{"id":175,"date":"2026-02-04T22:42:28","date_gmt":"2026-02-04T21:42:28","guid":{"rendered":"https:\/\/leblogtech.romain-s.fr\/?p=175"},"modified":"2026-03-22T00:20:11","modified_gmt":"2026-03-21T23:20:11","slug":"introduction-a-la-cybersecurite","status":"publish","type":"post","link":"https:\/\/leblogtech.romain-s.fr\/index.php\/2026\/02\/04\/introduction-a-la-cybersecurite\/","title":{"rendered":"Introduction \u00e0 la Cybers\u00e9curit\u00e9"},"content":{"rendered":"\t\t\t\t<div class=\"wp-block-uagb-table-of-contents uagb-toc__align-left uagb-toc__columns-1  uagb-block-2530bb78      \"\n\t\t\t\t\tdata-scroll= \"1\"\n\t\t\t\t\tdata-offset= \"30\"\n\t\t\t\t\tstyle=\"\"\n\t\t\t\t>\n\t\t\t\t<div class=\"uagb-toc__wrap\">\n\t\t\t\t\t\t<div class=\"uagb-toc__title\">\n\t\t\t\t\t\t\tTable des mati\u00e8res\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-toc__list-wrap \">\n\t\t\t\t\t\t<ol class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#la-cybers\u00e9curit\u00e9-origines-d\u00e9finitions-et-enjeux\" class=\"uagb-toc-link__trigger\">La Cybers\u00e9curit\u00e9 : Origines, D\u00e9finitions et Enjeux<\/a><ul class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#\u00e9tymologie-et-histoire\" class=\"uagb-toc-link__trigger\">\u00c9tymologie et Histoire<\/a><ul class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#lorigine-du-mot-cyber\" class=\"uagb-toc-link__trigger\">L&#039;origine du mot &quot;Cyber&quot;<\/a><\/li><\/ul><li class=\"uagb-toc__list\"><a href=\"#le-projet-creeper\" class=\"uagb-toc-link__trigger\">\u00a0Le projet Creeper<\/a><li class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#d\u00e9finition-technique-et-le-mod\u00e8le-dic\" class=\"uagb-toc-link__trigger\">D\u00e9finition Technique et le mod\u00e8le DIC<\/a><ul class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#aujourdhui-comment-d\u00e9finit-on-officiellement-la-cybers\u00e9curit\u00e9\" class=\"uagb-toc-link__trigger\">Aujourd&#039;hui, comment d\u00e9finit-on officiellement la cybers\u00e9curit\u00e9 ?<\/a><\/li><\/ul><li class=\"uagb-toc__list\"><a href=\"#\u00e0-quel-besoin-r\u00e9pond-elle-aujourdhui\" class=\"uagb-toc-link__trigger\">\u00c0 quel besoin r\u00e9pond-elle aujourd&#039;hui ?<\/a><ul class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#la-protection-du-patrimoine-\u00e9conomique\" class=\"uagb-toc-link__trigger\">La protection du patrimoine \u00e9conomique<\/a><li class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#la-souverainet\u00e9-nationale\" class=\"uagb-toc-link__trigger\">La souverainet\u00e9 nationale<\/a><li class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#la-protection-de-la-vie-priv\u00e9e-privacy\" class=\"uagb-toc-link__trigger\">La protection de la vie priv\u00e9e (Privacy)<\/a><\/li><\/ul><li class=\"uagb-toc__list\"><a href=\"#conclusion\" class=\"uagb-toc-link__trigger\">Conclusion<\/a><li class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#sources-et-r\u00e9f\u00e9rences-pour-aller-plus-loin\" class=\"uagb-toc-link__trigger\">Sources et R\u00e9f\u00e9rences pour aller plus loin<\/a><\/ul><\/ol>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-91c46a05\"><h1 class=\"uagb-heading-text\">La Cybers\u00e9curit\u00e9 : Origines, D\u00e9finitions et Enjeux<\/h1><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-9f25ebc6 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<p class=\"has-medium-font-size\">Actuellement le terme \u00ab\u00a0cybers\u00e9curit\u00e9\u00a0\u00bb est tr\u00e8s utilis\u00e9, des conseils d&rsquo;administration aux journaux t\u00e9l\u00e9vis\u00e9s. Mais au-del\u00e0 du buzzword, que signifie r\u00e9ellement ce concept ? D&rsquo;o\u00f9 vient-il et pourquoi est-il devenu si important dans notre soci\u00e9t\u00e9 ?