{"id":26500,"date":"2022-04-19T15:43:00","date_gmt":"2022-04-19T13:43:00","guid":{"rendered":"https:\/\/perseus.de\/cybersecurite\/"},"modified":"2026-03-30T09:49:44","modified_gmt":"2026-03-30T07:49:44","slug":"cybersecurite","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/cybersecurite\/","title":{"rendered":"Cybers\u00e9curit\u00e9"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26500\" class=\"elementor elementor-26500 elementor-22193\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-fa4e576 e-con-full e-flex e-con e-child\" data-id=\"fa4e576\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cybers\u00e9curit\u00e9\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25818\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-28e503da e-flex e-con-boxed e-con e-parent\" data-id=\"28e503da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-49f3ba64 e-con-full e-flex e-con e-child\" data-id=\"49f3ba64\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><p>Protection des dispositifs informatiques (par exemple ordinateurs ou smartphones) et des syst\u00e8mes contre les dangers de la mise hors service, la manipulation ou l\u2019\u00e9vacuation de donn\u00e9es via le cyberespace.<\/p><h4> <\/h4><h4>Que signifie en d\u00e9tail le terme cybers\u00e9curit\u00e9 ?<\/h4><p>Le sujet de la cybers\u00e9curit\u00e9 rev\u00eat une grande importance aux niveaux individuel, local, national et international. Cela s\u2019explique par le fait qu\u2019elle peut pr\u00e9venir une large gamme de dommages : de la d\u00e9faillance de production d\u2019une seule centrale \u00e0 la panne de courant d\u2019un district entier, en passant par le vol de documents d\u2019\u00c9tat ultra-secrets. Cette r\u00e9flexion devient de plus en plus r\u00e9pandue : \u00ab Dans peu de domaines, la s\u00e9curit\u00e9 interne et externe co\u00efncide aussi \u00e9troitement que dans le cyberespace. La situation de menace dans le cyberespace n\u00e9cessite une vision globale dans le cadre de la politique de cybers\u00e9curit\u00e9. \u00bb (<a href=\"https:\/\/www.bundesregierung.de\/resource\/blob\/975292\/736102\/64781348c12e4a80948ab1bdf25cf057\/weissbuch-zur-sicherheitspolitik-2016-download-bmvg-data.pdf?download=1\">Livre blanc sur la politique de s\u00e9curit\u00e9 et l\u2019avenir de la Bundeswehr 2016, p. 38<\/a>) Pour vous, en tant qu\u2019entrepreneur, cela a pour cons\u00e9quence positive que vous recevrez de plus en plus d\u2019informations de qualit\u00e9 sur ce sujet. Parmi autres, de l\u2019Alliance pour la cybers\u00e9curit\u00e9, de l\u2019Office f\u00e9d\u00e9ral allemand pour la s\u00e9curit\u00e9 de l\u2019information (BSI) et de diverses associations d\u2019entreprises et de l\u2019industrie.   <\/p><h4> <\/h4><h4>O\u00f9 puis-je rencontrer le sujet de la cybers\u00e9curit\u00e9 dans mon travail quotidien ?<\/h4><p>De nos jours de travail en r\u00e9seau, on tombe souvent sur le sujet de la cybers\u00e9curit\u00e9. Partout o\u00f9 des informations num\u00e9riques sont cr\u00e9\u00e9es, collect\u00e9es, g\u00e9r\u00e9es et utilis\u00e9es, la cybers\u00e9curit\u00e9 est un sujet tr\u00e8s pertinent. Par exemple :  <\/p><ul><li>Sur l\u2019ordinateur de travail<\/li><li>Dans la salle de montage enti\u00e8rement ou partiellement automatis\u00e9e<\/li><li>Dans vos fichiers clients num\u00e9riques<\/li><li>Dans votre gestion de commande num\u00e9rique<\/li><\/ul><p>Chaque saisie de mot de passe, chaque authentification, chaque mise \u00e0 jour affecte la cybers\u00e9curit\u00e9 de votre entreprise. Cela ouvre beaucoup de possibilit\u00e9s pour vous et vos employ\u00e9s afin d\u2019am\u00e9liorer votre cybers\u00e9curit\u00e9 dans votre travail quotidien. <\/p><h4> <\/h4><h4>Que puis-je faire pour am\u00e9liorer ma s\u00e9curit\u00e9 ?<\/h4><p>Augmentez votre cybers\u00e9curit\u00e9 en r\u00e9duisant vos risques cybern\u00e9tiques (voir l\u2019entr\u00e9e du glossaire \u00ab Risque cyber \u00bb pour des mesures par exemple). Gr\u00e2ce \u00e0 des directives, ils peuvent effectuer diverses mesures eux-m\u00eames. Alternativement, des prestataires de services comme Perseus sont \u00e9galement disponibles. Ici, vous pouvez \u00eatre s\u00fbr que les mesures de base et les mesures techniquement exigeantes seront prises en charge.   <\/p><h4> <\/h4><h4>D\u2019autres informations int\u00e9ressantes sont disponibles \u00e0 l\u2019adresse suivante :<\/h4><div> <\/div><ul><li>Le <a href=\"https:\/\/www.allianz-fuer-cybersicherheit.de\/Webs\/ACS\/DE\/Home\/home_node.html\">site web de l\u2019Alliance for Cyber Security de la BSI<\/a>, incluant un bureau de rapport pour les incidents cybern\u00e9tiques<\/li><li>La <a href=\"http:\/\/www.bmvg.de\/de\/themen\/cybersicherheit\">page th\u00e9matique Cybers\u00e9curit\u00e9<\/a> du Minist\u00e8re f\u00e9d\u00e9ral de la D\u00e9fense<\/li><li><a href=\"https:\/\/bdi.eu\/themenfelder\/digitalisierung\/cybersicherheit\/\">Page th\u00e9matique<\/a> de la F\u00e9d\u00e9ration allemande des industries sur la cybers\u00e9curit\u00e9<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-30e4c37 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"30e4c37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybers\u00e9curit\u00e9 Protection des dispositifs informatiques (par exemple ordinateurs ou smartphones) et des syst\u00e8mes contre les dangers de la mise hors service, la manipulation ou l\u2019\u00e9vacuation de donn\u00e9es via le cyberespace. Que signifie en d\u00e9tail le terme cybers\u00e9curit\u00e9 ? Le sujet de la cybers\u00e9curit\u00e9 rev\u00eat une grande importance aux niveaux individuel, local, national et international. Cela [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-26500","post","type-post","status-publish","format-standard","hentry","category-cyberlexique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybers\u00e9curit\u00e9 - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9 - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Cybers\u00e9curit\u00e9 Protection des dispositifs informatiques (par exemple ordinateurs ou smartphones) et des syst\u00e8mes contre les dangers de la mise hors service, la manipulation ou l\u2019\u00e9vacuation de donn\u00e9es via le cyberespace. Que signifie en d\u00e9tail le terme cybers\u00e9curit\u00e9 ? Le sujet de la cybers\u00e9curit\u00e9 rev\u00eat une grande importance aux niveaux individuel, local, national et international. Cela [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-19T13:43:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T07:49:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cybersecurite\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cybersecurite\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Cybers\u00e9curit\u00e9\",\"datePublished\":\"2022-04-19T13:43:00+00:00\",\"dateModified\":\"2026-03-30T07:49:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cybersecurite\\\/\"},\"wordCount\":497,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cybersecurite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyberlexique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/cybersecurite\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cybersecurite\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cybersecurite\\\/\",\"name\":\"Cybers\u00e9curit\u00e9 - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cybersecurite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cybersecurite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-19T13:43:00+00:00\",\"dateModified\":\"2026-03-30T07:49:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cybersecurite\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/cybersecurite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cybersecurite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cybersecurite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"Cybers\u00e9curit\u00e9 - Perseus Technologies","og_description":"Cybers\u00e9curit\u00e9 Protection des dispositifs informatiques (par exemple ordinateurs ou smartphones) et des syst\u00e8mes contre les dangers de la mise hors service, la manipulation ou l\u2019\u00e9vacuation de donn\u00e9es via le cyberespace. Que signifie en d\u00e9tail le terme cybers\u00e9curit\u00e9 ? Le sujet de la cybers\u00e9curit\u00e9 rev\u00eat une grande importance aux niveaux individuel, local, national et international. Cela [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/cybersecurite\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-19T13:43:00+00:00","article_modified_time":"2026-03-30T07:49:44+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/cybersecurite\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/cybersecurite\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Cybers\u00e9curit\u00e9","datePublished":"2022-04-19T13:43:00+00:00","dateModified":"2026-03-30T07:49:44+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/cybersecurite\/"},"wordCount":497,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyberlexique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/cybersecurite\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/cybersecurite\/","url":"https:\/\/perseus.de\/fr\/cybersecurite\/","name":"Cybers\u00e9curit\u00e9 - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-19T13:43:00+00:00","dateModified":"2026-03-30T07:49:44+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/cybersecurite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/cybersecurite\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=26500"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26500\/revisions"}],"predecessor-version":[{"id":26501,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26500\/revisions\/26501"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=26500"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=26500"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=26500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}