{"id":26506,"date":"2022-04-19T15:45:00","date_gmt":"2022-04-19T13:45:00","guid":{"rendered":"https:\/\/perseus.de\/incident-cybernetique\/"},"modified":"2026-03-30T09:50:39","modified_gmt":"2026-03-30T07:50:39","slug":"incident-cybernetique","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/incident-cybernetique\/","title":{"rendered":"Incident cybern\u00e9tique"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26506\" class=\"elementor elementor-26506 elementor-22198\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2e4050d e-con-full e-flex e-con e-child\" data-id=\"2e4050d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Incident cybern\u00e9tique<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25818\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5e7de6be e-flex e-con-boxed e-con e-parent\" data-id=\"5e7de6be\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2da113fc e-con-full e-flex e-con e-child\" data-id=\"2da113fc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><p>Un incident cybern\u00e9tique est tout \u00e9v\u00e9nement qui affecte vos informations stock\u00e9es ou vos ressources informatiques et qui pourrait causer des dommages importants \u00e0 votre entreprise. La gamme des cyberincidents est vaste, incluant les infections \u00e0 malwares, l\u2019extorsion, le vol de donn\u00e9es confidentielles et l\u2019abus de comptes bancaires. <\/p><h4><span style=\"color: inherit; font-family: inherit; font-size: 1.5rem;\"> <\/span><\/h4><h4><span style=\"color: inherit; font-family: inherit; font-size: 1.5rem;\">Que signifie en d\u00e9tail le terme incident cybern\u00e9tique ?<\/span><\/h4><p><span style=\"font-size: 1rem; color: inherit; font-family: inherit;\">Selon le Allianz Risk Barometer 2019, les incidents cybern\u00e9tiques comptent parmi les plus grands risques commerciaux au monde, au m\u00eame niveau que les interruptions d\u2019activit\u00e9. Il est important de se rappeler que les incidents informatiques peuvent \u00e9galement entra\u00eener des interruptions d\u2019activit\u00e9, par exemple s\u2019ils affectent les installations de production, verrouillent les ordinateurs ou suppriment des serveurs. Pour les entreprises individuelles, un incident cybern\u00e9tique peut entra\u00eener des co\u00fbts \u00e9lev\u00e9s. Selon Allianz, les d\u00e9g\u00e2ts moyens rapport\u00e9s en Allemagne sont de deux millions d\u2019euros.   <\/span><\/p><p><strong style=\"font-size: 1rem;\"> <\/strong><\/p><h4><strong style=\"font-size: 1rem;\">Les types courants d\u2019incidents cybern\u00e9tiques incluent :<\/strong><\/h4><ul><li>Infections par des programmes qui verrouillent un, plusieurs ou tous les ordinateurs et exigent une ran\u00e7on, apr\u00e8s quoi le verrou est suppos\u00e9ment invers\u00e9 (ce qui n\u2019est pas toujours le cas)<\/li><li>Infections par des programmes qui suppriment des informations importantes, telles que les donn\u00e9es clients<\/li><li>Suppression accidentelle ou malveillante de vos donn\u00e9es par des employ\u00e9s ou d\u2019anciens employ\u00e9s<br>Hame\u00e7onnage (e-mails frauduleux)<\/li><li>Ing\u00e9nierie sociale (vol d\u2019information par la construction abusive de relations, souvent avec des personnes invent\u00e9es uniquement \u00e0 cet effet)<\/li><\/ul><h3> <\/h3><h4>O\u00f9 est-ce que je rencontre des incidents cybern\u00e9tiques dans mon travail quotidien ?<\/h4><p>Malheureusement, vous pouvez \u00eatre confront\u00e9 \u00e0 des incidents cybern\u00e9tiques \u00e0 de nombreuses \u00e9tapes de votre travail quotidien. Par exemple : <\/p><ul><li>Apr\u00e8s un clic n\u00e9gligent sur un lien dans un e-mail<\/li><li>Apr\u00e8s avoir ouvert une pi\u00e8ce jointe contenant un malware<\/li><li>Apr\u00e8s avoir connect\u00e9 la cl\u00e9 USB d\u2019un client<\/li><li>Apr\u00e8s avoir connect\u00e9 un smartphone personnel au r\u00e9seau Wi-Fi de l\u2019entreprise<\/li><li>Malheureusement, les cons\u00e9quences peuvent \u00eatre importantes et causer de graves dommages \u00e0 votre entreprise.<\/li><\/ul><p> <\/p><p>D\u2019un point de vue positif, cela cr\u00e9e de nombreuses opportunit\u00e9s, dans votre travail quotidien, de prot\u00e9ger votre entreprise contre les dommages caus\u00e9s par des incidents cybern\u00e9tiques gr\u00e2ce \u00e0 vos actions r\u00e9fl\u00e9chies.<\/p><h4> <\/h4><h4>Que puis-je faire pour me prot\u00e9ger contre les incidents cybern\u00e9tiques ?<\/h4><p><span style=\"font-size: 1rem; color: inherit; font-family: inherit;\">Minimiser efficacement les diff\u00e9rents types d\u2019incidents cybern\u00e9tiques est une t\u00e2che globale \u2013 mais chaque mesure est utile. Que cela commence avec vous personnellement, tout le personnel, dans la salle des serveurs ou dans le r\u00e9seau.   <\/span><\/p><p> <\/p><p><span style=\"font-size: 1rem; color: inherit; font-family: inherit;\">Par exemple :<\/span><\/p><ul><li>Par principe, ne cliquez pas sur les liens dans les e-mails. Utilisez donc consciemment le d\u00e9tour via le navigateur. <\/li><li>Traitez les pi\u00e8ces jointes avec beaucoup de m\u00e9fiance. Si n\u00e9cessaire, v\u00e9rifiez l\u2019origine ind\u00e9pendamment de votre programme de messagerie (par exemple en appelant). <\/li><li>Essayez d\u2019\u00e9viter autant que possible les cl\u00e9s USB \u00e9trang\u00e8res ou priv\u00e9es<\/li><li>Installez un r\u00e9seau Wi-Fi s\u00e9par\u00e9 dans votre entreprise pour les appareils \u00e9galement utilis\u00e9s \u00e0 des fins personnelles, comme les smartphones.<\/li><\/ul><h4> <\/h4><h4>D\u2019autres informations int\u00e9ressantes sont disponibles \u00e0 l\u2019adresse suivante :<\/h4><ul><li><a href=\"https:\/\/polizei.brandenburg.de\/seite\/internetkriminalitaet\/2460110\">Guide de la criminalit\u00e9 sur Internet<\/a> de la police de Brandebourg avec explications et options d\u2019action<br>Page th\u00e9matique \u00ab <a href=\"http:\/\/www.sicher-im-netz.de\/it-sicherheit-am-arbeitsplatz\">S\u00e9curit\u00e9 informatique au lieu de travail<\/a> \u00bb de Deutschland sicher im Netz e. V.