{"id":16802,"date":"2018-04-09T10:37:36","date_gmt":"2018-04-09T15:37:36","guid":{"rendered":"http:\/\/www.okiok.com\/?p=16802"},"modified":"2019-05-21T14:42:09","modified_gmt":"2019-05-21T19:42:09","slug":"la-securite-a-l-ere-des-cyberconflits","status":"publish","type":"post","link":"https:\/\/www.okiok.com\/fr\/la-securite-a-l-ere-des-cyberconflits\/","title":{"rendered":"La s\u00e9curit\u00e9 \u00e0 l&rsquo;\u00e8re des cyberconflits"},"content":{"rendered":"<p><strong>La semaine derni\u00e8re\u00a0avait lieu le colloque annuel de l\u2019ASIMM, o\u00f9 plusieurs experts en cybers\u00e9curit\u00e9 discutaient de sujets d\u2019actualit\u00e9\u00a0aussi fascinants qu\u2019inqui\u00e9tants. Parmi ceux-ci, les enjeux du cyberterrorisme en 2018, expos\u00e9s par le\u00a0Brigadier-g\u00e9n\u00e9ral retrait\u00e9 Gaston C\u00f4t\u00e9 des Forces arm\u00e9es canadiennes. Il semblerait que les cybermenaces terroristes prennent de l\u2019ampleur, et qu\u2019une collaboration des groupes criminels organis\u00e9s\u00a0avec les\u00a0groupes terroristes soit cr\u00e9dible. Les conflits prennent lentement la forme de cyberguerres, et le Canada se situerait au 20e rang mondial au niveau de la s\u00e9curit\u00e9.<\/strong><\/p>\n<p>\u00c0 quoi ressemblent les impacts potentiels d\u2019une telle menace? La capacit\u00e9 de saper l\u2019\u00e9conomie d\u2019un pays et de paralyser les infrastructures essentielles. Si un ransomware bloquait\u00a0la distribution d&rsquo;\u00e9lectricit\u00e9\u00a0sur l\u2019ensemble de la r\u00e9gion de Montr\u00e9al, disposez-vous de sources d\u2019\u00e9nergie alternatives?\u00a0De quoi arroser le monde d\u2019une douche bien froide \u00e0 -25 degr\u00e9s Celsius en janvier. Et on se souvient de la crise du verglas.<\/p>\n<p>On a bien s\u00fbr d\u00e9pass\u00e9 l&rsquo;\u00e9poque\u00a0o\u00f9 les antivirus \u00e9taient suffisants pour prot\u00e9ger les r\u00e9seaux. Il suffit d\u2019un seul clic pour qu\u2019un pirate s\u2019introduise dans\u00a0un syst\u00e8me. De plus en plus d&rsquo;organisations se font prendre suite \u00e0 l&rsquo;envoi\u00a0d&rsquo;un courriel d&rsquo;hame\u00e7onnage (phishing) : si le lien est cliqu\u00e9, le pirate\u00a0peut\u00a0entrer\u00a0dans votre syst\u00e8me et y\u00a0rester incognito pendant plusieurs semaines, voire des mois. Il couronne le tout avec une attaque ransomware. Vos syst\u00e8mes sont bloqu\u00e9s, et\u00a0on peut ne jamais savoir\u00a0ce que le pirate\u00a0a pu r\u00e9cup\u00e9rer avant l\u2019attaque.<\/p>\n<p>Le risque probablement le plus important\u00a0li\u00e9 aux intrusions\u00a0demeure le personnel interne. Un employ\u00e9 m\u00e9content, un cong\u00e9diement malheureux ou simplement une erreur de bonne foi peuvent mener \u00e0 des catastrophes irr\u00e9parables pour les organisations. Comme on ne peut \u00e9liminer le facteur humain (quoique, l\u2019intelligence artificielle pourrait sans doute aider \u00e0 am\u00e9liorer la s\u00e9curit\u00e9), que faut-il faire pour limiter le risque?<\/p>\n<p>Parmi les mesures \u00e0 prendre, des programmes de s\u00e9curit\u00e9 ax\u00e9s sur la pr\u00e9vention et la gestion des incidents, une formation et une sensibilisation ad\u00e9quate des employ\u00e9s, ainsi qu\u2019une surveillance r\u00e9guli\u00e8re \u00e0 l\u2019int\u00e9rieur des organisations.\u00a0On constate aussi que la volont\u00e9 de faire des \u00e9conomies ou un budget d\u00e9ficient\u00a0augmente le\u00a0risque. Tel qu\u2019\u00e9voqu\u00e9 par Luc Lefebvre, autre pr\u00e9sentateur au RSI, 1$ \u00e9conomis\u00e9 sur la cybers\u00e9curit\u00e9 peut co\u00fbter des millions aux organisations suite \u00e0 une cyberattaque.<\/p>\n<p>Et qu\u2019en est-il de la s\u00e9curit\u00e9 nationale? On sait\u00a0que le Canada participe \u00e0\u00a0de nombreux\u00a0programmes de surveillance sur le web. Parmi ceux-ci,\u00a0certaines agences\u00a0r\u00e9cup\u00e8reraient des fichiers rel\u00e2ch\u00e9s\u00a0sur le darkweb par des pirates de mani\u00e8re ill\u00e9gale.