Overview
Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.
Read the articleAUTHORS
-
Pierre MONGIN: Mind mapping speaker, consultant and author
-
Laurent DELHALLE: Lecturer at Sciences Po Lyon and École de Guerre Économique
INTRODUCTION
Cyber risk can arise from human error (unintentional downloading of malware, for example) or accident. Protecting against cyber risk is no longer a choice, but an obligation for today's economic players. It's a fundamental challenge.
Whatever their size, companies need to safeguard their know-how, skills and, above all, their so-called personal data (DCP) and sensitive data (DCS), particularly in the face of malicious attacks with potentially devastating consequences. In addition to human error, malicious attacks can also include deliberate malicious acts, such as hacker attacks using software that installs a virus (malware), attempts to steal confidential information by posing as an authority (phishing), the interception of communications (eavesdropping, monitoring, viewing, reading or recording, by any means, as it passes over a telecommunications network without the knowledge of the person making or receiving the communication), the exploitation of software flaws, not to mention ransomware.
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Management and innovation engineering
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Cyber risk
Bibliography
SERRES Michel - Petite Poucette. Le Pommier (2012).
Websites
An ordinance concerns all electronic exchanges, teleservices or e-mails exchanged with administrations, whether they be State administrations, local authorities, their public administrative establishments, social security organizations or other private-sector bodies managing public administrative services.
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference