{"id":579,"date":"2011-04-28T18:00:51","date_gmt":"2011-04-28T17:00:51","guid":{"rendered":"http:\/\/www.auditsi.eu\/?p=579"},"modified":"2011-04-28T18:00:51","modified_gmt":"2011-04-28T17:00:51","slug":"securite-des-systemes-dinformation-la-protection-des-donnees-a-lepreuve-du-piratage","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=579","title":{"rendered":"S\u00e9curit\u00e9 des syst\u00e8mes d&#8217;information : la protection des donn\u00e9es \u00e0 l&#8217;\u00e9preuve du piratage"},"content":{"rendered":"<p style=\"text-align: justify;\">Le r\u00e9seau informatique assurant l\u2019interconnexion des consoles de jeu PS3 de Sony a \u00e9t\u00e9 pirat\u00e9<a href=\"http:\/\/www.auditsi.eu\/wp-includes\/js\/tinymce\/plugins\/paste\/pasteword.htm?ver=327-1235#_edn1\">[i]<\/a>, des donn\u00e9es personnelles d\u2019utilisateurs (nom, coordonn\u00e9es et peut-\u00eatre num\u00e9ros de cartes bancaires) ont \u00e9t\u00e9 siphonn\u00e9es par des pirates informatiques. Sony a bloqu\u00e9 l\u2019acc\u00e8s \u00e0 ses r\u00e9seaux emp\u00eachant aux utilisateurs de PS3 tous jeux en r\u00e9seau, toute mise \u00e0 jour et tout achat en ligne. Ce produit a perdu en quelques jours tout int\u00e9r\u00eat. C\u2019est un coup dur pour la marque. Sa cr\u00e9dibilit\u00e9 est s\u00e9rieusement \u00e9corn\u00e9e. Cette multinationale va devoir d\u00e9ployer des efforts de communication \u00e9normes pour redorer son image et effacer de la m\u00e9moire des utilisateurs cet \u00e9pisode. Si cet incident aura un impact financier \u00e9vident (baisse des ventes, proc\u00e8s\u2026) sur les comptes de la soci\u00e9t\u00e9, elle s\u2019en remettra, elle a les reins solides.<\/p>\n<p style=\"text-align: justify;\">Mais qu\u2019en est-il des PME\u00a0?<\/p>\n<p style=\"text-align: justify;\">Aucune PME ne survivrait, tant en termes de perte d\u2019image que de perte d\u2019activit\u00e9, \u00e0 ce genre d\u2019accident. Et pourtant, les piratages et autres malveillances informatiques se sont multipli\u00e9s ces derni\u00e8res ann\u00e9es. Pour autant la s\u00e9curit\u00e9 des syst\u00e8mes informatiques n\u2019est pas la priorit\u00e9 des DSI, les budgets de PME n\u2019\u00e9tant pas extensibles.<\/p>\n<p style=\"text-align: justify;\">F\u00e2cheuse erreur. Ne pas ou mal prot\u00e9ger l\u2019acc\u00e8s \u00e0 ses r\u00e9seaux informatique revient \u00e0 laisser la porte de son entreprise ouverte. Aucun syst\u00e8me informatique ne peut pr\u00e9tendre \u00e0 l\u2019inviolabilit\u00e9 de ses protections. Soit. Mais il est vital pour les PME de se pr\u00e9munir de ces attaques en mettant en place une strat\u00e9gie de s\u00e9curit\u00e9 et un plan de crise visant d\u2019une part \u00e0 maintenir un haut niveau de s\u00e9curit\u00e9 (compatible toutefois avec leur flexibilit\u00e9) et d&#8217;autre part \u00e0 pr\u00e9server leur r\u00e9activit\u00e9 en cas d\u2019incident grave. Une bonne part des actions \u00e0 mener passe par la sensibilisation des utilisateurs et des administrateurs\u2026<\/p>\n<p style=\"text-align: justify;\">La s\u00e9curit\u00e9 informatique n\u2019est pas un co\u00fbt, c\u2019est le prix de la survie.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<hr style=\"text-align: justify;\" size=\"1\" \/>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.auditsi.eu\/wp-includes\/js\/tinymce\/plugins\/paste\/pasteword.htm?ver=327-1235#_ednref1\">[i]<\/a> Pour plus de pr\u00e9cisions sur ce sujet, le lecteur se reportera sur l\u2019article de la Tribune accessible ici\u00a0: <a href=\"http:\/\/www.latribune.fr\/technos-medias\/electronique\/20110427trib000618021\/sony-victime-d-une-enorme-cyberattaque.html\">http:\/\/www.latribune.fr\/technos-medias\/electronique\/20110427trib000618021\/sony-victime-d-une-enorme-cyberattaque.html<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"S%C3%A9curit%C3%A9%20des%20syst%C3%A8mes%20d%27information%20%3A%20la%20protection%20des%20donn%C3%A9es%20%C3%A0%20l%27%C3%A9preuve%20du%20piratage\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>Le r\u00e9seau informatique assurant l\u2019interconnexion des consoles de jeu PS3 de Sony a \u00e9t\u00e9 pirat\u00e9[i], des donn\u00e9es personnelles d\u2019utilisateurs (nom, coordonn\u00e9es et peut-\u00eatre num\u00e9ros de cartes bancaires) ont \u00e9t\u00e9 siphonn\u00e9es par des pirates informatiques. Sony a bloqu\u00e9 l\u2019acc\u00e8s \u00e0 ses r\u00e9seaux emp\u00eachant aux utilisateurs de PS3 tous jeux en r\u00e9seau, toute mise \u00e0 jour et &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=579\" class=\"more-link\">Continue reading &lsquo;S\u00e9curit\u00e9 des syst\u00e8mes d&#8217;information : la protection des donn\u00e9es \u00e0 l&#8217;\u00e9preuve du piratage&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"S%C3%A9curit%C3%A9%20des%20syst%C3%A8mes%20d%27information%20%3A%20la%20protection%20des%20donn%C3%A9es%20%C3%A0%20l%27%C3%A9preuve%20du%20piratage\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[7,36,35,33],"tags":[315,203,318,99,43,146,316,118,92,314,1629,313,1628,317,312],"class_list":["post-579","post","type-post","status-publish","format-standard","hentry","category-breves","category-protection-des-donnees","category-securite-informatique","category-systeme-informatique","tag-credibilite","tag-donnees-personnelles","tag-dsi","tag-faille-de-securite","tag-integrite-des-donnees","tag-malveillance","tag-perennite","tag-piratage","tag-plan-de-crise","tag-politique-de-prevention","tag-protection-des-donnees","tag-ps3","tag-securite-informatique","tag-sensibilisation-des-utilisateurs","tag-sony"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=579"}],"version-history":[{"count":0,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/579\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}