{"id":98525,"date":"2018-06-28T08:15:33","date_gmt":"2018-06-28T07:15:33","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=98525"},"modified":"2024-06-20T14:12:13","modified_gmt":"2024-06-20T13:12:13","slug":"lepineuse-question-de-la-legitime-defense-numerique","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/lepineuse-question-de-la-legitime-defense-numerique\/","title":{"rendered":"L\u2019\u00e9pineuse question de la \u00ab&nbsp;l\u00e9gitime d\u00e9fense num\u00e9rique&nbsp;\u00bb"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-98526\" title=\"Image utilis\u00e9e sous licence de Shutterstock.com\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_506815861.jpg\" alt=\"\" width=\"800\" height=\"534\" \/><\/p>\n<p><strong>La cyber-s\u00e9curit\u00e9 fr\u00f4le parfois la ligne rouge. <em>Honeypot<\/em>, <em>hack back<\/em>, investigations dans le <em>darknet<\/em>\u2026 certaines voies de riposte aux attaques informatiques sont souvent tentantes, parfois utiles, mais aussi \u00e0 double tranchant. Tout l\u2019art est d\u2019en ma\u00eetriser l\u2019usage.<\/strong><\/p>\n<p>La cybercriminalit\u00e9 peut avoir des impacts au plus haut niveau des entreprises, avec des r\u00e9percussions \u00e9conomiques consid\u00e9rables. En 2014, pour la premi\u00e8re fois, une attaque informatique a eu raison d\u2019un patron. Gregg Steinhafel, PDG du groupe de distribution am\u00e9ricain Target, a ainsi d\u00e9missionn\u00e9 \u00e0 la suite du vol de 110 millions de num\u00e9ros de cartes de cr\u00e9dit de consommateurs. Le premier d\u2019une longue liste\u2026<\/p>\n<p>&nbsp;<\/p>\n<h2>La tentation de la riposte<\/h2>\n<p>Face \u00e0 ces attaques de plus en plus d\u00e9stabilisantes, la tentation est grande dans les entreprises de recourir \u00e0 la l\u00e9gitime d\u00e9fense, en utilisant les m\u00eames \u00ab armes \u00bb que les attaquants. On ne parle pas ici de <a href=\"https:\/\/usbeketrica.com\/article\/re-scam-le-chatbot-justicier-qui-vous-venge-des-arnaques-par-mail\" target=\"_blank\" rel=\"noopener noreferrer\"><em>chatbot<\/em> justicier<\/a>, mais bien de <em>hack back<\/em> ou cyber-riposte, une strat\u00e9gie consistant \u00e0 d\u00e9ployer des mesures de repr\u00e9sailles face \u00e0 des <a href=\"https:\/\/www.stormshield.com\/fr\/?s=%22attaques+informatiques%22\">attaques informatiques<\/a>.<\/p>\n<p>Aux \u00c9tats-Unis, un texte de loi octroyant aux soci\u00e9t\u00e9s priv\u00e9es un droit \u00e0 l'autod\u00e9fense cyber est en pr\u00e9paration depuis l'automne 2017. L\u2019id\u00e9e est de permettre aux entreprises d\u2019investir d\u2019autres r\u00e9seaux que les leurs pour identifier ou perturber les attaques. Autant dire que, si le texte est adopt\u00e9, les \u00c9tats-Unis vont radicalement changer la donne au niveau international.<\/p>\n<p>&nbsp;<\/p>\n<h2>Une solution \u00e0 hauts risques<\/h2>\n<p>L\u00e9galiser le hack back, c\u2019est ouvrir la bo\u00eete de Pandore, pr\u00e9viennent de nombreux experts. En permettant \u00e0 n'importe qui d'acc\u00e9der aux syst\u00e8mes informatiques des autres en toute impunit\u00e9, c\u2019est la l\u00e9gitimation d\u2019un <em>far west<\/em> num\u00e9rique. D\u2019autant que l\u2019origine d\u2019une attaque n\u2019est jamais tr\u00e8s claire comme le souligne <strong>Paul Fariello<\/strong>, membre de l\u2019\u00e9quipe de Security Intelligence chez