Skip to main content

Featured

Introduction to Finance, Accounting, Modeling and Valuation

  What you'll learn #1 Best Selling Accounting Course on Udemy (Learn Finance and Accounting the Easy Way)!​ Analyze and understand an income statement (even if you have no experience with income statements). Analyze and understand a balance sheet (even if you have no experience with balance sheets). The Foundation: An Introduction to Accounting and Business Every business transaction—from buying inventory to selling a product—must be recorded. This is the realm of accounting . Often referred to as the "language of business ," accounting is a systematic process that involves identifying, measuring, and communicating financial information to users, enabling them to make informed judgments and decisions. What is Accounting? A Deeper Dive At its core, accounting is about providing a clear, accurate, and standardized picture of a company’s financial activity. The ultimate goal is to generate financial statements that are used by various stakeholders, including owners, mana...

Exclusive DEALS

Cyber security : The systems and data to be protected

Cyber security : The systems and data to be protected



1  1- Two essential concepts

Information systems: all IT resources to process and disseminate information around the world digital. A computer, a phone, a connected watch, a server, the internal network of a school such as the of a company are therefore information systems.

The concept of "information systems" stems from the concept of "information systems security", which is very similar to that of cybersecurity.

Data: all digital information created, processed, stored, saved, but also accessible, shareable and disseminated.




2  2- What to protect

Asking the question of the information systems and data to be protected implies questioning their importance for a given entity or person. For example:

Personal data of an individual (e.g. name, surname, address, phone number, email, private conversations, photos, bank details, etc.) the use of which for malicious purposes or simply through negligence exposes you to many risks: misuse of data for commercial purposes, damage to reputation, fraud or extortion, identity theft, etc.

Information systems and data from companies, universities and communities, which are essential to their functioning and can be sensitive. An attack on the systems and data could be damage to their proper functioning or to the compromise of secrets. At stake, the interruption of all or part of their activity, sometimes losses in turnover, a damage to reputation...

The information systems of public and/or private operators of critical infrastructures, managing facilities that sometimes play a vital role in the functioning of the nation, such as in the energy, transport and telecommunications sectors.

Classified State Information, namely most sensitive information, including disclosure could be injurious to the national security.




3  3- An increasingly complex digital environment

Two trends are now helping to make the digital space more complex to understand, manage and protect:

-         The digital world is increasingly in the cloud!

In the past, protecting a computer network and the computers that exist on it were connected was primarily about securing the front doors and of an organization's output to the Internet, including the information system was most often installed in its premises. With the development remote working, the increasing interconnection of companies (etc.), Digital technology has become a huge interdependent ecosystem of actors, services, equipment. This is particularly rendered possible through the development of cloud computing making many services remotely accessible and allowing Access to data located in multiple locations at the same time on the planet.

-         The multiplication of actors involved in the provision of digital equipment and services

(the supply chain), including many subcontractors, suppliers or integrators, all of whom have a role to play in securing systems and data. Ensuring that everyone assumes their share of responsibility for securing information systems is not always easy! However, each unsecured link in the chain makes it more vulnerable.




 

 

 

 

Comments