5. Conclusion
Modern information systems are exposed to threats against which they must be protected. To this end, risk analysis methods can first reveal the vulnerabilities of these systems. This is followed by a number of technical solutions that enable effective countermeasures to be implemented.
The field of cybersecurity is currently booming, partly because technologies are evolving and countermeasures need to adapt, and partly because attackers are constantly developing new techniques to try and circumvent these countermeasures.
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Conclusion
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!