<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="fr">
	<id>https://wiki.campuscyber.fr/index.php?action=history&amp;feed=atom&amp;title=Translations%3AIA_et_cybers%C3%A9curit%C3%A9%2F3%2Fen</id>
	<title>Translations:IA et cybersécurité/3/en - Historique des versions</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.campuscyber.fr/index.php?action=history&amp;feed=atom&amp;title=Translations%3AIA_et_cybers%C3%A9curit%C3%A9%2F3%2Fen"/>
	<link rel="alternate" type="text/html" href="https://wiki.campuscyber.fr/index.php?title=Translations:IA_et_cybers%C3%A9curit%C3%A9/3/en&amp;action=history"/>
	<updated>2026-04-29T11:44:13Z</updated>
	<subtitle>Historique des versions pour cette page sur le wiki</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://wiki.campuscyber.fr/index.php?title=Translations:IA_et_cybers%C3%A9curit%C3%A9/3/en&amp;diff=6944&amp;oldid=prev</id>
		<title>Juliette le 5 décembre 2023 à 14:27</title>
		<link rel="alternate" type="text/html" href="https://wiki.campuscyber.fr/index.php?title=Translations:IA_et_cybers%C3%A9curit%C3%A9/3/en&amp;diff=6944&amp;oldid=prev"/>
		<updated>2023-12-05T14:27:03Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;fr&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Version précédente&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Version du 5 décembre 2023 à 16:27&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Ligne 1 :&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Ligne 1 :&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== The security of intelligent systems and their uses in cybersecurity, state of knowledge and skills ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== The security of intelligent systems and their uses in cybersecurity, state of knowledge and skills ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;File&lt;/del&gt;:&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;AI &lt;/del&gt;&amp;amp; Cyber &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;WG &lt;/del&gt;- &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Working Group &lt;/del&gt;Focus.png|vignette|300x300px|&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;left&lt;/del&gt;]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Fichier&lt;/ins&gt;:&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;GT IA &lt;/ins&gt;&amp;amp; Cyber - Focus &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;du Groupe de Travail&lt;/ins&gt;.png|vignette|300x300px|&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;gauche&lt;/ins&gt;]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Artificial Intelligence systems are becoming more and more widespread in modern information technology, and have made many advances in recent years. With a view to preparing the next generations of applications and defense systems against cyber threats, the Cyber Campus, through the Artificial Intelligence and Cybersecurity Working Group, is highlighting the main uses of AI to benefit cybersecurity, the limits identified as well as the risks and main measures recommended for the security of these systems.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Artificial Intelligence systems are becoming more and more widespread in modern information technology, and have made many advances in recent years. With a view to preparing the next generations of applications and defense systems against cyber threats, the Cyber Campus, through the Artificial Intelligence and Cybersecurity Working Group, is highlighting the main uses of AI to benefit cybersecurity, the limits identified as well as the risks and main measures recommended for the security of these systems.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key mediawiki_v1:diff:1.41:old-6934:rev-6944:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>Juliette</name></author>
	</entry>
	<entry>
		<id>https://wiki.campuscyber.fr/index.php?title=Translations:IA_et_cybers%C3%A9curit%C3%A9/3/en&amp;diff=6934&amp;oldid=prev</id>
		<title>Juliette : Page créée avec « == The security of intelligent systems and their uses in cybersecurity, state of knowledge and skills == left Artificial Intelligence systems are becoming more and more widespread in modern information technology, and have made many advances in recent years. With a view to preparing the next generations of applications and defense systems against cyber threats, the Cyber Campus, through the Artif... »</title>
		<link rel="alternate" type="text/html" href="https://wiki.campuscyber.fr/index.php?title=Translations:IA_et_cybers%C3%A9curit%C3%A9/3/en&amp;diff=6934&amp;oldid=prev"/>
		<updated>2023-12-05T14:25:46Z</updated>

		<summary type="html">&lt;p&gt;Page créée avec « == The security of intelligent systems and their uses in cybersecurity, state of knowledge and skills == &lt;a href=&quot;/index.php?title=Fichier:AI_%26_Cyber_WG_-_Working_Group_Focus.png&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Fichier:AI &amp;amp; Cyber WG - Working Group Focus.png (page inexistante)&quot;&gt;vignette|300x300px|left&lt;/a&gt; Artificial Intelligence systems are becoming more and more widespread in modern information technology, and have made many advances in recent years. With a view to preparing the next generations of applications and defense systems against cyber threats, the Cyber Campus, through the Artif... »&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Nouvelle page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== The security of intelligent systems and their uses in cybersecurity, state of knowledge and skills ==&lt;br /&gt;
[[File:AI &amp;amp; Cyber WG - Working Group Focus.png|vignette|300x300px|left]]&lt;br /&gt;
Artificial Intelligence systems are becoming more and more widespread in modern information technology, and have made many advances in recent years. With a view to preparing the next generations of applications and defense systems against cyber threats, the Cyber Campus, through the Artificial Intelligence and Cybersecurity Working Group, is highlighting the main uses of AI to benefit cybersecurity, the limits identified as well as the risks and main measures recommended for the security of these systems.&lt;br /&gt;
&lt;br /&gt;
== Which players are involved in Artificial Intelligence projects? ==&lt;br /&gt;
Artificial Intelligence projects involve a wide range of players in order to make the most of the data and respond to the use case identified in advance. Identifying key resources is a major challenge for any cybersecurity expert at the start of a project, and a succinct description of roles and responsibilities helps to quickly identify the stakeholders. The various phases of an AI project, including the development, production launch and monitoring of an AI application, involve many players, some of whom are data science specialists, others not. The diagram below shows the four main families of players identified:&lt;br /&gt;
* &amp;quot;Business&amp;quot; profiles, in charge of the use case and its validation in relation to the company&amp;#039;s objectives;&lt;br /&gt;
* Data science specialists, in charge of implementing Artificial Intelligence techniques to meet the needs identified by the &amp;quot;business&amp;quot;;&lt;br /&gt;
* IT profiles, in charge of developing and putting into production the use cases designed by the data science specialists;&lt;br /&gt;
* Risk profiles, in charge of monitoring and ensuring compliance with internal policies and external regulations.&lt;/div&gt;</summary>
		<author><name>Juliette</name></author>
	</entry>
</feed>