﻿{"id":2605,"date":"2022-10-04T10:20:59","date_gmt":"2022-10-04T15:20:59","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?p=2605"},"modified":"2022-10-04T10:21:02","modified_gmt":"2022-10-04T15:21:02","slug":"la-cybersecurite-en-chiffres","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/la-cybersecurite-en-chiffres\/","title":{"rendered":"La cybers\u00e9curit\u00e9 en chiffres"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"277\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/1-1024x277.png\" alt=\"\" class=\"wp-image-2606\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/1-1024x277.png 1024w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/1-300x81.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/1-768x208.png 768w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/1.png 1295w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-small-font-size\">Source : internetworldstats.com<\/p>\n\n\n\n<p>Que ce soit dans nos\nvies personnelle ou professionnelle, les outils bas\u00e9s sur l\u2019utilisation\nd\u2019Internet nous envahissent \u00e0 la vitesse de l\u2019\u00e9clair (applications mobiles,\npaiement en ligne, stockage de donn\u00e9es en infonuagique\u2026). Le gouvernement ne\npeut ignorer cette tendance. Il se doit donc de revoir la fa\u00e7on de desservir\nses services aux citoyens et entreprises, afin qu\u2019ils r\u00e9pondent \u00e0 ce nouveau\nmode de vie. Cependant, ces changements ne viennent pas qu\u2019avec des avantages.\nEn effet, en contrepartie de cette mont\u00e9e rapide de l\u2019utilisation d\u2019Internet,\non constate une augmentation des vuln\u00e9rabilit\u00e9s, des menaces, des attaques et\ndes incidents dans le cyberespace. Dans ce contexte, la cybers\u00e9curit\u00e9 est\nprimordiale pour r\u00e9duire le risque d\u2019\u00eatre victime d\u2019une cyberattaque.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"277\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/2-1024x277.png\" alt=\"\" class=\"wp-image-2607\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/2-1024x277.png 1024w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/2-300x81.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/2-768x208.png 768w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/2.png 1295w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-small-font-size\">Source : <a href=\"https:\/\/ici.radio-canada.ca\/nouvelle\/1792859\/les-cyberattaques-en-hausse-depuis-lavenement-du-teletravail-selon-une-enquete\">https:\/\/ici.radio-canada.ca\/nouvelle\/1792859\/les-cyberattaques-en-hausse-depuis-lavenement-du-teletravail-selon-une-enquete<\/a><\/p>\n\n\n\n<p>En\ntant qu\u2019employ\u00e9 du gouvernement, vous avez donc un r\u00f4le majeur \u00e0 jouer en\nmati\u00e8re de cybers\u00e9curit\u00e9. Vous \u00eates la premi\u00e8re ligne de d\u00e9fense! Il est de\nvotre responsabilit\u00e9 d\u2019adopter de bons r\u00e9flexes en mati\u00e8re de cybers\u00e9curit\u00e9!<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"277\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/3-1024x277.png\" alt=\"\" class=\"wp-image-2608\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/3-1024x277.png 1024w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/3-300x81.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/3-768x208.png 768w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/3.png 1295w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-small-font-size\">Source : <a href=\"https:\/\/techjury.net\/blog\/how-many-cyber-attacks-per-day\/\">https:\/\/techjury.net\/blog\/how-many-cyber-attacks-per-day\/<\/a><\/p>\n\n\n\n<p>Soyez\nvigilants avec la messagerie \u00e9lectronique&nbsp;: assurez-vous de toujours\nv\u00e9rifier la l\u00e9gitimit\u00e9 d\u2019un courriel avant d\u2019y r\u00e9pondre, de cliquer sur les\nliens ou de t\u00e9l\u00e9charger les documents qu\u2019il contient.&nbsp;&nbsp; <\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"277\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/4-1024x277.png\" alt=\"\" class=\"wp-image-2609\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/4-1024x277.png 1024w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/4-300x81.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/4-768x208.png 768w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/4.png 1295w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-small-font-size\">Source : Analyse\nNVD du NIST &#8211; Vuln\u00e9rabilit\u00e9s record en 2021 | Redscan et ncta-2020-f-web.pdf\n(cyber.gc.ca)<\/p>\n\n\n\n<p>L\u2019\u00e9volution\ndes technologies profite \u00e9galement aux cybercriminels. En effet, le\nd\u00e9veloppement d\u2019outils de piratage avanc\u00e9s, con\u00e7us pour r\u00e9aliser des attaques\ntelles que la modification d\u2019un site Web ou l\u2019envoi d\u2019un logiciel malveillant\npar courriel qui chiffre l\u2019ensemble des donn\u00e9es en demandant une ran\u00e7on \u00e0 la\nvictime en \u00e9change du mot de passe de d\u00e9chiffrement par exemple, permet\nmaintenant aux moins aguerris de perp\u00e9trer des attaques. Cela a donc pour effet\nd\u2019augmenter le nombre de cybercriminels et le nombre d\u2019attaques potentielles.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"277\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/5-1024x277.png\" alt=\"\" class=\"wp-image-2610\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/5-1024x277.png 1024w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/5-300x81.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/5-768x208.png 768w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/5.png 1295w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-small-font-size\">Source : <a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/canada-cyber-crime-statistics\/#20_Canadians_lost_over_230_million_to_online_fraud_during_2021\">https:\/\/www.comparitech.com\/blog\/information-security\/canada-cyber-crime-statistics\/#20_Canadians_lost_over_230_million_to_online_fraud_during_2021<\/a><\/p>\n\n\n\n<p>Les organismes publics et les entreprises du gouvernement\nd\u00e9tiennent des informations citoyennes personnelles et confidentielles qui\npourraient \u00eatre utilis\u00e9es pour perp\u00e9trer des vols d\u2019identit\u00e9. En tant que\nmembre du personnel du gouvernement, vous avez le devoir de prot\u00e9ger les\ninformations qui sont sous votre responsabilit\u00e9 dans le cadre de votre travail.\nN\u2019oublions pas&nbsp;que nous sommes \u00e9galement tous des citoyens.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"277\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/6-1024x277.png\" alt=\"\" class=\"wp-image-2611\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/6-1024x277.png 1024w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/6-300x81.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/6-768x208.png 768w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/6.png 1295w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Source : internetworldstats.com Que ce soit dans nos vies personnelle ou professionnelle, les outils bas\u00e9s sur l\u2019utilisation d\u2019Internet nous envahissent \u00e0 la vitesse de l\u2019\u00e9clair (applications mobiles, paiement en ligne, stockage de donn\u00e9es en infonuagique\u2026). Le gouvernement ne peut ignorer cette tendance. Il se doit donc de revoir la fa\u00e7on de desservir ses services aux [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":2606,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4,10],"tags":[],"class_list":["post-2605","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-campagne-de-sensibilisation"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2605","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=2605"}],"version-history":[{"count":2,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2605\/revisions"}],"predecessor-version":[{"id":2613,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2605\/revisions\/2613"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/2606"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=2605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=2605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=2605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}