{"id":3165,"date":"2021-04-28T16:07:21","date_gmt":"2021-04-28T14:07:21","guid":{"rendered":"http:\/\/observatoire-asap.org\/?p=3165"},"modified":"2021-05-19T16:30:05","modified_gmt":"2021-05-19T14:30:05","slug":"transformer-la-cybersecurite-par-la-durabilite","status":"publish","type":"post","link":"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/","title":{"rendered":"Transformer la cybers\u00e9curit\u00e9 par la durabilit\u00e9"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>La cybers\u00e9curit\u00e9<\/strong> ou s\u00e9curit\u00e9 de l&rsquo;information est un effort entrepris pour garantir la confidentialit\u00e9, l&rsquo;int\u00e9grit\u00e9 et la disponibilit\u00e9 des informations. De mani\u00e8re g\u00e9n\u00e9rale, la cybers\u00e9curit\u00e9 comprend un \u00e9ventail de politiques et outils sociaux et soci\u00e9taux, allant de la sensibilisation des utilisateurs aux programmes (m\u00e9thodes de gestion des risques, actions de formations, bonnes pratiques), \u00e0 la gouvernance d&rsquo;entreprise (gestion des infrastructures, mode d&rsquo;organisation et de fonctionnement) et aux relations entre Etats (enjeux \u00e9conomiques, strat\u00e9giques et politiques) . La qualit\u00e9 du management de la cybers\u00e9curit\u00e9 d\u00e9pend en grande partie de la priorit\u00e9 accord\u00e9e \u00e0 toutes les parties prenantes, \u00e0 commencer par les utilisateurs (Shackelford, Fort, et Charoen, 2016). Or, avec <a href=\"https:\/\/media.kaspersky.com\/fr\/business-security\/enterprise\/Fiche-Kaspersky-Security-Awareness_Facteur-humain.pdf\">90% des cyber incidents d\u2019origine humaine<\/a>, les utilisateurs sont consid\u00e9r\u00e9s comme une menace que l\u2019on cherche avant tout \u00e0 contr\u00f4ler et non r\u00e9ellement \u00e0 int\u00e9grer, alors m\u00eame qu&rsquo;il peut constituer une ressource strat\u00e9gique en mati\u00e8re de cybers\u00e9curit\u00e9.<\/p>\n<p style=\"text-align: justify;\">Ainsi, <strong>dans une d\u00e9marche de cybers\u00e9curit\u00e9 durable<\/strong>, les interactions des utilisateurs avec l&rsquo;\u00e9cosyst\u00e8me des TIC sont comprises et facilit\u00e9es. Le management de la cybers\u00e9curit\u00e9 durable revient alors \u00e0 cr\u00e9er un environnement, o\u00f9 chacun comprend sa responsabilit\u00e9 pour respecter et prot\u00e9ger l&rsquo;\u00e9cosyst\u00e8me et pr\u00e9server son utilisation future (Sadik, Ahmed, Sikos, et Islam, 2019). La construction de cet environnement n\u00e9cessite de <strong>consid\u00e9rer l\u2019utilisateur comme un acteur strat\u00e9gique<\/strong> de l\u2019\u00e9cosyst\u00e8me des TIC et de comprendre l\u2019interaction Homme-Machine. Pour ce faire il convient d\u2019int\u00e9grer <a href=\"https:\/\/www.revue-rms.fr\/Psyber-Securite-l-apport-de-la-psychologie-dans-le-management-de-la-cybersecurite_a372.html\">les sciences comportementales aux d\u00e9fis de la cybers\u00e9curit\u00e9<\/a> (Le Roy, 2021).<\/p>\n<p><strong>De la d\u00e9tection-pr\u00e9vention des comportements \u00e0 risques des utilisateurs&#8230;<\/strong><\/p>\n<p style=\"text-align: justify;\">A partir des sciences du comportement, il est possible de cartographier les comportements \u00e0 risques des utilisateurs. <a href=\"https:\/\/www.journaldeleconomie.fr\/Comment-integrer-l-utilisateur-dans-le-management-des-risques-cybers_a9944.html\">Cette cartographie<\/a> s\u2019inscrit dans le mod\u00e8le traditionnel du management des risques\u00a0:<\/p>\n<ul>\n<li style=\"text-align: justify;\"><strong>Les actifs\u00a0<\/strong> (ce qui doit \u00eatre prot\u00e9g\u00e9). Quand l\u2019utilisateur devient la cible d&rsquo;un <em>hacker<\/em> pour obtenir qu&rsquo;il se conforme \u00e0 sa demande, il devient un actif \u00e0 prot\u00e9ger. Ces comportements \u00e0 risques sont non-intentionnels. les cybercriminels \u00ab\u00a0hackent\u00a0\u00bb le cerveau