Rechercher par propriété

De Wiki Campus Cyber
Aller à :navigation, rechercher

Cette page fournit une simple interface de navigation pour trouver des entités décrites par une propriété et une valeur nommée. D’autres interfaces de recherche disponibles comprennent la page recherche de propriété, et le constructeur de requêtes « ask ».

Rechercher par propriété

Une liste de toutes les pages qui ont la propriété « Text« Text » est une propriété prédéfinie fournie par <a target="1" rel="nofollow" class="external text" href="https://www.semantic-mediawiki.org/wiki/Help:Special_properties">MediaWiki Sémantique</a> et qui représente un texte de longueur quelconque. » avec la valeur « Doctrine and method for cyber resilience and cyber crisis management. ». Puisqu’il n’y a que quelques résultats, les valeurs proches sont également affichées.

Affichage de 26 résultats à partir du nº 1.

Voir (50 précédentes | 50 suivantes) (20 | 50 | 100 | 250 | 500)


    

Liste de résultats

  • Practical guide: Preventing cyber risks in the supply chain  + (Cybersecurity in the supply chain, where sCybersecurity in the supply chain, where sector-specific issues highlight the importance of distinguishing between operating an information system and providing a service, highlights the key role of subcontractors, the need for mutual trust and high security standards. Cybersecurity in the supply chain, where sector-specific issues highlight the importance of distinguishing between operating an Information System and providing a service, underscores the key role of subcontractors, the need for mutual trust and high security standards. mutual trust and high security standards.)
  • Fiche pratique : Prévenir les risques cyber d'une supply chain  + (Cybersecurity in the supply chain, where sCybersecurity in the supply chain, where sector-specific issues highlight the importance of distinguishing between operating an information system and providing a service, highlights the key role of subcontractors, the need for mutual trust and high security standards. Cybersecurity in the supply chain, where sector-specific issues highlight the importance of distinguishing between operating an Information System and providing a service, underscores the key role of subcontractors, the need for mutual trust and high security standards. mutual trust and high security standards.)
  • Cybersecurity jobs skills workshop  + (Cybersecurity jobs skills workshop)
  • Cybersecurity jobs skills workshop  + (Cybersecurity jobs skills workshop)
  • Fiche méthode : Exercice Défacement  + (Defacement is the modification of a web page/site in order to share false information or pass on a message of protest.)
  • CI Sécurisation du Cloud  + (Define the risks inherent in the cloud in all areas (risk of information leakage, intrusion, compliance, etc.).)
  • Cloud security  + (Define the risks inherent in the cloud in all areas (risk of information leakage, intrusion, compliance, etc.).)
  • GT CTI - Doctrine  + (Describe the principles, rules, guidelines and methods for creating and sharing intelligence of cyber interest)
  • WG CTI - Doctrine  + (Describe the principles, rules, guidelines and methods for creating and sharing intelligence of cyber interest)
  • Horizon Cyber 2030  + (Dessiner un futur proche, en identifiant les priorités et les futurs défis de notre secteur et en extrapolant les tendances observées aujourd’hui.)
  • Cyber Horizon 2030  + (Dessiner un futur proche, en identifiant les priorités et les futurs défis de notre secteur et en extrapolant les tendances observées aujourd’hui.)
  • CI Crypto-assets  + (Develop a cybersecurity perspective on crypto-assets and identify the potential uses of crypto-assets for cybersecurity)
  • CI Crypto-actifs  + (Develop a cybersecurity perspective on crypto-assets and identify the potential uses of crypto-assets for cybersecurity)
  • Crise cyber et entrainement : outillage  + (Develop tools dedicated to maturity assessment and cyber crisis management.)
  • Cyber crisis and training: tools  + (Develop tools dedicated to maturity assessment and cyber crisis management.)
  • Crise cyber et entrainement : méthodologie d'entrainement  + (Developing a generic training methodology)
  • WG Cyber crisis and training: training methodology  + (Developing a generic training methodology)
  • CI : Drone and robots cybersecurity  + (Developing the safety of drones and robots and their specific features)
  • CI Cybersécurité des drones et robots  + (Developing the safety of drones and robots and their specific features)
  • UC5 : Machine Learning vs DDoS  + (Development of the educational Use Case ‘Machine Learning vs DDoS Attack’ as part of the AI and Cyber WG)
  • UC5 : Machine Learning vs DDoS  + (Development of the educational Use Case ‘Machine Learning vs DDoS Attack’ as part of the AI and Cyber WG)
  • UC7 : Suspicious security events detection  + (Development of the educational Use Case ‘Suspicious security events detection’ as part of the IA and Cyber WG)
  • UC7 : Suspicious security events detection  + (Development of the educational Use Case ‘Suspicious security events detection’ as part of the IA and Cyber WG)
  • UC3 : Brand protection, fight against typo-squatting  + (Development of the educational Use Case ‘UC 3: Combating typosquatting’ as part of the IA and Cyber Working Group)
  • UC3 : Brand protection, fight against typo-squatting  + (Development of the educational Use Case ‘UC 3: Combating typosquatting’ as part of the IA and Cyber Working Group)
  • UC3 : Brand protection, fight against typo-squatting  + (Development of the educational Use Case ‘UC 3: Combating typosquatting’ as part of the IA and Cyber Working Group)