<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Cet article revient aux fondamentaux pour d\u00e9mystifier la s\u00e9curit\u00e9 des syst\u00e8mes d&rsquo;information.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-82fbcb0e alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-8a7162d2\"><h2 class=\"uagb-heading-text\"><strong>\u00c9tymologie et Histoire<\/strong><\/h2><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-d102369b alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-985abee0 uagb-infobox__content-wrap  uagb-infobox-icon-left-title uagb-infobox-left uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-left-title-image\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 320 512\"><path d=\"M204.3 32.01H96c-52.94 0-96 43.06-96 96c0 17.67 14.31 31.1 32 31.1s32-14.32 32-31.1c0-17.64 14.34-32 32-32h108.3C232.8 96.01 256 119.2 256 147.8c0 19.72-10.97 37.47-30.5 47.33L127.8 252.4C117.1 258.2 112 268.7 112 280v40c0 17.67 14.31 31.99 32 31.99s32-14.32 32-31.99V298.3L256 251.3c39.47-19.75 64-59.42 64-103.5C320 83.95 268.1 32.01 204.3 32.01zM144 400c-22.09 0-40 17.91-40 40s17.91 39.1 40 39.1s40-17.9 40-39.1S166.1 400 144 400z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong><strong>L&rsquo;origine du mot \u00ab\u00a0Cyber\u00a0\u00bb<\/strong><\/strong><\/h3><\/div><\/div><p class=\"uagb-ifb-desc\">Le pr\u00e9fixe \u00ab\u00a0cyber\u00a0\u00bb provient du grec <strong>\u00ab\u00a0Kubern\u00eatik\u00ea\u00a0\u00bb<\/strong>, qui signifie \u00ab\u00a0l&rsquo;art de gouverner\u00a0\u00bb ou de piloter un navire (le gouvernail). Ce terme a \u00e9t\u00e9 popularis\u00e9 en 1948 par le math\u00e9maticien Norbert Wiener dans son ouvrage sur la <strong>Cybern\u00e9tique<\/strong>. \u00c0 l&rsquo;\u00e9poque, cela d\u00e9signait l&rsquo;\u00e9tude du contr\u00f4le et de la communication chez l&rsquo;animal et la machine. <br><br>Ce n&rsquo;est que dans les ann\u00e9es 80-90, avec l&rsquo;\u0153uvre de William Gibson (<em>Neuromancien<\/em>) et l&rsquo;essor d&rsquo;Internet, que \u00ab\u00a0cyber\u00a0\u00bb est devenu synonyme de \u00ab\u00a0monde num\u00e9rique\u00a0\u00bb.<br><\/p><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-56864cfb alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-162daa73\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-e13d3b88\"><h2 class=\"uagb-heading-text\"><strong>\u00a0Le projet Creeper <\/strong><\/h2><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-ad740cae\">\n<figure class=\"wp-block-image size-full has-custom-border\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"https:\/\/leblogtech.romain-s.fr\/wp-content\/uploads\/2026\/02\/image.png\" alt=\"\" class=\"wp-image-253\" style=\"border-width:6px;border-top-left-radius:56px;border-top-right-radius:56px;border-bottom-left-radius:56px;border-bottom-right-radius:56px\" srcset=\"https:\/\/leblogtech.romain-s.fr\/wp-content\/uploads\/2026\/02\/image.png 400w, https:\/\/leblogtech.romain-s.fr\/wp-content\/uploads\/2026\/02\/image-300x225.png 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/figure>\n<\/div>\n<\/div><\/div>\n\n\n\n<p class=\"has-medium-font-size\">Si le mot est ancien, le besoin de s\u00e9curit\u00e9 est n\u00e9 avec les premiers r\u00e9seaux. On consid\u00e8re souvent que l&rsquo;histoire de la cybers\u00e9curit\u00e9 d\u00e9bute en <strong>1971<\/strong> sur ARPANET (l&rsquo;anc\u00eatre d&rsquo;Internet).<\/p>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-d0049da3 uagb-infobox__content-wrap  uagb-infobox-icon-left-title uagb-infobox-left uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-left-title-image\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 96C256 42.98 298.1 0 352 0H390.4C439.9 0 480 40.12 480 89.6V376C480 451.1 419.1 512 344 512C268.9 512 208 451.1 208 376V296C208 273.9 190.1 256 168 256C145.9 256 128 273.9 128 296V464C128 490.5 106.5 512 80 512C53.49 512 32 490.5 32 464V296C32 220.9 92.89 160 168 160C243.1 160 304 220.9 304 296V376C304 398.1 321.9 416 344 416C366.1 416 384 398.1 384 376V192H352C298.1 192 256 149 256 96zM376 64C362.7 64 352 74.75 352 88C352 101.3 362.7 112 376 112C389.3 112 400 101.3 400 88C400 74.75 389.3 64 376 64z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><\/div><\/div><p class=\"uagb-ifb-desc\">Un chercheur, Bob Thomas, cr\u00e9e <strong>Creeper<\/strong>, un programme exp\u00e9rimental capable de se d\u00e9placer d&rsquo;un ordinateur \u00e0 un autre en affichant : <em>\u00ab\u00a0I&rsquo;m the creeper, catch me if you can!\u00a0\u00bb<\/em>. Ce n&rsquo;\u00e9tait pas malveillant, mais c&rsquo;\u00e9tait le premier \u00ab\u00a0ver\u00a0\u00bb informatique.<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-dccc5d39 uagb-infobox__content-wrap  uagb-infobox-icon-right-title uagb-infobox-right uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-right-title-image\"><div class=\"uagb-ifb-title-wrap\"><\/div><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M0 64C0 28.65 28.65 0 64 0H224V128C224 145.7 238.3 160 256 160H384V207L291.2 244.2C269.9 252.7 256 273.3 256 296.2C256 352.7 274.9 444.2 350.2 504.4C341.2 509.3 330.9 512 320 512H64C28.65 512 0 483.3 0 448V64zM256 128V0L384 128H256zM423.1 225.7C428.8 223.4 435.2 223.4 440.9 225.7L560.9 273.7C570 277.4 576 286.2 576 296C576 359.3 550.1 464.8 441.2 510.2C435.3 512.6 428.7 512.6 422.8 510.2C313.9 464.8 288 359.3 288 296C288 286.2 293.1 277.4 303.1 273.7L423.1 225.7zM432 273.8V461.7C500.2 428.7 523.5 362.7 527.4 311.1L432 273.8z\"><\/path><\/svg><\/div><\/div><p class=\"uagb-ifb-desc\">En r\u00e9ponse, Ray Tomlinson (l&rsquo;inventeur de l&#8217;email) code <strong>Reaper<\/strong>, un programme con\u00e7u pour traquer et supprimer Creeper. Le premier \u00ab\u00a0antivirus\u00a0\u00bb \u00e9tait n\u00e9.<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-35052ee8 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-9741cd77\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-1a2511ad\"><h2 class=\"uagb-heading-text\"><strong> D\u00e9finition Technique et le mod\u00e8le DIC<\/strong><\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-cf77ba1b uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 320 512\"><path d=\"M204.3 32.01H96c-52.94 0-96 43.06-96 96c0 17.67 14.31 31.1 32 31.1s32-14.32 32-31.1c0-17.64 14.34-32 32-32h108.3C232.8 96.01 256 119.2 256 147.8c0 19.72-10.97 37.47-30.5 47.33L127.8 252.4C117.1 258.2 112 268.7 112 280v40c0 17.67 14.31 31.99 32 31.99s32-14.32 32-31.99V298.3L256 251.3c39.47-19.75 64-59.42 64-103.5C320 83.95 268.1 32.01 204.3 32.01zM144 400c-22.09 0-40 17.91-40 40s17.91 39.1 40 39.1s40-17.9 40-39.1S166.1 400 144 400z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Aujourd&rsquo;hui, comment d\u00e9finit-on officiellement la cybers\u00e9curit\u00e9 ?<br><\/h3><\/div><p class=\"uagb-ifb-desc\"><br><\/p><\/div><\/div>\n\n\n\n<p class=\"has-medium-font-size\">Selon l&rsquo;<strong>ANSSI<\/strong> (Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d&rsquo;information) et le standard <strong>NIST<\/strong> (National Institute of Standards and Technology), la cybers\u00e9curit\u00e9 est l&rsquo;ensemble des moyens techniques, organisationnels et juridiques visant \u00e0 prot\u00e9ger les syst\u00e8mes d&rsquo;information.