Advanced Search

Decree Of 10 February 2004 Establishing The Organization, The Nature And The Programme Of Events For External And Internal Competitions For Access To The Body Of The Communication And Information Systems Officers

Original Language Title: Arrêté du 10 février 2004 fixant l'organisation, la nature et le programme des épreuves des concours externe et interne pour l'accès au corps des attachés des systèmes d'information et de communication

Subscribe to a Global-Regulation Premium Membership Today!

Key Benefits:

Subscribe Now for only USD$40 per month.
Learn more about this text ...

Text information

Summary

Application of Art. 33-2 to 33-4 of Decree 69-222. Repeal of the Order of 18-11-1998.

Keywords

FOREIGN AFFAIRS , PUBLIC FUNCTION OF THE STATE , CENTRAL ADMINISTRATION , FOCUS SERVICE , INFORMATION AND COMMUNICATION SYSTEM , ATTACHES INFORMATION AND COMMUNICATION SYSTEMS , CATEGORY A , RECRUITING , COMPETITION , CLOSED COMPETITION , EXTERNAL COMPETITION , PROGRAM , EPREUVE , ADMISSION , JURY , COMPOSITION , STUDY ORGANIZATION


JORF No. 59 of 10 March 2004 4689 page
Text No. 22



Decree of 10 February 2004 fixing the organisation, nature and programme of competitions for external and internal competitions for access to the body of information and communication systems.

NOR: MAEA0320568A ELI: https://www.legifrance.gouv.fr/eli/arrete/2004/2/10/MAEA0320568A/jo/texte


The Minister of Foreign Affairs and the Minister of the Public Service, State Reform and Spatial Planning,
Given the law N ° 83-634 of 13 July 1983 as amended bearing the rights and obligations of civil servants, together with Act No. 84-16 of 11 January 1984 laying down statutory provisions relating to the public service of the State;
Having regard to Decree No. 69-222 of 6 March 1969, Amended, inter alia, by Decree No. 98-954 of 27 October 1998 on the special status of diplomatic and consular officials, and in particular Articles 33-2, 33-3 and 33-4;
In the light of the amended decree of 10 June 1982 fixing the programme and nature Competitions and examinations for the processing of information, in particular Articles 5 (1) and 7 (1);
In view of the decree of 13 April 2000 laying down the list of operating systems and advanced languages In competitions and examinations for information processing;
In view of the opinion of the interdepartmental committee for the security of information systems,
Stop:

Item 1
The external and internal competitions for access to the body of the officers of the information and communication systems established by Article 33-2 of the above-mentioned Decree of 6 March 1969 contain written tests
of these tests may, in accordance with the provisions of the decree of 10 June 1982 referred to above, lead to the recognition of computer skills of an analyst or programmer of The operating system of the laureates who requested, upon registration in the competition, to undergo qualifying tests.

Article 2 Read more about this Article ...


The written tests for the eligibility of external and internal competitions for access to the body of information and communication systems are as follows:


1st test
(common to external and internal competitions)


Writing a summary note from a scientific folder and To verify the candidate's qualities of expression, analysis and synthesis in the scientific and technical fields, as well as his ability to draw conclusions and make proposals (duration: three hours; Coefficient 4). Any score less than 6 out of 20 is eliminatory.


2nd test
(common to external and internal competitions)


Major technical proof of candidate selection from the following options:
-networks And telecommunications;
-computer;
-architecture and system,
(duration: four hours; coefficient 5). Any score less than 8 out of 20 is eliminatory.
This test will be able to contribute, on the applicant's request when enrolling, to the recognition of the following computer skills:
-System Programmer Exploitation-in this case, the test will be for four hours, but the score for the acquisition of the rights to this qualification will have to be at least 10 of 20;
-analyst-in this case, the test will be For a period of six hours, and the note to be taken into account for the acquisition of the rights to that qualification shall be at least 10 of 20.
The programme of the major test is set out in Annex I and shall be published in the Official Journal.


