{"id":15527,"date":"2025-04-25T12:01:03","date_gmt":"2025-04-25T12:01:03","guid":{"rendered":"https:\/\/youthdemocracycohort.com\/glossary\/cybersecurity\/"},"modified":"2025-07-16T14:51:40","modified_gmt":"2025-07-16T14:51:40","slug":"cybersecurity","status":"publish","type":"glossary","link":"https:\/\/youthdemocracycohort.com\/fr\/glossary\/cybersecurity\/","title":{"rendered":"Cybers\u00e9curit\u00e9"},"content":{"rendered":"<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\">\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\"><strong>D&eacute;finition :<\/strong> <\/h2>\n\n\n\n<p>Protection des syst&egrave;mes et des donn&eacute;es contre les menaces num&eacute;riques gr&acirc;ce &agrave; des pratiques s&eacute;curis&eacute;es.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\"><strong>Le saviez-vous ?<\/strong> <\/h2>\n\n\n\n<p>Plus de 90 % des cyberattaques commencent par un courriel d&rsquo;<a class=\"glossaryLink\"  aria-describedby=\"tt\"  data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Escroquerie consistant &agrave; se faire passer pour une entit&eacute; de confiance afin de voler des donn&eacute;es personnelles par des moyens num&eacute;riques.&lt;\/div&gt;\"  href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/phishing\/\"  data-mobile-support=\"0\"  data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex='0' role='link'>hame&ccedil;onnage<\/a>, ce qui en fait la m&eacute;thode la plus courante utilis&eacute;e par les pirates pour acc&eacute;der &agrave; des donn&eacute;es sensibles.<\/p>\n\n\n\n<p><strong>Source :<\/strong><em> <em><em><em>Verizon Data Breach Investigations Report 2025 (Rapport d&rsquo;enqu&ecirc;te sur les violations de donn&eacute;es de Verizon)<\/em><\/em><\/em><br><\/em><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Protection des syst&egrave;mes et des donn&eacute;es contre les menaces num&eacute;riques gr&acirc;ce &agrave; des pratiques s&eacute;curis&eacute;es.<\/p>\n","protected":false},"author":1,"featured_media":0,"menu_order":0,"template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"glossary-categories":[],"glossary-tags":[],"class_list":["post-15527","glossary","type-glossary","status-publish","hentry"],"acf":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/glossary\/15527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":1,"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/glossary\/15527\/revisions"}],"predecessor-version":[{"id":15528,"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/glossary\/15527\/revisions\/15528"}],"wp:attachment":[{"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/media?parent=15527"}],"wp:term":[{"taxonomy":"glossary-categories","embeddable":true,"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/glossary-categories?post=15527"},{"taxonomy":"glossary-tags","embeddable":true,"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/glossary-tags?post=15527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}