5. Conclusion
Information systems are exposed to threats against which they must be protected. Intrusive testing and risk analysis methods can first reveal their vulnerabilities. A number of technical solutions are then available to provide effective countermeasures.
The field of cybersecurity is currently booming, partly because technologies are evolving and countermeasures need to adapt, and partly because attackers are constantly developing new techniques to try and circumvent these countermeasures.
In recent years, companies have become fully aware of the challenges of cybersecurity, and have adapted their organizations and processes to manage it.
Software can be certified to prove that it has been developed in compliance with the rules of cybersecurity standards, and will therefore have a satisfactory level of robustness....
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Conclusion
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!