{"id":5594,"date":"2023-07-04T22:07:32","date_gmt":"2023-07-04T21:07:32","guid":{"rendered":"https:\/\/mouillere.com\/universconvergents\/?p=5594"},"modified":"2023-07-06T14:49:03","modified_gmt":"2023-07-06T13:49:03","slug":"typologie-et-cout-des-cyberattaques-en-france","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2023\/07\/04\/typologie-et-cout-des-cyberattaques-en-france\/","title":{"rendered":"Typologie et co\u00fbt des cyberattaques en France"},"content":{"rendered":"<p>Le cabinet Aster\u00e8s \u00e9value le co\u00fbt des cyberattaques r\u00e9ussies contre les organismes publics et priv\u00e9s fran\u00e7ais \u00e0 2 Mds\u20ac en 2022.<\/p>\n<p><!--more--><\/p>\n<p>Ont \u00e9t\u00e9 analys\u00e9s les principaux impacts \u00e9conomiques des trois types d\u2019attaques r\u00e9ussies couvertes par l\u2019\u00e9tude : intrusion dans le syst\u00e8me d\u2019information, attaque par ran\u00e7ongiciel et par d\u00e9ni-de-service. Le co\u00fbt de l\u2019ensemble de ces cyberattaques r\u00e9ussies se r\u00e9partit entre un co\u00fbt direct (44% des ressources allou\u00e9es \u00e0 la r\u00e9solution de la crise : mobilisation des \u00e9quipes internes, services professionnels externes, sollicitation des avocats, etc.), le paiement des ran\u00e7ons (44%) et des pertes d&#8217;exploitation (12%).<\/p>\n<p>Ce montant n\u2019inclut pas les amendes pour violation du RGPD (jusqu&#8217;\u00e0 4% du CA mondial) et les \u00e9ventuels dommages-int\u00e9r\u00eats \u00e0 verser par ces organismes aux personnes victimes desdites attaques au titre de la responsabilit\u00e9 du responsable du traitement et au droit \u00e0 r\u00e9paration (art. 82 du RGPD). Cependant, dans son arr\u00eat du 4 mai 2023, la CJUE a rappel\u00e9 que la simple violation du RGPD ne suffisait pas \u00e0 ouvrir droit \u00e0 r\u00e9paration si les trois conditions de la responsabilit\u00e9 n&#8217;\u00e9tait pas r\u00e9unies (manquement au RGPD, dommage et lien de causalit\u00e9). Ainsi, l&#8217;acc\u00e8s non-autoris\u00e9 \u00e0 des donn\u00e9es personnelles dans le contexte d&#8217;une cyberattaque n\u2019est pas suffisant pour conclure \u00e0 un manquement de la part du responsable du traitement \u00e0 son obligation de s\u00e9curit\u00e9. Le responsable du traitement pourra s&#8217;exon\u00e9rer en d\u00e9montrant que les mesures techniques et organisationnelles \u00e9taient ad\u00e9quates. Par ailleurs, la victime devra d\u00e9montrer qu&#8217;elle a concr\u00e8tement et sp\u00e9cifiquement subi un pr\u00e9judice r\u00e9el et certain, un simple m\u00e9contentement n&#8217;ouvrant pas droit \u00e0 r\u00e9paration.<\/p>\n<iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fmouillere.com%2Funiversconvergents%2Fwp-content%2Fuploads%2F2023%2F07%2F2023-06-Cyberattaques-Cout.pdf&hl=fr&embedded=true\" class=\"gde-frame\" style=\"width:100%; height:500px; border: none;\" scrolling=\"no\"><\/iframe>\n<p class=\"gde-text\"><a href=\"https:\/\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/07\/2023-06-Cyberattaques-Cout.pdf\" class=\"gde-link\">T\u00e9l\u00e9charger (PDF, 357KB)<\/a><\/p>\n<iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fmouillere.com%2Funiversconvergents%2Fwp-content%2Fuploads%2F2023%2F07%2F2023-05-04-CJUE-affaire-C-300-21.pdf&hl=fr&embedded=true\" class=\"gde-frame\" style=\"width:100%; height:500px; border: none;\" scrolling=\"no\"><\/iframe>\n<p class=\"gde-text\"><a href=\"https:\/\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/07\/2023-05-04-CJUE-affaire-C-300-21.pdf\" class=\"gde-link\">T\u00e9l\u00e9charger (PDF, 256KB)<\/a><\/p>\n<p><a href=\"https:\/\/www.lemondedudroit.fr\/decryptages\/87966-juges-europeens-apportent-premiers-eclaircissements-contours-responsabilite-responsable-traitement-violation-rgpd.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.lemondedudroit.fr\/decryptages\/87966-juges-europeens-apportent-premiers-eclaircissements-contours-responsabilite-responsable-traitement-violation-rgpd.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le cabinet Aster\u00e8s \u00e9value le co\u00fbt des cyberattaques r\u00e9ussies contre les organismes publics et priv\u00e9s fran\u00e7ais \u00e0 2 Mds\u20ac en 2022.<\/p>\n","protected":false},"author":1,"featured_media":5595,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[16,74],"tags":[],"class_list":["post-5594","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-donnees-personnelles","category-it"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/07\/2023-06-Cyberattaques-Cout.jpg?fit=1238%2C882&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-1se","jetpack-related-posts":[{"id":6059,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/06\/27\/1-3-des-collectivites-victimes-de-cyberattaques\/","url_meta":{"origin":5594,"position":0},"title":"1\/3 des collectivit\u00e9s victimes de cyberattaques","author":"Fred","date":"27 juin 2024","format":false,"excerpt":"L\u2019entreprise de s\u00e9curit\u00e9 informatique Harfang Lab vient de publier une \u00e9tude consacr\u00e9e \u00e0 la cybers\u00e9curit\u00e9 des collectivit\u00e9s. Avec la num\u00e9risation des services publics, allant