1) BYOD or AP / "Take your personal devices"
It is a concept that comes straight from the United States. The "Bring Your Own Device" is a theory that highlights the use of a personal terminal (tablet, personal computer) to work. However, you should be warned against this practice. Indeed, using an unprotected Internet network to access content related to his work (emails, contract, files…) is to be taken very very seriously, with finesse as the risks are great. And this problem has been highlighted in confusing the professional devices of personal devices as one of the causes of increased cyber threats that most often weigh on companies. because an infected personal device can very easily corrupt a company's system when the user connects to the business network.
2) A data leak
When we are in a situation, where information of a nature confidential, private or very sensitive are easily accessible on the Internet by any who were supposed to be on a protected or accessible server that by a certain number of people, we are talking about data leakage. In the majority of cases, data leaks are the result of computer attacks, as it is necessary to to admit it, servers storing data, whether financial or simply standard, will always be of interest to hackers who want for various reasons (financial, political, activists) to have access to these. whether the market value of data is to be taken into account which is growing year after year with the evolution of big data, it is necessary to say that leaks data are not ready to stop today.
However, data leakage is often caused by poorly-needed servers protected or even mistakes manipulation on the part of managers.
3) Phishing or phishing
It is a well-known method of piracy in the world of cybercrime. In some measures, it does not really require high-skilled programming or pure computing. However, you have to be smart and very creative. Indeed, the method of phishing will consist of deceiving the internet user's vigilance, to lead him to a dummy platform, designed from any room, where the latter goes deliberately left his coordinates while believing that he has access to a platform he knows. For example, this can with the official page of an online bank, where the user believing having access to his online bank account in fact is giving his references banks to hackers. It should be noted that thanks to this model of hacking it is now easy for a cybercriminal to impersonate an individual, fraudulently accessing online accounts while posing as the owner of this account, initiate online actions on behalf of the The user who has been hacked.
4) Denial of Service Attack (DoS)
It is a form of computer attack that will involve attacking an Internet network or a computer and internet system, saturating it with information. This is usually achieved through a multitude of simultaneous automatic connections. It is now possible to find branches of hackers who have specialized only in this form of attack. Once the system is saturated, it is said that computers for servers become zombies, unable to run properly, participates even without knowing this saturation. If the attack is successful, the hackers originally will then be able to renegotiate the payment of a sum of money to cease hostilities against the targeted system.
5) Data Protection Delegate (DPO)
Position that has been formalised by EU legislation since May 2018, and especially by the RGPD (regulation general data protection). The delegate for the protection of data is a person who is in charge of a company or a public institution, to ensure that all the actions of the structure to which it is comply with data protection regulations. Looking at his skills, whether legally or technically, he will have the role of externally on all security measures to be developed and improve in the organizations in which it will be assigned. It should be noted that In Europe, it is mandatory to appoint a data protection delegate regardless of the legal form of the company, its size and of course its sector, if it is intended to generate, transfer and use sensitive data.
6) Vital Operators (IVOs)
These are structures, public or private, that are divided into 12 sectors of activity (transportation, health, energy, security, finance, etc.). In France there are exactly 250. In most countries that have this consideration for structures, vital operators are required to have an impeccable IT security policy. In order to do this, public institutions carry out security audits on a very regular basis. The impact of these structures on social and economic life is so great that we must not neglect even one parcel that can turn into vulnerability tomorrow.
Now access an unlimited number of passwords: