{"id":2598,"date":"2012-11-29T02:22:11","date_gmt":"2012-11-29T00:22:11","guid":{"rendered":"http:\/\/www.auditsi.eu\/?p=2598"},"modified":"2014-01-02T12:29:49","modified_gmt":"2014-01-02T10:29:49","slug":"la-fraude-informatique-une-histoire-de-30-ans","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=2598","title":{"rendered":"La fraude informatique : une histoire de 30 ans !"},"content":{"rendered":"<p style=\"text-align: justify;\">De tout temps, l\u2019homme a rivalis\u00e9 d\u2019ing\u00e9niosit\u00e9 pour frauder. L\u2019informatique a ouvert de nouvelles voies sur lesquelles les g\u00e9nies en col blanc se sont engouffr\u00e9s pour perfectionner la commission de d\u00e9lits. Ils n&#8217;ont pas attendu qu&#8217;internet se g\u00e9n\u00e9ralise pour frapper. Bien au contraire, les premi\u00e8res attaques informatiques contre des r\u00e9seaux bancaires ou militaires ont \u00e9t\u00e9 op\u00e9r\u00e9es dans le d\u00e9but des ann\u00e9es 80. A cette \u00e9poque, les moyens de protection \u00e9taient relativement faibles tant les responsables informatiques ignoraient les risques.<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2012\/11\/SVM-1-PHOTO-FRAUDE.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2596\" title=\"SVM 1 PHOTO FRAUDE\" alt=\"\" src=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2012\/11\/SVM-1-PHOTO-FRAUDE.jpg\" width=\"518\" height=\"447\" srcset=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2012\/11\/SVM-1-PHOTO-FRAUDE.jpg 518w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2012\/11\/SVM-1-PHOTO-FRAUDE-300x258.jpg 300w\" sizes=\"auto, (max-width: 518px) 100vw, 518px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">La panoplie du parfait pirate est assez l\u00e9g\u00e8re : un micro-ordinateur, un modem&#8230; et une bonne dose d&#8217;imagination (et bien entendu beaucoup de patience !).<\/p>\n<p style=\"text-align: justify;\">La d\u00e9linquance astucieuse a de beaux jours devant elle.<\/p>\n<p style=\"text-align: justify;\">Pour consulter des articles d&#8217;\u00e9poque sur le sujet : <a title=\"Fraude et nouvelles technologies\" href=\"http:\/\/www.auditsi.eu\/?page_id=2587\">http:\/\/www.auditsi.eu\/?page_id=2587<\/a>.<\/p>\n<p style=\"text-align: justify;\">Approfondir le sujet :<br \/>\n<a title=\"Articles sur l'histoire de l'informatique\" href=\"http:\/\/www.auditsi.eu\/?cat=1118\"> Histoire de l\u2019informatique<\/a> \/ <a title=\"L'informatique des ann\u00e9es 80\" href=\"http:\/\/www.auditsi.eu\/?page_id=2119\">L\u2019informatique des ann\u00e9es 80<\/a> \/ <a title=\"Ma collection\" href=\"http:\/\/www.auditsi.eu\/?page_id=1983\">Ma collection<\/a> \/ <a title=\"Ma documentation\" href=\"http:\/\/www.auditsi.eu\/?page_id=3930\">Ma documentation<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"La%20fraude%20informatique%20%3A%20une%20histoire%20de%2030%20ans%20%21\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>De tout temps, l\u2019homme a rivalis\u00e9 d\u2019ing\u00e9niosit\u00e9 pour frauder. L\u2019informatique a ouvert de nouvelles voies sur lesquelles les g\u00e9nies en col blanc se sont engouffr\u00e9s pour perfectionner la commission de d\u00e9lits. Ils n&#8217;ont pas attendu qu&#8217;internet se g\u00e9n\u00e9ralise pour frapper. Bien au contraire, les premi\u00e8res attaques informatiques contre des r\u00e9seaux bancaires ou militaires ont \u00e9t\u00e9 &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=2598\" class=\"more-link\">Continue reading &lsquo;La fraude informatique : une histoire de 30 ans !&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"La%20fraude%20informatique%20%3A%20une%20histoire%20de%2030%20ans%20%21\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[7,1118,35],"tags":[1124,1121,1621,773,1123,1122,135,136,118,1125,65],"class_list":["post-2598","post","type-post","status-publish","format-standard","hentry","category-breves","category-histoire-de-linformatique","category-securite-informatique","tag-arpanet","tag-deliquance-astucieuse","tag-fraude","tag-histoire","tag-micro-ordinateur","tag-modem","tag-mots-de-passe","tag-niveau-de-protection","tag-piratage","tag-reseau-informatique","tag-usurpation-didentite"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/2598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2598"}],"version-history":[{"count":8,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/2598\/revisions"}],"predecessor-version":[{"id":4416,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/2598\/revisions\/4416"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}