Stormshield : \u00ab <em>c\u2019est une pratique \u00e0 haut risque puisqu\u2019on ne sait jamais vraiment quelle machine a \u00e9t\u00e9 r\u00e9ellement utilis\u00e9e pour lancer une attaque<\/em> \u00bb. Pour <strong>Pierre-Yves Hentzen<\/strong>, CEO de Stormshield, \u00ab <em>le probl\u00e8me de la l\u00e9gitime d\u00e9fense num\u00e9rique est que, contrairement au monde physique, elle n\u2019en respecte pas les r\u00e8gles. \u00c0 savoir, la simultan\u00e9it\u00e9 (sur le web, on ne peut pas riposter instantan\u00e9ment), la proportionnalit\u00e9 (on ne conna\u00eet pas l\u2019impact r\u00e9el de l\u2019attaque) et la riposte \u00e0 l\u2019attaquant (difficilement identifiable sur le web).<\/em> \u00bb<\/p>\n<blockquote><p>Le probl\u00e8me de la l\u00e9gitime d\u00e9fense num\u00e9rique est que, contrairement au monde physique, elle n\u2019en respecte pas les r\u00e8gles. \u00c0 savoir, la simultan\u00e9it\u00e9, la proportionnalit\u00e9 et la riposte \u00e0 l\u2019attaquant.<\/p>\n<pre><strong>Pierre-Yves Hentzen,<\/strong> Pr\u00e9sident de Stormshield<\/pre>\n<\/blockquote>\n<p>Le probl\u00e8me est bien l\u00e0 : avec les techniques de masquage ou de falsification, voire la cr\u00e9ation de faux indices num\u00e9riques, toute riposte agressive induit de s\u00e9rieux risques d\u2019erreurs de cibles. \u00ab <em>Se lancer dans une action de hack back, c\u2019est risquer de toucher une tierce partie innocente si, par exemple, le pirate a utilis\u00e9 un autre PC comme zone de rebond. On peut imaginer les cons\u00e9quences dramatiques si ce dernier est pass\u00e9 par l\u2019ordinateur d\u2019un <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/hopital-connecte-et-e-sante-la-data-une-arme-a-double-tranchant\/\">h\u00f4pital<\/a> par exemple<\/em> \u00bb, explique Paul Fariello. Et c\u2019est \u00e9galement ouvrir la voie \u00e0 des effets d\u2019aubaine : pourquoi ne pas riposter contre un concurrent en pr\u00e9textant une attaque ? De quoi tomber dans une spirale infernale de repr\u00e9sailles \u00e0 tour de r\u00f4le\u2026 Ou de l\u00e9gitimer <a href=\"https:\/\/www.01net.com\/actualites\/les-etats-unis-envisagent-des-cyberfrappes-preventives-contre-leurs-ennemis-1473299.html\">des cyberfrappes pr\u00e9ventives<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h2>De la d\u00e9fense passive \u00e0 la d\u00e9fense active<\/h2>\n<p>Les entreprises ne sont toutefois pas totalement d\u00e9munies face aux <a href=\"https:\/\/www.stormshield.com\/fr\/?s=cyberattaques\">cyberattaques<\/a>. Dans le registre d\u2019une d\u00e9fense passive, les <em>honeypots<\/em> (pot de miel ou pi\u00e8ge \u00e0 pirates) ont leur utilit\u00e9. Ces syst\u00e8mes informatiques publics volontairement vuln\u00e9rables visent \u00e0 attirer les pirates. \u00ab <em>Les honeypots permettent de se rendre compte des actes malveillants qui menacent une entreprise et des outils qui peuvent \u00eatre utilis\u00e9s<\/em> \u00bb, note Paul Fariello.<\/p>\n<p>Mais pour emp\u00eacher l\u2019utilisation d\u2019un <em>honeypot<\/em> comme point de d\u00e9part d\u2019attaques de hackers sur d\u2019autres syst\u00e8mes, il est indispensable de r\u00e9duire au minimum les connexions sortantes. Reste enfin la question de la l\u00e9galit\u00e9 de ce type d\u2019action. En effet, les entreprises y ayant recours ne sont pas \u00e0 l\u2019abri de risques connexes. \u00c0 commencer par le recours juridique de tierces personnes, si l\u2019attaquant a r\u00e9ussi \u00e0 \u00ab s\u2019\u00e9chapper \u00bb de l'<em>honeypot<\/em> et \u00e0 l\u2019utiliser comme rebond pour conduire de nouvelles attaques contre d\u2019autres syst\u00e8mes. Il existe \u00e9galement un risque assurantiel : la mise en place d\u2019un <em>honeypot<\/em>, si elle introduit des risques pour le syst\u00e8me d\u2019exploitation assur\u00e9, pourrait conduire \u00e0 exclure les garanties de la police d\u2019assurance en mati\u00e8re de risques informatiques.<\/p>\n<p>Dans un registre plus offensif, comment ne pas citer <a href=\"https:\/\/infiltratecon.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">la conf\u00e9rence INFILTRATE<\/a> ? Cette conf\u00e9rence ultra-technique aux \u00c9tats-Unis se concentre exclusivement sur des solutions offensives aux probl\u00e8mes de s\u00e9curit\u00e9, et \u00ab <em>\u00e9vite les questions politiques et les pr\u00e9sentations de haut niveau pour se concentrer sur de la viande technique hard-core qui fait r\u00e9fl\u00e9chir<\/em> \u00bb. Tout un programme\u2026<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"fr\">\n<p dir=\"ltr\" lang=\"en\">\"Attacking a co-hosted VM\" \ud83d\udc49\ud83c\udffb Discover in video the presentation by .<a href=\"https:\/\/twitter.com\/paulfariello?ref_src=twsrc%5Etfw\">@paulfariello<\/a> and <a href=\"https:\/\/twitter.com\/abu_y0ussef?ref_src=twsrc%5Etfw\">@abu_y0ussef<\/a>, <a href=\"https:\/\/twitter.com\/Stormshield_?ref_src=twsrc%5Etfw\">@Stormshield_<\/a> security engineer and researcher at <a href=\"https:\/\/twitter.com\/InfiltrateCon?ref_src=twsrc%5Etfw\">@InfiltrateCon<\/a>! <a href=\"https:\/\/t.co\/naAe7PkQ4o\">https:\/\/t.co\/naAe7PkQ4o<\/a> w.\/ <a href=\"https:\/\/twitter.com\/ThisIsSecurity_?ref_src=twsrc%5Etfw\">@ThisIsSecurity_<\/a><\/p>\n<p>\u2014 Stormshield (@Stormshield_) <a href=\"https:\/\/twitter.com\/Stormshield_\/status\/997480070771036161?ref_src=twsrc%5Etfw\">18 mai 2018<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>&nbsp;<\/p>\n<h2>Plong\u00e9e dans le <em>darknet<\/em><\/h2>\n<p>Pour les plus aguerris, existe \u00e9galement l\u2019aventure du <em>darknet<\/em>. \u00ab <em>Il fait partie de l\u2019environnement du web, ce serait une erreur pour une entreprise de ne pas l\u2019utiliser \u00e0 des fins de veille et de protection<\/em> \u00bb, assure <strong>Damien Bancal<\/strong>, journaliste sp\u00e9cialis\u00e9 dans la cybercriminalit\u00e9. Or le deep web, cette partie d\u2019internet qui n\u2019est pas r\u00e9pertori\u00e9e par les moteurs de recherche, et le dark web, compos\u00e9 de nombreux r\u00e9seaux priv\u00e9s garantissant l\u2019anonymat des donn\u00e9es de leurs utilisateurs, sont par d\u00e9finition le terrain de jeu de pr\u00e9dilection des cybercriminels. \u00ab <em>M\u00eame si cela n\u00e9cessite un certain niveau d\u2019expertise, cette partie d\u2019internet est tout \u00e0 fait accessible et utile. Elle permet de collecter des informations en mode veille afin de d\u00e9tecter des bad buzz potentiels, d\u2019identifier des casses de donn\u00e9es en pr\u00e9paration ou ayant \u00e9t\u00e9 r\u00e9alis\u00e9s<\/em> \u00bb, estime <strong>Matthieu Bonenfant<\/strong>, directeur Marketing de Stormshield. La surveillance du <em>darknet<\/em> permet en effet de rep\u00e9rer les menaces avant qu\u2019elles ne se concr\u00e9tisent. En mati\u00e8re de vols de donn\u00e9es, de divulgations d\u2019informations confidentielles voire de d\u00e9lits d\u2019initi\u00e9, mais aussi en termes d\u2019image et de r\u00e9putation.