{"id":109578,"date":"2020-01-10T17:14:25","date_gmt":"2020-01-10T17:14:25","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2020\/01\/des-initiatives-majeures-en-matiere-de-cybersecurite-montrent-que-chacun-peut-contribuer-a-etablir-la-confiance\/"},"modified":"2025-11-27T21:04:24","modified_gmt":"2025-11-27T21:04:24","slug":"des-initiatives-majeures-en-matiere-de-cybersecurite-montrent-que-chacun-peut-contribuer-a-etablir-la-confiance","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2020\/01\/des-initiatives-majeures-en-matiere-de-cybersecurite-montrent-que-chacun-peut-contribuer-a-etablir-la-confiance\/","title":{"rendered":"Des \u00ab\u00a0Initiatives majeures en mati\u00e8re de cybers\u00e9curit\u00e9\u00a0\u00bb montrent que chacun peut contribuer \u00e0 \u00e9tablir la confiance"},"content":{"rendered":"\n<p>Comment\ntravaillons-nous \u00e0 un Internet plus s\u00fbr ?<\/p>\n\n\n\n<p>Dans les discussions sur la cybers\u00e9curit\u00e9 qui ont lieu dans les divers forums politiques du monde entier, on reconna\u00eet souvent peu que la s\u00e9curit\u00e9 d&rsquo;Internet est une responsabilit\u00e9 partag\u00e9e, o\u00f9 de nombreux intervenants agissent.<\/p>\n\n\n\n<p>De\npar sa conception, Internet est un syst\u00e8me distribu\u00e9 sans noyau central ni point de\ncontr\u00f4le. Au lieu de cela, la s\u00e9curit\u00e9 d&rsquo;Internet est assur\u00e9e quand collaborent de multiples\nentreprises, organisations, gouvernements et individus, et qu&rsquo;ils prennent les mesures ad\u00e9quates pour am\u00e9liorer\nla s\u00e9curit\u00e9 et la fiabilit\u00e9 d&rsquo;Internet &#8211; afin que celui-ci reste ouvert, s\u00e9curis\u00e9\net disponible pour tous.<\/p>\n\n\n\n<p>Aujourd&rsquo;hui, nous avons publi\u00e9 les <em><a href=\"https:\/\/www.internetsociety.org\/fr\/major-initiatives-in-cybersecurity-2\/\">Initiatives majeures en mati\u00e8re de cybers\u00e9curit\u00e9 : Contributions publiques et priv\u00e9es en vue d&rsquo;accro\u00eetre la s\u00e9curit\u00e9 sur Internet<\/a><\/em> pour illustrer, \u00e0 l&rsquo;aide de quelques exemples concernant l&rsquo;infrastructure Internet, qu&rsquo;il existe un grand nombre d&rsquo;initiatives qui s&rsquo;efforcent, parfois ensemble et parfois s\u00e9par\u00e9ment, d&rsquo;am\u00e9liorer la s\u00e9curit\u00e9 de l&rsquo;Internet. Une approche que nous appelons la s\u00e9curit\u00e9 collaborative.<\/p>\n\n\n\n<p><em><a href=\"https:\/\/www.internetsociety.org\/fr\/major-initiatives-in-cybersecurity-2\/\">Initiatives majeures en mati\u00e8re de cybers\u00e9curit\u00e9<\/a><\/em> d\u00e9crit la s\u00e9curit\u00e9 de l&rsquo;Internet comme la partie de la cybers\u00e9curit\u00e9 qui, de mani\u00e8re g\u00e9n\u00e9rale, concerne la s\u00e9curit\u00e9 de l&rsquo;infrastructure de l&rsquo;Internet, les appareils qui y sont connect\u00e9s et les \u00e9l\u00e9ments techniques \u00e0 partir desquels les applications et les plateformes sont construites.<\/p>\n\n\n\n<p>Nous\nne pr\u00e9tendons pas \u00eatre exhaustifs, mais nous esp\u00e9rons que ce document illustre la\ncomplexit\u00e9, l&rsquo;ampleur et la profondeur des diverses initiatives en place. Et, par\nextension, qu&rsquo;il n&rsquo;existe pas de solution unique pour tous. Dans un esprit de\ncollaboration, nous appr\u00e9cions toute r\u00e9troaction que vous pourriez avoir pour les prochaines versions de\nce document.<\/p>\n\n\n\n<p><em><a href=\"https:\/\/www.internetsociety.org\/fr\/major-initiatives-in-cybersecurity-2\/\">Lire <\/a><\/em> <a href=\"https:\/\/www.internetsociety.org\/fr\/major-initiatives-in-cybersecurity-2\/\">Initiatives majeures en mati\u00e8re de cybers\u00e9curit\u00e9 : Contributions publiques et priv\u00e9es en vue d&rsquo;accro\u00eetre la s\u00e9curit\u00e9 sur Internet <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Comment travaillons-nous \u00e0 un Internet plus s\u00fbr ? Dans les discussions sur la cybers\u00e9curit\u00e9 qui ont lieu dans les divers forums politiques du monde entier, on reconna\u00eet souvent peu que la s\u00e9curit\u00e9 d&rsquo;Internet est une responsabilit\u00e9 partag\u00e9e, o\u00f9 de nombreux intervenants agissent. De par sa conception, Internet est un syst\u00e8me distribu\u00e9 sans noyau central ni [&hellip;]<\/p>\n","protected":false},"author":866,"featured_media":109473,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[185,4909,4775],"tags":[4641,6319],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4140],"class_list":["post-109578","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-confiance","category-renforcer-internet","category-securite-fr","tag-multipartite","tag-multistakeholder-approach","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/01\/major-initiatives-in-cybersecurity.jpg",1280,550,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/01\/major-initiatives-in-cybersecurity-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/01\/major-initiatives-in-cybersecurity-450x193.jpg",450,193,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/01\/major-initiatives-in-cybersecurity-768x330.jpg",768,330,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/01\/major-initiatives-in-cybersecurity-1024x440.jpg",1024,440,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/01\/major-initiatives-in-cybersecurity.jpg",1280,550,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/01\/major-initiatives-in-cybersecurity.jpg",1280,550,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/01\/major-initiatives-in-cybersecurity-250x107.jpg",250,107,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/01\/major-initiatives-in-cybersecurity-600x550.jpg",600,550,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/01\/major-initiatives-in-cybersecurity.jpg",300,129,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/01\/major-initiatives-in-cybersecurity.jpg",400,172,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/01\/major-initiatives-in-cybersecurity.jpg",600,258,false]},"uagb_author_info":{"display_name":"Olaf Kolkman","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/kolkman\/"},"uagb_comment_info":0,"uagb_excerpt":"Comment travaillons-nous \u00e0 un Internet plus s\u00fbr ? Dans les discussions sur la cybers\u00e9curit\u00e9 qui ont lieu dans les divers forums politiques du monde entier, on reconna\u00eet souvent peu que la s\u00e9curit\u00e9 d&rsquo;Internet est une responsabilit\u00e9 partag\u00e9e, o\u00f9 de nombreux intervenants agissent. De par sa conception, Internet est un syst\u00e8me distribu\u00e9 sans noyau central ni\u2026","authors":[{"term_id":4140,"user_id":866,"is_guest":0,"slug":"kolkman","display_name":"Olaf Kolkman","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Olaf-Kolkman.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Olaf-Kolkman.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/109578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/866"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=109578"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/109578\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/109473"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=109578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=109578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=109578"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=109578"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=109578"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=109578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}