Article | REF: S8260 V2

Information systems security – Guaranteeing risk control

Author: Jean-Marc CHARTRES

Publication date: March 10, 2011

You do not have access to this resource.
Click here to request your free trial access!

Already subscribed? Log in!


Overview

Français

Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.

Read the article

AUTHOR

  • Jean-Marc CHARTRES: CNAM engineer - Security Consultant at TELINDUS ICT Belgacom

 INTRODUCTION

Changes in the way we work have led to a fantastic evolution in means of communication and information exchange. Our use of computers is constant, and our dependence on connection to information systems is growing all the time. At the same time, we are witnessing worrying parasitic phenomena in this new exchange space; the opening up of the Internet to all modes of communication, whether private or public, is generating new threats.

Information systems need to be protected so that data can be freely communicated, stored and processed.

Our times are marked by a paradox: risks are multiplying, and we would like to ignore them; worse, we do not tolerate the consequences of our unforeseen events.

Increasingly miniaturized, disseminated and individualized, IT and telecommunications systems are exposed to threats from people, organization, procedures and devices, through errors, breakdowns, accidents and, above all, malicious intent.

Technical constraints fade away; services take precedence over infrastructure. The network is now "virtual" and global, and the customer is once again active.

Cybercrime has become one of the major scourges of our economies. IT security is a major objective for our companies.

You do not have access to this resource.

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource.
Click here to request your free trial access!

Already subscribed? Log in!


The Ultimate Scientific and Technical Reference

A Comprehensive Knowledge Base, with over 1,200 authors and 100 scientific advisors
+ More than 10,000 articles and 1,000 how-to sheets, over 800 new or updated articles every year
From design to prototyping, right through to industrialization, the reference for securing the development of your industrial projects

This article is included in

Safety and risk management

This offer includes:

Knowledge Base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

Practical Path

Operational and didactic, to guarantee the acquisition of transversal skills

Doc & Quiz

Interactive articles with quizzes, for constructive reading

Subscribe now!

Ongoing reading
Information systems security – Guaranteeing risk control