{"version":"1.0","provider_name":"","provider_url":"https:\/\/observatoire-asap.org","author_name":"admin1337","author_url":"https:\/\/observatoire-asap.org\/index.php\/author\/admin1337\/","title":"Transformer la cybers\u00e9curit\u00e9 par la durabilit\u00e9 -","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"cV50uRqvxZ\"><a href=\"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/\">Transformer la cybers\u00e9curit\u00e9 par la durabilit\u00e9<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/embed\/#?secret=cV50uRqvxZ\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Transformer la cybers\u00e9curit\u00e9 par la durabilit\u00e9\u00a0\u00bb &#8212; \" data-secret=\"cV50uRqvxZ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/04\/Image2.jpg","thumbnail_width":451,"thumbnail_height":253,"description":"La cybers\u00e9curit\u00e9 ou s\u00e9curit\u00e9 de l&rsquo;information est un effort entrepris pour garantir la confidentialit\u00e9, l&rsquo;int\u00e9grit\u00e9 et la disponibilit\u00e9 des informations. De mani\u00e8re g\u00e9n\u00e9rale, la cybers\u00e9curit\u00e9 comprend un \u00e9ventail de politiques et outils sociaux et soci\u00e9taux, allant de la sensibilisation des utilisateurs aux programmes (m\u00e9thodes de gestion des risques, actions de formations, bonnes pratiques), \u00e0 la &hellip;"}