de l&rsquo;utilisateur (alors victime) et tentent de cr\u00e9er chez l&rsquo;int\u00e9ress\u00e9 un mouvement de stress, de panique, qui le conduit \u00e0 agir de fa\u00e7on irrationnelle (impulsivit\u00e9 dysfonctionnelle);<\/li>\n<li style=\"text-align: justify;\"><strong>Les vuln\u00e9rabilit\u00e9s potentielles<\/strong> (les failles, c&rsquo;est-\u00e0-dire ce qui manque comme solutions organisationnelles pour r\u00e9soudre les probl\u00e8mes identifi\u00e9s). Quand l\u2019utilisateur contourne d\u00e9lib\u00e9r\u00e9ment les r\u00e8gles s\u00e9curitaires sans intention de nuire, il augmente les zones de vuln\u00e9rabilit\u00e9s et donc la surface d\u2019attaque. Ces comportements \u00e0 risques sont intentionnels (pour cause de fatigue ou de difficult\u00e9 d&rsquo;utilisation) mais n&rsquo;ont pas comme intention de mettre en p\u00e9ril le fonctionnement de l&rsquo;entreprise;<\/li>\n<li style=\"text-align: justify;\"><strong>Les menaces directes<\/strong> (ce qui exploite volontairement les vuln\u00e9rabilit\u00e9s). On se trouve alors dans la situation, o\u00f9 c&rsquo;est l\u2019utilisateur lui-m\u00eame qui va augmenter les menaces. Ces comportements \u00e0 risques sont dans ce cas malveillants. Ils renvoient \u00e0 des logiques de repr\u00e9sailles organisationnelles directes, telles que que le vol, le sabotage, la destruction de biens (ressources) ou d&rsquo;actifs strat\u00e9giques de l\u2019entreprise (image, r\u00e9putation). Ils son le r\u00e9sultat g\u00e9n\u00e9ralement le r\u00e9sultat d&rsquo;un sentiment de col\u00e8re et d&rsquo;injustice sociale.<\/li>\n<\/ul>\n<p><strong>\u2026Vers la promotion des comportements de cybers\u00e9curit\u00e9<\/strong><\/p>\n<p style=\"text-align: justify;\">A partir de recherches r\u00e9centes, conduites dans le domaine de la psychologie durable, on peut n\u00e9anmoins observer que <strong>certains comportements &#8211; utilisateurs, non attendus ou d\u00e9viants, peuvent aussi donner lieu \u00e0 des d\u00e9marches innovantes et adaptatives<\/strong> (Bri\u00e8re, Le Roy et Meier, 2020). Paradoxalement, ces comportements d\u00e9viants sont donc susceptibles de favoriser une am\u00e9lioration des pratiques de cybers\u00e9curit\u00e9 aupr\u00e8s des parties prenantes (apprentissage par essais-erreurs) et de cr\u00e9er les conditions d&rsquo;un \u00e9cosyst\u00e8me des TIC plus s\u00fbr, plus r\u00e9sistant et plus durable, pour soutenir l&rsquo;\u00e9conomie moderne (Oh, Phillips, Park et Lee, 2016). Face \u00e0 ce constat, il importe par cons\u00e9quent de prendre davantage en compte l\u2019environnement social et organisationnel, afin de promouvoir efficacement et durablement les comportements de cybers\u00e9curit\u00e9 dans l&rsquo;int\u00e9r\u00eat de tous (Meier, Le Roy, 2021).<\/p>\n<p style=\"text-align: right;\">par <a href=\"http:\/\/observatoire-asap.org\/index.php\/2020\/02\/27\/jeanne-le-roy\/\">Jeanne Le Roy<\/a> et <a href=\"http:\/\/observatoire-asap.org\/index.php\/2020\/02\/02\/olivier-meier\/\">Olivier Meier<\/a><\/p>\n<p><strong>R\u00e9f\u00e9rences<\/strong><\/p>\n<p style=\"text-align: justify;\">Bri\u00e8re M, Le Roy J, Meier O. (2020). Linking servant leadership to positive deviant behavior: The mediating role of self-determination theory. <em>Journal of Applied Social Psychology.<\/em> 00:1\u201314. https:\/\/doi.org\/10.1111\/jasp.12716<\/p>\n<p style=\"text-align: justify;\">Le Roy J., 2021, Psyber S\u00e9curit\u00e9: l\u2019apport de la psychologie dans le management de la cybers\u00e9curit\u00e9, <em>Revue Internationale de Management et de Strat\u00e9gie<\/em>, <a href=\"http:\/\/www.revue-rms.fr\/\">http:\/\/www.revue-rms.fr\/<\/a><\/p>\n<p style=\"text-align: justify;\">Meier O., Le Roy J. (2021), \u00ab\u00a0Sociologie du num\u00e9rique et cybers\u00e9curit\u00e9: construction d&rsquo;un programme de formation \u00e0 destination des jeunes ing\u00e9nieurs\u00a0\u00bb, Cours de Master, Module sociologie et management, Master Droit et Num\u00e9rique, Universit\u00e9 Paris Est.