{"id":89577,"date":"2013-07-11T00:00:00","date_gmt":"2013-07-11T00:00:00","guid":{"rendered":"https:\/\/www.internetsociety.org\/?post_type=resources&#038;p=89577"},"modified":"2025-11-14T15:17:23","modified_gmt":"2025-11-14T15:17:23","slug":"comprendre-la-securite-et-la-resilience-de-linternet","status":"publish","type":"resources","link":"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2013\/comprendre-la-securite-et-la-resilience-de-linternet\/","title":{"rendered":"Comprendre la s\u00e9curit\u00e9 et la r\u00e9silience de l\u2019Internet"},"content":{"rendered":"<p>La cybers\u00e9curit\u00e9 est un terme g\u00e9n\u00e9ral plut\u00f4t vague, utilis\u00e9 dans diff\u00e9rents contextes pour signifier diff\u00e9rentes choses tel que \u00ab s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information et des syst\u00e8mes informatiques \u00bb; s\u00e9curit\u00e9 de l\u2019infrastructure de l\u2019Internet; s\u00e9curit\u00e9 de tout ce qui touche \u00e0 l\u2019Internet (y compris les \u00ab services essentiels \u00bb tels que la distribution d\u2019\u00e9lectricit\u00e9); s\u00e9curit\u00e9 des donn\u00e9es; applications et communications; s\u00e9curit\u00e9 des utilisateurs de l\u2019Internet (en particulier les enfants), qui englobe souvent les notions de s\u00e9curit\u00e9 \u00ab nationale \u00bb ainsi que s\u00e9curit\u00e9 \u00ab priv\u00e9e \u00bb. En fait, il n\u2019existe pas de consensus sur ce que signifie le terme.<\/p>\n<p>Sans chercher \u00e0 mieux d\u00e9finir le terme \u00ab cybers\u00e9curit\u00e9 \u00bb ni \u00e0 proposer de solutions pour tous les aspects que pourrait englober son champ d\u2019application, cet article explore les \u00e9l\u00e9ments essentiels \u00e0 la s\u00e9curit\u00e9 et la r\u00e9silience de l\u2019\u00e9cosyst\u00e8me de l\u2019Internet (fondement de toute strat\u00e9gie de cybers\u00e9curit\u00e9 saine). Ces \u00e9l\u00e9ments sont les suivants: des solutions techniques et politiques align\u00e9es avec les invariants de l\u2019Internet; la responsabilit\u00e9 individuelle et collective pour le risque; et la collaboration.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La cybers\u00e9curit\u00e9 est un terme g\u00e9n\u00e9ral plut\u00f4t vague, utilis\u00e9 dans diff\u00e9rents contextes pour signifier diff\u00e9rentes choses tel que \u00ab s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information et des syst\u00e8mes informatiques \u00bb; s\u00e9curit\u00e9 de l\u2019infrastructure de l\u2019Internet; s\u00e9curit\u00e9 de tout ce qui touche \u00e0 l\u2019Internet (y compris les \u00ab services essentiels \u00bb tels que la distribution d\u2019\u00e9lectricit\u00e9); s\u00e9curit\u00e9 des [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":0,"template":"","categories":[178,5890,4909,4775],"tags":[782],"region_news_regions":[6029],"content_category":[6105],"ppma_author":[4057],"class_list":["post-89577","resources","type-resources","status-publish","hentry","category-securite","category-gouvernance-internet","category-renforcer-internet","category-securite-fr","tag-routing-security","region_news_regions-mondial","resource_types-ressource","content_category-resources-type"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"post-thumbnail":false,"square":false,"gform-image-choice-sm":false,"gform-image-choice-md":false,"gform-image-choice-lg":false},"uagb_author_info":{"display_name":"Ivana Trbovic","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/trbovic\/"},"uagb_comment_info":0,"uagb_excerpt":"La cybers\u00e9curit\u00e9 est un terme g\u00e9n\u00e9ral plut\u00f4t vague, utilis\u00e9 dans diff\u00e9rents contextes pour signifier diff\u00e9rentes choses tel que \u00ab s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information et des syst\u00e8mes informatiques \u00bb; s\u00e9curit\u00e9 de l\u2019infrastructure de l\u2019Internet; s\u00e9curit\u00e9 de tout ce qui touche \u00e0 l\u2019Internet (y compris les \u00ab services essentiels \u00bb tels que la distribution d\u2019\u00e9lectricit\u00e9); s\u00e9curit\u00e9 des\u2026","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/resources\/89577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/resources"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/resources"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/46"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=89577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=89577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=89577"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=89577"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=89577"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=89577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}