{"id":1472,"date":"2012-02-10T08:45:46","date_gmt":"2012-02-10T06:45:46","guid":{"rendered":"http:\/\/www.auditsi.eu\/?p=1472"},"modified":"2018-03-25T14:17:06","modified_gmt":"2018-03-25T12:17:06","slug":"intrusion-et-protection-des-acces-testez-le-degre-de-securite-de-vos-mots-de-passe","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=1472","title":{"rendered":"Intrusion et protection des acc\u00e8s : testez le degr\u00e9 de s\u00e9curit\u00e9 de vos mots de passe"},"content":{"rendered":"<p style=\"text-align: justify;\">C&#8217;est bien connu : la gestion des mots de passe est un des maillons faibles en mati\u00e8re de politique de s\u00e9curit\u00e9 des syst\u00e8mes d&#8217;information. En effet, les mots de passe sont g\u00e9n\u00e9ralement (et \u00e0 tort)\u00a0d\u00e9termin\u00e9s par les utilisateurs eux-m\u00eames. Pour mieux s&#8217;en souvenir, il est fr\u00e9quent que les mots de passe correspondent \u00e0 une simple et courte succession de chifres (123 par exemple) ou de lettres&#8230; Pourtant, les mots de passe sont une des clefs d&#8217;acc\u00e8s au syst\u00e8me d&#8217;information.<\/p>\n<p style=\"text-align: justify;\">Le site internet <a href=\"http:\/\/www.passwordmeter.com\/\" target=\"_blank\" rel=\"noopener\">http:\/\/www.passwordmeter.com\/<\/a>\u00a0propose d&#8217;\u00e9valuer, selon plusieurs crit\u00e8res, le degr\u00e9 de s\u00e9curit\u00e9 de vos mots de passe. Testez-le et vous constaterez que certains mots de passe sont vraiment faibles&#8230;<\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Intrusion%20et%20protection%20des%20acc%C3%A8s%20%3A%20testez%20le%20degr%C3%A9%20de%20s%C3%A9curit%C3%A9%20de%20vos%20mots%20de%20passe\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>C&#8217;est bien connu : la gestion des mots de passe est un des maillons faibles en mati\u00e8re de politique de s\u00e9curit\u00e9 des syst\u00e8mes d&#8217;information. En effet, les mots de passe sont g\u00e9n\u00e9ralement (et \u00e0 tort)\u00a0d\u00e9termin\u00e9s par les utilisateurs eux-m\u00eames. Pour mieux s&#8217;en souvenir, il est fr\u00e9quent que les mots de passe correspondent \u00e0 une simple &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=1472\" class=\"more-link\">Continue reading &lsquo;Intrusion et protection des acc\u00e8s : testez le degr\u00e9 de s\u00e9curit\u00e9 de vos mots de passe&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Intrusion%20et%20protection%20des%20acc%C3%A8s%20%3A%20testez%20le%20degr%C3%A9%20de%20s%C3%A9curit%C3%A9%20de%20vos%20mots%20de%20passe\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[36,35,30],"tags":[99,502,135,118,137,1629,156,1628,317,750],"class_list":["post-1472","post","type-post","status-publish","format-standard","hentry","category-protection-des-donnees","category-securite-informatique","category-sites-internet","tag-faille-de-securite","tag-intrusion","tag-mots-de-passe","tag-piratage","tag-politique-de-securite","tag-protection-des-donnees","tag-securisation-des-acces","tag-securite-informatique","tag-sensibilisation-des-utilisateurs","tag-www-passwordmeter-com"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/1472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1472"}],"version-history":[{"count":3,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/1472\/revisions"}],"predecessor-version":[{"id":7430,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/1472\/revisions\/7430"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1472"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1472"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}