{"id":1310,"date":"2015-12-10T19:44:07","date_gmt":"2015-12-10T19:44:07","guid":{"rendered":"http:\/\/evosec.eu\/?page_id=1310"},"modified":"2016-09-11T01:02:40","modified_gmt":"2016-09-11T01:02:40","slug":"security","status":"publish","type":"page","link":"https:\/\/evosec.eu\/fr\/security\/","title":{"rendered":"S\u00e9curit\u00e9 Des TI"},"content":{"rendered":"<div class=\"well well-sm\">\n<p>S\u00e9curit\u00e9 informatique, \u00e9galement connu sous le nom la cybers\u00e9curit\u00e9 ou la s\u00e9curit\u00e9 des TI, est la protection des syst\u00e8mes d\u2019information de vol ou de dommage au mat\u00e9riel, le logiciel, et les informations sur eux, ainsi que de la perturbation ou le d\u00e9tournement des services qu\u2019ils fournissent. Il comprend le contr\u00f4le de l\u2019acc\u00e8s physique au mat\u00e9riel, ainsi que de prot\u00e9ger contre les dommages qui peuvent venir par injection de code, les donn\u00e9es et les acc\u00e8s r\u00e9seau et en raison de la faute professionnelle par les op\u00e9rateurs, qu\u2019ils soient intentionnels, accidentels, ou \u00e0 cause de leur \u00eatre tromp\u00e9s en s\u2019\u00e9cartant des proc\u00e9dures s\u00e9curis\u00e9es.<\/p>\n<p>Syst\u00e8mes informatiques comprennent maintenant une tr\u00e8s grande vari\u00e9t\u00e9 de dispositifs \u00ab\u00a0intelligents\u00a0\u00bb, notamment les smartphones, les t\u00e9l\u00e9viseurs et les appareils minuscules comme partie des r\u00e9seaux Internet of Things \u2013 et n\u2019incluent pas seulement Internet et donn\u00e9es priv\u00e9es r\u00e9seaux, mais aussi le Bluetooth, Wi-Fi et autres r\u00e9seaux sans fil.<\/p>\n<\/div>\n<ul class=\"fa-ul\" style=\"list-style-type: none;\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i><a href=\"http:\/\/evosec.eu\/smbs-fast-cyber-security-checklist\/\">SMB Quick Check<\/a><\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Audit de s\u00e9curit\u00e9 site Web<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Audit de s\u00e9curit\u00e9 r\u00e9seau<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Audit de s\u00e9curit\u00e9 de serveur<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Audit de s\u00e9curit\u00e9 embarqu\u00e9e \/ Audit de s\u00e9curit\u00e9 de l\u2019ITO<\/li>\n<\/ul>\n<p>Nous pouvons fournir des essais, de surveillance, de solutions et Conseil pour\u00a0:<\/p>\n<ul class=\"fa-ul\" style=\"list-style-type: none;\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Injection d\u2019URL\/commande<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Cass\u00e9 l\u2019authentification \/ Bad Session Management<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>R\u00e9f\u00e9rences d\u2019objet direct<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Exposition des donn\u00e9es sensibles<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Vuln\u00e9rabilit\u00e9s connues des composants<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>D\u00e9veloppement de l\u2019exploit<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Analyse du Code source &#8211; en particulier le protocole impl\u00e9mente<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>S\u00e9curit\u00e9 informatique, \u00e9galement connu sous le nom la cybers\u00e9curit\u00e9 ou la s\u00e9curit\u00e9 des TI, est la protection des syst\u00e8mes d\u2019information de vol ou de dommage au mat\u00e9riel, le logiciel, et les informations sur eux, ainsi que de la perturbation ou le d\u00e9tournement des services qu\u2019ils fournissent. Il comprend le contr\u00f4le &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1310","page","type-page","status-publish","hentry"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"fr","enabled_languages":["en","da","de","es","fi","fr","it","hu","nl","no","pl","pt","ru","sv"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"da":{"title":true,"content":true,"excerpt":false},"de":{"title":true,"content":true,"excerpt":false},"es":{"title":true,"content":true,"excerpt":false},"fi":{"title":true,"content":true,"excerpt":false},"fr":{"title":true,"content":true,"excerpt":false},"it":{"title":true,"content":true,"excerpt":false},"hu":{"title":true,"content":true,"excerpt":false},"nl":{"title":true,"content":true,"excerpt":false},"no":{"title":true,"content":true,"excerpt":false},"pl":{"title":true,"content":true,"excerpt":false},"pt":{"title":true,"content":true,"excerpt":false},"ru":{"title":true,"content":true,"excerpt":false},"sv":{"title":true,"content":true,"excerpt":false}}},"_links":{"self":[{"href":"https:\/\/evosec.eu\/fr\/wp-json\/wp\/v2\/pages\/1310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evosec.eu\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/evosec.eu\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/evosec.eu\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/evosec.eu\/fr\/wp-json\/wp\/v2\/comments?post=1310"}],"version-history":[{"count":3,"href":"https:\/\/evosec.eu\/fr\/wp-json\/wp\/v2\/pages\/1310\/revisions"}],"predecessor-version":[{"id":2136,"href":"https:\/\/evosec.eu\/fr\/wp-json\/wp\/v2\/pages\/1310\/revisions\/2136"}],"wp:attachment":[{"href":"https:\/\/evosec.eu\/fr\/wp-json\/wp\/v2\/media?parent=1310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}