{"id":136,"date":"2008-12-30T11:36:54","date_gmt":"2008-12-30T10:36:54","guid":{"rendered":"http:\/\/www.auditsi.eu\/?p=136"},"modified":"2011-09-20T13:12:28","modified_gmt":"2011-09-20T11:12:28","slug":"protection-contre-le-vol-des-donnees-le-cryptage","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=136","title":{"rendered":"Protection contre le vol des donn\u00e9es : le cryptage"},"content":{"rendered":"<p style=\"text-align: justify;\">La perte ou le vol d&#8217;un ordinateur portable n&#8217;est en soit pas dramatique pour l&#8217;entreprise. Par contre, le contenu, c&#8217;est-\u00e0-dire les donn\u00e9es, de cet ordinateur a une valeur pour l&#8217;entreprise. Sa divulgation peut faire perdre \u00e0 l&#8217;entreprise une avance sur la concurrence, sans compter la confidentialit\u00e9 que l&#8217;entreprise se doit de garantir \u00e0 ses salari\u00e9s et partenaires sur certaines donn\u00e9es.<\/p>\n<p style=\"text-align: justify;\">Afin de rendre inutilisables par un tiers les donn\u00e9es en cas de vol ou de perte d&#8217;un ordinateur portable, le cryptage est une solution id\u00e9ale. D&#8217;une utilisation transparente pour l&#8217;utilisateur, le cryptage en temps r\u00e9el code et d\u00e9code les fichiers au fur et \u00e0 mesure de leur ouverture et fermeture par l&#8217;utilisateur. Lorsque l&#8217;utilisateur n&#8217;a plus besoin des donn\u00e9es crypt\u00e9es, il ferme sa session (la session est ouverte \u00e0 l&#8217;aide d&#8217;un code ou par empreinte digitale) : les donn\u00e9es ne sont plus lisibles.<\/p>\n<p style=\"text-align: justify;\">Personnellement, j&#8217;utilise TrueCrypt pour crypter mes donn\u00e9es depuis plusieurs ann\u00e9es. Ce logiciel, fiable et gratuit, est t\u00e9l\u00e9chargeable \u00e0 partir du site de son auteur <a href=\"http:\/\/www.truecrypt.org\" target=\"_blank\">www.truecrypt.org<\/a>.<\/p>\n<div id=\"polls-6\" class=\"wp-polls\">\n\t<form id=\"polls_form_6\" class=\"wp-polls-form\" action=\"\/index.php\" method=\"post\">\n\t\t<p style=\"display: none;\"><input type=\"hidden\" id=\"poll_6_nonce\" name=\"wp-polls-nonce\" value=\"77161dc1a9\" \/><\/p>\n\t\t<p style=\"display: none;\"><input type=\"hidden\" name=\"poll_id\" value=\"6\" \/><\/p>\n\t\t<p style=\"text-align: center;\"><strong>Les disques durs des ordinateurs portables de votre entreprise sont-ils crypt\u00e9s ?<\/strong><\/p><div id=\"polls-6-ans\" class=\"wp-polls-ans\"><ul class=\"wp-polls-ul\">\n\t\t<li><input type=\"radio\" id=\"poll-answer-20\" name=\"poll_6\" value=\"20\" \/> <label for=\"poll-answer-20\">Oui<\/label><\/li>\n\t\t<li><input type=\"radio\" id=\"poll-answer-21\" name=\"poll_6\" value=\"21\" \/> <label for=\"poll-answer-21\">Non<\/label><\/li>\n\t\t<li><input type=\"radio\" id=\"poll-answer-22\" name=\"poll_6\" value=\"22\" \/> <label for=\"poll-answer-22\">Ne sais pas<\/label><\/li>\n\t\t<\/ul><p style=\"text-align: center;\"><input type=\"button\" name=\"vote\" value=\"   Vote   \" class=\"Buttons\" onclick=\"poll_vote(6);\" onkeypress=\"poll_result(6);\" \/><\/p><p style=\"text-align: center;\"><a href=\"#ViewPollResults\" onclick=\"poll_result(6); return false;\" onkeypress=\"poll_result(6); return false;\" title=\"View Results Of This Poll\">View Results<\/a><\/p><\/div>\n\t<\/form>\n<\/div>\n<div id=\"polls-6-loading\" class=\"wp-polls-loading\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.auditsi.eu\/wp-content\/plugins\/wp-polls\/images\/loading.gif\" width=\"16\" height=\"16\" alt=\"Chargement ...\" title=\"Chargement ...\" class=\"wp-polls-image\" \/>&nbsp;Chargement ...<\/div>\n\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Protection%20contre%20le%20vol%20des%20donn%C3%A9es%20%3A%20le%20cryptage\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>La perte ou le vol d&#8217;un ordinateur portable n&#8217;est en soit pas dramatique pour l&#8217;entreprise. Par contre, le contenu, c&#8217;est-\u00e0-dire les donn\u00e9es, de cet ordinateur a une valeur pour l&#8217;entreprise. Sa divulgation peut faire perdre \u00e0 l&#8217;entreprise une avance sur la concurrence, sans compter la confidentialit\u00e9 que l&#8217;entreprise se doit de garantir \u00e0 ses salari\u00e9s &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=136\" class=\"more-link\">Continue reading &lsquo;Protection contre le vol des donn\u00e9es : le cryptage&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Protection%20contre%20le%20vol%20des%20donn%C3%A9es%20%3A%20le%20cryptage\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[7,36,38,35,33],"tags":[416,34,415,1629,1630,1628,1627,37],"class_list":["post-136","post","type-post","status-publish","format-standard","hentry","category-breves","category-protection-des-donnees","category-secret-professionnel","category-securite-informatique","category-systeme-informatique","tag-chiffrement","tag-cryptage","tag-cryptographie","tag-protection-des-donnees","tag-secret-professionnel","tag-securite-informatique","tag-systeme-informatique","tag-truecrypt"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=136"}],"version-history":[{"count":0,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/136\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}