3rd test
(common to external and internal competitions)


Minor technical proof, at the choice of the candidate, one of the options not chosen for the major technical test Above (duration: two hours; coefficient 3). Any score of less than 8 out of 20 is eliminatory.
This test will be able to contribute, on the application of the candidate formulated upon registration, to the recognition of the computer proficiency of the operating system programmer, Concurrent with the above major technical test, provided that the score obtained is at least 10 of 20.
The program of the minor test is set out in Annex I and will be published in the Official Journal.

Article 3 Learn more about this Article ...


The oral tests for the admission of external and internal competitions for access to the body of information and communication systems are as follows:


1st Draft
External Competition


Conversation with the jury on a scientific and technical subject or text in French from the Leaves, after thirty minutes of preparation, to check the candidate's ability to meet the scientific and technical requirements of his future functions and to assess the personality and motivations of the candidate. This conversation starts with a ten-minute presentation (total duration: thirty minutes; coefficient 6). Any score of less than 8 out of 20 is eliminatory.


Internal competition


Conversation with the jury on a subject drawn by lot, after thirty minutes of preparation, to verify the aptitude and the Scientific and technical knowledge of the candidate in the chosen field of eligibility (networks and telecommunications, or computing, or architecture and systems) and allowing to appreciate the personality and motivations of the Candidate. The starting point for this conversation is a five-minute presentation on the candidate's status and professional experience (total duration: thirty minutes; coefficient 6). Any score of less than 8 out of 20 is eliminatory.
The external or internal candidates who requested, upon registration, the recognition of an IT qualification either as an analyst or an operating system programmer Get a score of at least 10 of 20.


2nd test
(common to external and internal competitions)


Evidence of reading, translating, and commenting on a text (which will be of character In a language chosen by the candidate upon entry on the following list: Arabic, Chinese, English, French, German, Italian, Japanese, Portuguese, Russian or Turkish. (preparation: twenty minutes; duration: twenty minutes; coefficient 1). Any score less than 6 out of 20 is eliminatory.

Item 4 More about this Article ...


When registering, candidates may apply for an optional oral test.


Optional oral evidence common to both competitions


Legal evidence (preparation: thirty minutes; duration: thirty minutes; coefficient 1). The programme is set out in Annex II to this Order and will be published in the Official Journal.

Article 5 Learn more about this Article ...


For the external and internal competition language test, the use of the dictionary is allowed only for the following languages: Arabic, Chinese, Japanese. For all three languages, all types of dictionaries, excluding electronic dictionaries, from the language of the test to English, to English or to a third language are allowed. Candidates using a dictionary of the language of the test to a language other than English and French may use a third-language dictionary to English or French. Also permitted for Arabic, Chinese or Japanese are dictionaries written exclusively in the language of the test.

Article 6 Learn more about this Article ...


The jury shall draw up, in alphabetical order, the list of candidates admitted to the oral admission tests.
Following the oral tests of admission, the jury shall draw up, in order of merit, the list of candidates. In
case of equality in the number of points between several candidates, the order of classification shall be determined by the mark obtained at the first written test of eligibility and, in the case of new equality, by the mark obtained in the second Written eligibility test.

Article 7 Read more about this Article ...


The composition of the selection board for access to the body of information and communication systems attaches is fixed by order of the Minister for Foreign Affairs.
This jury includes:
-le Director General of the Administration of the Ministry of Foreign Affairs or its representative, President, with a casting vote;
-a member of the Interdepartmental Committee on Information Systems Security;
-des Officials of the Ministry of Foreign Affairs belonging to a category A or assimilated body;
-teachers or personalities appointed because of their speciality and skills.

Article 8 Learn more about this Item ...


Order of November 18, 1998, relating to the same subject matter is repealed.

Item 9 Read more about this Article ...


The Director General of the Administration of the Ministry of Foreign Affairs shall be responsible for the execution of this Order, which shall be published in the Official Journal of the French Republic.

Appendix
A N N E X E I
A. -NETWORKS AND TELECOMMUNICATIONS OPTION
Common Tronc for all candidates
Architectures and protocols


Network topologies.
Extended networks, metropolitan networks, local networks.
ressage.
Types of Transmission.
Access methods, interconnections, switching, bypass, routing.
Standard layered architecture, owner-shell architecture.
OSI model.
TCP/IP architecture, Ipv4/IPv6.
Ethernet.
Hardware.
Digitization and compression techniques.
Features of a NOS.
Network administration (performance, administration and management, MIB, SNMP, RPC, constructor approaches ...).


