Cyber risk
Practical sheet REF: FIC1855 V1

Cyber risk

Authors : Pierre MONGIN, Laurent DELHALLE

Publication date: January 10, 2025 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

Overview

Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.

Read the article

AUTHORS

 INTRODUCTION

Cyber risk can arise from human error (unintentional downloading of malware, for example) or accident. Protecting against cyber risk is no longer a choice, but an obligation for today's economic players. It's a fundamental challenge.

Whatever their size, companies need to safeguard their know-how, skills and, above all, their so-called personal data (DCP) and sensitive data (DCS), particularly in the face of malicious attacks with potentially devastating consequences. In addition to human error, malicious attacks can also include deliberate malicious acts, such as hacker attacks using software that installs a virus (malware), attempts to steal confidential information by posing as an authority (phishing), the interception of communications (eavesdropping, monitoring, viewing, reading or recording, by any means, as it passes over a telecommunications network without the knowledge of the person making or receiving the communication), the exploitation of software flaws, not to mention ransomware.

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Article included in this offer

"Management and innovation engineering"

( 434 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details
Contact us