<\/p>\n<p style=\"text-align: justify;\">Oh, D. S., Phillips, F., Park, S., &amp; Lee, E. (2016). Innovation ecosystems: A critical examination. <em>Technovation<\/em>, <em>54<\/em>, 1-6.<\/p>\n<p style=\"text-align: justify;\">Sadik, S., Ahmed, M., Sikos, L. F., &amp; Islam, A. K. M. (2020). Toward a Sustainable Cybersecurity Ecosystem. <em>Computers<\/em>, <em>9<\/em>(3), 74<\/p>\n<p style=\"text-align: justify;\">Shackelford, S. J., Fort, T. L., &amp; Charoen, D. (2016). Sustainable cybersecurity: Applying lessons from the green movement to managing Cyber Attacks. <em>U. Ill. L. Rev.<\/em>, 1995.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La cybers\u00e9curit\u00e9 ou s\u00e9curit\u00e9 de l&rsquo;information est un effort entrepris pour garantir la confidentialit\u00e9, l&rsquo;int\u00e9grit\u00e9 et la disponibilit\u00e9 des informations. De mani\u00e8re g\u00e9n\u00e9rale, la cybers\u00e9curit\u00e9 comprend un \u00e9ventail de politiques et outils sociaux et soci\u00e9taux, allant de la sensibilisation des utilisateurs aux programmes (m\u00e9thodes de gestion des risques, actions de formations, bonnes pratiques), \u00e0 la &hellip; <\/p>\n","protected":false},"author":1,"featured_media":3166,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","footnotes":""},"categories":[10],"tags":[53],"class_list":["post-3165","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","tag-lettre"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Transformer la cybers\u00e9curit\u00e9 par la durabilit\u00e9 -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Transformer la cybers\u00e9curit\u00e9 par la durabilit\u00e9 -\" \/>\n<meta property=\"og:description\" content=\"La cybers\u00e9curit\u00e9 ou s\u00e9curit\u00e9 de l&rsquo;information est un effort entrepris pour garantir la confidentialit\u00e9, l&rsquo;int\u00e9grit\u00e9 et la disponibilit\u00e9 des informations. De mani\u00e8re g\u00e9n\u00e9rale, la cybers\u00e9curit\u00e9 comprend un \u00e9ventail de politiques et outils sociaux et soci\u00e9taux, allant de la sensibilisation des utilisateurs aux programmes (m\u00e9thodes de gestion des risques, actions de formations, bonnes pratiques), \u00e0 la &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/fabrice.hamelin.1\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-28T14:07:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-19T14:30:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/04\/Image2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"451\" \/>\n\t<meta property=\"og:image:height\" content=\"253\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin1337\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin1337\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/\"},\"author\":{\"name\":\"admin1337\",\"@id\":\"http:\/\/observatoire-asap.org\/#\/schema\/person\/fa918dad212f26e33e6b911a2553fafa\"},\"headline\":\"Transformer la cybers\u00e9curit\u00e9 par la durabilit\u00e9\",\"datePublished\":\"2021-04-28T14:07:21+00:00\",\"dateModified\":\"2021-05-19T14:30:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/\"},\"wordCount\":866,\"commentCount\":0,\"publisher\":{\"@id\":\"http:\/\/observatoire-asap.org\/#organization\"},\"image\":{\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/04\/Image2.jpg\",\"keywords\":[\"Lettre#\"],\"articleSection\":[\"Articles\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/\",\"url\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/\",\"name\":\"Transformer la cybers\u00e9curit\u00e9 par la durabilit\u00e9 -\",\"isPartOf\":{\"@id\":\"http:\/\/observatoire-asap.