{"id":78193,"date":"2018-04-13T13:44:46","date_gmt":"2018-04-13T13:44:46","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/04\/security-research-critical-protect-open-internet\/"},"modified":"2025-11-14T15:13:05","modified_gmt":"2025-11-14T15:13:05","slug":"security-research-critical-protect-open-internet","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/04\/security-research-critical-protect-open-internet\/","title":{"rendered":"La recherche sur la s\u00e9curit\u00e9 est essentielle pour prot\u00e9ger l&rsquo;Internet ouvert"},"content":{"rendered":"<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p>Le 10 Avril 2018,\u00a0<a href=\"http:\/\/I joined over fifty like-minded individuals signing a letter\">j&rsquo;ai rejoint plus de cinquante personnes partageant les m\u00eames id\u00e9es et signant une lettre<\/a>\u00a0qui met l&rsquo;accent sur l&rsquo;importance de la recherche sur la s\u00e9curit\u00e9. La lettre renonce \u00e0 un certain nombre de proc\u00e8s r\u00e9cents, tels que\u00a0<em><a href=\"https:\/\/www.courtlistener.com\/docket\/6244750\/keeper-security-incv-goodin\/\">Keeper v. Goodlin<\/a><\/em> et\u00a0<em><a href=\"https:\/\/www.courtlistener.com\/docket\/4685667\/river-city-media-llc-v-kromtech-alliance-corporation\/\">River City Media v. Kromtech<\/a><\/em>, contre les chercheurs en s\u00e9curit\u00e9 et des journalistes, et souligne l&rsquo;importance du travail qu&rsquo;ils font afin de se d\u00e9fendre contre une augmentation rapide des menaces sur la s\u00e9curit\u00e9 d&rsquo;Internet.<\/p>\n<p>La recherche de s\u00e9curit\u00e9, parfois appel\u00e9 \u201chacking chapeau blanc\u201d, <strong>est une pratique par des pirates \u201ctransparents\u201d qui en toute \u00e9galit\u00e9 trouvent des failles dans les syst\u00e8mes d&rsquo;information et de les signalent aux cr\u00e9ateurs de ces syst\u00e8mes.<\/strong> La capacit\u00e9 \u00e0 trouver et \u00e0 signaler les vuln\u00e9rabilit\u00e9s \u2014 avant que des acteurs mal intentionn\u00e9s puissent y acc\u00e9der \u2014 prend de l&rsquo;importance, en particulier dans le contexte de l&rsquo;Internet des objets (IdO).<\/p>\n<p>Nous avons r\u00e9cemment discut\u00e9 du renforcement de la s\u00e9curit\u00e9 de l&rsquo;IdO \u00e0 Ottawa, au Canada.\u00a0 Les appareils connect\u00e9s \u00e0 Internet sont prometteurs mais peuvent cr\u00e9er bien des probl\u00e8mes de s\u00e9curit\u00e9. Il est crucial que nous continuons \u00e0 encourager les individus \u00e0 rechercher et corriger les d\u00e9fauts de ces dispositifs, dont l&rsquo;application et l&rsquo;utilisation est de plus en plus courante.<\/p>\n<p>Olaf Kolkman, chef de la technologie Internet \u00e0 l&rsquo;Internet Society, <a href=\"https:\/\/www.internetsociety.org\/blog\/2017\/02\/responsible-disclosure-from-a-collaborative-security-perspective\/\">a \u00e9crit r\u00e9cemment<\/a>\u00a0que les chercheurs en s\u00e9curit\u00e9 contribuent \u00e0 rendre l&rsquo;Internet plus s\u00fbr. La collaboration entre ceux qui trouvent les vuln\u00e9rabilit\u00e9s et ceux qui les corrigent am\u00e9liore la confiance des utilisateur d&rsquo;Internet. Tout le monde en profite.<\/p>\n<p>Je milite pour que nous soutenions tous ensemble les chercheurs en s\u00e9curit\u00e9 et les journalistes qui effectuent des travaux critiques OMS, afin de prot\u00e9ger des menaces de s\u00e9curit\u00e9\u00a0les consommateurs et les entreprises.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le 10 Avril 2018,\u00a0j&rsquo;ai rejoint plus de cinquante personnes partageant les m\u00eames id\u00e9es et signant une lettre\u00a0qui met l&rsquo;accent sur l&rsquo;importance de la recherche sur la s\u00e9curit\u00e9. La lettre renonce \u00e0 un certain nombre de proc\u00e8s r\u00e9cents, tels que\u00a0Keeper v. Goodlin et\u00a0River City Media v. Kromtech, contre les chercheurs en s\u00e9curit\u00e9 et des journalistes, et [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":77695,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[178,170,156,4909,4775],"tags":[6247],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4053],"class_list":["post-78193","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite","category-confidentialite","category-iot-fr","category-renforcer-internet","category-securite-fr","tag-internet-des-objets-ido","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-research-expert-statement.jpg",1280,515,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-research-expert-statement-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-research-expert-statement-300x121.jpg",300,121,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-research-expert-statement-768x309.jpg",768,309,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-research-expert-statement-1024x412.jpg",1024,412,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-research-expert-statement.jpg",1280,515,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-research-expert-statement.jpg",1280,515,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-research-expert-statement-250x101.jpg",250,101,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-research-expert-statement-600x515.jpg",600,515,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-research-expert-statement.jpg",300,121,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-research-expert-statement.jpg",400,161,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-research-expert-statement.jpg",600,241,false]},"uagb_author_info":{"display_name":"Mark Buell","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/buell\/"},"uagb_comment_info":0,"uagb_excerpt":"Le 10 Avril 2018,\u00a0j&rsquo;ai rejoint plus de cinquante personnes partageant les m\u00eames id\u00e9es et signant une lettre\u00a0qui met l&rsquo;accent sur l&rsquo;importance de la recherche sur la s\u00e9curit\u00e9. La lettre renonce \u00e0 un certain nombre de proc\u00e8s r\u00e9cents, tels que\u00a0Keeper v. Goodlin et\u00a0River City Media v. Kromtech, contre les chercheurs en s\u00e9curit\u00e9 et des journalistes, et\u2026","authors":[{"term_id":4053,"user_id":39,"is_guest":0,"slug":"buell","display_name":"Mark Buell","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/9923abedeb495281298a2e3ae929138fe0f89f4d5d897f44641198fa285c3a42?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/78193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=78193"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/78193\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/77695"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=78193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=78193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=78193"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=78193"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=78193"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=78193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}