{"id":6226,"date":"2024-09-09T22:19:47","date_gmt":"2024-09-09T21:19:47","guid":{"rendered":"https:\/\/mouillere.com\/universconvergents\/?p=6226"},"modified":"2024-09-10T20:43:38","modified_gmt":"2024-09-10T19:43:38","slug":"cyberdico-un-dictionnaire-dedie-a-la-cybersecurite","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2024\/09\/09\/cyberdico-un-dictionnaire-dedie-a-la-cybersecurite\/","title":{"rendered":"CyberDico, un dictionnaire d\u00e9di\u00e9 \u00e0 la cybers\u00e9curit\u00e9"},"content":{"rendered":"<p>L\u2019Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d&#8217;information (ANSSI), autorit\u00e9 nationale dont la mission est de comprendre, pr\u00e9venir et r\u00e9pondre au risque cyber, a publi\u00e9 un dictionnaire d\u00e9di\u00e9 \u00e0 la cybers\u00e9curit\u00e9 pour traduire et clarifier mots, expressions et sigles propres \u00e0 la cybers\u00e9curit\u00e9.<\/p>\n<p><!--more--><\/p>\n<iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fmouillere.com%2Funiversconvergents%2Fwp-content%2Fuploads%2F2024%2F09%2FCyberDico_ANSSI_2024.pdf&hl=fr&embedded=true\" class=\"gde-frame\" style=\"width:100%; height:500px; border: none;\" scrolling=\"no\"><\/iframe>\n<p class=\"gde-text\"><a href=\"https:\/\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/09\/CyberDico_ANSSI_2024.pdf\" class=\"gde-link\">T\u00e9l\u00e9charger (PDF, 439KB)<\/a><\/p>\n<p><a href=\"https:\/\/cyber.gouv.fr\/publications\/cyberdico-quest-ce-que-cest\" target=\"_blank\" rel=\"noopener\">https:\/\/cyber.gouv.fr\/publications\/cyberdico-quest-ce-que-cest<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d&#8217;information (ANSSI), autorit\u00e9 nationale dont la mission est de comprendre, pr\u00e9venir et r\u00e9pondre au risque cyber, a publi\u00e9 un dictionnaire d\u00e9di\u00e9 \u00e0 la&hellip; <\/p>\n","protected":false},"author":1,"featured_media":6229,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20,74],"tags":[],"class_list":["post-6226","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite","category-it"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/09\/Cyberdico.jpeg?fit=1024%2C1024&ssl=1","jetpack_sharing_enabled":false,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-1Cq","jetpack-related-posts":[{"id":1145,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/10\/16\/cybersecurite-la-france-en-ordre-de-bataille\/","url_meta":{"origin":6226,"position":0},"title":"Cybers\u00e9curit\u00e9 &#8211; La France \u00ab en ordre de bataille \u00bb","author":"Fred","date":"16 octobre 2015","format":false,"excerpt":"Le gouvernement pr\u00e9sentait ce matin \u00e0 la maison de la Chimie sa strat\u00e9gie nationale de cybers\u00e9curit\u00e9, l\u2019occasion de faire le point sur les... http:\/\/www.zdnet.fr\/actualites\/cybersecurite-la-france-en-ordre-de-bataille-39826636.htm http:\/\/www.ssi.gouv.fr\/uploads\/2015\/10\/strategie_nationale_securite_numerique_fr.pdf http:\/\/www.ssi.gouv.fr\/actualite\/la-strategie-nationale-pour-la-securite-du-numerique-une-reponse-aux-nouveaux-enjeux-des-usages-numeriques\/ Strat\u00e9gie nationale s\u00e9curit\u00e9 num\u00e9rique","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6059,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/06\/27\/1-3-des-collectivites-victimes-de-cyberattaques\/","url_meta":{"origin":6226,"position":1},"title":"1\/3 des collectivit\u00e9s victimes de cyberattaques","author":"Fred","date":"27 juin 2024","format":false,"excerpt":"L\u2019entreprise de s\u00e9curit\u00e9 informatique Harfang Lab vient de publier une \u00e9tude consacr\u00e9e \u00e0 la cybers\u00e9curit\u00e9 des collectivit\u00e9s. Avec