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/04\/Image2.jpg\",\"datePublished\":\"2021-04-28T14:07:21+00:00\",\"dateModified\":\"2021-05-19T14:30:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/#primaryimage\",\"url\":\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/04\/Image2.jpg\",\"contentUrl\":\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/04\/Image2.jpg\",\"width\":451,\"height\":253},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"http:\/\/observatoire-asap.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Transformer la cybers\u00e9curit\u00e9 par la durabilit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/observatoire-asap.org\/#website\",\"url\":\"http:\/\/observatoire-asap.org\/\",\"name\":\"Action Soci\u00e9tale et Action Publique\",\"description\":\"\",\"publisher\":{\"@id\":\"http:\/\/observatoire-asap.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/observatoire-asap.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/observatoire-asap.org\/#organization\",\"name\":\"Laboratoire ASAP\",\"url\":\"http:\/\/observatoire-asap.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"http:\/\/observatoire-asap.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2022\/01\/cropped-cropped-ASAP_Plan-de-travail-1.png\",\"contentUrl\":\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2022\/01\/cropped-cropped-ASAP_Plan-de-travail-1.png\",\"width\":1345,\"height\":426,\"caption\":\"Laboratoire ASAP\"},\"image\":{\"@id\":\"http:\/\/observatoire-asap.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/fabrice.hamelin.1\"]},{\"@type\":\"Person\",\"@id\":\"http:\/\/observatoire-asap.org\/#\/schema\/person\/fa918dad212f26e33e6b911a2553fafa\",\"name\":\"admin1337\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"http:\/\/observatoire-asap.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2a82292198583820f63704df9cf531b1ab53b8418711096a9618d7584cfd7764?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2a82292198583820f63704df9cf531b1ab53b8418711096a9618d7584cfd7764?s=96&d=mm&r=g\",\"caption\":\"admin1337\"},\"url\":\"https:\/\/observatoire-asap.org\/index.php\/author\/admin1337\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Transformer la cybers\u00e9curit\u00e9 par la durabilit\u00e9 -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/","og_locale":"fr_FR","og_type":"article","og_title":"Transformer la cybers\u00e9curit\u00e9 par la durabilit\u00e9 -","og_description":"La cybers\u00e9curit\u00e9 ou s\u00e9curit\u00e9 de l&rsquo;information est un effort entrepris pour garantir la confidentialit\u00e9, l&rsquo;int\u00e9grit\u00e9 et la disponibilit\u00e9 des informations. De mani\u00e8re g\u00e9n\u00e9rale, la cybers\u00e9curit\u00e9 comprend un \u00e9ventail de politiques et outils sociaux et soci\u00e9taux, allant de la sensibilisation des utilisateurs aux programmes (m\u00e9thodes de gestion des risques, actions de formations, bonnes pratiques), \u00e0 la &hellip;","og_url":"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/","article_publisher":"https:\/\/facebook.com\/fabrice.hamelin.1","article_published_time":"2021-04-28T14:07:21+00:00","article_modified_time":"2021-05-19T14:30:05+00:00","og_image":[{"width":451,"height":253,"url":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/04\/Image2.jpg","type":"image\/jpeg"}],"author":"admin1337","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin1337","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/#article","isPartOf":{"@id":"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/"},"author":{"name":"admin1337","@id":"http:\/\/observatoire-asap.org\/#\/schema\/person\/fa918dad212f26e33e6b911a2553fafa"},"headline":"Transformer la cybers\u00e9curit\u00e9 par la durabilit\u00e9","datePublished":"2021-04-28T14:07:21+00:00","dateModified":"2021-05-19T14:30:05+00:00","mainEntityOfPage":{"@id":"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/"},"wordCount":866,"commentCount":0,"publisher":{"@id":"http:\/\/observatoire-asap.org\/#organization"},"image":{"@id":"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/#primaryimage"},"thumbnailUrl":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/04\/Image2.jpg","keywords":["Lettre#"],"articleSection":["Articles"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/","url":"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/","name":"Transformer la cybers\u00e9curit\u00e9 par la durabilit\u00e9 -","isPartOf":{"@id":"http:\/\/observatoire-asap.