<\/li><li>Sur ce site <a href=\"http:\/\/www.botfrei.de\/de\/index.html\">sans bots<\/a>, vous pouvez trouver des conseils de s\u00e9curit\u00e9, des programmes pour v\u00e9rifier les fichiers suspects en ligne, ainsi que des programmes de premiers intervenants, tels que le retrait de logiciels malveillants<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-209c16c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"209c16c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Incident cybern\u00e9tique Un incident cybern\u00e9tique est tout \u00e9v\u00e9nement qui affecte vos informations stock\u00e9es ou vos ressources informatiques et qui pourrait causer des dommages importants \u00e0 votre entreprise. La gamme des cyberincidents est vaste, incluant les infections \u00e0 malwares, l\u2019extorsion, le vol de donn\u00e9es confidentielles et l\u2019abus de comptes bancaires. Que signifie en d\u00e9tail le terme [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-26506","post","type-post","status-publish","format-standard","hentry","category-cyberlexique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Incident cybern\u00e9tique - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/incident-cybernetique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Incident cybern\u00e9tique - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Incident cybern\u00e9tique Un incident cybern\u00e9tique est tout \u00e9v\u00e9nement qui affecte vos informations stock\u00e9es ou vos ressources informatiques et qui pourrait causer des dommages importants \u00e0 votre entreprise. La gamme des cyberincidents est vaste, incluant les infections \u00e0 malwares, l\u2019extorsion, le vol de donn\u00e9es confidentielles et l\u2019abus de comptes bancaires. Que signifie en d\u00e9tail le terme [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/incident-cybernetique\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-19T13:45:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T07:50:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/incident-cybernetique\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/incident-cybernetique\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Incident cybern\u00e9tique\",\"datePublished\":\"2022-04-19T13:45:00+00:00\",\"dateModified\":\"2026-03-30T07:50:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/incident-cybernetique\\\/\"},\"wordCount\":608,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/incident-cybernetique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyberlexique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/incident-cybernetique\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/incident-cybernetique\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/incident-cybernetique\\\/\",\"name\":\"Incident cybern\u00e9tique - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/incident-cybernetique\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/incident-cybernetique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-19T13:45:00+00:00\",\"dateModified\":\"2026-03-30T07:50:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/incident-cybernetique\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/incident-cybernetique\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/incident-cybernetique\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/incident-cybernetique\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Incident cybern\u00e9tique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Incident cybern\u00e9tique - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/incident-cybernetique\/","og_locale":"fr_FR","og_type":"article","og_title":"Incident cybern\u00e9tique - Perseus Technologies","og_description":"Incident cybern\u00e9tique Un incident cybern\u00e9tique est tout \u00e9v\u00e9nement qui affecte vos informations stock\u00e9es ou vos ressources informatiques et qui pourrait causer des dommages importants \u00e0 votre entreprise. La gamme des cyberincidents est vaste, incluant les infections \u00e0 malwares, l\u2019extorsion, le vol de donn\u00e9es confidentielles et l\u2019abus de comptes bancaires. Que signifie en d\u00e9tail le terme [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/incident-cybernetique\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-19T13:45:00+00:00","article_modified_time":"2026-03-30T07:50:39+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/incident-cybernetique\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/incident-cybernetique\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Incident cybern\u00e9tique","datePublished":"2022-04-19T13:45:00+00:00","dateModified":"2026-03-30T07:50:39+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/incident-cybernetique\/"},"wordCount":608,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/incident-cybernetique\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyberlexique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/incident-cybernetique\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/incident-cybernetique\/","url":"https:\/\/perseus.de\/fr\/incident-cybernetique\/","name":"Incident cybern\u00e9tique - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/incident-cybernetique\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/incident-cybernetique\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-19T13:45:00+00:00","dateModified":"2026-03-30T07:50:39+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/incident-cybernetique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/incident-cybernetique\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/incident-cybernetique\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/incident-cybernetique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Incident cybern\u00e9tique"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26506","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=26506"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26506\/revisions"}],"predecessor-version":[{"id":26507,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26506\/revisions\/26507"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=26506"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=26506"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=26506"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}