{"id":2797,"date":"2016-08-16T08:36:19","date_gmt":"2016-08-16T06:36:19","guid":{"rendered":"http:\/\/h2o-avocats.com\/en\/201608cyber-attaque-le-gouvernement-propose-une-definition-html\/"},"modified":"2016-12-12T11:16:34","modified_gmt":"2016-12-12T10:16:34","slug":"201608cyber-attaque-le-gouvernement-propose-une-definition-html","status":"publish","type":"post","link":"https:\/\/h2o-avocats.com\/en\/201608cyber-attaque-le-gouvernement-propose-une-definition-html\/","title":{"rendered":"Cyber-attaque: Le gouvernement propose une d\u00e9finition"},"content":{"rendered":"<div class=\"ob-sections\">\n<div class=\"ob-section ob-section-quote\">\n<blockquote class=\"ob-quote\" cite=\"http:\/\/www.gouvernement.fr\/risques\/risques-cyber\"><p><svg class=\"ob-quote-left\" width=\"25px\" height=\"24px\" viewBox=\"0 0 25 24\" ><path\n                d=\"M0.145536,21.327864 C0.145536,22.452232 1.088732,23.363128 2.253256,23.363128 L9.103694,23.363128 C10.268276,23.363128 11.211588,22.452232 11.211588,21.327864 L11.211588,13.187312 C11.211588,12.062888 10.268276,11.15216 9.103694,11.15216 L5.72067,11.15216 C5.135508,11.15216 4.66681,10.694248 4.66681,10.13464 C4.66681,9.951464 4.71408,9.824288 4.71408,9.824288 C5.483392,7.361576 7.42761,5.387576 9.920276,4.512576 L9.930716,4.502384 C10.684542,4.192144 11.21153,3.469464 11.21153,2.629912 C11.21153,1.5056 10.268218,0.594816 9.103636,0.594816 C8.819088,0.594816 8.550548,0.650704 8.303004,0.747304 L8.207652,0.783144 C3.49144,2.55868 0.145536,6.9852 0.145536,12.16968 L0.145536,21.327864 L0.145536,21.327864 Z M13.84647,21.327864 C13.84647,22.452232 14.789666,23.363128 15.954248,23.363128 L22.804744,23.363128 C23.969268,23.363128 24.912464,22.452232 24.912464,21.327864 L24.912464,13.187312 C24.912464,12.062888 23.969268,11.15216 22.804744,11.15216 L19.421604,11.15216 C18.8365,11.15216 18.367802,10.694248 18.367802,10.13464 C18.367802,9.946368 18.414956,9.824288 18.414956,9.824288 C19.184442,7.361576 21.128602,5.387576 23.621326,4.512576 L23.631766,4.502384 C24.385476,4.192144 24.912464,3.469464 24.912464,2.629912 C24.912464,1.5056 23.969268,0.594816 22.804744,0.594816 C22.520196,0.594816 22.25154,0.650704 22.004054,0.747304 L21.908702,0.783144 C17.192374,2.55868 13.84647,6.9852 13.84647,12.16968 L13.84647,21.327864 L13.84647,21.327864 Z\"><\/path><\/svg><\/p>\n<p>Une cyber-attaque est une atteinte \u00e0 des syst\u00e8mes informatiques r\u00e9alis\u00e9e dans un but malveillant. <\/p>\n<p>Elle cible diff\u00e9rents dispositifs informatiques : des ordinateurs ou des serveurs, isol\u00e9s ou en r\u00e9seaux, reli\u00e9s ou non \u00e0 Internet, des \u00e9quipements p\u00e9riph\u00e9riques tels que les imprimantes, ou encore des appareils communicants comme les t\u00e9l\u00e9phones mobiles, les smartphones ou les tablettes.<\/p>\n<p>Il existe 4 types de risques cyber aux cons\u00e9quences diverses, affectant directement ou indirectement les particuliers, les administrations et les entreprises : la cybercriminalit\u00e9, l\u2019atteinte \u00e0 l\u2019image, l\u2019espionnage, le sabotage. <\/p>\n<p>Pour en savoir plus: http:\/\/www.gouvernement.fr\/risques\/risques-cyber<\/p>\n<p><svg class=\"ob-quote-right\" width=\"25px\" height=\"24px\" viewBox=\"0 0 25 24\" ><path\n                d=\"M0.145536,21.327864 C0.145536,22.452232 1.088732,23.363128 2.253256,23.363128 L9.103694,23.363128 C10.268276,23.363128 11.211588,22.452232 11.211588,21.327864 L11.211588,13.187312 C11.211588,12.062888 10.268276,11.15216 9.103694,11.15216 L5.72067,11.15216 C5.135508,11.15216 4.66681,10.694248 4.66681,10.13464 C4.66681,9.951464 4.71408,9.824288 4.71408,9.824288 C5.483392,7.361576 7.42761,5.387576 9.920276,4.512576 L9.930716,4.502384 C10.684542,4.192144 11.21153,3.469464 11.21153,2.629912 C11.21153,1.5056 10.268218,0.594816 9.103636,0.594816 C8.819088,0.594816 