{"id":17996,"date":"2022-03-15T14:00:43","date_gmt":"2022-03-15T17:00:43","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=17996"},"modified":"2022-03-15T13:04:04","modified_gmt":"2022-03-15T16:04:04","slug":"security-considerations-assessment","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/security-considerations-assessment\/","title":{"rendered":"Security Considerations Assessment"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-17997\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2022\/03\/security-considerations-assessment.jpg\" alt=\"Security Considerations Assessment\" width=\"145\" height=\"205\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2022\/03\/security-considerations-assessment.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2022\/03\/security-considerations-assessment-106x150.jpg 106w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>CPNI &#8211; Centre for the Protection of National Infrastructure<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> It is important to protect people, buildings, infrastructure, data and information, and the systems that support businesses and services, from those with hostile and malicious intent, whether they use physical and\/or cyberattack methods.<br \/>\nRobust decisions need to be made regarding when and where measures to mitigate security risks are required.<br \/>\nThe decision-making process also needs to consider the type and extent of measures that are appropriate and proportionate to the risks, factoring in the decreasing separation between the physical and technological aspects of built environments, buildings, infrastructure and services.<br \/>\nTechnological systems are becoming ever more sophisticated with greater levels of connectivity. They also increasingly allow cyber and physical processes to be integrated, with embedded computers and networks monitoring and controlling physical processes that in turn provide feedback to alter the computations themselves. This enables assets and services to respond to changing conditions and demands in real-time and thereby improve delivery. Such processes can be applied across a wide range of disciplines but are already being utilised in traffic management, lighting, HVAC (heating, ventilation, and air conditioning), and safety (fire monitoring and evacuation) systems.<br \/>\nFurthermore, as society has embraced technological advances, the expectation that up-to-date information will be available, and can be obtained as soon as it is required, has grown, not only from individuals but also from business, industry and trade.<\/p>\n<p><a href=\"https:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2022\/03\/security-considerations-assessment.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CPNI &#8211; Centre for the Protection of National Infrastructure R\u00e9sum\u00e9: It is important to protect people, buildings, infrastructure, data and information, and the systems that support businesses and services, from those with hostile and malicious intent, whether they use physical and\/or cyberattack methods. Robust decisions need to be made regarding when and where measures to mitigate security risks are required. The decision-making process also needs to consider the type and&hellip; <\/p>\n","protected":false},"author":3,"featured_media":17997,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,6,112],"tags":[],"class_list":["post-17996","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-gestao-da-seguranca-empresarial","category-livros","category-download"],"views":108,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/17996","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=17996"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/17996\/revisions"}],"predecessor-version":[{"id":17998,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/17996\/revisions\/17998"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/17997"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=17996"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=17996"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=17996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}