{"id":22483,"date":"2019-12-12T14:19:10","date_gmt":"2019-12-12T14:19:10","guid":{"rendered":"https:\/\/www.istegroup.com\/?post_type=product&#038;p=22483"},"modified":"2024-01-03T13:43:23","modified_gmt":"2024-01-03T13:43:23","slug":"cybervigilance-et-confiance-numerique","status":"publish","type":"product","link":"https:\/\/www.istegroup.com\/fr\/produit\/cybervigilance-et-confiance-numerique\/","title":{"rendered":"Cybervigilance et confiance num\u00e9rique"},"content":{"rendered":"<p>Les cybermenaces sont d\u00e9sormais nombreuses et sophistiqu\u00e9es et les cybercriminels infiltrent des organisations de secteurs de plus en plus vari\u00e9s. Les entreprises n\u2019ont d\u2019autre choix que de se doter d\u2019outils et de m\u00e9canismes de s\u00e9curit\u00e9 efficaces, afin de devancer les cybercriminels et de se pr\u00e9munir contre les attaques.<\/p>\n<p><em>Cybervigilance et confiance num\u00e9rique<\/em> pr\u00e9sente les avanc\u00e9es r\u00e9centes en mati\u00e8re de renseignement sur la cybermenace, de gestion de la confiance et d\u2019analyse des risques. Il d\u00e9crit les approches, en mati\u00e8re de renseignement et de cybervigilance, qui permettent de r\u00e9duire l\u2019\u00e9cart technique et tactique entre les m\u00e9thodes d\u2019attaques avanc\u00e9es et celles de d\u00e9fense. En plus de la gestion de confiance, cet ouvrage propose une synth\u00e8se comparative des diff\u00e9rentes m\u00e9thodes d\u2019analyse de risque dans les r\u00e9seaux et illustre leur int\u00e9r\u00eat sur un cas d\u2019usage concret. Enfin, il offre une solution fond\u00e9e sur un m\u00e9canisme d\u2019alt\u00e9ration des donn\u00e9es qui permet de d\u00e9tecter et de bloquer les fuites de donn\u00e9es sensibles des utilisateurs des syst\u00e8mes Android.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les cybermenaces sont d\u00e9sormais nombreuses et sophistiqu\u00e9es et les cybercriminels infiltrent des organisations de secteurs de plus en plus vari\u00e9s. Les entreprises n\u2019ont d\u2019autre choix que de se doter d\u2019outils et de m\u00e9canismes de s\u00e9curit\u00e9 efficaces, afin de devancer les cybercriminels et de se pr\u00e9munir contre les attaques. Cybervigilance et confiance num\u00e9rique pr\u00e9sente les avanc\u00e9es [&hellip;]<\/p>\n","protected":false},"featured_media":22491,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"product_brand":[],"product_cat":[679],"product_tag":[4066,4065,31,196,18,19,20,198,204,172,212,28,4064],"class_list":{"0":"post-22483","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-rseaux-et-tlcommunications-12506534","7":"product_tag-confiance-numerique","8":"product_tag-cybervigilance","9":"product_tag-ebook","10":"product_tag-ebooks","11":"product_tag-edition-scientifique","12":"product_tag-editions-francaise","13":"product_tag-editions-technique","14":"product_tag-iste-edition","15":"product_tag-livre","16":"product_tag-livre-scientifique","17":"product_tag-ouvrage","18":"product_tag-ouvrage-scientifique-francais","19":"product_tag-wiem-tounsi","21":"first","22":"instock","23":"shipping-taxable","24":"purchasable","25":"product-type-variable"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybervigilance et confiance num\u00e9rique - ISTE Group<\/title>\n<meta name=\"description\" content=\"Cybervigilance et confiance num\u00e9rique pr\u00e9sente les avanc\u00e9es r\u00e9centes en mati\u00e8re de renseignement sur la cybermenace, de gestion de la confiance et d\u2019analyse des risques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.istegroup.com\/en\/produit\/cybervigilance-et-confiance-numerique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybervigilance et confiance num\u00e9rique - ISTE Group\" \/>\n<meta property=\"og:description\" content=\"Cybervigilance et confiance num\u00e9rique pr\u00e9sente les avanc\u00e9es r\u00e9centes en mati\u00e8re de renseignement sur la cybermenace, de gestion de la confiance et d\u2019analyse des risques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.istegroup.com\/en\/produit\/cybervigilance-et-confiance-numerique\/\" \/>\n<meta property=\"og:site_name\" content=\"ISTE Group\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-03T13:43:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/08\/Cybervigilance-et-confiance-num\u00e9rique-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1706\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.istegroup.com\/en\/produit\/cybervigilance-et-confiance-numerique\/\",\"url\":\"https:\/\/www.istegroup.com\/en\/produit\/cybervigilance-et-confiance-numerique\/\",\"name\":\"Cybervigilance et confiance num\u00e9rique - ISTE Group\",\"isPartOf\":{\"@id\":\"https:\/\/www.istegroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.istegroup.com\/en\/produit\/cybervigilance-et-confiance-numerique\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.istegroup.com\/en\/produit\/cybervigilance-et-confiance-numerique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/08\/Cybervigilance-et-confiance-num\u00e9rique-scaled.jpg\",\"datePublished\":\"2019-12-12T14:19:10+00:00\",\"dateModified\":\"2024-01-03T13:43:23+00:00\",\"description\":\"Cybervigilance et confiance num\u00e9rique pr\u00e9sente les avanc\u00e9es r\u00e9centes en mati\u00e8re de renseignement sur la cybermenace, de gestion de la confiance et d\u2019analyse des risques.