Academic literature on the topic 'Cyberattaque'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyberattaque.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyberattaque"
Vacheron, Charles-Hervé, Régis Fuzier, Estelle Morau, Antonia Blanie, Maryline Bordes, Julien Bordes, Jean-Louis Bourgain, et al. "Cyberattaque : le nouveau défi pour les établissements de santé ?" Anesthésie & Réanimation 7, no. 4 (July 2021): 268–69. http://dx.doi.org/10.1016/j.anrea.2021.06.005.
Full textLehu, Jean-Marc. "Cyberattaque : la gestion du risque est-elle encore possible ?" La Revue des Sciences de Gestion 291-292, no. 3 (2018): 41. http://dx.doi.org/10.3917/rsg.291.0041.
Full textQuinson, Audrey, Janusz Wajszczak, Charlotte Fernandez Canal, and François-Pierrick Desgranges. "Cyberattaque d’un centre hospitalier : de l’épée de Damoclès au tsunami." Anesthésie & Réanimation 7, no. 4 (July 2021): 316–17. http://dx.doi.org/10.1016/j.anrea.2021.05.001.
Full textBasset, Laurence. "Cyberattaque et cyberdéfense, Daniel Ventre, 2011, Paris, Lavoisier, 312 p." Études internationales 43, no. 3 (2012): 476. http://dx.doi.org/10.7202/1012824ar.
Full textLopez, Rébecca. "Cyberattaque et cyberdéfense / Daniel Ventre Paris, Hermès science publications Lavoisier, 2011, 312 p." Revue internationale et stratégique 85, no. 1 (February 1, 2012): XXXII. http://dx.doi.org/10.3917/ris.085.0141af.
Full textScius, Marie, Solène Brocail, Isabelle Lombard, Cécile Cadot, and Farahna Samdjee. "Faire face à une cyberattaque : retour d’expérience d’une unité de reconstitution des chimiothérapies." Le Pharmacien Clinicien 59, no. 1 (March 2024): e14-e15. http://dx.doi.org/10.1016/j.phacli.2023.11.025.
Full textLibicki, Martin C. "De Tallinn à Las Vegas, une cyberattaque d’importance justifie-t-elle une réponse cinétique?" Hérodote 152-153, no. 1 (2014): 221. http://dx.doi.org/10.3917/her.152.0221.
Full textMennecier, Didier. "Cyberattaques et hôpital." Médecine de Catastrophe - Urgences Collectives 4, no. 4 (December 2020): 327–30. http://dx.doi.org/10.1016/j.pxur.2020.06.006.
Full textFévrier, Rémy. "Covid-19 et cyberattaques." Revue Française de Gestion 46, no. 293 (November 2020): 81–94. http://dx.doi.org/10.3166/rfg.2020.00479.
Full textDelépine, Justin. "Cyberattaques : sommes-nous prêts ?" Alternatives Économiques N° 424, no. 6 (June 1, 2022): 56–59. http://dx.doi.org/10.3917/ae.424.0056.
Full textDissertations / Theses on the topic "Cyberattaque"
Coste, Benjamin. "Détection contextuelle de cyberattaques par gestion de confiance à bord d'un navire." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0106/document.
Full textNavigation and ship’s management are two essential aspects for the security of the ship itself and people on board as much as the maritime environment protection. Modern ships ensure these functions by increasingly embedding connected and automated technologies such as sensors, actuators, programmable logic controllers and pieces of software. However, the security of this objects as well as the trust in the information they produce cannot be guaranteed: they can be deceived or under the control of a malicious third party. In this context, a novel approach of data falsification detection is proposed. It is based on trust assessment of information system components which can be seen as inter-related functional blocks producing, processing and receiving pieces of information. The trust one can have inproduction blocks, called information sources, is assessed through its ability to report real situation of the ship. Trust is then propagated to the remainder part of the system. A simulator was made thanks to which we experiment several scenarios including intentional modification of numerical data. In these cases and under some conditions, the variability of trust give us the ability to identify the attack occurrence as much as its target. Our proposition is not restricted to naval information systems and can be employed in various situations even with human factor
Kasse, Mamadou. "Système de Ρréventiοn cοntre les vulnérabilités et de Détectiοn des Anοmalies dans les Réseaux Ιnfοrmatiques." Electronic Thesis or Diss., Normandie, 2024. https://theses.hal.science/tel-04885354.
Full textTools for vulnerability prevention and anomaly detection are essential for the security of computer networks. This thesis focuses on using MITRE ATT&CK data, CVSS scores, and the ISO 27002:2022 standard to automate and consolidate vulnerability analysis and anomaly detection.The main objectives are: -Vulnerability Diagnosis: Identify the most vulnerable sub-networks by combining MITRE ATT&CK data, CVSS scores, and the ISO 27002:2022 standard. To achieve this, a database called Data ISO-MA was created. An algorithm evaluates the vulnerability of network paths, identifying those most at risk. - Anomaly Detection: Analyze traffic flows to detect unusual behaviors in vulnerable paths. An approach inspired by the Path-scan model introduced by Joshua Neil et al. (2013) was used. Each network connection is modeled with a 3-state Markov model and the Generalized Likelihood Ratio Test (GLRT), allowing for the capture and identification of abnormal behaviors.These two tools aim to enhance the security of computer networks by providing an integrated solution for vulnerability prevention and anomaly detection
Timbert, Michaël. "Protections des processeurs contre les cyber-attaques par vérification de l’intégrité du flot d’exécution." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT028.
