{"id":2499,"date":"2017-06-05T10:56:48","date_gmt":"2017-06-05T09:56:48","guid":{"rendered":"http:\/\/mouillere.com\/universconvergents\/?p=2499"},"modified":"2017-06-05T11:03:04","modified_gmt":"2017-06-05T10:03:04","slug":"projet-de-rapport-sur-la-lutte-contre-la-cybercriminalite","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2017\/06\/05\/projet-de-rapport-sur-la-lutte-contre-la-cybercriminalite\/","title":{"rendered":"PROJET DE RAPPORT sur la lutte contre la cybercriminalit\u00e9"},"content":{"rendered":"<p>La commission des libert\u00e9s civiles, de la justice et des affaires int\u00e9rieures (LIBE) du parlement europ\u00e9en a publi\u00e9 un projet de rapport sur la lutte contre la cybercriminalit\u00e9.<\/p>\n<p><!--more--><\/p>\n<blockquote><p><em> \u00ab La cybercriminalit\u00e9 cause des dommages \u00e9conomiques et sociaux de plus en plus importants, ayant une incidence sur les droits fondamentaux des particuliers, posant une menace \u00e0 l\u2019encontre de l\u2019\u00c9tat de droit dans le cyberespace et mettant en danger la stabilit\u00e9 de nos soci\u00e9t\u00e9s d\u00e9mocratiques \u00bb<\/em><\/p><\/blockquote>\n<p>En mars 2017, <strong>Wikileaks<\/strong> r\u00e9v\u00e9lait comment la CIA peut p\u00e9n\u00e9trer les \u00e9quipements r\u00e9seau (routeurs), TV connect\u00e9es (Samsung), smartphones (iPhone, Android) et autres objets connect\u00e9s\u00a0pour espionner particuliers, diplomates, hommes politiques et chefs d&#8217;entreprises.<\/p>\n<p>En mai 2017, une attaque par phishing a provoqu\u00e9 une vague d\u2019infections mondiale par le ransomware <strong>WannaCrypt<\/strong> exploitant une faille Windows et paralysant de nombreuses entreprises dans le monde. <strong>MacronLeaks<\/strong> nous a par ailleurs rappel\u00e9 les risques li\u00e9s aux fuites de mots de passe et de donn\u00e9es et \u00e0 l&#8217;importance pour chacun de respecter\u00a0de bonnes pratiques informatiques.<\/p>\n<p>L&#8217;une des solutions seraient de g\u00e9n\u00e9raliser la signature ou le chiffrement \u00e9lectroniques en faisant appel \u00e0 des\u00a0 infrastructure \u00e0 cl\u00e9s publiques (ICP) ou Public Key Infrastructure (<strong>PKI<\/strong>) qui\u00a0d\u00e9livrent des certificats num\u00e9riques permettant\u00a0d&#8217;effectuer des op\u00e9rations cryptographiques qui offrent les garanties suivantes\u00a0:<\/p>\n<ul>\n<li><strong>confidentialit\u00e9 et\u00a0authentification\u00a0<\/strong>: seul le destinataire des donn\u00e9es peut y avoir acc\u00e8s;<\/li>\n<li><strong>int\u00e9grit\u00e9<\/strong>\u00a0: non alt\u00e9ration des donn\u00e9es;<\/li>\n<li><strong>non-r\u00e9pudiation<\/strong>\u00a0: l&#8217;\u00e9metteur ne peut renier \u00eatre l&#8217;auteur des donn\u00e9es.<\/li>\n<\/ul>\n<p>Un certificat \u00e9lectronique est une donn\u00e9e publique. Suivant la technique des cl\u00e9s asym\u00e9triques, \u00e0 chaque certificat \u00e9lectronique correspond une cl\u00e9 priv\u00e9e, qui doit \u00eatre soigneusement prot\u00e9g\u00e9e. C&#8217;est l&#8217;usage conjoint des cl\u00e9s cryptographiques publiques (contenue dans le certificat) et priv\u00e9e (prot\u00e9g\u00e9e par l&#8217;utilisateur) qui permet de\u00a0s\u00e9curiser les donn\u00e9es.<\/p>\n<p>Avec le d\u00e9veloppement de l&#8217;Internet des objets ou Internet of Things (<strong>IoT<\/strong>), de nombreuses soci\u00e9t\u00e9s proposent des solutions de cybers\u00e9curit\u00e9 comme IDnomic (ex OpenTrust, membre du groupement d&#8217;entreprises sp\u00e9cialis\u00e9es dans la cybers\u00e9curit\u00e9 Hexatrust), Afero, Qadium, Bayshore ou Sentryo.<\/p>\n<p>Le d\u00e9veloppement d&#8217;entreprises sp\u00e9cialis\u00e9es dans la cybers\u00e9curit\u00e9 est actuellement encourag\u00e9 par la r\u00e9glementation. En France, la loi de programmation militaire de 2014 oblige d\u00e9j\u00e0 les &#8220;op\u00e9rateurs d&#8217;importance vitale&#8221; (\u00e9nergie, banques, etc) \u00e0 prot\u00e9ger leur syst\u00e8me informatique et leurs appareils intelligents contre de potentielles intrusions. En Europe, le <strong>RGDP<\/strong> qui entrera en vigueur en mai 2018 va g\u00e9n\u00e9raliser le concept de Security by design mettant au c\u0153ur des entreprises la question de la protection des donn\u00e9es.