25:
210:
that handle confidential or secret defense classified information. It enables well informed security actions to be undertaken. The objective is to assess and prepare for possible future situations (in the case of a newly created information system), and identify and respond to deficiencies (when the
55:
69:, is a useful starting point for translations, but translators must revise errors as necessary and confirm that the translation is accurate, rather than simply copy-pasting machine-translated text into the English Knowledge.
37:
176:
236:
79:
263:
214:
In its first version, EBIOS was focused on “security objectives redaction”. Since 2000, ANSSI became aware of improvements in international standards (
89:
Do not translate text that appears unreliable or low-quality. If possible, verify the text with references provided in the foreign-language article.
253:
215:
218:
in particular) and “engaged EBIOS adaptation to this criteria”. It might also be viewed as a way to avoid France’s introspective approach to
231:
222:, responding to the limitations of French methods that are not recognized abroad and are unsuited to international markets.
278:
74:
97:
110:
Content in this edit is translated from the existing French
Knowledge article at ]; see its history for attribution.
207:
258:
105:
248:
180:
175:
to the needs of an organization. The method was created in 1995 and is now maintained by the
126:
219:
206:
EBIOS is primarily intended for governmental and commercial organizations working with the
8:
163:écurité - Expression of Needs and Identification of Security Objectives) is a method for
168:
101:
116:{{Translated|fr|Expression des besoins et identification des objectifs de sécurité}}
272:
119:
108:
to the source of your translation. A model attribution edit summary is
211:
system is operating) in order to refine the security arrangements.
164:
172:
66:
78:
to this template: there are already 1,488 articles in the
62:
58:
a machine-translated version of the French article.
270:
237:European Network and information security agency
190:Circumstantial study - determining the context;
104:accompanying your translation by providing an
49:Click for important translation instructions.
36:expand this article with text translated from
167:, evaluation and action on risks relating to
254:EBIOS 2010 - Agence Nationale de la Sécurité
16:Risk evaluation method in computer science
186:The five steps of the EBIOS method are:
202:Determination of security requirements.
271:
264:Portail de la securite de lìnformation
199:Identification of security goals; and
18:
13:
249:EBIOS risk manager guide (english)
171:. It generates a security policy
14:
290:
242:
23:
114:You may also add the template
1:
225:
7:
279:Risk analysis methodologies
232:System Security Information
86:will aid in categorization.
10:
295:
61:Machine translation, like
38:the corresponding article
125:For more guidance, see
193:Security requirements;
179:, a department of the
181:French Prime Minister
127:Knowledge:Translation
98:copyright attribution
220:information security
169:information systems
155:dentification des
106:interlanguage link
138:
137:
50:
46:
286:
208:Defense Ministry
117:
111:
85:
84:|topic=
82:, and specifying
67:Google Translate
48:
44:
27:
26:
19:
294:
293:
289:
288:
287:
285:
284:
283:
269:
268:
245:
228:
134:
133:
132:
115:
109:
83:
51:
28:
24:
17:
12:
11:
5:
292:
282:
281:
267:
266:
261:
256:
251:
244:
243:External links
241:
240:
239:
234:
227:
224:
204:
203:
200:
197:
194:
191:
147:xpression des
136:
135:
131:
130:
123:
112:
90:
87:
75:adding a topic
70:
59:
52:
45:(October 2011)
33:
32:
31:
29:
22:
15:
9:
6:
4:
3:
2:
291:
280:
277:
276:
274:
265:
262:
260:
257:
255:
252:
250:
247:
246:
238:
235:
233:
230:
229:
223:
221:
217:
212:
209:
201:
198:
195:
192:
189:
188:
187:
184:
182:
178:
174:
170:
166:
162:
158:
154:
150:
146:
142:
128:
124:
121:
113:
107:
103:
99:
95:
91:
88:
81:
80:main category
77:
76:
71:
68:
64:
60:
57:
54:
53:
47:
41:
39:
34:You can help
30:
21:
20:
213:
205:
185:
160:
159:bjectifs de
156:
152:
148:
144:
140:
139:
102:edit summary
93:
73:
43:
35:
259:Isdecisions
196:Risk study;
226:References
151:esoins et
120:talk page
72:Consider
40:in French
273:Category
165:analysis
96:provide
173:adapted
118:to the
100:in the
42:.
177:ANSSI
141:EBIOS
63:DeepL
94:must
92:You
56:View
216:ISO
65:or
275::
183:.
161:S
157:O
153:I
149:B
145:E
143:(
129:.
122:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.