la num\u00e9risation des services publics, allant des syst\u00e8mes de gestion administrative aux services en ligne pour les citoyens, les collectivit\u00e9s sont de plus en plus expos\u00e9es aux cyberattaques qui peuvent paralyser les\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6496,"url":"https:\/\/mouillere.com\/universconvergents\/2025\/03\/06\/cloud-cybersecurite-souverainete\/","url_meta":{"origin":6226,"position":2},"title":"Cloud : cybers\u00e9curit\u00e9 &#038; souverainet\u00e9","author":"Fred","date":"6 mars 2025","format":false,"excerpt":"Alors que Microsoft finalise son projet garantissant \u00e0 ses utilisateurs europ\u00e9ens que leurs donn\u00e9es restent localis\u00e9es dans des centres de donn\u00e9es bas\u00e9es dans dans un pays de l'Union europ\u00e9enne ou au sein d'un pays membre de l'association europ\u00e9enne de libre \u00e9change (Suisse, Liechtenstein, Norv\u00e8ge, Islande), ce qui ne devrait pas\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1085,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/10\/08\/qui-est-responsable-de-la-cybersecurite-le-rssi-le-dsi-le-pdg-ou-vous\/","url_meta":{"origin":6226,"position":3},"title":"Qui est responsable de la cybers\u00e9curit\u00e9 : le RSSI, le DSI, le PDG ou vous ?","author":"Fred","date":"8 octobre 2015","format":false,"excerpt":"La s\u00e9curit\u00e9 du syst\u00e8me d'information ne se cantonne pas \u00e0 l'\u00e9quipement et au logiciel. Jusqu'o\u00f9 vont les responsabilit\u00e9s ? Des experts donnent leur... http:\/\/www.zdnet.fr\/actualites\/qui-est-responsable-de-la-cybersecurite-le-rssi-le-dsi-le-pdg-ou-vous-39826198.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":780,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/09\/04\/comment-savoir-si-les-depenses-en-cybersecurite-sont-suffisantes\/","url_meta":{"origin":6226,"position":4},"title":"Comment savoir si les d\u00e9penses en cybers\u00e9curit\u00e9 sont suffisantes ?","author":"Fred","date":"4 septembre 2015","format":false,"excerpt":"\u00c0 part d\u00e9penser toutes leurs liquidit\u00e9s en antivirus, pare-feu, d\u00e9tection des intrusions et autres, comment font les entreprises... http:\/\/www.zdnet.fr\/actualites\/comment-savoir-si-les-depenses-en-cybersecurite-sont-suffisantes-39824324.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":3260,"url":"https:\/\/mouillere.com\/universconvergents\/2019\/11\/02\/cybersecurite-et-vulnerabilite-humaine\/","url_meta":{"origin":6226,"position":5},"title":"Cybers\u00e9curit\u00e9 et vuln\u00e9rabilit\u00e9 humaine","author":"Fred","date":"2 novembre 2019","format":false,"excerpt":"Maddyness publie un int\u00e9ressant article sur une r\u00e9cente \u00e9tude de l'entreprise de cybers\u00e9curit\u00e9 Proofpoint qui met en avant le facteur humain \u00e0 l\u2019origine des cyber-attaques. Sur les 300 cadres interrog\u00e9s, 86% indiquent avoir subi une cyber-attaque au cours des 3 derni\u00e8res ann\u00e9es. Pour 48% des cadres interrog\u00e9s, les failles humaines\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/6226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=6226"}],"version-history":[{"count":2,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/6226\/revisions"}],"predecessor-version":[{"id":6230,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/6226\/revisions\/6230"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/6229"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=6226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=6226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=6226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}