{"id":5959,"date":"2024-04-02T10:25:11","date_gmt":"2024-04-02T08:25:11","guid":{"rendered":"https:\/\/observatoire-asap.org\/?p=5959"},"modified":"2024-04-02T10:25:12","modified_gmt":"2024-04-02T08:25:12","slug":"face-aux-cyberattaques-security-by-design-resilience","status":"publish","type":"post","link":"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/","title":{"rendered":"Face aux cyberattaques, security by design &#038; r\u00e9silience"},"content":{"rendered":"<p style=\"text-align: justify;\">Dans le prolongement de notre pr\u00e9c\u00e9dent <a href=\"http:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/\">article<\/a>, les cyberattaques augmentent de mani\u00e8re exponentielle, visant tous types d\u2019acteurs et de mani\u00e8re cibl\u00e9e.<\/p>\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\">Derni\u00e8rement, plusieurs ENT (espaces num\u00e9riques de travail) ont \u00e9t\u00e9 pirat\u00e9s et des bo\u00eetes e-mail ont \u00e9t\u00e9 d\u00e9tourn\u00e9es afin de diffuser aupr\u00e8s d\u2019\u00e9l\u00e8ves d&rsquo;une vingtaine d&rsquo;\u00e9tablissements d&rsquo;Ile-de-France, du personnel enseignant et de parents d&rsquo;\u00e9l\u00e8ves des messages \u00e0 caract\u00e8re terroriste.<\/p>\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\">Apr\u00e8s plusieurs minist\u00e8res vis\u00e9s par des cyberattaques, c\u2019est France Travail qui a annonc\u00e9 en mars 2024 avoir \u00e9t\u00e9 victime d&rsquo;une cyberattaque engendrant un vol de donn\u00e9es. Les donn\u00e9es personnelles d\u2019environ 43 millions de personnes sont potentiellement impact\u00e9es, incluant nom et pr\u00e9nom, date de naissance, num\u00e9ro de s\u00e9curit\u00e9 sociale, identifiant France Travail, adresses mail et postale et num\u00e9ros de t\u00e9l\u00e9phone.<\/p>\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\">Les donn\u00e9es personnelles incluant les coordonn\u00e9es et num\u00e9ros de licenci\u00e9s de la F\u00e9d\u00e9ration Fran\u00e7aise de Football ont aussi \u00e9t\u00e9 pirat\u00e9es, touchant potentiellement plusieurs millions de personnes.<\/p>\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\">Lors du Forum International de la Cybers\u00e9curit\u00e9 (renomm\u00e9 \u00ab\u00a0Forum InCyber\u00a0\u00bb) qui a lieu chaque ann\u00e9e \u00e0 Lille, les professionnels du secteur ont mis l\u2019accent sur les risques \u00e9lev\u00e9s d\u2019attaques dans le contexte des Jeux Olympiques 2024, mais aussi sur les menaces du fait de l\u2019utilisation croissante de l\u2019intelligence artificielle.<\/p>\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\">La r\u00e9glementation tente de suivre les \u00e9volutions technologiques et soci\u00e9tales en imposant des actions pr\u00e9ventives (exigences \u00ab\u00a0security by design\u00a0\u00bb et \u00ab\u00a0ethics by design for IA\u00a0\u00bb) mais aussi \u00ab\u00a0correctives\u00a0\u00bb. La question n\u2019est plus de savoir si l\u2019on va \u00eatre attaqu\u00e9 mais quand et comment s\u2019en sortir.<\/p>\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\">La Directive concernant des mesures destin\u00e9es \u00e0 assurer un niveau \u00e9lev\u00e9 commun de cybers\u00e9curit\u00e9 dans l\u2019ensemble de l\u2019Union (\u00ab\u00a0<a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/FR\/TXT\/?uri=CELEX%3A32022L2555\">Directive NIS 2\u00a0<\/a>\u00bb) a \u00e9largi le champ d&rsquo;application de la Directive NIS de 2016, en s\u2019adressant \u00e0 un plus grand nombre de secteurs consid\u00e9r\u00e9s comme critiques. Elle renforce les exigences de r\u00e9silience en mati\u00e8re de cybers\u00e9curit\u00e9 dans l\u2019UE, imposant d\u00e9sormais la mise en place d\u2019un cadre complet de gestion des risques. Le texte \u00e9tant une directive europ\u00e9enne, il doit \u00eatre transpos\u00e9 dans chaque \u00c9tat membre de l\u2019UE au plus tard en octobre 2024.