\u00a0On ne sait pas trop ce que contiennent ces fichiers, et,\u00a0bien que la\u00a0cybersurveillance \u00e9tatique puisse \u00eatre une bonne nouvelle pour la s\u00e9curit\u00e9 nationale, on se questionne toujours sur notre droit \u00e0 la vie priv\u00e9e.<\/p>\n<p>Certes, si les nouvelles technologies \u00e9voluent rapidement, les cybermenaces aussi.\u00a0 Il\u00a0serait\u00a0m\u00eame possible de g\u00e9n\u00e9rer un faux signal GPS \u00e0 partir de satellites. Et qu&rsquo;en est-il des ordinateurs quantiques? Ceci fera l&rsquo;objet d&rsquo;un\u00a0prochain article.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La semaine derni\u00e8re\u00a0avait lieu le colloque annuel de l\u2019ASIMM, o\u00f9 plusieurs experts en cybers\u00e9curit\u00e9 discutaient de sujets d\u2019actualit\u00e9\u00a0aussi fascinants qu\u2019inqui\u00e9tants. Parmi ceux-ci, les enjeux du cyberterrorisme en 2018, expos\u00e9s par le\u00a0Brigadier-g\u00e9n\u00e9ral retrait\u00e9 Gaston C\u00f4t\u00e9 des Forces arm\u00e9es canadiennes. Il semblerait que les cybermenaces terroristes prennent de l\u2019ampleur, et qu\u2019une collaboration des groupes criminels organis\u00e9s\u00a0avec les\u00a0groupes [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[173],"tags":[],"class_list":["post-16802","post","type-post","status-publish","format-standard","hentry","category-blogue-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La s\u00e9curit\u00e9 \u00e0 l&#039;\u00e8re des cyberconflits | OKIOK - Blogue<\/title>\n<meta name=\"description\" content=\"Nos experts s&#039;interrogent sur la r\u00e9alit\u00e9 et les impacts potentiels des cyberguerres face aux cybermenaces terroristes qui prennent de l\u2019ampleur.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La s\u00e9curit\u00e9 \u00e0 l&#039;\u00e8re des cyberconflits | OKIOK - Blogue\" \/>\n<meta property=\"og:description\" content=\"Nos experts s&#039;interrogent sur la r\u00e9alit\u00e9 et les impacts potentiels des cyberguerres face aux cybermenaces terroristes qui prennent de l\u2019ampleur.\" \/>\n<meta property=\"og:site_name\" content=\"OKIOK - Securit\u00e9 dans un monde en changement\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/okiokdata\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-09T15:37:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-21T19:42:09+00:00\" \/>\n<meta name=\"author\" content=\"Julie M. Gauthier, avocate\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OKIOKdata\" \/>\n<meta name=\"twitter:site\" content=\"@OKIOKdata\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julie M. Gauthier, avocate\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La s\u00e9curit\u00e9 \u00e0 l'\u00e8re des cyberconflits | OKIOK - Blogue","description":"Nos experts s'interrogent sur la r\u00e9alit\u00e9 et les impacts potentiels des cyberguerres face aux cybermenaces terroristes qui prennent de l\u2019ampleur.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"La s\u00e9curit\u00e9 \u00e0 l'\u00e8re des cyberconflits | OKIOK - Blogue","og_description":"Nos experts s'interrogent sur la r\u00e9alit\u00e9 et les impacts potentiels des cyberguerres face aux cybermenaces terroristes qui prennent de l\u2019ampleur.","og_site_name":"OKIOK - Securit\u00e9 dans un monde en changement","article_publisher":"https:\/\/www.facebook.com\/okiokdata\/","article_published_time":"2018-04-09T15:37:36+00:00","article_modified_time":"2019-05-21T19:42:09+00:00","author":"Julie M. Gauthier, avocate","twitter_card":"summary_large_image","twitter_creator":"@OKIOKdata","twitter_site":"@OKIOKdata","twitter_misc":{"\u00c9crit par":"Julie M. Gauthier, avocate","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.okiok.com\/fr\/la-securite-a-l-ere-des-cyberconflits\/#article","isPartOf":{"@id":"https:\/\/www.okiok.com\/fr\/la-securite-a-l-ere-des-cyberconflits\/"},"author":{"name":"Julie