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.istegroup.com\/en\/produit\/cybervigilance-et-confiance-numerique\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.istegroup.com\/en\/produit\/cybervigilance-et-confiance-numerique\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.istegroup.com\/en\/produit\/cybervigilance-et-confiance-numerique\/#primaryimage\",\"url\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/08\/Cybervigilance-et-confiance-num\u00e9rique-scaled.jpg\",\"contentUrl\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/08\/Cybervigilance-et-confiance-num\u00e9rique-scaled.jpg\",\"width\":1706,\"height\":2560,\"caption\":\"La cybers\u00e9curit\u00e9 \u00e0 l\u2019\u00e8re du Cloud et des objets connect\u00e9s\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.istegroup.com\/en\/produit\/cybervigilance-et-confiance-numerique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.istegroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/www.istegroup.com\/fr\/nouveautes\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybervigilance et confiance num\u00e9rique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.istegroup.com\/#website\",\"url\":\"https:\/\/www.istegroup.com\/\",\"name\":\"ISTE Group\",\"description\":\"\u00c9diteur des Sciences\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.istegroup.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybervigilance et confiance num\u00e9rique - ISTE Group","description":"Cybervigilance et confiance num\u00e9rique pr\u00e9sente les avanc\u00e9es r\u00e9centes en mati\u00e8re de renseignement sur la cybermenace, de gestion de la confiance et d\u2019analyse des risques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.istegroup.com\/en\/produit\/cybervigilance-et-confiance-numerique\/","og_locale":"fr_FR","og_type":"article","og_title":"Cybervigilance et confiance num\u00e9rique - ISTE Group","og_description":"Cybervigilance et confiance num\u00e9rique pr\u00e9sente les avanc\u00e9es r\u00e9centes en mati\u00e8re de renseignement sur la cybermenace, de gestion de la confiance et d\u2019analyse des risques.","og_url":"https:\/\/www.istegroup.com\/en\/produit\/cybervigilance-et-confiance-numerique\/","og_site_name":"ISTE Group","article_modified_time":"2024-01-03T13:43:23+00:00","og_image":[{"width":1706,"height":2560,"url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/08\/Cybervigilance-et-confiance-num\u00e9rique-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.istegroup.com\/en\/produit\/cybervigilance-et-confiance-numerique\/","url":"https:\/\/www.istegroup.com\/en\/produit\/cybervigilance-et-confiance-numerique\/","name":"Cybervigilance et confiance num\u00e9rique - ISTE Group","isPartOf":{"@id":"https:\/\/www.istegroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.istegroup.com\/en\/produit\/cybervigilance-et-confiance-numerique\/#primaryimage"},"image":{"@id":"https:\/\/www.istegroup.com\/en\/produit\/cybervigilance-et-confiance-numerique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/08\/Cybervigilance-et-confiance-num\u00e9rique-scaled.jpg","datePublished":"2019-12-12T14:19:10+00:00","dateModified":"2024-01-03T13:43:23+00:00","description":"Cybervigilance et confiance num\u00e9rique pr\u00e9sente les avanc\u00e9es r\u00e9centes en mati\u00e8re de renseignement sur la cybermenace, de gestion de la confiance et d\u2019analyse des risques.","breadcrumb":{"@id":"https:\/\/www.istegroup.com\/en\/produit\/cybervigilance-et-confiance-numerique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.istegroup.com\/en\/produit\/cybervigilance-et-confiance-numerique\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.istegroup.com\/en\/produit\/cybervigilance-et-confiance-numerique\/#primaryimage","url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/08\/Cybervigilance-et-confiance-num\u00e9rique-scaled.jpg","contentUrl":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/08\/Cybervigilance-et-confiance-num\u00e9rique-scaled.jpg","width":1706,"height":2560,"caption":"La cybers\u00e9curit\u00e9 \u00e0 l\u2019\u00e8re du Cloud et des objets connect\u00e9s"},{"@type":"BreadcrumbList","@id":"https:\/\/www.istegroup.com\/en\/produit\/cybervigilance-et-confiance-numerique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.istegroup.com\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/www.istegroup.com\/fr\/nouveautes\/"},{"@type":"ListItem","position":3,"name":"Cybervigilance et confiance num\u00e9rique"}]},{"@type":"WebSite","@id":"https:\/\/www.istegroup.com\/#website","url":"https:\/\/www.istegroup.com\/","name":"ISTE Group","description":"\u00c9diteur des Sciences","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.istegroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product\/22483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/media\/22491"}],"wp:attachment":[{"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/media?parent=22483"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product_brand?post=22483"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product_cat?post=22483"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product_tag?post=22483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}