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Mais pour \u00eatre pr\u00e9cis, tout expert en s\u00e9curit\u00e9 se r\u00e9f\u00e8re \u00e0 la <strong>Triade CIA<\/strong> ou <strong>DIC<\/strong> (en fran\u00e7ais). C&rsquo;est le c\u0153ur de la discipline. Pour qu&rsquo;un syst\u00e8me soit s\u00e9curis\u00e9, il doit garantir trois crit\u00e8res :<br><\/p>\n\n\n\n<div class=\"wp-block-uagb-icon-list uagb-block-e6e6703f\"><div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-997cbe8e\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 256 512\"><path d=\"M64 448c-8.188 0-16.38-3.125-22.62-9.375c-12.5-12.5-12.5-32.75 0-45.25L178.8 256L41.38 118.6c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l160 160c12.5 12.5 12.5 32.75 0 45.25l-160 160C80.38 444.9 72.19 448 64 448z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Disponibilit\u00e9 (Availability) : Le syst\u00e8me doit fonctionner quand on en a besoin.<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-f526594a\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 256 512\"><path d=\"M64 448c-8.188 0-16.38-3.125-22.62-9.375c-12.5-12.5-12.5-32.75 0-45.25L178.8 256L41.38 118.6c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l160 160c12.5 12.5 12.5 32.75 0 45.25l-160 160C80.38 444.9 72.19 448 64 448z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Int\u00e9grit\u00e9 (Integrity) : Les donn\u00e9es ne doivent pas \u00eatre modifi\u00e9es par une personne non autoris\u00e9e.<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-3f4b65db\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 256 512\"><path d=\"M64 448c-8.188 0-16.38-3.125-22.62-9.375c-12.5-12.5-12.5-32.75 0-45.25L178.8 256L41.38 118.6c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l160 160c12.5 12.5 12.5 32.75 0 45.25l-160 160C80.38 444.9 72.19 448 64 448z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Confidentialit\u00e9 (Confidentiality) : Seules les personnes autoris\u00e9es ont acc\u00e8s aux donn\u00e9es.<\/span><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-4c72a535\"><button class=\"uagb-notice-close-button\" type=\"button\" aria-label=\"Close\"><\/button><span class=\"uagb-notice-title\"><strong>Note<\/strong><\/span><div class=\"uagb-notice-text\">\n<p class=\"has-medium-font-size\">On ajoute parfois un quatri\u00e8me pilier, la <strong>Tra\u00e7abilit\u00e9<\/strong> (ou Preuve), pour savoir \u00ab\u00a0qui a fait quoi et quand\u00a0\u00bb.<\/p>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-88a8e426 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-c5d729a6\"><h2 class=\"uagb-heading-text\"><strong>\u00c0 quel besoin r\u00e9pond-elle aujourd&rsquo;hui ?<\/strong><\/h2><\/div>\n\n\n\n<p class=\"has-medium-font-size\">Si la cybers\u00e9curit\u00e9 a \u00e9t\u00e9 cr\u00e9\u00e9e pour prot\u00e9ger des machines, elle r\u00e9pond aujourd&rsquo;hui \u00e0 des besoins beaucoup plus vastes avec la transformation num\u00e9rique.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Les besoins actuels se classent en trois cat\u00e9gories :<br><\/p>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-da0f8c05 uagb-infobox__content-wrap  uagb-infobox-icon-left-title uagb-infobox-left uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-left-title-image\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 256 512\"><path d=\"M256 448c0 17.67-14.33 32-32 32H32c-17.67 0-32-14.33-32-32s14.33-32 32-32h64V123.8L49.75 154.6C35.02 164.5 15.19 160.4 5.375 145.8C-4.422 131.1-.4531 111.2 14.25 101.4l96-64c9.828-6.547 22.45-7.187 32.84-1.594C153.5 41.37 160 52.22 160 64.01v352h64C241.7 416 256 430.3 256 448z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>La protection du patrimoine \u00e9conomique <\/strong><\/h3><\/div><\/div><p class=\"uagb-ifb-desc\">Pour une entreprise, se faire voler sa propri\u00e9t\u00e9 intellectuelle ou paralyser sa production (via un <em>Ransomware<\/em>) signifie souvent la faillite.