M. Gauthier, avocate","@id":"https:\/\/www.okiok.com\/fr\/#\/schema\/person\/07e676d2a2d03c5e39c6234fff7656b8"},"headline":"La s\u00e9curit\u00e9 \u00e0 l&rsquo;\u00e8re des cyberconflits","datePublished":"2018-04-09T15:37:36+00:00","dateModified":"2019-05-21T19:42:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.okiok.com\/fr\/la-securite-a-l-ere-des-cyberconflits\/"},"wordCount":566,"commentCount":0,"publisher":{"@id":"https:\/\/www.okiok.com\/fr\/#organization"},"articleSection":["Blogue"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.okiok.com\/fr\/la-securite-a-l-ere-des-cyberconflits\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.okiok.com\/fr\/la-securite-a-l-ere-des-cyberconflits\/","url":"https:\/\/www.okiok.com\/fr\/la-securite-a-l-ere-des-cyberconflits\/","name":"La s\u00e9curit\u00e9 \u00e0 l'\u00e8re des cyberconflits | OKIOK - Blogue","isPartOf":{"@id":"https:\/\/www.okiok.com\/fr\/#website"},"datePublished":"2018-04-09T15:37:36+00:00","dateModified":"2019-05-21T19:42:09+00:00","description":"Nos experts s'interrogent sur la r\u00e9alit\u00e9 et les impacts potentiels des cyberguerres face aux cybermenaces terroristes qui prennent de l\u2019ampleur.","breadcrumb":{"@id":"https:\/\/www.okiok.com\/fr\/la-securite-a-l-ere-des-cyberconflits\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.okiok.com\/fr\/la-securite-a-l-ere-des-cyberconflits\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.okiok.com\/fr\/la-securite-a-l-ere-des-cyberconflits\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/prod.okiok.com\/fr\/"},{"@type":"ListItem","position":2,"name":"La s\u00e9curit\u00e9 \u00e0 l&rsquo;\u00e8re des cyberconflits"}]},{"@type":"WebSite","@id":"https:\/\/www.okiok.com\/fr\/#website","url":"https:\/\/www.okiok.com\/fr\/","name":"OKIOK - Securit\u00e9 dans un monde en changement","description":"","publisher":{"@id":"https:\/\/www.okiok.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.okiok.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.okiok.com\/fr\/#organization","name":"Okiok","url":"https:\/\/www.okiok.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.okiok.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.okiok.com\/wp-content\/uploads\/2017\/06\/logo-okiok-2.png","contentUrl":"https:\/\/www.okiok.com\/wp-content\/uploads\/2017\/06\/logo-okiok-2.png","width":300,"height":369,"caption":"Okiok"},"image":{"@id":"https:\/\/www.okiok.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/okiokdata\/","https:\/\/x.com\/OKIOKdata","https:\/\/www.linkedin.com\/company-beta\/119436\/"]},{"@type":"Person","@id":"https:\/\/www.okiok.com\/fr\/#\/schema\/person\/07e676d2a2d03c5e39c6234fff7656b8","name":"Julie M. Gauthier, avocate","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.okiok.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/www.okiok.com\/wp-content\/litespeed\/avatar\/8039c30897876bf025048bd3cfe15cf6.jpg?ver=1775235082","contentUrl":"https:\/\/www.okiok.com\/wp-content\/litespeed\/avatar\/8039c30897876bf025048bd3cfe15cf6.jpg?ver=1775235082","caption":"Julie M. Gauthier, avocate"}}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/posts\/16802","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/comments?post=16802"}],"version-history":[{"count":20,"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/posts\/16802\/revisions"}],"predecessor-version":[{"id":16836,"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/posts\/16802\/revisions\/16836"}],"wp:attachment":[{"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/media?parent=16802"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/categories?post=16802"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/tags?post=16802"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}