{"id":26205,"date":"2022-04-26T12:22:00","date_gmt":"2022-04-26T10:22:00","guid":{"rendered":"https:\/\/perseus.de\/ingenierie-sociale-social-engineering\/"},"modified":"2026-03-27T12:20:02","modified_gmt":"2026-03-27T11:20:02","slug":"ingenierie-sociale-social-engineering","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/ingenierie-sociale-social-engineering\/","title":{"rendered":"Ing\u00e9nierie sociale (Social Engineering)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26205\" class=\"elementor elementor-26205 elementor-22494\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Ing\u00e9nierie sociale (Social Engineering)<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25818\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9a22961 e-flex e-con-boxed e-con e-parent\" data-id=\"9a22961\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c06f255 e-con-full e-flex e-con e-child\" data-id=\"c06f255\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2a26c2a elementor-widget elementor-widget-text-editor\" data-id=\"2a26c2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L&rsquo;ing\u00e9nierie sociale est une manipulation interpersonnelle qui permet aux cybercriminels d&rsquo;acc\u00e9der aux syst\u00e8mes informatiques de tiers et aux donn\u00e9es sensibles. Le terme vient de l&rsquo;anglais et se compose de \u00ab\u00a0social\u00a0\u00bb, qui se traduit par \u00ab\u00a0interpersonnel\u00a0\u00bb, et de \u00ab\u00a0engineering\u00a0\u00bb, qui se traduit litt\u00e9ralement par \u00ab\u00a0construction\u00a0\u00bb. Il s&rsquo;agit donc d&rsquo;une construction cibl\u00e9e d&rsquo;une relation interpersonnelle.  <\/p><h4>Qu&rsquo;est-ce que cela signifie en d\u00e9tail ?<\/h4><p>Le principe de l&rsquo;ing\u00e9nierie sociale n&rsquo;est pas nouveau. Dans la vie de tous les jours, il est connu sous des termes tels que \u00ab\u00a0escroquerie\u00a0\u00bb et \u00ab\u00a0imposture\u00a0\u00bb. Les m\u00e9dias num\u00e9riques offrent aux criminels de nouvelles possibilit\u00e9s en la mati\u00e8re :  <\/p><ul><li>Les cybercriminels peuvent collecter des informations d\u00e9taill\u00e9es sur une entreprise par le biais de m\u00e9dias num\u00e9riques tels que les sites Web, blogs, pages Facebook, etc. de l&rsquo;entreprise. Elles leur permettent de se pr\u00e9senter de mani\u00e8re cr\u00e9dible comme <\/li><li>Les entreprises qui se font passer pour des employ\u00e9s, <a href=\"https:\/\/perseus.de\/2022\/03\/21\/administrator\/\">des administrateurs<\/a> ou m\u00eame des dirigeants (cf. <a href=\"https:\/\/perseus.de\/2022\/04\/19\/ceo-fraud\/\">fraude au PDG<\/a>) de cette entreprise sont des entreprises qui ne sont pas des entreprises.<\/li><li>Les cybercriminels peuvent utiliser les m\u00e9dias sociaux pour \u00e9tablir des contacts cibl\u00e9s, par exemple avec des cadres sup\u00e9rieurs, sous une fausse identit\u00e9. Dans le cadre d&rsquo;une pr\u00e9tendue amiti\u00e9 ou d&rsquo;une romance, ils essaient d&rsquo;inciter la personne attaqu\u00e9e \u00e0 r\u00e9v\u00e9ler des informations sensibles sur l&rsquo;entreprise. <\/li><\/ul><p>L&rsquo;ing\u00e9nierie sociale exploite souvent les forces humaines \u00e0 des fins criminelles. Des qualit\u00e9s indispensables telles que la serviabilit\u00e9, la confiance et le respect de l&rsquo;autorit\u00e9 sont d\u00e9lib\u00e9r\u00e9ment d\u00e9tourn\u00e9es. <\/p><ul><li>Par exemple, les cybercriminels pr\u00e9tendent \u00eatre des amis d&rsquo;amis \u00e0 qui la cible a \u00e9t\u00e9 recommand\u00e9e comme contact. Par exemple : pour relire une candidature. Cependant, le document num\u00e9rique contenant la pr\u00e9tendue candidature contient <a href=\"https:\/\/perseus.de\/2022\/04\/26\/schadprogramme-malware\/\">des programmes malveillants<\/a> tels que <a href=\"https:\/\/perseus.de\/2022\/04\/26\/trojaner\/\">des chevaux de Troie<\/a>, <a href=\"http:\/\/52.57.197.213\/2022\/04\/25\/ransomware\/\">des ransomwares<\/a> ou <a href=\"https:\/\/perseus.de\/2022\/04\/22\/keylogger\/\">des keyloggers<\/a>.  <\/li><li>Les cybercriminels peuvent \u00e9galement se faire passer pour des sup\u00e9rieurs hi\u00e9rarchiques press\u00e9s par le temps, qui ordonnent par exemple le transfert d&rsquo;une somme d&rsquo;argent importante sur un compte donn\u00e9.