{"id":26494,"date":"2022-04-19T15:41:00","date_gmt":"2022-04-19T13:41:00","guid":{"rendered":"https:\/\/perseus.de\/risque-cybernetique\/"},"modified":"2026-03-30T09:48:41","modified_gmt":"2026-03-30T07:48:41","slug":"risque-cybernetique","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/risque-cybernetique\/","title":{"rendered":"Risque cybern\u00e9tique"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26494\" class=\"elementor elementor-26494 elementor-22188\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-903eb1b e-con-full e-flex e-con e-child\" data-id=\"903eb1b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Risque cybern\u00e9tique\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25818\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-26398665 e-flex e-con-boxed e-con e-parent\" data-id=\"26398665\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3c02b1a e-con-full e-flex e-con e-child\" data-id=\"3c02b1a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><p>Le risque cybern\u00e9tique est la possibilit\u00e9 qu\u2019il arrive quelque chose aux informations ou composants informatiques stock\u00e9s dans votre entreprise qui causerait des dommages importants. Le risque est mesur\u00e9 \u00e0 deux niveaux : <\/p><p>\u00c0 quel point quelque chose pourrait nuire \u00e0 votre entreprise et \u00e0 quel point c\u2019est probable.<\/p><h4> <\/h4><h4>Que signifie en d\u00e9tail le terme risque cybern\u00e9tique ?<\/h4><p>Parmi les exemples typiques d\u2019incidents pouvant nuire aux entreprises, on trouve :<\/p><ul><li>Perte d\u2019acc\u00e8s aux informations commerciales ou clients critiques<\/li><li>Divulgation non autoris\u00e9e d\u2019informations commerciales ou clients \u00e0 des tiers<\/li><li>Vol d\u2019argent ou d\u2019autres ressources financi\u00e8res par des moyens techniques<\/li><\/ul><p>La probabilit\u00e9 d\u2019un tel incident dommageable d\u00e9pend des mesures prises par votre organisation pour garantir et prot\u00e9ger le stockage des informations et l\u2019acc\u00e8s aux ressources informatiques. Puisque les sc\u00e9narios de dommages sont abstraits et que de nombreux actifs en danger sont intangibles, les risques cybern\u00e9tiques sont souvent sous-estim\u00e9s. Cela permet \u00e0 la plupart des entreprises de r\u00e9duire ou mieux g\u00e9rer ces risques gr\u00e2ce \u00e0 des mesures appropri\u00e9es. Par exemple, sensibiliser les employ\u00e9s peut conduire \u00e0 une approche plus critique des emails malveillants et pr\u00e9venir les incidents. Et avec des sauvegardes fr\u00e9quentes et r\u00e9guli\u00e8res, par exemple, apr\u00e8s une panne serveur caus\u00e9e par une force majeure, vous pouvez reprendre un travail quotidien productif beaucoup plus rapidement.    <\/p><h4> <\/h4><h4>O\u00f9 puis-je rencontrer des risques cybern\u00e9tiques dans mon travail quotidien ?<\/h4><p>De nombreux d\u00e9tails quotidiens de votre travail quotidien influencent le risque cybern\u00e9tique de votre entreprise. Par exemple, si : <\/p><ul><li>Les donn\u00e9es des clients sont chiffr\u00e9es ou stock\u00e9es librement, accessibles \u00e0 tous les employ\u00e9s<\/li><li>Les cl\u00e9s USB tierces sont v\u00e9rifi\u00e9es pour d\u00e9tecter des malwares avant de se connecter<\/li><li>Les comptes utilisateurs d\u2019anciens employ\u00e9s existent toujours \u2013 tous les employ\u00e9s et d\u00e9partements travaillent sur le m\u00eame r\u00e9seau<\/li><li>Des sauvegardes r\u00e9guli\u00e8res de toutes les donn\u00e9es sont effectu\u00e9es et stock\u00e9es de mani\u00e8re s\u00e9curis\u00e9e \u2013 les employ\u00e9s connectent leur smartphone priv\u00e9 au Wi-Fi de l\u2019entreprise<\/li><\/ul><h3> <\/h3><h4>Que puis-je faire pour me prot\u00e9ger des risques cybern\u00e9tiques ?<\/h4><p>Identifiez le risque cybern\u00e9tique de votre organisation. En fonction des r\u00e9sultats, vous saurez o\u00f9 se trouve votre besoin d\u2019action le plus important.<br>Si vous manquez de temps, priorisez. Chaque mesure r\u00e9duit votre risque cybern\u00e9tique. Identifiez les plus grands facteurs de risque et commencez par eux, par exemple sensibiliser vos employ\u00e9s, mettre \u00e0 jour vos serveurs et cr\u00e9er des sauvegardes r\u00e9guli\u00e8res.    <\/p><p>Utilisez des sources d\u2019information fiables telles que l\u2019Office f\u00e9d\u00e9ral allemand de la s\u00e9curit\u00e9 de l\u2019information (BSI) comme base pour la prise de d\u00e9cision<br>Consid\u00e9rez l\u2019assurance contre les risques cybern\u00e9tiques si, par exemple, une interruption de production pourrait rapidement mettre votre entreprise en danger<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e1de57d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e1de57d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Risque cybern\u00e9tique Le risque cybern\u00e9tique est la possibilit\u00e9 qu\u2019il arrive quelque chose aux informations ou composants informatiques stock\u00e9s dans votre entreprise qui causerait des dommages importants. Le risque est mesur\u00e9 \u00e0 deux niveaux : \u00c0 quel point quelque chose pourrait nuire \u00e0 votre entreprise et \u00e0 quel point c\u2019est probable. Que signifie en d\u00e9tail le [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-26494","post","type-post","status-publish","format-standard","hentry","category-cyberlexique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Risque cybern\u00e9tique - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/risque-cybernetique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Risque cybern\u00e9tique - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Risque cybern\u00e9tique Le risque cybern\u00e9tique est la possibilit\u00e9 qu\u2019il arrive quelque chose aux informations ou composants informatiques stock\u00e9s dans votre entreprise qui causerait des dommages importants. Le risque est mesur\u00e9 \u00e0 deux niveaux : \u00c0 quel point quelque chose pourrait nuire \u00e0 votre entreprise et \u00e0 quel point c\u2019est probable. Que signifie en d\u00e9tail le [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/risque-cybernetique\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-19T13:41:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T07:48:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/risque-cybernetique\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/risque-cybernetique\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Risque cybern\u00e9tique\",\"datePublished\":\"2022-04-19T13:41:00+00:00\",\"dateModified\":\"2026-03-30T07:48:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/risque-cybernetique\\\/\"},\"wordCount\":493,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/risque-cybernetique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyberlexique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/risque-cybernetique\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/risque-cybernetique\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/risque-cybernetique\\\/\",\"name\":\"Risque cybern\u00e9tique - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/risque-cybernetique\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/risque-cybernetique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-19T13:41:00+00:00\",\"dateModified\":\"2026-03-30T07:48:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/risque-cybernetique\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/risque-cybernetique\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/risque-cybernetique\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/risque-cybernetique\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Risque cybern\u00e9tique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Risque cybern\u00e9tique - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/risque-cybernetique\/","og_locale":"fr_FR","og_type":"article","og_title":"Risque cybern\u00e9tique - Perseus Technologies","og_description":"Risque cybern\u00e9tique Le risque cybern\u00e9tique est la possibilit\u00e9 qu\u2019il arrive quelque chose aux informations ou composants informatiques stock\u00e9s dans votre entreprise qui causerait des dommages importants. Le risque est mesur\u00e9 \u00e0 deux niveaux : \u00c0 quel point quelque chose pourrait nuire \u00e0 votre entreprise et \u00e0 quel point c\u2019est probable. Que signifie en d\u00e9tail le [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/risque-cybernetique\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-19T13:41:00+00:00","article_modified_time":"2026-03-30T07:48:41+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/risque-cybernetique\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/risque-cybernetique\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Risque cybern\u00e9tique","datePublished":"2022-04-19T13:41:00+00:00","dateModified":"2026-03-30T07:48:41+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/risque-cybernetique\/"},"wordCount":493,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/risque-cybernetique\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyberlexique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/risque-cybernetique\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/risque-cybernetique\/","url":"https:\/\/perseus.de\/fr\/risque-cybernetique\/","name":"Risque cybern\u00e9tique - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/risque-cybernetique\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/risque-cybernetique\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-19T13:41:00+00:00","dateModified":"2026-03-30T07:48:41+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/risque-cybernetique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/risque-cybernetique\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/risque-cybernetique\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/risque-cybernetique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Risque cybern\u00e9tique"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26494","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=26494"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26494\/revisions"}],"predecessor-version":[{"id":26495,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26494\/revisions\/26495"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=26494"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=26494"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=26494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}