{"id":81617,"date":"2018-06-22T18:39:47","date_gmt":"2018-06-22T18:39:47","guid":{"rendered":"https:\/\/www.internetsociety.org\/iot\/"},"modified":"2023-08-31T16:50:40","modified_gmt":"2023-08-31T16:50:40","slug":"iot","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/fr\/iot\/","title":{"rendered":"Internet des objets (IdO)"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-77f6901a uagb-columns__columns-1 uagb-columns__max_width-theme wp-embed-aspect-4-3 wp-has-aspect-ratio\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-e04b43dc\"><div class=\"uagb-column__overlay\"><\/div>\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading has-neutral-white-color has-text-color\">Internet des objets (IdO)<\/h1>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center wp-embed-aspect-4-3 wp-has-aspect-ratio is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center uag-hide-tab uag-hide-mob is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:84%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-left has-48-font-size\">C&rsquo;est quoi un appareil de l&rsquo;IdO?<\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">C\u2019est est un objet physique qui se connecte \u00e0 Internet. Il peut s\u2019agir d\u2019un pisteur fitness, d\u2019un thermostat, d\u2019une serrure ou d\u2019un appareil \u2013 m\u00eame une ampoule.<\/p>\n\n\n\n<p class=\"has-18-font-size\">Imaginez des chaussures qui suivent votre rythme cardiaque \u2026 et qui peuvent signaler des probl\u00e8mes de sant\u00e9 potentiels. Vous n\u2019avez pas \u00e0 imaginer \u2013 ces chaussures \u00ab&nbsp;intelligentes&nbsp;\u00bb existent d\u00e9j\u00e0!<\/p>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h3 class=\"wp-block-heading has-32-font-size\">Quel impact puisse ce ph\u00e9nom\u00e8ne avoir sur moi?<\/h3>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">L\u2019Internet des Objets est arriv\u00e9 et il va pr\u00e9senter des opportunit\u00e9s incroyables au cours des cinq prochaines ann\u00e9es. Et tandis que les choses intelligentes sont d\u00e9j\u00e0 parmi nouse, l\u2019industrie IdO a un long chemin \u00e0 parcourir en termes de s\u00e9curit\u00e9 globale. Un grand nombre des appareils actuels sont lanc\u00e9s sur le march\u00e9 avec peu de consid\u00e9ration pour la s\u00e9curit\u00e9 de base et la protection de la confidentialit\u00e9, un ph\u00e9nom\u00e8ne nouveau: \u00abL\u2019ins\u00e9curit\u00e9 par le design\u00bb.<\/p>\n\n\n\n<p class=\"has-18-font-size\">Cela repr\u00e9sente un risque pour tout le monde: vous et\u00eas espionn\u00e9s ou vos donn\u00e9es sont compromises, jusqu\u2019\u00e0 m\u00eame vous rendre incapable de verrouiller votre propre maison. Vous faite peut \u00eatre m\u00eame partie d\u2019un botnet qui est en train d\u2019attaquer l\u2019Internet. Votre webcam \u2013 avec des millions d\u2019autres appareils mal s\u00e9curis\u00e9s \u2013 pourrait \u00eatre utilis\u00e9e pour attaquer le r\u00e9seau \u00e9lectrique d\u2019un pays entier.<\/p>\n\n\n\n<p class=\"has-18-font-size\">Des capteurs dentaires qui peuvent surveiller ce qu\u2019une personne mange aux port\u00e9es de chat qui peuvent suivre chaque mouvement d\u2019un chat, il peut \u00eatre difficile de distinguer les faits de la fiction lorsqu\u2019il s\u2019agit de l\u2019Internet des objets. Pouvez-vous dire lequel est r\u00e9el et lequel ne l\u2019est pas?<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-ground-navy-color has-ground-green-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2019\/02\/fact-or-fiction-with-iot-its-not-always-clear\/\">En savoir plus<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Connect Smart - Take Action Today\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/9YTc6_6NSwY?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center uag-hide-tab uag-hide-mob is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center wp-embed-aspect-4-3 wp-has-aspect-ratio has-neutral-white-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:84%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Faites-vous confiance \u00e0 votre appareil?<\/h3>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Connaissez-vous les risques de s\u00e9curit\u00e9 et de confidentialit\u00e9 de votre appareil de l\u2019IdO?  Si nous voulons que tout le monde profite du potentiel des objets connect\u00e9s, nous devons nous assurer qu\u2019ils sont s\u00fbrs et fiables. Vous pouvez rejoindre des personnes partout dans le monde et militer pour un monde connect\u00e9 plus s\u00fbr et plus s\u00e9curis\u00e9. <\/p>\n\n\n\n<p class=\"has-18-font-size\"><strong>Si vous \u00eates un fabricant ou si vous fournissez une assistance aux entreprises<\/strong>, nous vous couvrons pour la s\u00e9curit\u00e9 et la confidentialit\u00e9 des appareils de l\u2019IdO avec&nbsp;<a href=\"https:\/\/www.internetsociety.org\/fr\/iot\/trust-framework\/\">IoT Trust Framework<\/a>,&nbsp;<a href=\"https:\/\/otalliance.org\/system\/files\/files\/initiative\/documents\/enterprise_iot_checklist.pdf\">Enterprise IoT Security Checklist<\/a>&nbsp;et&nbsp;<a href=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/05\/OTA_IoT_Framework_Overview-FR.pdf\">Top Tips for Manufacturers<\/a>. <\/p>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"has-18-font-size\"><strong>Si vous \u00eates un consommateur<\/strong>, voici quelques conseils pour vous:<\/p>\n\n\n\n<ul class=\"has-18-font-size wp-block-list\">\n<li>Apprenez \u00e0 \u00ab\u00a0acheter intelligemment\u00a0\u00bb pour les appareils connect\u00e9s.