{"id":74218,"date":"2018-02-26T07:00:10","date_gmt":"2018-02-26T07:00:10","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/02\/improving-routing-security-introducing-six-new-manrs-tutorials\/"},"modified":"2025-11-25T13:10:19","modified_gmt":"2025-11-25T13:10:19","slug":"improving-routing-security-introducing-six-new-manrs-tutorials","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/02\/improving-routing-security-introducing-six-new-manrs-tutorials\/","title":{"rendered":"Am\u00e9lioration de la s\u00e9curit\u00e9 du routage: pr\u00e9sentation de six nouveaux tutoriels MANRS"},"content":{"rendered":"<p>Les pannes de routage ou des attaques telles que le d\u00e9tournement, les fuites et l&rsquo;usurpation d&rsquo;identit\u00e9, peuvent conduire au vol de donn\u00e9es, \u00e0 des pertes de revenus, \u00e0 des atteintes \u00e0 la r\u00e9putation, etc. et cela \u00e0 l&rsquo;\u00e9chelle mondiale. La s\u00e9curit\u00e9 du routage est donc vitale pour l&rsquo;avenir et la stabilit\u00e9 de l&rsquo;Internet. L&rsquo;initiative MANRS (Mutually Agreed Standards for Routing Security) met en \u0153uvre des solutions indispensables. Nous sommes heureux d&rsquo;annoncer aujourd&rsquo;hui une s\u00e9rie de <a href=\"http:\/\/www.manrs.org\/tutorials\/\">six nouveaux tutoriels MANRS<\/a> qui aideront les op\u00e9rateurs de r\u00e9seaux \u00e0 am\u00e9liorer \u00e0 la fois la s\u00e9curit\u00e9 de routage d&rsquo;Internet et l&rsquo;efficacit\u00e9 op\u00e9rationnelle de leur propre r\u00e9seau.<\/p>\n<p>Ces tutoriels sont destin\u00e9s aux administrateurs r\u00e9seaux, aux ing\u00e9nieurs r\u00e9seaux et \u00e0 toute personne ayant une connaissance pratique du routage et de la s\u00e9curit\u00e9, souhaitant am\u00e9liorer la s\u00e9curit\u00e9 du routage de leurs r\u00e9seaux et\u00a0<a href=\"http:\/\/www.manrs.org\/join\/\">rejoindre<\/a> la liste croissante <a href=\"http:\/\/www.manrs.org\/participants\/\">des participants MANRS<\/a>.<\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/02\/improving-routing-security-introducing-six-new-manrs-tutorials\/\">Savoir plus (en anglais)<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les pannes de routage ou des attaques telles que le d\u00e9tournement, les fuites et l&rsquo;usurpation d&rsquo;identit\u00e9, peuvent conduire au vol de donn\u00e9es, \u00e0 des pertes de revenus, \u00e0 des atteintes \u00e0 la r\u00e9putation, etc. et cela \u00e0 l&rsquo;\u00e9chelle mondiale. La s\u00e9curit\u00e9 du routage est donc vitale pour l&rsquo;avenir et la stabilit\u00e9 de l&rsquo;Internet. L&rsquo;initiative MANRS [&hellip;]<\/p>\n","protected":false},"author":819,"featured_media":50818,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[178,6187,185,2545,4909,4775,183,146],"tags":[6250,6283],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4083],"class_list":["post-74218","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite","category-comment-fonctionne-internet","category-confiance","category-manrs-fr","category-renforcer-internet","category-securite-fr","category-technologie","category-deploy360-fr","tag-les-normes-pour-la-securisation-du-routage-mutuellement-agreees-manrs","tag-securite-du-routage","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338.jpg",976,338,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338-300x104.jpg",300,104,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338-768x266.jpg",768,266,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338.jpg",976,338,false],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338.jpg",976,338,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338.jpg",976,338,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338-250x87.jpg",250,87,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338-600x338.jpg",600,338,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338.jpg",300,104,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338.jpg",400,139,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338.jpg",600,208,false]},"uagb_author_info":{"display_name":"Megan Kruse","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/kruse\/"},"uagb_comment_info":0,"uagb_excerpt":"Les pannes de routage ou des attaques telles que le d\u00e9tournement, les fuites et l&rsquo;usurpation d&rsquo;identit\u00e9, peuvent conduire au vol de donn\u00e9es, \u00e0 des pertes de revenus, \u00e0 des atteintes \u00e0 la r\u00e9putation, etc. et cela \u00e0 l&rsquo;\u00e9chelle mondiale. La s\u00e9curit\u00e9 du routage est donc vitale pour l&rsquo;avenir et la stabilit\u00e9 de l&rsquo;Internet. L&rsquo;initiative MANRS\u2026","authors":[{"term_id":4083,"user_id":819,"is_guest":0,"slug":"kruse","display_name":"Megan Kruse","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/Megan-Kruse-min.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/Megan-Kruse-min.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/74218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/819"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=74218"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/74218\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/50818"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=74218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=74218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=74218"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=74218"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=74218"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=74218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}