Cyber security : The systems and data to be protected

Cyber security : The systems and data to be protected



1  1- Two essential concepts

Information systems: all IT resources to process and disseminate information around the world digital. A computer, a phone, a connected watch, a server, the internal network of a school such as the of a company are therefore information systems.

The concept of "information systems" stems from the concept of "information systems security", which is very similar to that of cybersecurity.

Data: all digital information created, processed, stored, saved, but also accessible, shareable and disseminated.




2  2- What to protect

Asking the question of the information systems and data to be protected implies questioning their importance for a given entity or person. For example:

Personal data of an individual (e.g. name, surname, address, phone number, email, private conversations, photos, bank details, etc.) the use of which for malicious purposes or simply through negligence exposes you to many risks: misuse of data for commercial purposes, damage to reputation, fraud or extortion, identity theft, etc.

Information systems and data from companies, universities and communities, which are essential to their functioning and can be sensitive. An attack on the systems and data could be damage to their proper functioning or to the compromise of secrets. At stake, the interruption of all or part of their activity, sometimes losses in turnover, a damage to reputation...

The information systems of public and/or private operators of critical infrastructures, managing facilities that sometimes play a vital role in the functioning of the nation, such as in the energy, transport and telecommunications sectors.

Classified State Information, namely most sensitive information, including disclosure could be injurious to the national security.




3  3- An increasingly complex digital environment

Two trends are now helping to make the digital space more complex to understand, manage and protect:

-         The digital world is increasingly in the cloud!

In the past, protecting a computer network and the computers that exist on it were connected was primarily about securing the front doors and of an organization's output to the Internet, including the information system was most often installed in its premises. With the development remote working, the increasing interconnection of companies (etc.), Digital technology has become a huge interdependent ecosystem of actors, services, equipment. This is particularly rendered possible through the development of cloud computing making many services remotely accessible and allowing Access to data located in multiple locations at the same time on the planet.

-         The multiplication of actors involved in the provision of digital equipment and services

(the supply chain), including many subcontractors, suppliers or integrators, all of whom have a role to play in securing systems and data. Ensuring that everyone assumes their share of responsibility for securing information systems is not always easy! However, each unsecured link in the chain makes it more vulnerable.




 

 

 

 

Next Post Previous Post
No Comment
Add Comment
comment url