﻿{"id":34,"date":"2018-09-28T17:41:38","date_gmt":"2018-09-28T15:41:38","guid":{"rendered":"http:\/\/www.uqac.ca\/cybersecurite\/?page_id=34"},"modified":"2025-11-03T15:52:30","modified_gmt":"2025-11-03T20:52:30","slug":"outils","status":"publish","type":"page","link":"https:\/\/www.uqac.ca\/cybersecurite\/outils\/","title":{"rendered":"Outils de cybers\u00e9curit\u00e9"},"content":{"rendered":"<h4>Sites de r\u00e9f\u00e9rences:<\/h4>\n<p><cite><a href=\"https:\/\/asiq.org\/\">Association de la s\u00e9curit\u00e9 de l&rsquo;information du Qu\u00e9bec<\/a><br \/>\n<a href=\"https:\/\/cyber.gc.ca\/fr\/\">Centre canadien pour la cybers\u00e9curit\u00e9<\/a><br \/>\n<a href=\"https:\/\/cybereco.ca\/\">CyberEco<\/a><br \/>\n<a href=\"https:\/\/www.av-test.org\/fr\/nouvelles\/\">Institut AV-TEST<\/a><br \/>\n<a href=\"https:\/\/www.lemondeinformatique.fr\/securite-informatique-3.html\">Le monde informatique<\/a><br \/>\n<a href=\"https:\/\/www.nomoreransom.org\/\">NomoreRansom<\/a><br \/>\n<a href=\"https:\/\/cyber.gc.ca\/fr\/orientation\/pratiques-exemplaires-en-cybersecurite\">Pratiques exemplaires en cybers\u00e9curit\u00e9<\/a><br \/>\n<a href=\"https:\/\/quebecsec.ca\/\">QuebecSec<\/a><br \/>\n<a href=\"https:\/\/www.secunews.org\/\">SecuNews<\/a><br \/>\n<a href=\"https:\/\/community.sophos.com\/products\/malware\/\">Sophos<\/a><br \/>\n<a href=\"https:\/\/www.sq.gouv.qc.ca\/wp-content\/uploads\/2020\/02\/mpf-vous-etes-victime-fraude.pdf\">SQ &#8211; Aide-m\u00e9moire \u2013 Vous \u00eates victime d\u2019une fraude?<\/a><br \/>\n<a href=\"https:\/\/www.sq.gouv.qc.ca\/wp-content\/uploads\/2021\/10\/depliant-prevention-rancongiciels.pdf\">SQ &#8211; Aide-m\u00e9moire &#8211; Pr\u00e9vention ran\u00e7ongiciel<\/a><\/cite><\/p>\n<p>&nbsp;<\/p>\n<h4>Conseils ou formations en cybers\u00e9curit\u00e9:<\/h4>\n<p><cite><a href=\"https:\/\/www.uqac.ca\/direction_services\/sti\/capsules-sensibilisation.php\">Capsules de sensibilisation de l&rsquo;UQAC<\/a><br \/>\n<\/cite><cite><a href=\"https:\/\/www.quebec.ca\/gouvernement\/travailler-gouvernement\/travailler-fonction-publique\/services-employes-etat\/conformite\/protection-des-renseignements-personnels\/activites-formation\">Capsules de formation sur la protection des renseignements personnels (loi 25)<\/a><br \/>\n<a href=\"https:\/\/www.serene-risc.ca\/fr\/conseils-en-cybersecurite\">Conseils en cybers\u00e9curit\u00e9 SERENE-RISC<\/a><br \/>\n<a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/S\u00e9ance-de-sensibilisation-\u00e0-la-cybers\u00e9curit\u00e9.pdf\">Contenu de la s\u00e9ance de sensibilisation \u00e0 la cybers\u00e9curit\u00e9<\/a><br \/>\n<a href=\"https:\/\/www.cybersec101.ca\/fr\/\">Formations en cybers\u00e9curit\u00e9 SERENE-RISC<\/a><br \/>\n<a href=\"https:\/\/www.uqac.ca\/cybersecurite\/index.php\/2021\/01\/25\/nouvelles-infographies-pour-bien-comprendre-et-se-proteger\/\">Les infographies de cybers\u00e9curit\u00e9<\/a><br \/>\n<\/cite><cite><a href=\"https:\/\/www.pensezcybersecurite.gc.ca\/fr\/accueil\">Pensez cybers\u00e9curit\u00e9<\/a><br \/>\n<a