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/#primaryimage"},"image":{"@id":"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/#primaryimage"},"thumbnailUrl":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/04\/Image2.jpg","datePublished":"2021-04-28T14:07:21+00:00","dateModified":"2021-05-19T14:30:05+00:00","breadcrumb":{"@id":"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/#primaryimage","url":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/04\/Image2.jpg","contentUrl":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/04\/Image2.jpg","width":451,"height":253},{"@type":"BreadcrumbList","@id":"https:\/\/observatoire-asap.org\/index.php\/2021\/04\/28\/transformer-la-cybersecurite-par-la-durabilite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"http:\/\/observatoire-asap.org\/"},{"@type":"ListItem","position":2,"name":"Transformer la cybers\u00e9curit\u00e9 par la durabilit\u00e9"}]},{"@type":"WebSite","@id":"http:\/\/observatoire-asap.org\/#website","url":"http:\/\/observatoire-asap.org\/","name":"Action Soci\u00e9tale et Action Publique","description":"","publisher":{"@id":"http:\/\/observatoire-asap.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/observatoire-asap.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"http:\/\/observatoire-asap.org\/#organization","name":"Laboratoire ASAP","url":"http:\/\/observatoire-asap.org\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"http:\/\/observatoire-asap.org\/#\/schema\/logo\/image\/","url":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2022\/01\/cropped-cropped-ASAP_Plan-de-travail-1.png","contentUrl":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2022\/01\/cropped-cropped-ASAP_Plan-de-travail-1.png","width":1345,"height":426,"caption":"Laboratoire ASAP"},"image":{"@id":"http:\/\/observatoire-asap.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/fabrice.hamelin.1"]},{"@type":"Person","@id":"http:\/\/observatoire-asap.org\/#\/schema\/person\/fa918dad212f26e33e6b911a2553fafa","name":"admin1337","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"http:\/\/observatoire-asap.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2a82292198583820f63704df9cf531b1ab53b8418711096a9618d7584cfd7764?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2a82292198583820f63704df9cf531b1ab53b8418711096a9618d7584cfd7764?s=96&d=mm&r=g","caption":"admin1337"},"url":"https:\/\/observatoire-asap.org\/index.php\/author\/admin1337\/"}]}},"jetpack_featured_media_url":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/04\/Image2.jpg","_links":{"self":[{"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/posts\/3165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/comments?post=3165"}],"version-history":[{"count":19,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/posts\/3165\/revisions"}],"predecessor-version":[{"id":3202,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/posts\/3165\/revisions\/3202"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/media\/3166"}],"wp:attachment":[{"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/media?parent=3165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/categories?post=3165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/tags?post=3165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}