{"id":31736,"date":"2017-12-08T08:00:32","date_gmt":"2017-12-08T07:00:32","guid":{"rendered":"http:\/\/e3mag.com\/?p=31736"},"modified":"2022-05-01T09:22:19","modified_gmt":"2022-05-01T07:22:19","slug":"risque-de-securite-pour-la-cle-usb","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/sicherheitsrisiko-usb-stick\/","title":{"rendered":"Le risque de s\u00e9curit\u00e9 des cl\u00e9s USB"},"content":{"rendered":"<p>Les supports de donn\u00e9es comme faille de s\u00e9curit\u00e9 sont un risque plus important qu'on ne le pense : selon une \u00e9tude r\u00e9alis\u00e9e pour le compte de l'association am\u00e9ricaine Computing Technology Industry Association (CompTIA), une personne sur cinq qui trouve un support de donn\u00e9es appartenant \u00e0 quelqu'un d'autre s'en empare et le relie sans h\u00e9siter \u00e0 son propre ordinateur.<\/p>\n<p>Selon une \u00e9tude de l'universit\u00e9 am\u00e9ricaine de l'Illinois, 69 % des personnes qui trouvent des fichiers ne prennent aucune mesure de s\u00e9curit\u00e9 avant d'ouvrir les supports de donn\u00e9es et les fichiers.<\/p>\n<p>Ils donnent ainsi libre acc\u00e8s \u00e0 leurs appareils aux virus et aux logiciels espions et mettent en danger - \u00e0 l'heure des pratiques professionnelles modernes comme le Bring Your Own Device (BYOD) - non seulement leur s\u00e9curit\u00e9 informatique priv\u00e9e, mais aussi celle de leur employeur.<\/p>\n<h3>R\u00e9duire les risques de s\u00e9curit\u00e9<\/h3>\n<p>La base d'une protection efficace est un concept de s\u00e9curit\u00e9 \u00e9tendu avec un catalogue de mesures bien pens\u00e9, qui inclut la sensibilisation et la formation des collaborateurs. Il faut surtout que les utilisateurs sachent exactement ce qu'il faut faire dans tel ou tel sc\u00e9nario et qui doit \u00eatre contact\u00e9.<\/p>\n<p>Quelles donn\u00e9es internes \u00e0 l'entreprise peuvent \u00eatre enregistr\u00e9es sur des supports de donn\u00e9es externes et dans quelle mesure ? Comment les collaborateurs doivent-ils se comporter lorsqu'ils trouvent des cl\u00e9s USB abandonn\u00e9es dans des lieux publics ?<a href=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/Holger-Huegel-Manag-1712.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"Le risque de s\u00e9curit\u00e9 des cl\u00e9s USB\" class=\"aligncenter wp-image-31738 size-full\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/Holger-Huegel-Manag-1712.jpg\" alt=\"Holger Huegel, donn\u00e9es, virus, protection des donn\u00e9es\" width=\"800\" height=\"605\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/Holger-Huegel-Manag-1712.jpg 800w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/Holger-Huegel-Manag-1712-768x581.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/Holger-Huegel-Manag-1712-100x76.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/Holger-Huegel-Manag-1712-480x363.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/Holger-Huegel-Manag-1712-640x484.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/Holger-Huegel-Manag-1712-720x545.jpg 720w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p>Une fois que ces questions ont \u00e9t\u00e9 transpos\u00e9es dans une politique d'entreprise, il ne reste plus qu'une question \u00e0 r\u00e9soudre : Quelles solutions logicielles peuvent \u00eatre utilis\u00e9es pour s\u00e9curiser les donn\u00e9es utilis\u00e9es en dehors de l'organisation ?<\/p>\n<p>La plupart des grandes et moyennes entreprises stockent des donn\u00e9es sensibles, telles que des donn\u00e9es financi\u00e8res confidentielles ou des donn\u00e9es personnelles, dans SAP. Elles sont donc, \u00e0 premi\u00e8re vue, en s\u00e9curit\u00e9.<\/p>\n<p>En y regardant de plus pr\u00e8s, on constate toutefois que les donn\u00e9es SAP peuvent \u00e9galement \u00eatre transf\u00e9r\u00e9es rapidement et discr\u00e8tement sur des supports de donn\u00e9es externes via des fonctions d'exportation.<\/p>\n<p>Avec Halocore, Secude propose une solution logicielle intelligente qui contr\u00f4le l'exportation des donn\u00e9es \u00e0 partir des syst\u00e8mes SAP. Sur la base d'une classification des donn\u00e9es \u00e0 l'\u00e9chelle de l'entreprise, il est possible de d\u00e9finir individuellement les droits d'exportation des donn\u00e9es \u00e0 partir de SAP, de limiter le t\u00e9l\u00e9chargement des donn\u00e9es particuli\u00e8rement sensibles et de proc\u00e9der \u00e0 un suivi clair de toutes les transactions de donn\u00e9es.<\/p>\n<p>Une \u00e9troite collaboration avec Microsoft permet en outre de garantir que les applications Office courantes reconnaissent \u00e9galement les classifications de s\u00e9curit\u00e9 des diff\u00e9rents fichiers et les appliquent automatiquement.