Intervention by an expert in the field, to increase awareness of information systems security issues. Understand the issues, analyze critical situations, adopt appropriate practices.
Defining the scope of information systems security
Physical system protection: physical, thermal, electrical
Information backup: NAS, SAN, outsourcing, etc.
Integrity and confidentiality: encryption, authentication, PKI
Secure IT architectures: firewalls, intrusion detection, technology watch
Legal implications: CNIL, legal obligations.
A substantial part of the activities is dedicated to environmentally sustainable development and social responsibility.
Students will conduct a case study on a company's security audit. This study examines the societal challenges of IT security and evaluates the solutions envisaged in relation to the environmental impact of digital technology.