href=\"http:\/\/science.gc.ca\/eic\/site\/063.nsf\/fra\/h_97955.html?open&amp;utm_campaign=safeguarding%20your%20research&amp;utm_source=csis&amp;utm_medium=pog&amp;utm_content=safeguarding_research\">Prot\u00e9gez la recherche<\/a><br \/>\n<a href=\"https:\/\/portagenetwork.ca\/fr\/\">Services partag\u00e9s pour les donn\u00e9es de recherche<\/a><\/cite><\/p>\n<h4>Loi, politique et directive.:<\/h4>\n<p><cite><a href=\"https:\/\/www.quebec.ca\/gouvernement\/ministere\/cybersecurite-numerique\/publications\/dispositions-legales-et-administratives-en-securite-de-linformation#:~:text=Les%20dispositions%20l%C3%A9gales%20et%20administratives%20en%20s%C3%A9curit%C3%A9%20de,pr%C3%A9cisent%20les%20liens%20fonctionnels%20qui%20doivent%20%C3%AAtre%20maintenus.\">Dispositions l\u00e9gales et administratives en s\u00e9curit\u00e9 de l&rsquo;information du gouvernement du Qu\u00e9bec<\/a><br \/>\n<a href=\"https:\/\/www.uqac.ca\/direction_services\/secretariat_general\/manuel\/3\/073.pdf\">Politique de s\u00e9curit\u00e9 de l&rsquo;information de l&rsquo;UQAC.<\/a><br \/>\n<a href=\"https:\/\/cdn-contenu.quebec.ca\/cdn-contenu\/adm\/min\/cybersecurite_numerique\/Publications\/Strategie_cybersecurite_numerique_2024-2028\/Strategie_cybersecurite_numerique_2024-2028.pdf\">Strat\u00e9gie gouvernementale de cybers\u00e9curit\u00e9 et du num\u00e9rique<\/a><\/cite><\/p>\n<h4>Outils:<\/h4>\n<p><cite><a href=\"https:\/\/lebonantivirus.com\/meilleur-antivirus-mac\/\">Antivirus gratuits pour MAC<\/a><br \/>\n<a href=\"https:\/\/www.techadvisor.fr\/banc-essai\/logiciels\/meilleur-antivirus-windows-pc-3657120\/\">Antivirus gratuits pour Windows<\/a><br \/>\n<a href=\"https:\/\/www.techadvisor.fr\/banc-essai\/ordinateurs\/meilleur-gestionnaire-de-mot-de-passe-gratuit-3666137\/\">Gestionnaires de mots de passe gratuits<\/a><br \/>\n<a href=\"https:\/\/www.security.org\/how-secure-is-my-password\/\">Tester la robustesse d&rsquo;un mot de passe<\/a><\/cite><\/p>\n<h4>Cat\u00e9gorisation des actifs:<\/h4>\n<p><cite><a href=\"https:\/\/terranovasecurity.com\/fr\/classification-de-l-information-ou-des-actifs-informationnels\/\">Pourquoi cat\u00e9goriser les actifs ?<\/a><\/cite><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sites de r\u00e9f\u00e9rences: Association de la s\u00e9curit\u00e9 de l&rsquo;information du Qu\u00e9bec Centre canadien pour la cybers\u00e9curit\u00e9 CyberEco Institut AV-TEST Le monde informatique NomoreRansom Pratiques exemplaires en cybers\u00e9curit\u00e9 QuebecSec SecuNews Sophos SQ &#8211; Aide-m\u00e9moire \u2013 Vous \u00eates victime d\u2019une fraude? SQ &#8211; Aide-m\u00e9moire &#8211; Pr\u00e9vention ran\u00e7ongiciel &nbsp; Conseils ou formations en cybers\u00e9curit\u00e9: Capsules de sensibilisation de [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-34","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/pages\/34","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=34"}],"version-history":[{"count":77,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/pages\/34\/revisions"}],"predecessor-version":[{"id":3279,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/pages\/34\/revisions\/3279"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}