This course aims to present the concepts of risks and threats related to information systems, to adopt appropriate protection strategies, and to define a security policy consistent with the organization’s objectives and resources. It also covers risk assessment methods, security standards, as well as the different aspects of information system quality (software, data, models, and processes).