﻿{"id":2649,"date":"2022-10-19T00:00:36","date_gmt":"2022-10-19T05:00:36","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?p=2649"},"modified":"2022-10-06T08:49:55","modified_gmt":"2022-10-06T13:49:55","slug":"le-savez-vous-le-piratage-psychologique-pourquoi-chaque-employe-est-un-vecteur-dattaque-pour-les-cybercriminels","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/le-savez-vous-le-piratage-psychologique-pourquoi-chaque-employe-est-un-vecteur-dattaque-pour-les-cybercriminels\/","title":{"rendered":"Le savez-vous? \u2013 Le piratage psychologique : pourquoi chaque employ\u00e9 est un vecteur d\u2019attaque pour les cybercriminels?"},"content":{"rendered":"\n<p>Les cybercriminels exploitent\nr\u00e9guli\u00e8rement des failles dans les syst\u00e8mes informatiques. Ils se servent\n\u00e9galement de certaines d\u00e9viations du raisonnement humain appel\u00e9es biais\ncognitifs, maillon faible de la cha\u00eene de s\u00e9curit\u00e9, pour arriver \u00e0 leurs\nfins.&nbsp;<\/p>\n\n\n\n<p>Le but des acteurs malveillants est de nous manipuler pour que\nnous prenions des d\u00e9cisions irraisonnables. Voici quelques strat\u00e9gies\nfr\u00e9quemment utilis\u00e9es&nbsp;:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"277\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/1-2-1024x277.png\" alt=\"\" class=\"wp-image-2650\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/1-2-1024x277.png 1024w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/1-2-300x81.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/1-2-768x208.png 768w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/1-2.png 1295w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"277\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/2-2-1024x277.png\" alt=\"\" class=\"wp-image-2651\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/2-2-1024x277.png 1024w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/2-2-300x81.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/2-2-768x208.png 768w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/2-2.png 1295w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"277\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/3-2-1024x277.png\" alt=\"\" class=\"wp-image-2652\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/3-2-1024x277.png 1024w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/3-2-300x81.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/3-2-768x208.png 768w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/3-2.png 1295w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Le\nbut des pirates est d\u2019endormir notre vigilance afin d\u2019arriver \u00e0 leurs fins. <\/p>\n\n\n\n<p>Parmi\nles buts du piratage psychologique, on retrouve l\u2019extorsion de donn\u00e9es, soit \u00e0\ntravers l\u2019utilisation de donn\u00e9es vol\u00e9es ou alors en mettant en vente ces informations.<\/p>\n\n\n\n<p>Le\nvol d\u2019informations confidentielles permet de commettre des fraudes, d\u2019alimenter\nd\u2019autres campagnes d\u2019hame\u00e7onnage ou encore d\u2019user de chantage contre\nl\u2019organisation.<\/p>\n\n\n\n<p>Un\npiratage psychologique r\u00e9ussi permet de d\u00e9jouer la plupart des m\u00e9canismes de\ns\u00e9curit\u00e9 \u00e0 un faible co\u00fbt. Sa&nbsp;grande popularit\u00e9 n\u2019est donc pas\nsurprenante! <\/p>\n\n\n\n<p>Demeurez\nvigilants face \u00e0 ces types de piratage.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"277\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/8-4-1024x277.png\" alt=\"\" class=\"wp-image-2653\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/8-4-1024x277.png 1024w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/8-4-300x81.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/8-4-768x208.png 768w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/8-4.png 1295w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Les cybercriminels exploitent r\u00e9guli\u00e8rement des failles dans les syst\u00e8mes informatiques. Ils se servent \u00e9galement de certaines d\u00e9viations du raisonnement humain appel\u00e9es biais cognitifs, maillon faible de la cha\u00eene de s\u00e9curit\u00e9, pour arriver \u00e0 leurs fins.&nbsp; Le but des acteurs malveillants est de nous manipuler pour que nous prenions des d\u00e9cisions irraisonnables. Voici quelques strat\u00e9gies fr\u00e9quemment [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":2641,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4,10],"tags":[],"class_list":["post-2649","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-campagne-de-sensibilisation"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2649","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=2649"}],"version-history":[{"count":2,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2649\/revisions"}],"predecessor-version":[{"id":2655,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2649\/revisions\/2655"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/2641"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=2649"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=2649"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=2649"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}