<\/li>\n\n\n\n<li>Mettez \u00e0 jour vos appareils et ses applications.<\/li>\n\n\n\n<li>Activez le cryptage fort.<\/li>\n\n\n\n<li>Arr\u00eatez de r\u00e9utiliser les mots de passe.<\/li>\n\n\n\n<li>V\u00e9rifiez les param\u00e8tres de confidentialit\u00e9 de vos appareils et de leurs applications.<\/li>\n\n\n\n<li>Utilisez un mot de passe fort.<\/li>\n\n\n\n<li>\u00c9teignez l&rsquo;appareil ou d\u00e9connectez-le d&rsquo;Internet lorsqu&rsquo;il n&rsquo;est pas utilis\u00e9.<\/li>\n\n\n\n<li>Prenez des mesures pour rendre votre r\u00e9seau domestique plus s\u00e9curis\u00e9.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-neutral-white-color has-ground-navy-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/www.internetsociety.org\/resources\/doc\/2018\/top-tips-for-consumers-internet-of-things-security-and-privacy\/\">T\u00e9l\u00e9charger les meilleurs conseils pour les consommateurs<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Do you trust your IoT device?\" width=\"500\" height=\"375\" src=\"https:\/\/www.youtube.com\/embed\/cE40MJwoSGs?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns wp-embed-aspect-4-3 wp-has-aspect-ratio is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column uag-hide-tab uag-hide-mob is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"how-the-ndss-symposium-helps-to-strengthen-the-internet\">Nouvelles de l&rsquo;Internet des objets<\/h4>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t\t<div class=\"wp-block-uagb-post-grid uagb-post-grid  uagb-post__image-position-top uagb-post__image-disabled uagb-block-15e563be     uagb-post__items uagb-post__columns-3 is-grid uagb-post__columns-tablet-2 uagb-post__columns-mobile-1 uagb-post__equal-height\" data-total=\"6\" style=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2019\/11\/la-plateforme-des-politiques-de-securite-de-lido-veut-mettre-la-barre-plus-haut-en-matiere-de-securite-mondiale-de-lido\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">La Plateforme des politiques de s\u00e9curit\u00e9 de l&rsquo;IdO veut mettre la barre plus haut en mati\u00e8re de s\u00e9curit\u00e9 mondiale de l&rsquo;IdO<\/a>\n\t\t\t<\/h5>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2019-11-14T16:12:36+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t14 novembre 2019\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2019\/10\/celebration-du-mois-de-la-sensibilisation-a-la-cybersecurite-aux-etats-unis\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">C\u00e9l\u00e9bration du Mois de la sensibilisation \u00e0 la cybers\u00e9curit\u00e9 aux \u00c9tats-Unis<\/a>\n\t\t\t<\/h5>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2019-10-02T13:40:23+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t2 octobre 2019\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2019\/09\/confidentialite-de-lido-pour-les-decideurs-politiques-les-solutions-doivent-faire-lobjet-dune-discussion-eclairee\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Confidentialit\u00e9 de l&rsquo;IdO pour les d\u00e9cideurs politiques : Les solutions doivent faire l&rsquo;objet d&rsquo;une discussion \u00e9clair\u00e9e<\/a>\n\t\t\t<\/h5>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2019-09-19T14:50:09+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t19 septembre 2019\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2019\/04\/sommet-international-des-consommateurs-faire-de-la-confidentialite-et-de-la-securite-de-lido-une-priorite\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Sommet international des consommateurs&nbsp;:&nbsp;faire de la confidentialit\u00e9 et de la s\u00e9curit\u00e9 de l&rsquo;IdO une priorit\u00e9<\/a>\n\t\t\t<\/h5>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2019-04-26T12:30:27+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t26 avril 2019\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2019\/03\/recherche-de-commentaires-canadiens-rapport-preliminaire-sur-la-securisation-de-linternet-des-objets-au-canada\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Recherche de commentaires canadiens&nbsp;: rapport pr\u00e9liminaire sur la s\u00e9curisation de l&rsquo;Internet des objets au Canada<\/a>\n\t\t\t<\/h5>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2019-03-15T17:05:28+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t15 mars 2019\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2019\/02\/fact-or-fiction-with-iot-its-not-always-clear\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">R\u00e9alit\u00e9 ou fiction&nbsp;? Avec l&rsquo;IdO, ce n&rsquo;est pas toujours clair<\/a>\n\t\t\t<\/h5>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2019-03-15T08:00:31+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t15 mars 2019\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post-pagination-wrap\">\n\t\t\t\t\t\t<span