﻿{"id":2614,"date":"2022-10-05T06:45:41","date_gmt":"2022-10-05T11:45:41","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?p=2614"},"modified":"2022-10-05T06:45:43","modified_gmt":"2022-10-05T11:45:43","slug":"gestion-des-menaces-des-vulnerabilites-et-des-incidents","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/gestion-des-menaces-des-vulnerabilites-et-des-incidents\/","title":{"rendered":"Gestion des menaces, des vuln\u00e9rabilit\u00e9s et des incidents"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1295\" height=\"350\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/7-1024x277.png\" alt=\"\" class=\"wp-image-2615\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/7-1024x277.png 1024w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/7-300x81.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/7-768x208.png 768w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/7.png 1295w\" sizes=\"auto, (max-width: 1295px) 100vw, 1295px\" \/><\/figure>\n\n\n\n<p>L\u2019omnipr\u00e9sence du num\u00e9rique est telle que la\ntechnologie rend nos vies plus faciles. Cons\u00e9quemment, nos habitudes changent.<\/p>\n\n\n\n<p>Cette r\u00e9alit\u00e9 comporte de nouveaux enjeux de s\u00e9curit\u00e9\net de protection de l\u2019information, qui doivent nous pousser \u00e0 \u00eatre <strong>cybervigilants<\/strong>.\nAvec l\u2019acc\u00e9l\u00e9ration de la transformation num\u00e9rique gouvernementale, il est\nPRIMORDIAL d\u2019assurer une protection ad\u00e9quate des ressources informationnelles\net des informations sensibles des citoyens et des entreprises d\u00e9tenues par les\norganismes publics. <\/p>\n\n\n\n<p>Dans cette optique, le gouvernement du Qu\u00e9bec s\u2019est\ndot\u00e9 de processus, qui s\u2019inspirent des meilleures pratiques dans le domaine,\npour faire preuve de proactivit\u00e9 en cas de menace ou de cyberattaque. Le\nprocessus de gestion des menaces, des vuln\u00e9rabilit\u00e9s et des incidents,\ncommun\u00e9ment appel\u00e9 GMVI, implique des intervenants en s\u00e9curit\u00e9 \u00e0 tous les\nniveaux de l\u2019appareil gouvernemental. <\/p>\n\n\n\n<p>En tant qu\u2019employ\u00e9 de la fonction publique, vous \u00eates\nle premier rempart de ce processus face aux menaces. C\u2019est&nbsp;pourquoi vous\ndevez adopter, au quotidien, un comportement <strong>cybervigilant. <\/strong><\/p>\n\n\n\n<p>Les menaces de s\u00e9curit\u00e9 sont de plus en plus\ncomplexes. Bien souvent, elles \u00e9manent d\u2019endroits insoup\u00e7onn\u00e9s.&nbsp;Usurpation\nd\u2019identit\u00e9, courriel frauduleux, sinistre, vol d\u2019\u00e9quipement et vol de donn\u00e9es\nne repr\u00e9sentent que quelques-unes des <strong>menaces<\/strong> qui portent atteinte \u00e0\nl\u2019int\u00e9grit\u00e9 ou \u00e0 la s\u00e9curit\u00e9 de l\u2019information.<\/p>\n\n\n\n<p>Une mauvaise installation du mat\u00e9riel, l\u2019utilisation\nd\u2019un poste de travail non s\u00e9curis\u00e9 et la pr\u00e9sence de r\u00e9glages incorrects parmi\nles param\u00e8tres de s\u00e9curit\u00e9, qu\u2019elles soient volontaires ou accidentelles,\npeuvent conduire \u00e0 des <strong>vuln\u00e9rabilit\u00e9s.<\/strong><\/p>\n\n\n\n<p>La vigilance de tous est la cl\u00e9 pour pr\u00e9venir les\nmenaces et incidents qui perturbent les op\u00e9rations quotidiennes et compromettent\nla s\u00e9curit\u00e9 des actifs informatiques du gouvernement.<\/p>\n\n\n\n<p>Dans le doute, n\u2019h\u00e9sitez surtout pas \u00e0 alerter les\nintervenants en s\u00e9curit\u00e9 de votre organisation.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"277\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/8-1024x277.png\" alt=\"\" class=\"wp-image-2616\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/8-1024x277.png 1024w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/8-300x81.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/8-768x208.png 768w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/8.png 1295w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019omnipr\u00e9sence du num\u00e9rique est telle que la technologie rend nos vies plus faciles. Cons\u00e9quemment, nos habitudes changent. Cette r\u00e9alit\u00e9 comporte de nouveaux enjeux de s\u00e9curit\u00e9 et de protection de l\u2019information, qui doivent nous pousser \u00e0 \u00eatre cybervigilants. Avec l\u2019acc\u00e9l\u00e9ration de la transformation num\u00e9rique gouvernementale, il est PRIMORDIAL d\u2019assurer une protection ad\u00e9quate des ressources informationnelles et [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":2615,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4,10],"tags":[],"class_list":["post-2614","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-campagne-de-sensibilisation"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=2614"}],"version-history":[{"count":2,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2614\/revisions"}],"predecessor-version":[{"id":2618,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2614\/revisions\/2618"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/2615"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=2614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=2614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=2614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}