<\/p>\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\">Plusieurs textes de l\u2019UE visent ainsi \u00e0 assurer la r\u00e9silience des infrastructures IT, de mani\u00e8re globale mais aussi sp\u00e9cifique\u00a0:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Sp\u00e9cifique \u00e0 un secteur d\u2019activit\u00e9\u00a0: le Digital Operational Resilience Act (<a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/FR\/TXT\/PDF\/?uri=CELEX:32022R2554\">DORA<\/a>), applicable d\u00e8s janvier 2025 vise \u00e0 renforcer la r\u00e9silience op\u00e9rationnelle IT des organismes financiers, les banques et les assurances notamment, mais aussi les prestataires de services TIC dans le secteur financier. Organiser la r\u00e9silience selon DORA passe par la veille des cybermenaces, le signalement des cyberattaques, les PCA\/PRA, l\u2019organisation des sauvegardes, l\u2019insertion de dispositions contractuelles sp\u00e9cifiques, etc.<\/li>\n<li>Sp\u00e9cifique \u00e0 un objet particulier (produit ou service)\u00a0: le Cyber Resilience Act (<a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex:52022PC0454\">CRA<\/a>) vise \u00e0 assurer plus grande r\u00e9silience des produits mat\u00e9riels et logiciels en imposant des obligations de s\u00e9curit\u00e9 plus contraignantes aux fabricants, aux importateurs et distributeurs (de hardware comme de software). Ce texte a \u00e9t\u00e9 adopt\u00e9 par le Parlement europ\u00e9en et doit \u00eatre formellement adopt\u00e9 par le Conseil de l\u2019UE avant d\u2019entrer en vigueur. D\u00e8s son entr\u00e9e en vigueur, les fabricants, importateurs et distributeurs de produits mat\u00e9riels et logiciels disposeront &#8211; sauf exception &#8211; de 36 mois pour s&rsquo;adapter aux nouvelles exigences europ\u00e9ennes.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\">Le Parlement europ\u00e9en a aussi adopt\u00e9 mi-mars 2024 un r\u00e8glement \u00e9tablissant des r\u00e8gles harmonis\u00e9es concernant l&rsquo;intelligence artificielle (ci-apr\u00e8s \u00ab\u00a0IA Act\u00a0\u00bb), pour encadrer l\u2019utilisation de l\u2019IA. Le texte devrait \u00eatre publi\u00e9 d\u2019ici juin 2024 et entrer en vigueur en 2026. Les op\u00e9rateurs de syst\u00e8mes d\u2019IA devront donc d\u00e8s la publication du texte au Journal officiel entamer la mise en conformit\u00e9 de leurs syst\u00e8mes. Les obligations de l\u2019IA Act seront gradu\u00e9es en fonction du niveau de risque du syst\u00e8me d\u2019IA (risque inacceptable, \u00e9lev\u00e9 ou limit\u00e9). Des r\u00e9gulateurs seront d\u00e9sign\u00e9s pour surveiller le march\u00e9 et fixer des sanctions financi\u00e8res le cas \u00e9ch\u00e9ant. A suivre\u2026<\/p>\n<p style=\"text-align: right;\"><a href=\"http:\/\/observatoire-asap.org\/index.php\/2020\/10\/23\/marie-helene-gostiaux\/\">Marie-H\u00e9l\u00e8ne Gostiaux<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans le prolongement de notre pr\u00e9c\u00e9dent article, les cyberattaques augmentent de mani\u00e8re exponentielle, visant tous types d\u2019acteurs et de mani\u00e8re cibl\u00e9e. Derni\u00e8rement, plusieurs ENT (espaces num\u00e9riques de travail) ont \u00e9t\u00e9 pirat\u00e9s et des bo\u00eetes e-mail ont \u00e9t\u00e9 d\u00e9tourn\u00e9es afin de diffuser aupr\u00e8s d\u2019\u00e9l\u00e8ves d&rsquo;une vingtaine d&rsquo;\u00e9tablissements d&rsquo;Ile-de-France, du personnel enseignant et de parents d&rsquo;\u00e9l\u00e8ves des &hellip; <\/p>\n","protected":false},"author":1,"featured_media":5960,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","footnotes":""},"categories":[10],"tags":[],"class_list":["post-5959","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Face aux cyberattaques, security by design &amp; r\u00e9silience -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Face aux cyberattaques, security by design &amp; r\u00e9silience -\" \/>\n<meta property=\"og:description\" content=\"Dans le prolongement de notre pr\u00e9c\u00e9dent article, les cyberattaques augmentent de mani\u00e8re exponentielle, visant tous types d\u2019acteurs et de mani\u00e8re cibl\u00e9e. Derni\u00e8rement, plusieurs ENT (espaces num\u00e9riques de travail) ont \u00e9t\u00e9 pirat\u00e9s et des bo\u00eetes e-mail ont \u00e9t\u00e9 d\u00e9tourn\u00e9es afin de diffuser aupr\u00e8s d\u2019\u00e9l\u00e8ves d&rsquo;une vingtaine d&rsquo;\u00e9tablissements d&rsquo;Ile-de-France, du personnel enseignant et de parents d&rsquo;\u00e9l\u00e8ves des &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/fabrice.hamelin.1\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-02T08:25:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-02T08:25:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2024\/04\/cyber-4610993_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin1337\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin1337\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/\"},\"author\":{\"name\":\"admin1337\",\"@id\":\"http:\/\/observatoire-asap.org\/#\/schema\/person\/fa918dad212f26e33e6b911a2553fafa\"},\"headline\":\"Face