Full textCyber attacks are based on intrusions into digital systems by exploiting bugs to take control over the system. Many protections have been developed to thwart cyber attack, among them we can quote code obfuscation, memory integrity check, instruction set randomization, address space layout randomization (ASLR), canary, sand boxing, process isolation, virtualization and access right restriction. Modern processors provide security by zone isolation systems (Protection ring, MMU, NX bit, TrustZone), Control Flow Integrity (CFI) is a new technique proposed by Abadi et al. to mitigate program corruption. This technique gave rise to many implementations but none are complete, fast and easily incorporable to existing processor. This thesis is inspired from previous work on HCODE which implements code integrity by computing signature for each executed basic block. HCODE is an hardware block designed to be plugged in read only on the interface between the processor and the instruction cache. In this thesis we present CCFI solution, improvement of HCODE, which is now able to provide Code Integrity and Control Flow Integrity. We propose CCFI architecture able to protect direct and indirect jumps as well as interruptions. The proposed solution is based on both hardware modules and software modifications to ensure speed and flexibility of the solution. To ensure a full CFI protection metadata are embedded with the code. These metadata describes the Control Flow Graph
Skaf, Faten. "La justice pénale face à la cybercriminalité." Thesis, Aix-Marseille, 2017. http://www.theses.fr/2017AIXM0218.
Full textNowdays, Criminal justice is confronted to digital and the development of dematerialized data, whose heritage value is still increasing, raise challenges of ideological, sociological, economical, geopolitical and of course legal nature. Criminal justice needs to deal with cybercrime which make light of time, space and legislation because illicit acts now take place in cyberspace. However, so that the criminal justice system can contribute effectively to fight against cybercrime, states should be able to lean on a set of legal rules against crime and criminal justice systems which work correctly, should have the necessary abilities to get to the bottom of legal affairs which can be complex and cooperate in cybercrime repression on the international level
Di, Maggio Antonia. "Les atteintes aux systèmes de traitement automatisé de données : harmonisation et coopération en Europe." Electronic Thesis or Diss., Corte, 2022. http://www.theses.fr/2022CORT0014.
Full textComputer systems are essential parts of political, social, and economic interaction and have become fundamental for development and innovation. However, these systems are as many resources as they can be a threat to the security, the rights and the freedoms of users. Indeed, attacks on automated data processing systems consist in various criminal processes, carried out by several categories of offenders and affecting many different victims such as individuals, companies, or even States. The study of the punishment of such offences leads us to the question of the relevance of French legislation concerning that through a double examination. The first one, on the one hand, consisting of comparing, through a horizontal analysis, the substantive and formal special criminal law, from the angle of comparative law (Belgium and Italy), and, on the other hand, in examining, through a vertical analysis, their consistency with European standards. From this point of view, the study discloses the existence of a legislative corpus which is dense but also unclear because of its technicality. The study also notes that there is a fragile border in procedural matters regarding to the development of techniques which are effective but also likely to affect individual freedoms. The second examination focuses on the overall policy implemented by States to prevent and combat these computer attacks. On this point, cooperation between States is a corollary of the effectiveness of repression in this area. However, in practice, the choices made to promote such collaboration encounter major application difficulties. Added to these difficulties are those linked to the commission of cyberattacks by the States themselves, since cyberspace now appears as a new field of political and military conflict. That being stated, while it seemed that these state cyberattacks were carried out in an area of lawlessness, it turns out, on the contrary, that criminal law has a certain potential for their repression
Books on the topic "Cyberattaque"
Cyberattaque et cyberdéfense. Paris: Hermès science publications, 2011.
Find full textEVASION NE DANGER: CYBERATTAQUE ! Santillana Français, 2019.
Find full textDuport, Florence Esposito. CYBERATTAQUE À LA BANQUE. PEARSON DISTRIBUCIÓN, 2017.
Find full textKOKO, Charles. BOÎTIER de SÉCURITÉ NATIONALE: Piratage et Cyberattaques Contre les Infrastructures Critiques - le défi de la Cyberguerre Aux Portes de l'Europe et du Royaume-Uni. Independently Published, 2022.
Find full textBook chapters on the topic "Cyberattaque"
Dahmen, Ulla, and Nicolas Krämer. "Angriff aus der Dunkelheit: Cyberattacke auf das Lukaskrankenhaus Neuss." In Cybersecurity Best Practices, 13–21. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21655-9_2.
Full textBEN CHEHIDA DOUSS, Aida, and Ryma ABASSI. "Vulnérabilités dans la e-santé et contre-mesures." In Gestion de la sécurité en e-santé, 27–51. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9179.ch2.
Full textMiramont, Delphine. "Cyberattaques et espace extra-atmosphérique : interférences et régime juridique." In Droit de l'espace extra−atmosphérique, 147–60. Presses de l’Université Toulouse 1 Capitole, 2021. http://dx.doi.org/10.4000/books.putc.14788.
Full text