• Aucun résultat trouvé

Security Systeme Information Administration Lecture 0

N/A
N/A
Protected

Academic year: 2022

Partager "Security Systeme Information Administration Lecture 0"

Copied!
12
0
0

Texte intégral

(1)

Security Systeme Information Administration

Lecture 0

Pascal Lafourcade

2021-2022

(2)

“To teach is to show what is possible.”

“To learn is to make yourself possible.”

Paulo Coelho Le P´elerin de Compostelle

The students learn, the teacher promotes learning!

(3)

“To teach is to show what is possible.”

“To learn is to make yourself possible.”

Paulo Coelho Le P´elerin de Compostelle The students learn, the teacher promotes learning!

(4)

Organisation du cours : 12 Sessions

Planning

I Lecture 1: Friday 24 September 13h30 - 15h30 I Exercice Session 1: Friday 1 October 13h30 - 15h30 I Lecture 2: Friday 8 October 13h30 - 15h30

I Exercice Session 2: Friday 15 October 13h30 - 15h30 I Lecture 3 : Friday 22 October 13h30 - 15h30

I Presentation Session 1: Friday 29 October 13h30 - 15h30 I Presentation Session 2: Friday 12 November 13h30 - 15h30 I Exercice Session 3: Friday 19 October 13h30 - 15h30

I Lecture 4: Friday 26 November 13h30 - 15h30 I Exercice Session 4: Friday 3 December 13h30 I Lecture 5: Friday 10 December 13h30 - 15h30 I Practical Session: Friday 17 December 13h30 - 15h30

(5)

I hear, I forget.

I see, I remember.

I do, I understand.

Confucius

(6)

Grading

I Pr´esentations : 25’+ 10’ Q I Exam 2h in january

Final = 60%Exam+ 40% max(CC,Exam)

CC = 60%Presentation+ 40%TP pascal.lafourcade@uca.fr

leo.robert@uca.fr

(7)

Sujets

1. Buffer/Stack over Flow 2. TLS Attacks

3. SQL and NOSQL injection 4. Imessage attack

5. SGX Intel 6. OSINT

(8)

The only knowledge that really influences behaviour is that which one has discovered and appropriated oneself.

Carl Rogers

(9)

How does lecture work

I Lecture available, at least one week before.

I Exercice session available also before.

Answer YOUR questions during the lecture I Read the material of the lecture before I Understand and prepare questions

(10)

Content of the Lectures

1. Introduction to cybersecurity 2. Public Key Cryptography 3. Symmetric Cryptography 4. Main ATTACKS (Presentation) 5. PKI, TLS, Malwares ...

6. TOR, ZKP, Bitcoin ...

(11)

Questions?

(12)

Bruce Schneier

“Security is a process, not a product.”

Références

Documents relatifs

On a ajouté quelques questions, disséminées dans le questionnaire, qui, moins neutres et plus orientées, visent à tester certaines hypothèses d’explication : intérêt

Time-based SQL Injection is an inferential SQL Injection technique that relies on sending an SQL query to the database which forces the database to wait for a specified amount of

Paulo Coelho Le P´ elerin de Compostelle The students learn, the teacher promotes learning!.. The only knowledge that really influences behaviour is that which one has discovered

Exp´ erience classique de Held & Hein (1963) (chats) I L’apprentissage est optimal lorsque l’enfant alterne. apprentissage et test r´ ep´ et´ e de

Keywords: Remote learning (distance), e-learning, teacher, learner, infor- mation technology, authentication methods, dynamic authentication, static au- thentication,

The Data Production component extracts event metadata from files produced at Tier-0 or on the Grid, the Data Collection system [19] transfers EventIndex information from jobs to

The dynamics of the learning circle (LC) as a pedagogical tool are limitless, but as a science teacher, I have noticed a gap between theory and praxis in the practical

[r]