<\/p>\n<p>&nbsp;<\/p>\n<h2>Une d\u00e9marche et des outils adapt\u00e9s<\/h2>\n<p>Investir le <em>darknet<\/em> n\u00e9cessite cependant un minimum de pr\u00e9caution. \u00ab <em>Les limites sont claires : il est hors de question de passer la ligne rouge en entrant dans l\u2019ill\u00e9galit\u00e9. Seules quelques rares autorisations de l\u2019\u00c9tat peuvent exister pour son propre usage exclusif \u2013 dans le cadre notamment de <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/lpm-nis-quand-la-cyber-securite-offre-un-avantage-concurrentiel\/\">la loi de programmation militaire<\/a> (LPM) \u2013 afin de lui permettre de neutraliser un syst\u00e8me attaquant<\/em> \u00bb, pr\u00e9vient Pierre-Yves Hentzen.<\/p>\n<p>C\u00f4t\u00e9 outils, il existe toutes sortes de techniques telles que les hidden web crawlers, ces robots sp\u00e9cialis\u00e9s dans l\u2019analyse du contenu d\u2019importantes quantit\u00e9s de pages du web souterrain. \u00ab <em>Mais le meilleur outil pour scruter le darknet reste l\u2019humain<\/em> \u00bb, note le journaliste Damien Bancal, \u00ab <em>avec tous les log in, mots de passe et syst\u00e8mes d\u2019authentification mis en place sur cette partie du web, \u00e0 ce jour aucun logiciel ne peut remplacer l\u2019infiltration humaine. D\u2019autant que, <a href=\"https:\/\/www.youtube.com\/watch?v=nSdXFrwPc40&amp;t=2s\" target=\"_blank\" rel=\"noopener noreferrer\">sur le darknet<\/a>, on trouve g\u00e9n\u00e9ralement ce qu\u2019on ne cherche pas. C\u2019est un peu comme au march\u00e9 aux puces\u2026<\/em> \u00bb.<\/p>\n<p>&nbsp;<\/p>\n<h2>L\u2019horizon improbable d\u2019une \u00ab cyberpaix \u00bb<\/h2>\n<p>L\u2019\u00e9radication de la cybercriminalit\u00e9 serait-elle une chim\u00e8re ? Certains ne veulent pas s\u2019y r\u00e9soudre et se prennent \u00e0 r\u00eaver d\u2019une \u00ab cyberpaix \u00bb, d\u2019un droit international qui encadrerait le comportement des acteurs \u00e9tatiques et priv\u00e9s. La cl\u00e9 : une d\u00e9finition et identification claire des parties prenantes. Mais c\u2019est ici que r\u00e9side toute la difficult\u00e9.<\/p>\n<p>\u00ab <em>Un tel pacte de non-agression num\u00e9rique \u00e0 l\u2019\u00e9chelle internationale est \u00e9videmment souhaitable, mais il sera certainement difficilement applicable<\/em> \u00bb, remarque Pierre-Yves Hentzen. Dans le cyberespace, difficile d\u2019\u00eatre s\u00fbr que les membres dudit pacte n\u2019aient pas g\u00e9n\u00e9r\u00e9 d\u2019attaques envers leurs \u00ab alli\u00e9s \u00bb d\u2019aujourd\u2019hui. Ni qu\u2019ils le seront encore demain. La route semble encore longue vers une premi\u00e8re \u00ab\u00a0convention de Gen\u00e8ve num\u00e9rique\u00a0\u00bb \u2026<\/p>\n<p>&nbsp;<\/p>\n<p>En plus de la dimension politique, \u00ab <em>le d\u00e9veloppement du num\u00e9rique est plus fort que tout, comme en t\u00e9moigne l\u2019augmentation du nombre de comptes Facebook malgr\u00e9 le scandale Cambridge Analytica qui a concern\u00e9 des millions de donn\u00e9es personnelles<\/em> \u00bb. L\u2019heure est donc plus que jamais \u00e0 la vigilance et \u00e0 la n\u00e9cessit\u00e9 de prot\u00e9ger au mieux les personnes et les entreprises. Et si la meilleure attaque, c\u2019\u00e9tait la d\u00e9fense ?