8.550548,0.650704 8.303004,0.747304 L8.207652,0.783144 C3.49144,2.55868 0.145536,6.9852 0.145536,12.16968 L0.145536,21.327864 L0.145536,21.327864 Z M13.84647,21.327864 C13.84647,22.452232 14.789666,23.363128 15.954248,23.363128 L22.804744,23.363128 C23.969268,23.363128 24.912464,22.452232 24.912464,21.327864 L24.912464,13.187312 C24.912464,12.062888 23.969268,11.15216 22.804744,11.15216 L19.421604,11.15216 C18.8365,11.15216 18.367802,10.694248 18.367802,10.13464 C18.367802,9.946368 18.414956,9.824288 18.414956,9.824288 C19.184442,7.361576 21.128602,5.387576 23.621326,4.512576 L23.631766,4.502384 C24.385476,4.192144 24.912464,3.469464 24.912464,2.629912 C24.912464,1.5056 23.969268,0.594816 22.804744,0.594816 C22.520196,0.594816 22.25154,0.650704 22.004054,0.747304 L21.908702,0.783144 C17.192374,2.55868 13.84647,6.9852 13.84647,12.16968 L13.84647,21.327864 L13.84647,21.327864 Z\"\n                transform=\"scale(-1,1) translate(-25)\"><\/path><\/svg><\/p><\/blockquote>\n<p class=\"ob-author\"><a href=\"http:\/\/www.gouvernement.fr\/risques\/risques-cyber\" class=\"ob-link\" target=\"_blank\">Gouvermement<\/a><\/p>\n<\/div>\n<div class=\"ob-section ob-section-link\">\n<div class=\"ob-ctn ob-ctn--withImage\"><a href=\"http:\/\/www.gouvernement.fr\/risques\/risques-cyber\" class=\"ob-link ob-pull-left ob-media-left\" target=\"_blank\"><img decoding=\"async\" src=\"http:\/\/resize.over-blog.com\/170x170-ct.jpg?http:\/\/www.gouvernement.fr\/sites\/default\/files\/risques\/images\/menace-cyber-disp.jpg\" class=\"ob-media ob-img\" alt=\"Risques cyber\" \/><\/a><\/p>\n<p class=\"ob-title\"><a href=\"http:\/\/www.gouvernement.fr\/risques\/risques-cyber\" class=\"ob-link\" target=\"_blank\">Risques cyber<\/a><\/p>\n<p class=\"ob-snippet\">Une cyber-attaque est une atteinte \u00e0 des syst\u00e8mes informatiques r\u00e9alis\u00e9e dans un but malveillant. Elle cible diff\u00e9rents dispositifs informatiques : des ordinateurs ou des serveurs, isol\u00e9s ou &#8230;<\/p>\n<p class=\"ob-url\"><a class=\"ob-link\" href=\"http:\/\/www.gouvernement.fr\/risques\/risques-cyber\" target=\"_blank\">http:\/\/www.gouvernement.fr\/risques\/risques-cyber<\/a><\/p>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Une cyber-attaque est une atteinte \u00e0 des syst\u00e8mes informatiques r\u00e9alis\u00e9e dans un but malveillant. Elle cible diff\u00e9rents dispositifs informatiques : des ordinateurs ou des serveurs, isol\u00e9s ou en r\u00e9seaux, reli\u00e9s ou non \u00e0 Internet, des \u00e9quipements p\u00e9riph\u00e9riques tels que les imprimantes, ou encore des appareils communicants comme les t\u00e9l\u00e9phones mobiles, les smartphones ou les tablettes.<br \/><a href=\"https:\/\/h2o-avocats.com\/en\/201608cyber-attaque-le-gouvernement-propose-une-definition-html\/\" class=\"more\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[42,41],"_links":{"self":[{"href":"https:\/\/h2o-avocats.com\/en\/wp-json\/wp\/v2\/posts\/2797"}],"collection":[{"href":"https:\/\/h2o-avocats.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/h2o-avocats.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/h2o-avocats.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/h2o-avocats.com\/en\/wp-json\/wp\/v2\/comments?post=2797"}],"version-history":[{"count":1,"href":"https:\/\/h2o-avocats.com\/en\/wp-json\/wp\/v2\/posts\/2797\/revisions"}],"predecessor-version":[{"id":2855,"href":"https:\/\/h2o-avocats.com\/en\/wp-json\/wp\/v2\/posts\/2797\/revisions\/2855"}],"wp:attachment":[{"href":"https:\/\/h2o-avocats.com\/en\/wp-json\/wp\/v2\/media?parent=2797"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/h2o-avocats.com\/en\/wp-json\/wp\/v2\/categories?post=2797"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/h2o-avocats.com\/en\/wp-json\/wp\/v2\/tags?post=2797"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}