<\/p>\n<iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fmouillere.com%2Funiversconvergents%2Fwp-content%2Fuploads%2F2017%2F06%2FPROJET-DE-RAPPORT-Cybercriminalit%C3%A9.pdf&hl=fr&embedded=true\" class=\"gde-frame\" style=\"width:100%; height:500px; border: none;\" scrolling=\"no\"><\/iframe>\n<p class=\"gde-text\"><a href=\"https:\/\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/06\/PROJET-DE-RAPPORT-Cybercriminalit\u00e9.pdf\" class=\"gde-link\">T\u00e9l\u00e9charger (PDF, 283KB)<\/a><\/p>\n<iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fmouillere.com%2Funiversconvergents%2Fwp-content%2Fuploads%2F2017%2F06%2FRGDP-par-Coralie-Heritier.pdf.pdf&hl=fr&embedded=true\" class=\"gde-frame\" style=\"width:100%; height:500px; border: none;\" scrolling=\"no\"><\/iframe>\n<p class=\"gde-text\"><a href=\"https:\/\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/06\/RGDP-par-Coralie-Heritier.pdf.pdf\" class=\"gde-link\">T\u00e9l\u00e9charger (PDF, 981KB)<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La commission des libert\u00e9s civiles, de la justice et des affaires int\u00e9rieures (LIBE) du parlement europ\u00e9en a publi\u00e9 un projet de rapport sur la lutte contre la cybercriminalit\u00e9.<\/p>\n","protected":false},"author":1,"featured_media":524,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20],"tags":[64,65],"class_list":["post-2499","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite","tag-iot","tag-rgpd"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1667%2C1152&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-Ej","jetpack-related-posts":[{"id":2444,"url":"https:\/\/mouillere.com\/universconvergents\/2017\/03\/16\/2444\/","url_meta":{"origin":2499,"position":0},"title":"La lutte contre les cybermenaces","author":"Fred","date":"16 mars 2017","format":false,"excerpt":"Le premier rapport de la D\u00e9l\u00e9gation minist\u00e9rielle aux industries de s\u00e9curit\u00e9 et \u00e0 la lutte contre les cybermenaces (DMISC) a \u00e9t\u00e9 rendu public le 10 mars 2017. La lutte contre la cybercriminalit\u00e9 se d\u00e9cline principalement au travers de l\u2019activit\u00e9 de la plateforme d\u2019harmonisation, d\u2019analyse, de recoupement et d\u2019orientation des signalements\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6155,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/07\/31\/rapport-sur-la-cybercriminalite-du-ministere-de-linterieur-et-des-outre-mer\/","url_meta":{"origin":2499,"position":1},"title":"Rapport sur la cybercriminalit\u00e9 du minist\u00e8re de l\u2019Int\u00e9rieur et des Outre-mer","author":"Fred","date":"31 juillet 2024","format":false,"excerpt":"D\u00e9but 2023, le ministre de l\u2019Int\u00e9rieur et des Outre-mer a lanc\u00e9 un commandement cyber intitul\u00e9 COMCYBER-MI, associant diff\u00e9rents corps et services du minist\u00e8re (gendarmerie, police nationale, direction g\u00e9n\u00e9rale de la s\u00e9curit\u00e9 int\u00e9rieure, pr\u00e9fecture de police de Paris, personnels civils), afin d\u2019analyser les menaces num\u00e9riques pesant sur les citoyens, les entreprises\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/08\/Ecosysteme-Cybercriminel.png?fit=1200%2C799&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/08\/Ecosysteme-Cybercriminel.png?fit=1200%2C799&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/08\/Ecosysteme-Cybercriminel.png?fit=1200%2C799&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/08\/Ecosysteme-Cybercriminel.png?fit=1200%2C799&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/08\/Ecosysteme-Cybercriminel.png?fit=1200%2C799&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2487,"url":"https:\/\/mouillere.com\/universconvergents\/2017\/05\/30\/lanssi-lance-le-portail-cybermalveillance\/","url_meta":{"origin":2499,"position":2},"title":"L&#8217;ANSSI lance le portail Cybermalveillance","author":"Fred","date":"30 mai 2017","format":false,"excerpt":"L\u2019Agence Nationale de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information (ANSSI) a lanc\u00e9 le portail internet\u00a0Cybermalveillance pour venir en aide aux particuliers, PME et administrations