{"id":4575,"date":"2022-08-16T10:57:59","date_gmt":"2022-08-16T08:57:59","guid":{"rendered":"\/?post_type=defis&#038;p=4575"},"modified":"2023-10-13T09:48:06","modified_gmt":"2023-10-13T07:48:06","slug":"cybersecurite-hardware-et-software","status":"publish","type":"defis","link":"https:\/\/talentimpulse.cea.fr\/en\/defis\/cybersecurite-hardware-et-software\/","title":{"rendered":"Cyber security : hardware and sofware"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"4575\" class=\"elementor elementor-4575\" data-elementor-post-type=\"defis\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-538e9c3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"538e9c3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e19a33e\" data-id=\"e19a33e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-affaefd elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-video\" data-id=\"affaefd\" data-element_type=\"widget\" data-settings=\"{&quot;video_type&quot;:&quot;hosted&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-hosted-video elementor-wrapper elementor-open-inline\">\n\t\t\t\t\t<video class=\"elementor-video\" src=\"\/wp-content\/uploads\/2020\/09\/CEA_SCIENCE-IMPULSE_1min_nolink-1.mp4\" controls=\"\" preload=\"metadata\" controlslist=\"nodownload\"><\/video>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-edbf8cf elementor-widget elementor-widget-image\" data-id=\"edbf8cf\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/talentimpulse.cea.fr\/wp-content\/uploads\/elementor\/thumbs\/16_Cybersecurite_harware_and_software-rl9rsgyi8s0dxhg65nrd61z5isyrb1e2j2pihe400k.jpg\" title=\"16_Cybersecurite_harware_and_software\" alt=\"Cyber security : hardware and sofware\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-331cef05 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"331cef05\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-36df904\" data-id=\"36df904\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-792f6b03 elementor-widget elementor-widget-text-editor\" data-id=\"792f6b03\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity is not a new problem. Saltzer and Schroeder defined general principles for the protection of information in computer systems in 1974, at a time when PDP-11 computers were being used in particle physics research. What is new is the impact that cybersecurity has on society\u2014an impact that is amplified by the complexity and pervasiveness of modern systems.<\/p><p>From the email servers of computer adopters in the 1990s, to the credit card information of consumers in the 2000s, to critical national infrastructures and the fundamental rights of citizens amid ubiquitous data collection in the 2010s, the security of digital systems has become a global societal challenge.<\/p><p>The early responses have been chaotic. Local and domain-specific approaches have focused on patches and other \u201cfixes.\u201d However, in general, these short-term, narrow efforts have very rapidly revealed a need to dig deeper, in the form of research and innovation programs, and for more\u2014and more effective\u2014cooperation.<\/p><p>Entrants in this race are using different strategies. The superpowers have responded with monolithic solutions characterized by armies of thousands of contractors, centralized coordination, and massive expenditures. Meanwhile, grassroots efforts such as the Chaos Computer Club, PoC||GTFO, and The Cavalry have leveraged online resources to connect and orchestrate ethical hacking communities.<\/p><p>At the intersection of both approaches, researchers at CEA bring fresh outlooks and new possibilities, combining excellence in electronics and computing with a highly collaborative way of working.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"featured_media":6848,"template":"","categories":[188],"tags":[],"class_list":["post-4575","defis","type-defis","status-publish","has-post-thumbnail","hentry","category-cybersecurite-hardware-et-software"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/talentimpulse.cea.fr\/en\/wp-json\/wp\/v2\/defis\/4575","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/talentimpulse.cea.fr\/en\/wp-json\/wp\/v2\/defis"}],"about":[{"href":"https:\/\/talentimpulse.cea.fr\/en\/wp-json\/wp\/v2\/types\/defis"}],"version-history":[{"count":16,"href":"https:\/\/talentimpulse.cea.fr\/en\/wp-json\/wp\/v2\/defis\/4575\/revisions"}],"predecessor-version":[{"id":8640,"href":"https:\/\/talentimpulse.cea.fr\/en\/wp-json\/wp\/v2\/defis\/4575\/revisions\/8640"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/talentimpulse.cea.fr\/en\/wp-json\/wp\/v2\/media\/6848"}],"wp:attachment":[{"href":"https:\/\/talentimpulse.cea.fr\/en\/wp-json\/wp\/v2\/media?parent=4575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/talentimpulse.cea.fr\/en\/wp-json\/wp\/v2\/categories?post=4575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/talentimpulse.cea.fr\/en\/wp-json\/wp\/v2\/tags?post=4575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}