<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-41d85d32 uagb-infobox__content-wrap  uagb-infobox-icon-left-title uagb-infobox-left uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-left-title-image\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 320 512\"><path d=\"M320 448c0 17.67-14.33 32-32 32H32c-13.08 0-24.83-7.953-29.7-20.09c-4.859-12.12-1.859-26 7.594-35.03l193.6-185.1c31.36-30.17 33.95-80 5.812-113.4c-14.91-17.69-35.86-28.12-58.97-29.38C127.4 95.83 105.3 103.9 88.53 119.9L53.52 151.7c-13.08 11.91-33.33 10.89-45.2-2.172C-3.563 136.5-2.594 116.2 10.48 104.3l34.45-31.3c28.67-27.34 68.39-42.11 108.9-39.88c40.33 2.188 78.39 21.16 104.4 52.03c49.8 59.05 45.2 147.3-10.45 200.8l-136 130H288C305.7 416 320 430.3 320 448z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>La souverainet\u00e9 nationale<\/strong><\/h3><\/div><\/div><p class=\"uagb-ifb-desc\">Les infrastructures critiques (h\u00f4pitaux, r\u00e9seaux \u00e9lectriques, distribution d&rsquo;eau) sont d\u00e9sormais connect\u00e9es. La cybers\u00e9curit\u00e9 est devenue une question de d\u00e9fense nationale pour \u00e9viter le sabotage.<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-4ac9798d uagb-infobox__content-wrap  uagb-infobox-icon-left-title uagb-infobox-left uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-left-title-image\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 320 512\"><path d=\"M320 344c0 74.98-61.02 136-136 136H103.6c-46.34 0-87.31-29.53-101.1-73.48c-5.594-16.77 3.484-34.88 20.25-40.47c16.75-5.609 34.89 3.484 40.47 20.25c5.922 17.77 22.48 29.7 41.23 29.7H184c39.7 0 72-32.3 72-72s-32.3-72-72-72H80c-13.2 0-25.05-8.094-29.83-20.41C45.39 239.3 48.66 225.3 58.38 216.4l131.4-120.4H32c-17.67 0-32-14.33-32-32s14.33-32 32-32h240c13.2 0 25.05 8.094 29.83 20.41c4.781 12.3 1.516 26.27-8.203 35.19l-131.4 120.4H184C258.1 208 320 269 320 344z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>La protection de la vie priv\u00e9e (Privacy)<\/strong><\/h3><\/div><\/div><p class=\"uagb-ifb-desc\">\u00a0Avec le RGPD (R\u00e8glement G\u00e9n\u00e9ral sur la Protection des Donn\u00e9es), la cybers\u00e9curit\u00e9 est le garant technique de nos libert\u00e9s individuelles face \u00e0 la surveillance ou au vol d&rsquo;identit\u00e9.<\/p><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-a17736e0 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-7134154b\"><h2 class=\"uagb-heading-text\">Conclusion<\/h2><\/div>\n\n\n\n<p>La cybers\u00e9curit\u00e9 n&rsquo;est pas un produit que l&rsquo;on ach\u00e8te, c&rsquo;est un processus continu. N\u00e9e de la n\u00e9cessit\u00e9 de contr\u00f4ler les premiers programmes autonomes dans les ann\u00e9es 70, elle est devenue la cl\u00e9 de notre \u00e9conomie num\u00e9rique.<\/p>\n\n\n\n<p>Son objectif n&rsquo;est pas d&#8217;emp\u00eacher toutes les attaques (ce qui est impossible), mais de rendre le co\u00fbt de l&rsquo;attaque dissuasif pour le pirate, tout en garantissant que nos syst\u00e8mes restent <strong>Disponibles, Int\u00e8gres et Confidentiels<\/strong>.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-c97af54f alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-5853f359\"><h2 class=\"uagb-heading-text\">Sources et R\u00e9f\u00e9rences pour aller plus loin<\/h2><\/div>\n\n\n\n<p><strong>Norbert Wiener :<\/strong> <em>Cybernetics: Or Control and Communication in the Animal and the Machine<\/em> (1948)<\/p>\n\n\n\n<p><strong>ANSSI :<\/strong> <em>Panorama de la cybermenace<\/em> (<a href=\"https:\/\/cyber.gouv.fr\/nous-connaitre\/publications\/panoramas-de-la-cybermenace\/\">https:\/\/cyber.gouv.fr\/nous-connaitre\/publications\/panoramas-de-la-cybermenace\/<\/a>)<\/p>\n\n\n\n<p><strong>NIST :<\/strong> <em>Cybersecurity Framework<\/em> <\/p>\n\n\n\n<p><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Cyber\">https:\/\/fr.wikipedia.org\/wiki\/Cyber<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Cybernetics:_Or_Control_and_Communication_in_the_Animal_and_the_Machine\">https:\/\/en.wikipedia.org\/wiki\/Cybernetics:_Or_Control_and_Communication_in_the_Animal_and_the_Machine<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Creeper_(programme)\">https:\/\/fr.wikipedia.org\/wiki\/Creeper_(programme)<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.bonjourcyber.com\/blog\/pionniers-cybersecurite-de-creeper-a-reaper\">https:\/\/www.bonjourcyber.com\/blog\/pionniers-cybersecurite-de-creeper-a-reaper<\/a><\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La Cybers\u00e9curit\u00e9 : Origines, D\u00e9finitions et Enjeux Actuellement le terme \u00ab\u00a0cybers\u00e9curit\u00e9\u00a0\u00bb est tr\u00e8s utilis\u00e9, des conseils d&rsquo;administration aux journaux t\u00e9l\u00e9vis\u00e9s. [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":176,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[6],"tags":[],"class_list":["post-175","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite"],"uagb_featured_image_src":{"full":["https:\/\/leblogtech.romain-s.fr\/wp-content\/uploads\/2025\/12\/cyb.gif",800,600,false],"thumbnail":["https:\/\/leblogtech.romain-s.fr\/wp-content\/uploads\/2025\/12\/cyb-150x150.gif",150,150,true],"medium":["https:\/\/leblogtech.romain-s.fr\/wp-content\/uploads\/2025\/12\/cyb-300x225.gif",300,225,true],"medium_large":["https:\/\/leblogtech.romain-s.fr\/wp-content\/uploads\/2025\/12\/cyb-768x576.gif",768,576,true],"large":["https:\/\/leblogtech.romain-s.fr\/wp-content\/uploads\/2025\/12\/cyb.gif",800,600,false],"1536x1536":["https:\/\/leblogtech.romain-s.fr\/wp-content\/uploads\/2025\/12\/cyb.gif",800,600,false],"2048x2048":["https:\/\/leblogtech.romain-s.fr\/wp-content\/uploads\/2025\/12\/cyb.gif",800,600,false]},"uagb_author_info":{"display_name":"romain-s","author_link":"https:\/\/leblogtech.romain-s.fr\/index.php\/author\/romain-s\/"},"uagb_comment_info":0,"uagb_excerpt":"La Cybers\u00e9curit\u00e9 : Origines, D\u00e9finitions et Enjeux Actuellement le terme \u00ab\u00a0cybers\u00e9curit\u00e9\u00a0\u00bb est tr\u00e8s utilis\u00e9, des conseils d&rsquo;administration aux journaux t\u00e9l\u00e9vis\u00e9s. [&hellip;]","_links":{"self":[{"href":"https:\/\/leblogtech.romain-s.fr\/index.php\/wp-json\/wp\/v2\/posts\/175","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/leblogtech.romain-s.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/leblogtech.romain-s.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/leblogtech.romain-s.fr\/index.php\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/leblogtech.romain-s.fr\/index.php\/wp-json\/wp\/v2\/comments?post=175"}],"version-history":[{"count":10,"href":"https:\/\/leblogtech.romain-s.fr\/index.php\/wp-json\/wp\/v2\/posts\/175\/revisions"}],"predecessor-version":[{"id":257,"href":"https:\/\/leblogtech.romain-s.fr\/index.php\/wp-json\/wp\/v2\/posts\/175\/revisions\/257"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/leblogtech.romain-s.fr\/index.php\/wp-json\/wp\/v2\/media\/176"}],"wp:attachment":[{"href":"https:\/\/leblogtech.romain-s.fr\/index.php\/wp-json\/wp\/v2\/media?parent=175"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/leblogtech.romain-s.fr\/index.php\/wp-json\/wp\/v2\/categories?post=175"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/leblogtech.romain-s.fr\/index.php\/wp-json\/wp\/v2\/tags?post=175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}