Internet - Intranet-extranet


Operating and operating principles, protocols.
Approach to techniques: HTTP, HTML, XML, URL, DNS, Web servers, firewall, proxy, FTP.
Networks and subnets, addressing plan.
Access Types.
Session identifier.
Internet and intranet security: filters, firewalls, proxies, DMZ, address translation, IPSec, SSH, SSL, SHTTP.
Mobility and nomadism management, remote access.


Mail and Directory


Operating and operating principles, protocols (X400, SMTP, POP, IMAP, X500, LDAP, MIME ...).
Market offerings.


Specific program
Principles General


Basic Concepts.
The needs of organizations in internal and external communication.
Organization of international, European and national telecommunications authorities.
National operators and International.


Operator Networks


Switched telephone network.
Digital Network.
Specialized bindings.
Large network networks: X.25, frame relay, ATM, optical networks, MPLS.
High speed technologies: ADSL, 100 Mbps Ethernet, Gigabit Ethernet, SDH.
Wireless networks, mobile networks: BLR, Wi-Fi, GSM, GPRS, UMTS.
Satellite networks.
Virtual private networks.
Value network services Added.


Equipment


Physical media characteristics.
Cabling infrastructures, architectural considerations (local, implantation, security, accessories, installation, testing, and Certification).
Characteristics of LAN/WAN interconnect equipment.


Telephony


Basic principles of voice communication, telephony concepts.
Architecture, Basic services and management of autoswitches.
Connection modes, classic or digital terminals, sizing rules.
Voice over IP
Telephony, video, IT integration.


Antennas


General Principles and Antenna Types.


Network Security


Network Identification Services.
Access Control (Inbound and Outbound).
Network Dissimulation
Packet Filtering
Security of cabling infrastructures, local network equipment, and autoswitches.


Network Administration


Techniques and approaches to Network administration (problem management, performance, quality of service, configurations, state and consumption of resources, security, maintenance).
Apclose Constructors and Market Offers.


B. -INFORMATICS OPTION
Common Tronc for all candidates
General Concepts of Information Systems Security


Physical and Logical Risk Identification.
Fraudes and Computer hacking.
Threats, vulnerabilities, and parades
Non-technical security operational measures.
Protection techniques.
Security management, methodological approaches.


Security of Data and hardware


Logical measures: access control, authentication, integrity, encryption, electronic signature.
Physical measures: backups, logs, hardware redundancy, replication, key Physical.
Levels of protection.


Cryptography


Terminology.
Public key encryption, secret key.
Encryption algorithms (DES, 3-DESS, IDEA, AES, RSA, ECC ...).
Key Management Infrastructures.
Certificates.
Cross-Certification.


Specific Program
Design and Realization of the Information System


Methodological bases for the information system Information systems design and implementation
Data structures and programs.
Conceptual Data Model (DCM).
Flow Graph.
Organizational Data Model (MOD).
Logical Model of Data (MLD).


Information Systems Methodology


Information System Urbanism.
Blueprint.
Project life cycle phases: needs identification, phase of Design, prototyping, programming, testing, integration, qualification, installation, operation and maintenance.
Project Conduct: prediction and implementation tracking, documents, steps, validation instances.
Analytical Approach and Systems approach.
Knowledge of a method of analysis: selecting the candidate (Merise, Merise Subject, OMT, UML ...).


Specification of the information system


Objectives and constraints.
Basics Data and DBMS: organization of data, functions and use of a DBMS, optimization, conceptual schema, relational model, SQL.
Evaluation of volumes, periodicity, response time.
Choice of adapted structure and offers


Processing Organization


Processing Methods
Programmatic Trees (Sequential, Alternative, Repetitive Structures).
Recursion Reentrance.
Central, departmental, and distributed systems: history and evolutions, data distribution, programs between stations and servers, and between servers.
Multi-tier architectures.
Client connection layers And servers (sockets, ODBC drivers ...).