des syst\u00e8mes de gestion administrative aux services en ligne pour les citoyens, les collectivit\u00e9s sont de plus en plus expos\u00e9es aux cyberattaques qui peuvent paralyser les\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1908,"url":"https:\/\/mouillere.com\/universconvergents\/2016\/03\/03\/cyberattaque-la-securite-a-coute-des-millions-deuros-a-tv5-monde\/","url_meta":{"origin":5594,"position":1},"title":"Cyberattaque &#8211; La s\u00e9curit\u00e9 a co\u00fbt\u00e9 des millions d&#8217;euros \u00e0 TV5 Monde","author":"Fred","date":"3 mars 2016","format":false,"excerpt":"Apr\u00e8s l'importante cyberattaque dont il a \u00e9t\u00e9 la cible en 2015, le groupe TV5 Monde a d\u00fb r\u00e9parer les d\u00e9g\u00e2ts, mettre en place une politique de... http:\/\/www.zdnet.fr\/actualites\/cyberattaque-la-securite-a-coute-des-millions-d-euros-a-tv5-monde-39833578.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6075,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/07\/14\/le-centre-integre-pour-la-cyberdefense-de-lotan\/","url_meta":{"origin":5594,"position":2},"title":"Le Centre int\u00e9gr\u00e9 pour la cyberd\u00e9fense de l&#8217;Otan","author":"Fred","date":"14 juillet 2024","format":false,"excerpt":"Face \u00e0 la recrudescence des cyberattaques russes et chinoises, l'Otan cr\u00e9\u00e9 le Centre int\u00e9gr\u00e9 pour la cyberd\u00e9fense afin d'am\u00e9liorer la protection des r\u00e9seaux de l\u2019Otan et de ses 32 \u00c9tats membres, d'informer les commandements militaires des cybermenaces et vuln\u00e9rabilit\u00e9s, y compris celles pesant sur les infrastructures critiques priv\u00e9es d\u00e8s lors\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/07\/NICC.jpeg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/07\/NICC.jpeg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/07\/NICC.jpeg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/07\/NICC.jpeg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":6111,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/07\/19\/microsoft-bug-ou-cyberattaque\/","url_meta":{"origin":5594,"position":3},"title":"Microsoft : bug ou cyberattaque ?","author":"Fred","date":"19 juillet 2024","format":false,"excerpt":"M\u00e9dias et experts en cybers\u00e9curit\u00e9 s'empressent de qualifier de panne informatique mondiale les anomalies bloquantes affectant actuellement de nombreuses infrastructures critiques et essentielles utilisant les services de Microsoft qui serait dues \u00e0 une mise \u00e0 jour d\u00e9fectueuse du logiciel de cybers\u00e9curit\u00e9 CrowdStrike. Dans le contexte g\u00e9opolitioque actuel et face \u00e0\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/07\/Microsoft.jpeg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/07\/Microsoft.jpeg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/07\/Microsoft.jpeg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/07\/Microsoft.jpeg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":3260,"url":"https:\/\/mouillere.com\/universconvergents\/2019\/11\/02\/cybersecurite-et-vulnerabilite-humaine\/","url_meta":{"origin":5594,"position":4},"title":"Cybers\u00e9curit\u00e9 et vuln\u00e9rabilit\u00e9 humaine","author":"Fred","date":"2 novembre 2019","format":false,"excerpt":"Maddyness publie un int\u00e9ressant article sur une r\u00e9cente \u00e9tude de l'entreprise de cybers\u00e9curit\u00e9 Proofpoint qui met en avant le facteur humain \u00e0 l\u2019origine des cyber-attaques. Sur les 300 cadres interrog\u00e9s, 86% indiquent avoir subi une cyber-attaque au cours des 3 derni\u00e8res ann\u00e9es. Pour 48% des cadres interrog\u00e9s, les failles humaines\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":5328,"url":"https:\/\/mouillere.com\/universconvergents\/2022\/11\/15\/comment-lutter-contre-les-cyberattaques\/","url_meta":{"origin":5594,"position":5},"title":"Comment lutter contre les cyberattaques ?","author":"Fred","date":"15 novembre 2022","format":false,"excerpt":"","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/11\/ACC-Cyber-Attack-Cheat-Sheet.jpg?fit=1200%2C831&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/11\/ACC-Cyber-Attack-Cheat-Sheet.jpg?fit=1200%2C831&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/11\/ACC-Cyber-Attack-Cheat-Sheet.jpg?fit=1200%2C831&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/11\/ACC-Cyber-Attack-Cheat-Sheet.jpg?fit=1200%2C831&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/11\/ACC-Cyber-Attack-Cheat-Sheet.jpg?fit=1200%2C831&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/5594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=5594"}],"version-history":[{"count":2,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/5594\/revisions"}],"predecessor-version":[{"id":5605,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/5594\/revisions\/5605"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/5595"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=5594"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=5594"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=5594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}