aria-current=\"page\" class=\"page-numbers current\">1<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/81617\/page\/2\/\">2<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/81617\/page\/3\/\">3<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/81617\/page\/4\/\">4<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/81617\/page\/5\/\">5<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/81617\/page\/6\/\">6<\/a>\n<a class=\"next page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/81617\/page\/2\/\">\u00bb<\/a>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"how-the-ndss-symposium-helps-to-strengthen-the-internet\">Ressources<\/h4>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t\t<div class=\"wp-block-uagb-post-grid uagb-post-grid  uagb-post__image-position-top uagb-post__image-disabled uagb-block-0cef5983     uagb-post__items uagb-post__columns-3 is-grid uagb-post__columns-tablet-2 uagb-post__columns-mobile-1 uagb-post__equal-height\" data-total=\"2\" style=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2019\/enhancing-iot-security-final-outcomes-and-recommendations-report\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Rapport final sur les r\u00e9sultats et les recommandations<\/a>\n\t\t\t<\/h5>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2019-05-28T11:57:31+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t28 mai 2019\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2018\/iot-trust-by-design\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Confiance IoT\u00a0par Design<\/a>\n\t\t\t<\/h5>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2018-05-22T09:36:42+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t22 mai 2018\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2018\/iot-trust-framework-v2-5\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Cadre de confiance de s\u00e9curit\u00e9 et de confidentialit\u00e9 de IoT v2.5<\/a>\n\t\t\t<\/h5>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2018-05-22T09:15:54+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t22 mai 2018\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post-pagination-wrap\">\n\t\t\t\t\t\t<span aria-current=\"page\" class=\"page-numbers current\">1<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/81617\/page\/2\/\">2<\/a>\n<a class=\"next page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/81617\/page\/2\/\">\u00bb<\/a>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column uag-hide-tab uag-hide-mob is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-not-stacked-on-mobile margin-bottom-0 has-neutral-green-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h5 class=\"wp-block-heading has-depth-teal-color has-text-color\">Avez-vous trouv\u00e9 cette ressource utile ? Votre don, quel que soit son montant, nous aidera \u00e0 financer d&rsquo;autres recherches et contenus similaires.<\/h5>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button animated fadeIn is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-depth-teal-color has-text-color wp-element-button\" href=\"https:\/\/www.internetsociety.org\/fr\/donate\/\"><strong>\u2665 Faire un don<\/strong><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Aujourd&rsquo;hui, des milliards d&rsquo;appareils sont connect\u00e9s \u00e0 Internet dans ce que nous appelons \u00abl&rsquo;Internet des objets\u00bb ou \u00abIdO\u00bb. Ces appareils transforment d\u00e9j\u00e0 nos vies. Se faisant, ils nous poussent \u00e0 relever de s\u00e9rieux d\u00e9fis afin de maximiser les avantages potentiels.<\/p>\n","protected":false},"author":46,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[95],"tags":[],"region_news_regions":[5931],"content_category":[6090],"ppma_author":[4057],"class_list":["post-81617","page","type-page","status-publish","hentry","category-iot","region_news_regions-global","content_category-resources-type"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"post-thumbnail":false,"square":false,"gform-image-choice-sm":false,"gform-image-choice-md":false,"gform-image-choice-lg":false},"uagb_author_info":{"display_name":"Ivana Trbovic","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/trbovic\/"},"uagb_comment_info":0,"uagb_excerpt":"Aujourd'hui, des milliards d'appareils sont connect\u00e9s \u00e0 Internet dans ce que nous appelons \u00abl'Internet des objets\u00bb ou \u00abIdO\u00bb. Ces appareils transforment d\u00e9j\u00e0 nos vies. Se faisant, ils nous poussent \u00e0 relever de s\u00e9rieux d\u00e9fis afin de maximiser les avantages potentiels.","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/81617","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=81617"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/81617\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=81617"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=81617"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=81617"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=81617"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=81617"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=81617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}