Article | REF: SE2505 V2

Cyber risk management - Risk identification, detection, analysis, treatment and transfer

Authors: Nicolas DUFOUR, Matthieu BARRIER

Publication date: September 10, 2022

You do not have access to this resource.
Click here to request your free trial access!

Already subscribed? Log in!


Français

1. Identifying cyber threats

1.1 Permanent vulnerability

Cyberspace

Cyberspace can be seen as the interconnection of several computers in a communication environment (e.g. the Internet).

At a time when all companies are turning to cyberspace for their customer and supplier relations, as well as for their links with partners and investors, exposure to potential security breaches is an issue that every company must address in its risk management strategy. For a company, this means adopting a risk management policy, or even an information systems security policy. This approach also involves identifying the internal vulnerabilities and threats (internal or external) that the company may face.

Before...

You do not have access to this resource.

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource.
Click here to request your free trial access!

Already subscribed? Log in!


The Ultimate Scientific and Technical Reference

A Comprehensive Knowledge Base, with over 1,200 authors and 100 scientific advisors
+ More than 10,000 articles and 1,000 how-to sheets, over 800 new or updated articles every year
From design to prototyping, right through to industrialization, the reference for securing the development of your industrial projects

This article is included in

Safety and risk management

This offer includes:

Knowledge Base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

Practical Path

Operational and didactic, to guarantee the acquisition of transversal skills

Doc & Quiz

Interactive articles with quizzes, for constructive reading

Subscribe now!

Ongoing reading
Identifying cyber threats
Outline