victimes de\u00a0piratage ou de vol de donn\u00e9es afin de leur permettre de trouver des prestataires susceptibles de leur venir en aide. Si l'ANSSI vient en aide directement\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/06\/2017-06-05_122038.jpg?fit=1200%2C584&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/06\/2017-06-05_122038.jpg?fit=1200%2C584&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/06\/2017-06-05_122038.jpg?fit=1200%2C584&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/06\/2017-06-05_122038.jpg?fit=1200%2C584&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/06\/2017-06-05_122038.jpg?fit=1200%2C584&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":5369,"url":"https:\/\/mouillere.com\/universconvergents\/2023\/01\/11\/projet-de-traite-sur-la-cybercriminalite\/","url_meta":{"origin":2499,"position":3},"title":"Projet de trait\u00e9 sur la cybercriminalit\u00e9","author":"Fred","date":"11 janvier 2023","format":false,"excerpt":"Plusieurs organisations s'inqui\u00e8tent du projet de trait\u00e9 des Nations Unies sur la cybercriminalit\u00e9 pr\u00e9voyant une liste de crimes li\u00e9s aux contenus sur Internet qui menacerait gravement la libert\u00e9 d'expression, la vie priv\u00e9e et les activit\u00e9s l\u00e9gitimes des journalistes, lanceurs d'alerte, activistes, etc.\u00a0 Ainsi, alors que\u00a0 la d\u00e9sinformation menace la d\u00e9mocratie\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/08\/cyber-war-300.jpg?fit=600%2C300&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/08\/cyber-war-300.jpg?fit=600%2C300&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/08\/cyber-war-300.jpg?fit=600%2C300&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":1919,"url":"https:\/\/mouillere.com\/universconvergents\/2016\/03\/07\/cybercriminalite-les-entreprises-francaises-particulierement-touchees-par-la-fraude\/","url_meta":{"origin":2499,"position":4},"title":"Cybercriminalit\u00e9 : les entreprises fran\u00e7aises particuli\u00e8rement touch\u00e9es par la fraude","author":"Fred","date":"7 mars 2016","format":false,"excerpt":"Le cabinet Pwc publie aujourd\u2018hui une \u00e9tude portant sur la fraude en entreprise. Stable dans le reste du monde, celle-ci a doubl\u00e9 en France avec pour principal moteur de croissance la cybercriminalit\u00e9. http:\/\/www.zdnet.fr\/actualites\/cybercriminalite-les-entreprises-francaises-particulierement-touchees-par-la-fraude-39833704.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2016\/03\/FraudesPwc.png?fit=600%2C339&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2016\/03\/FraudesPwc.png?fit=600%2C339&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2016\/03\/FraudesPwc.png?fit=600%2C339&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":4965,"url":"https:\/\/mouillere.com\/universconvergents\/2021\/12\/09\/rapport-du-senat-sur-la-cybersecurite-dans-les-collectivites-territoriales\/","url_meta":{"origin":2499,"position":5},"title":"Rapport du S\u00e9nat sur la cybers\u00e9curit\u00e9 dans les collectivit\u00e9s territoriales","author":"Fred","date":"9 d\u00e9cembre 2021","format":false,"excerpt":"Le S\u00e9nat vient de publier un rapport sur la cybers\u00e9curit\u00e9 dans les collectivit\u00e9s territoriales pour sensibiliser les \u00e9lus sur les risques inh\u00e9rents \u00e0 la num\u00e9risation de l\u2019\u00e9conomie et des services publics. Ce rapport constate une\u00a0professionnalisation de la cybercriminalit\u00e9 favoris\u00e9e notamment par le d\u00e9veloppement des cryptomonnaies et rappelle la difficult\u00e9 de\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/2499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=2499"}],"version-history":[{"count":3,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/2499\/revisions"}],"predecessor-version":[{"id":2509,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/2499\/revisions\/2509"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/524"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=2499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=2499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=2499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}