aux cyberattaques, security by design &#038; r\u00e9silience\",\"datePublished\":\"2024-04-02T08:25:11+00:00\",\"dateModified\":\"2024-04-02T08:25:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/\"},\"wordCount\":720,\"publisher\":{\"@id\":\"http:\/\/observatoire-asap.org\/#organization\"},\"image\":{\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2024\/04\/cyber-4610993_1920.jpg\",\"articleSection\":[\"Articles\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/\",\"url\":\"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/\",\"name\":\"Face aux cyberattaques, security by design & r\u00e9silience -\",\"isPartOf\":{\"@id\":\"http:\/\/observatoire-asap.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2024\/04\/cyber-4610993_1920.jpg\",\"datePublished\":\"2024-04-02T08:25:11+00:00\",\"dateModified\":\"2024-04-02T08:25:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/#primaryimage\",\"url\":\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2024\/04\/cyber-4610993_1920.jpg\",\"contentUrl\":\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2024\/04\/cyber-4610993_1920.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"http:\/\/observatoire-asap.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Face aux cyberattaques, security by design &#038; r\u00e9silience\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/observatoire-asap.org\/#website\",\"url\":\"http:\/\/observatoire-asap.org\/\",\"name\":\"Action Soci\u00e9tale et Action Publique\",\"description\":\"\",\"publisher\":{\"@id\":\"http:\/\/observatoire-asap.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/observatoire-asap.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/observatoire-asap.org\/#organization\",\"name\":\"Laboratoire ASAP\",\"url\":\"http:\/\/observatoire-asap.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"http:\/\/observatoire-asap.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2022\/01\/cropped-cropped-ASAP_Plan-de-travail-1.png\",\"contentUrl\":\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2022\/01\/cropped-cropped-ASAP_Plan-de-travail-1.png\",\"width\":1345,\"height\":426,\"caption\":\"Laboratoire ASAP\"},\"image\":{\"@id\":\"http:\/\/observatoire-asap.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/fabrice.hamelin.1\"]},{\"@type\":\"Person\",\"@id\":\"http:\/\/observatoire-asap.org\/#\/schema\/person\/fa918dad212f26e33e6b911a2553fafa\",\"name\":\"admin1337\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"http:\/\/observatoire-asap.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2a82292198583820f63704df9cf531b1ab53b8418711096a9618d7584cfd7764?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2a82292198583820f63704df9cf531b1ab53b8418711096a9618d7584cfd7764?s=96&d=mm&r=g\",\"caption\":\"admin1337\"},\"url\":\"https:\/\/observatoire-asap.org\/index.php\/author\/admin1337\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Face aux cyberattaques, security by design & r\u00e9silience -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/","og_locale":"fr_FR","og_type":"article","og_title":"Face aux cyberattaques, security by design & r\u00e9silience -","og_description":"Dans le prolongement de notre pr\u00e9c\u00e9dent article, les cyberattaques augmentent de mani\u00e8re exponentielle, visant tous types d\u2019acteurs et de mani\u00e8re cibl\u00e9e. Derni\u00e8rement, plusieurs ENT (espaces num\u00e9riques de travail) ont \u00e9t\u00e9 pirat\u00e9s et des bo\u00eetes e-mail ont \u00e9t\u00e9 d\u00e9tourn\u00e9es afin de diffuser aupr\u00e8s d\u2019\u00e9l\u00e8ves d&rsquo;une vingtaine d&rsquo;\u00e9tablissements d&rsquo;Ile-de-France, du personnel enseignant et de parents d&rsquo;\u00e9l\u00e8ves des &hellip;","og_url":"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/","article_publisher":"https:\/\/facebook.com\/fabrice.hamelin.1","article_published_time":"2024-04-02T08:25:11+00:00","article_modified_time":"2024-04-02T08:25:12+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2024\/04\/cyber-4610993_1920.jpg","type":"image\/jpeg"}],"author":"admin1337","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin1337","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/#article","isPartOf":{"@id":"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/"},"author":{"name":"admin1337","@id":"http:\/\/observatoire-asap.org\/#\/schema\/person\/fa918dad212f26e33e6b911a2553fafa"},"headline":"Face aux cyberattaques, security by design &#038; r\u00e9silience","datePublished":"2024-04-02T08:25:11+00:00","dateModified":"2024-04-02T08:25:12+00:00","mainEntityOfPage":{"@id":"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/"},"wordCount":720,"publisher":{"@id":"http:\/\/observatoire-asap.org\/#organization"},"image":{"@id":"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2024\/04\/cyber-4610993_1920.jpg","articleSection":["Articles"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/","url":"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/","name":"Face aux cyberattaques, security by design & r\u00e9silience -","isPartOf":{"@id":"http:\/\/observatoire-asap.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/#primaryimage"},"image":{"@id":"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2024\/04\/cyber-4610993_1920.jpg","datePublished":"2024-04-02T08:25:11+00:00","dateModified":"2024-04-02T08:25:12+00:00","breadcrumb":{"@id":"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/#primaryimage","url":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2024\/04\/cyber-4610993_1920.jpg","contentUrl":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2024\/04\/cyber-4610993_1920.jpg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/observatoire-asap.org\/index.php\/2024\/04\/02\/face-aux-cyberattaques-security-by-design-resilience\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"http:\/\/observatoire-asap.org\/"},{"@type":"ListItem","position":2,"name":"Face aux cyberattaques, security by design &#038; r\u00e9silience"}]},{"@type":"WebSite","@id":"http:\/\/observatoire-asap.org\/#website","url":"http:\/\/observatoire-asap.org\/","name":"Action Soci\u00e9tale et Action Publique","description":"","publisher":{"@id":"http:\/\/observatoire-asap.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/observatoire-asap.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"http:\/\/observatoire-asap.org\/#organization","name":"Laboratoire ASAP","url":"http:\/\/observatoire-asap.org\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"http:\/\/observatoire-asap.org\/#\/schema\/logo\/image\/","url":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2022\/01\/cropped-cropped-ASAP_Plan-de-travail-1.png","contentUrl":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2022\/01\/cropped-cropped-ASAP_Plan-de-travail-1.png","width":1345,"height":426,"caption":"Laboratoire ASAP"},"image":{"@id":"http:\/\/observatoire-asap.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/fabrice.hamelin.1"]},{"@type":"Person","@id":"http:\/\/observatoire-asap.org\/#\/schema\/person\/fa918dad212f26e33e6b911a2553fafa","name":"admin1337","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"http:\/\/observatoire-asap.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2a82292198583820f63704df9cf531b1ab53b8418711096a9618d7584cfd7764?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2a82292198583820f63704df9cf531b1ab53b8418711096a9618d7584cfd7764?s=96&d=mm&r=g","caption":"admin1337"},"url":"https:\/\/observatoire-asap.org\/index.php\/author\/admin1337\/"}]}},"jetpack_featured_media_url":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2024\/04\/cyber-4610993_1920.jpg","_links":{"self":[{"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/posts\/5959","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/comments?post=5959"}],"version-history":[{"count":1,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/posts\/5959\/revisions"}],"predecessor-version":[{"id":5961,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/posts\/5959\/revisions\/5961"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/media\/5960"}],"wp:attachment":[{"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/media?parent=5959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/categories?post=5959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/tags?post=5959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}