Realization


Knowledge of a programming language, at the choice of the candidate (C/C + +, Basic/Visual Basic, Cobol, Java, Powerbuilder).
Help tools for The design, realization and validation of computer applications (software engineering workshop, test tools ...).
Object oriented concepts and applets.


C. -OPTION ARCHITECTURE AND
Tronc SYSTEM Common for all candidates
Basic knowledge


Information basic representation.
Amount of information.
Input and control of information.


Data structures


Tables, stacks, files.
Files: organization and use.
Database and DBMS: organization, functions, and use, optimization concepts, relational model.
Data Permanence, Rights, Sharing, Access control.
Reliability, backup.


Architecture and hardware


Processor: data path, statement, addressing, sequencing.
I/O management.
Controllers Devices.
Interrupt Systems.
Submissions: types, operations, classification.
Major devices.
Information storage devices.
Machine types: high power computers, mini-computers, stations Working, microcomputers.
Dedicated servers (appliance), multi-processor servers, farms, clusters.
Storage networks: NAS, SAN.


Software Types


OS.
Utility programs.
Application programs.
Software packages.
Editors, FOSS.


Operating Systems


Knowledge of the basic characteristics of a system Operating, choosing the candidate: Unix, Linux, Microsoft Windows (NT and later), GCOS 7.
Process Management.
Task Manager, Trap Manager, " Scheduler ".
CPU Ordering.
Multiprocessor architectures.
Internal memory management.


Organization of the
information system and programming jobs


Methods of analysis, project management, and Programming.
Algorithms-modes of representation.
Compilation.
Test Cases and Development.
Program Maintenance.
Program Libraries.
Backup and Recovery Methods.
Synthesis Documentation : analysis folder, programming folder, operating folder.


Information Center


Objectives and structure of an information processing center.
Organization of the Job, tasks, and qualification.
Control.


Specific Program
Processor Architecture


Processing bodies: data path, statement, addressing, sequencing.
Architectures: Cisc, Risc, multiheart, multithreading.
Types of architectures:
-output systems;
-device controllers;
-interrupt systems;
-market offerings.


Production Programs


Process and resource management: concepts, scheduling, process operations, cooperative processes, inter-process communications, resource sharing ...
Process synchronization : critical section, semaphore.
Interlock: prevention, detection, correction.
Memory resource management.
Virtual memory.
System generation.
Information processing: assembly language, macroassembler, Machine language, advanced language.


System programming environment


Command language, phase and job workflow, resource reservation, virtual machine, assistance with Operations and development, accounting.
Interactive systems-editors.
Utility programs.
Systems: monoprogramming, multiprogramming, real-time system, shared time.
Initial loading of a system.


A N N E X E I I
EVIDENCE LEGAL FACULTATIVE
Informatique et libertés (law of January 6, 1978)
The CNIL


Membership and status of its members.
Operation and capabilities.
Powers CNIL missions.


Nominal file regulation


The scope of the law.
Its application: public sector, private sector.
The reporting system
Simplified standards.


Special categories of information
The right of access and rectification


Conditions of exercise and content of the right of access.
The right of access
The right of rectification.


Software Protection
The scope of protection
The different protection options


Copyright protection.
Protection by The law of patents, designs of the mark.
Non-custodial modes of protection: secrecy, protection under the contract.
Alternative means of protection: deposit forms, technical protections.


Law n ° 88-19 of 5 January 1988 on
on computer fraud, right to communications


The regulation of encryption in France (Acts Nos. 90-1170 of 29 December 1990 and No. 96-659 of 26 July 1996).
The regulation of communication vectors: private domain, public domain, operators.
The legal problems posed by the opening of means of communication (Internet, deregulation ...).


Administrative law


Public procurement code approach.


Done at Paris, February 10, 2004.


The Minister of Foreign Affairs,

For the Minister and by delegation:

By preventing the Director General

from Administration:

The subdirector,

P. Lefort

The Minister of the Public Service,

of the

and Spatial Planning,

For the Minister and delegation:

By Prevention of the Director General

Administration and Public Service:

The Deputy Director,

J.-P.
Jordan


Download the document in RTF (weight < 1MB) Facsimile (format: pdf, weight < 3.5 MB) Download document to RDF (format: rdf, weight < 1MB)