<\/p>\n<p>Les donn\u00e9es export\u00e9es par les utilisateurs dans un fichier Excel et enregistr\u00e9es sur un support de donn\u00e9es externe ne peuvent donc pas \u00eatre ouvertes par des tiers avec les solutions de Secude.<\/p>\n<p>En combinaison avec les moyens embarqu\u00e9s de SAP et un logiciel antivirus professionnel, on obtient ainsi une protection efficace - aussi bien contre la perte accidentelle de donn\u00e9es due \u00e0 la perte d'une cl\u00e9 USB que contre les attaques de pirates via des logiciels malveillants.<\/p>\n<p><a href=\"https:\/\/e3mag.com\/partners\/secude-gmbh\/\"><img loading=\"lazy\" decoding=\"async\" title=\"Le risque de s\u00e9curit\u00e9 des cl\u00e9s USB\" class=\"aligncenter wp-image-11377 size-full\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE.jpg\" alt=\"https:\/\/e3mag.com\/partners\/secude-gmbh\/\" width=\"1000\" height=\"112\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE.jpg 1000w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE-768x86.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE-100x11.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE-480x54.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE-640x72.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE-720x81.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE-960x108.jpg 960w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Les gros titres actuels sur la d\u00e9couverte d'une cl\u00e9 USB contenant des donn\u00e9es non crypt\u00e9es sur les cam\u00e9ras de surveillance, les itin\u00e9raires de fuite et les patrouilles de police de l'a\u00e9roport d'Heathrow montrent clairement ce qui peut arriver lorsque des informations aussi sensibles tombent entre de mauvaises mains.  <\/p>","protected":false},"author":355,"featured_media":31737,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[4,19171],"tags":[17715,236,5977],"coauthors":[23277],"class_list":["post-31736","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-management","category-mag-1712","tag-halocore","tag-sap","tag-secude","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",1000,556,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",400,222,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-768x427.jpg",768,427,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",1000,556,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-100x56.jpg",100,56,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-480x267.jpg",480,267,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-640x356.jpg",640,356,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-720x400.jpg",720,400,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-960x534.jpg",960,534,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",1000,556,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",1000,556,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",1000,556,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",1000,556,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",1000,556,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",18,10,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",1000,556,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",1000,556,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",1000,556,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",600,334,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk.jpg",600,334,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/12\/shutterstock_603280343_cmyk-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Die aktuellen Schlagzeilen \u00fcber den Fund eines USB-Sticks mit unverschl\u00fcsselten Daten \u00fcber \u00dcberwachungskameras, Fluchtwege und Polizeipatrouillen des Heathrow Airport zeigen deutlich, was passieren kann, wenn derart sensible Informationen in die falschen H\u00e4nde geraten.  <\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/category\/management\/\" rel=\"category tag\">Business-Management<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/category\/mag-1712\/\" rel=\"category tag\">MAG 17-12<\/a>","author_info_v2":{"name":"Holger H\u00fcgel, Secude","url":"https:\/\/e3mag.com\/fr\/author\/holger-huegel\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/31736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/355"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=31736"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/31736\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/31737"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=31736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=31736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=31736"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=31736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}