2. Information system methodologies
After recalling the challenges of cybersecurity, taking stock of the current situation and giving numerous examples of attacks, this paragraph presents the different methods that can be used to build less vulnerable information systems, and distinguishes between analysis-based and process-based methods. For information systems, the general aim of IT security is to protect the company's IT assets
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Information system methodologies
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!