<\/li><\/ul><p>La peur est utilis\u00e9e pour l&rsquo;ing\u00e9nierie sociale. En raison de son fort impact \u00e9motionnel, la peur r\u00e9duit la capacit\u00e9 de r\u00e9flexion critique. Cela facilite la manipulation recherch\u00e9e par les cybercriminels.  <\/p><ul><li>La fraude du PDG consiste par exemple \u00e0 menacer de cons\u00e9quences professionnelles n\u00e9gatives si les instructions pr\u00e9sum\u00e9es ne sont pas appliqu\u00e9es.<\/li><li>Dans les tentatives d&rsquo;extorsion, les cybercriminels pr\u00e9tendent \u00eatre en possession de donn\u00e9es sensibles de la personne attaqu\u00e9e, par exemple des photos ou des vid\u00e9os d&rsquo;actes sexuels. Si les conditions du ma\u00eetre chanteur sont remplies, ces donn\u00e9es seront d\u00e9truites, sinon elles seront publi\u00e9es. <\/li><li>Selon un mod\u00e8le similaire, les cybercriminels se font passer pour des policiers et exigent le paiement d&rsquo;une amende pour des d\u00e9lits all\u00e9gu\u00e9s, tels que des t\u00e9l\u00e9chargements ill\u00e9gaux.<\/li><\/ul><p>Les entreprises sont particuli\u00e8rement concern\u00e9es par les attaques d&rsquo;ing\u00e9nierie sociale \u00e0 long terme visant des employ\u00e9s strat\u00e9giques. Il peut s&rsquo;agir, par exemple, d&rsquo;un contact pr\u00e9tendument priv\u00e9 au cours duquel des informations de plus en plus sensibles sur l&rsquo;entreprise sont \u00e9voqu\u00e9es. Si la personne attaqu\u00e9e devient m\u00e9fiante ou se d\u00e9sint\u00e9resse, il peut s&rsquo;ensuivre un chantage bas\u00e9 sur des informations ou des donn\u00e9es confidentielles d\u00e9j\u00e0 divulgu\u00e9es.  <\/p><h4>O\u00f9 est-ce que je rencontre ce th\u00e8me dans mon travail quotidien ?<\/h4><p>En th\u00e9orie, vous \u00eates toujours confront\u00e9 \u00e0 la situation o\u00f9 vous ne pouvez pas confirmer avec certitude l&rsquo;identit\u00e9 d&rsquo;un interlocuteur, que ce soit au t\u00e9l\u00e9phone, par e-mail ou dans des messages priv\u00e9s.<\/p><h4>Que puis-je faire pour am\u00e9liorer ma s\u00e9curit\u00e9 ?<\/h4><ul><li>En principe : utilisez vos strat\u00e9gies quotidiennes \u00e9prouv\u00e9es \u00e9galement dans les m\u00e9dias num\u00e9riques. Des questions inhabituelles, des demandes inappropri\u00e9es, des histoires douteuses ou simplement une \u00ab\u00a0impression g\u00e9n\u00e9rale \u00e9trange\u00a0\u00bb sont des signes d&rsquo;alerte importants, quel que soit le canal utilis\u00e9. <\/li><li>Ne donnez jamais de mots de passe, d&rsquo;informations confidentielles, etc. au t\u00e9l\u00e9phone.<br>Demandez des pr\u00e9cisions, par exemple le nom complet et le num\u00e9ro de t\u00e9l\u00e9phone \u00e0 rappeler. Ou demandez des informations sur des personnes fictives, par exemple un coll\u00e8gue imaginaire dans le service ou le conjoint inexistant d&rsquo;un ami pr\u00e9tendument commun. <\/li><li>Ne vous laissez pas mettre sous pression. Pas par un pr\u00e9tendu manque de temps ou une pr\u00e9tendue n\u00e9cessit\u00e9 de garder le secret. Pas par des affirmations, des menaces ou des flatteries. Tous ces moyens peuvent \u00eatre utilis\u00e9s de mani\u00e8re cibl\u00e9e pour obscurcir votre jugement. Cr\u00e9ez une situation dans laquelle vous pouvez r\u00e9fl\u00e9chir \u00e0 t\u00eate repos\u00e9e aux demandes, etc. et les r\u00e9examiner le cas \u00e9ch\u00e9ant.    <\/li><li>Si possible, v\u00e9rifiez l&rsquo;identit\u00e9 de votre interlocuteur via un canal fiable et neutre. Appelez par exemple le si\u00e8ge de votre entreprise et demandez \u00e0 \u00eatre mis en relation avec le nom mentionn\u00e9. Cet appel \u00e0 un sup\u00e9rieur que vous ne connaissiez pas personnellement peut susciter un grand \u00e9tonnement de sa part &#8211; ou montrer qu&rsquo;il n&rsquo;y a pas de personne de ce nom dans votre entreprise.  <\/li><li><a href=\"https:\/\/perseus.de\/2022\/04\/22\/mitarbeitenden-sensibilisierung\/\">Sensibilisez tous les collaborateurs<\/a> de votre entreprise aux m\u00e9thodes d&rsquo;ing\u00e9nierie sociale et aux mesures de protection. Demandez \u00e0 vos collaborateurs de poser des questions aux services concern\u00e9s en cas d&rsquo;instructions inhabituelles. Sensibilisez vos cadres \u00e0 l&rsquo;importance de ces demandes &#8211; elles peuvent \u00e9viter \u00e0 votre entreprise de subir des dommages importants.  <\/li><li>Planifiez les cas d&rsquo;urgence, c&rsquo;est-\u00e0-dire les cas d&rsquo;attaques d&rsquo;ing\u00e9nierie sociale r\u00e9ussies. D\u00e9veloppez des sc\u00e9narios et des mesures \u00e0 prendre afin de pouvoir agir imm\u00e9diatement en cas de besoin. Cela inclut des dispositions techniques, mais aussi sociales, par exemple des points de contact s\u00fbrs et confidentiels pour les employ\u00e9s victimes de chantage ou d&rsquo;autres formes de coercition.  <\/li><li>Si vous avez \u00e9t\u00e9 la cible d&rsquo;une attaque d&rsquo;ing\u00e9nierie sociale, informez imm\u00e9diatement les services concern\u00e9s de votre entreprise. Il est possible que vous ayez d\u00e9tect\u00e9 le signe d&rsquo;une menace persistante avanc\u00e9e (Advanced Persistent Threat). C&rsquo;est-\u00e0-dire d&rsquo;une attaque cibl\u00e9e \u00e0 plusieurs niveaux contre votre entreprise, qui peut inclure d&rsquo;autres vecteurs d&rsquo;attaque, comme le spam, les enregistreurs de frappe et les <a href=\"https:\/\/perseus.de\/2022\/04\/25\/ransomware\/\">ransomwares<\/a>. Vos informations peuvent \u00eatre cruciales pour une d\u00e9fense efficace.   <\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bf20cc7 e-flex e-con-boxed e-con e-parent\" data-id=\"bf20cc7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ff11169 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ff11169\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ing\u00e9nierie sociale (Social Engineering) L&rsquo;ing\u00e9nierie sociale est une manipulation interpersonnelle qui permet aux cybercriminels d&rsquo;acc\u00e9der aux syst\u00e8mes informatiques de tiers et aux donn\u00e9es sensibles. Le terme vient de l&rsquo;anglais et se compose de \u00ab\u00a0social\u00a0\u00bb, qui se traduit par \u00ab\u00a0interpersonnel\u00a0\u00bb, et de \u00ab\u00a0engineering\u00a0\u00bb, qui se traduit litt\u00e9ralement par \u00ab\u00a0construction\u00a0\u00bb. Il s&rsquo;agit donc d&rsquo;une construction cibl\u00e9e d&rsquo;une [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-26205","post","type-post","status-publish","format-standard","hentry","category-cyberlexique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ing\u00e9nierie sociale (Social Engineering) - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/ingenierie-sociale-social-engineering\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ing\u00e9nierie sociale (Social Engineering) - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Ing\u00e9nierie sociale (Social Engineering) L&rsquo;ing\u00e9nierie sociale est une manipulation interpersonnelle qui permet aux cybercriminels d&rsquo;acc\u00e9der aux syst\u00e8mes informatiques de tiers et aux donn\u00e9es sensibles. Le terme vient de l&rsquo;anglais et se compose de \u00ab\u00a0social\u00a0\u00bb, qui se traduit par \u00ab\u00a0interpersonnel\u00a0\u00bb, et de \u00ab\u00a0engineering\u00a0\u00bb, qui se traduit litt\u00e9ralement par \u00ab\u00a0construction\u00a0\u00bb. Il s&rsquo;agit donc d&rsquo;une construction cibl\u00e9e d&rsquo;une [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/ingenierie-sociale-social-engineering\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-26T10:22:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-27T11:20:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Anastasia Pamoukis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasia Pamoukis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-social-engineering\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-social-engineering\\\/\"},\"author\":{\"name\":\"Anastasia Pamoukis\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\"},\"headline\":\"Ing\u00e9nierie sociale (Social Engineering)\",\"datePublished\":\"2022-04-26T10:22:00+00:00\",\"dateModified\":\"2026-03-27T11:20:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-social-engineering\\\/\"},\"wordCount\":1126,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-social-engineering\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyberlexique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-social-engineering\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-social-engineering\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-social-engineering\\\/\",\"name\":\"Ing\u00e9nierie sociale (Social Engineering) - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-social-engineering\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-social-engineering\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-26T10:22:00+00:00\",\"dateModified\":\"2026-03-27T11:20:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-social-engineering\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-social-engineering\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-social-engineering\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-social-engineering\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ing\u00e9nierie sociale (Social Engineering)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\",\"name\":\"Anastasia Pamoukis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"caption\":\"Anastasia Pamoukis\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/anastasia-pamoukis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ing\u00e9nierie sociale (Social Engineering) - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/ingenierie-sociale-social-engineering\/","og_locale":"fr_FR","og_type":"article","og_title":"Ing\u00e9nierie sociale (Social Engineering) - Perseus Technologies","og_description":"Ing\u00e9nierie sociale (Social Engineering) L&rsquo;ing\u00e9nierie sociale est une manipulation interpersonnelle qui permet aux cybercriminels d&rsquo;acc\u00e9der aux syst\u00e8mes informatiques de tiers et aux donn\u00e9es sensibles. Le terme vient de l&rsquo;anglais et se compose de \u00ab\u00a0social\u00a0\u00bb, qui se traduit par \u00ab\u00a0interpersonnel\u00a0\u00bb, et de \u00ab\u00a0engineering\u00a0\u00bb, qui se traduit litt\u00e9ralement par \u00ab\u00a0construction\u00a0\u00bb. Il s&rsquo;agit donc d&rsquo;une construction cibl\u00e9e d&rsquo;une [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/ingenierie-sociale-social-engineering\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-26T10:22:00+00:00","article_modified_time":"2026-03-27T11:20:02+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Anastasia Pamoukis","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Anastasia Pamoukis","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/ingenierie-sociale-social-engineering\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/ingenierie-sociale-social-engineering\/"},"author":{"name":"Anastasia Pamoukis","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b"},"headline":"Ing\u00e9nierie sociale (Social Engineering)","datePublished":"2022-04-26T10:22:00+00:00","dateModified":"2026-03-27T11:20:02+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/ingenierie-sociale-social-engineering\/"},"wordCount":1126,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/ingenierie-sociale-social-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyberlexique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/ingenierie-sociale-social-engineering\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/ingenierie-sociale-social-engineering\/","url":"https:\/\/perseus.de\/fr\/ingenierie-sociale-social-engineering\/","name":"Ing\u00e9nierie sociale (Social Engineering) - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/ingenierie-sociale-social-engineering\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/ingenierie-sociale-social-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-26T10:22:00+00:00","dateModified":"2026-03-27T11:20:02+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/ingenierie-sociale-social-engineering\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/ingenierie-sociale-social-engineering\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/ingenierie-sociale-social-engineering\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/ingenierie-sociale-social-engineering\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Ing\u00e9nierie sociale (Social Engineering)"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b","name":"Anastasia Pamoukis","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","caption":"Anastasia Pamoukis"},"sameAs":["https:\/\/perseus.de"],"url":"https:\/\/perseus.de\/fr\/author\/anastasia-pamoukis\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=26205"}],"version-history":[{"count":3,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26205\/revisions"}],"predecessor-version":[{"id":26209,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26205\/revisions\/26209"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=26205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=26205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=26205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}