{"id":15531,"date":"2025-04-25T12:01:29","date_gmt":"2025-04-25T12:01:29","guid":{"rendered":"https:\/\/youthdemocracycohort.com\/glossary\/social-engineering\/"},"modified":"2025-07-16T14:55:30","modified_gmt":"2025-07-16T14:55:30","slug":"social-engineering","status":"publish","type":"glossary","link":"https:\/\/youthdemocracycohort.com\/fr\/glossary\/social-engineering\/","title":{"rendered":"Ing\u00e9nierie sociale"},"content":{"rendered":"<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\">\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\"><strong>D&eacute;finition :<\/strong> <\/h2>\n\n\n\n<p>Tactiques visant &agrave; inciter les individus &agrave; r&eacute;v&eacute;ler des informations sensibles.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\"><strong>Le saviez-vous ?<\/strong> <\/h2>\n\n\n\n<p>Plus de 70 % des violations de donn&eacute;es commencent par des attaques d&rsquo;<a class=\"glossaryLink\"  aria-describedby=\"tt\"  data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Escroquerie consistant &agrave; se faire passer pour une entit&eacute; de confiance afin de voler des donn&eacute;es personnelles par des moyens num&eacute;riques.&lt;\/div&gt;\"  href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/phishing\/\"  data-mobile-support=\"0\"  data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex='0' role='link'>hame&ccedil;onnage<\/a> ou d&rsquo;<a class=\"glossaryLink\"  aria-describedby=\"tt\"  data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Tactiques visant &agrave; inciter les individus &agrave; r&eacute;v&eacute;ler des informations sensibles.&lt;\/div&gt;\"  href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/social-engineering\/\"  data-mobile-support=\"0\"  data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex='0' role='link'>ing&eacute;nierie sociale<\/a>, ce qui souligne le r&ocirc;le essentiel que joue le comportement humain dans la <a class=\"glossaryLink\"  aria-describedby=\"tt\"  data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Protection des syst&egrave;mes et des donn&eacute;es contre les menaces num&eacute;riques gr&acirc;ce &agrave; des pratiques s&eacute;curis&eacute;es.&lt;\/div&gt;\"  href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/cybersecurity\/\"  data-mobile-support=\"0\"  data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex='0' role='link'>cybers&eacute;curit&eacute;<\/a>.<\/p>\n\n\n\n<p><strong>Source :<\/strong><em> <em><em><em><em><em><em>Proofpoint<\/em><\/em><\/em><\/em><\/em><\/em><br><\/em><\/p>\n<\/div>\n<\/div>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tactiques visant &agrave; inciter les individus &agrave; r&eacute;v&eacute;ler des informations sensibles.<\/p>\n","protected":false},"author":1,"featured_media":0,"menu_order":0,"template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"glossary-categories":[],"glossary-tags":[],"class_list":["post-15531","glossary","type-glossary","status-publish","hentry"],"acf":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/glossary\/15531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":1,"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/glossary\/15531\/revisions"}],"predecessor-version":[{"id":15532,"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/glossary\/15531\/revisions\/15532"}],"wp:attachment":[{"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/media?parent=15531"}],"wp:term":[{"taxonomy":"glossary-categories","embeddable":true,"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/glossary-categories?post=15531"},{"taxonomy":"glossary-tags","embeddable":true,"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/glossary-tags?post=15531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}