﻿{"id":1534,"date":"2020-05-27T08:38:33","date_gmt":"2020-05-27T12:38:33","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?p=1534"},"modified":"2020-05-27T08:38:35","modified_gmt":"2020-05-27T12:38:35","slug":"le-coffre-doutils-de-cybersecurite-de-luqac","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/le-coffre-doutils-de-cybersecurite-de-luqac\/","title":{"rendered":"Le coffre d&rsquo;outils de cybers\u00e9curit\u00e9 de l&rsquo;UQAC"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignleft is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2020\/04\/pixel-cells-3976293__340.png\" alt=\"\" class=\"wp-image-1498\" width=\"99\" height=\"187\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2020\/04\/pixel-cells-3976293__340.png 181w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2020\/04\/pixel-cells-3976293__340-160x300.png 160w\" sizes=\"auto, (max-width: 99px) 100vw, 99px\" \/><\/figure><\/div>\n\n\n\n<p style=\"background-color:#5a7410\" class=\"has-text-color has-background has-very-light-gray-color\">Comprendre le RPV (r\u00e9seau priv\u00e9 virtuel) ou en anglais VPN (virtual private network).<br><\/p>\n\n\n\n<p>En cette p\u00e9riode intense de t\u00e9l\u00e9travail, c&rsquo;est un outil indispensable.  Si vous \u00e9tablissez votre session de travail \u00e0 partir de votre domicile afin d&rsquo;avoir acc\u00e8s aux informations n\u00e9cessaires \u00e0 la mission de l\u2019UQAC en passant par internet.   La connexion RPV est n\u00e9cessaire afin de s\u00e9curiser l\u2019\u00e9change d\u2019informations.<\/p>\n\n\n\n<p>Le RPV&nbsp; permet de cr\u00e9er une communication chiffr\u00e9e et s\u00e9curis\u00e9e pour faire circuler les informations en provenance ou \u00e0 destination des infrastructures de l\u2019UQAC. Ce mode de communication met en place une connexion s\u00e9curis\u00e9e qui impose une authentification et permet de traverser un r\u00e9seau public en s\u00e9curit\u00e9. <br><a href=\"https:\/\/www.numerama.com\/tech\/140954-quel-vpn-choisir-et-pourquoi.html\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Comprendre le RPV (r\u00e9seau priv\u00e9 virtuel) ou en anglais VPN (virtual private network). En cette p\u00e9riode intense de t\u00e9l\u00e9travail, c&rsquo;est un outil indispensable. Si vous \u00e9tablissez votre session de travail \u00e0 partir de votre domicile afin d&rsquo;avoir acc\u00e8s aux informations n\u00e9cessaires \u00e0 la mission de l\u2019UQAC en passant par internet. La connexion RPV est n\u00e9cessaire [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":1538,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2],"tags":[],"class_list":["post-1534","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-outils"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1534","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=1534"}],"version-history":[{"count":4,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1534\/revisions"}],"predecessor-version":[{"id":1539,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1534\/revisions\/1539"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/1538"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=1534"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=1534"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=1534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}