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La cyber-s\u00e9curit\u00e9 fr\u00f4le parfois la ligne rouge. Honeypot, hack back, investigations dans le darknet\u2026 certaines voies de riposte aux attaques informatiques sont souvent tentantes, parfois utiles, mais aussi \u00e0 double tranchant. Tout l\u2019art est d\u2019en ma\u00eetriser l\u2019usage. La cybercriminalit\u00e9 peut avoir des impacts au plus&#8230;<\/p>\n","protected":false},"author":31,"featured_media":98526,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1612],"tags":[4368],"business_size":[682,683],"industry":[695,691],"help_mefind":[],"features":[],"type_security":[],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[],"class_list":["post-98525","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-veille-securite","tag-la-cybersecurite-par-stormshield","business_size-eti","business_size-grande-entreprise","industry-administrations-publiques","industry-defense-et-organisations-militaires"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les mirages de la l\u00e9gitime d\u00e9fense num\u00e9rique | Stormshield<\/title>\n<meta name=\"description\" content=\"Honeypot, hack back, dark web\u2026 Certaines voies de riposte aux attaques informatiques sont souvent tentantes. Encore faut-il en ma\u00eetriser l\u2019usage !\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/lepineuse-question-de-la-legitime-defense-numerique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les mirages de la l\u00e9gitime d\u00e9fense num\u00e9rique | Stormshield\" \/>\n<meta property=\"og:description\" content=\"Honeypot, hack back, dark web\u2026 Certaines voies de riposte aux attaques informatiques sont souvent tentantes. Encore faut-il en ma\u00eetriser l\u2019usage !\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/lepineuse-question-de-la-legitime-defense-numerique\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-28T07:15:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-20T13:12:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_506815861.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"334\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Victor Poitevin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Victor Poitevin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/lepineuse-question-de-la-legitime-defense-numerique\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/lepineuse-question-de-la-legitime-defense-numerique\\\/\"},\"author\":{\"name\":\"Victor Poitevin\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\"},\"headline\":\"L\u2019\u00e9pineuse question de la \u00ab&nbsp;l\u00e9gitime d\u00e9fense num\u00e9rique&nbsp;\u00bb\",\"datePublished\":\"2018-06-28T07:15:33+00:00\",\"dateModified\":\"2024-06-20T13:12:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/lepineuse-question-de-la-legitime-defense-numerique\\\/\"},\"wordCount\":1528,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/lepineuse-question-de-la-legitime-defense-numerique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_506815861.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - par Stormshield\"],\"articleSection\":[\"Veille s\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/lepineuse-question-de-la-legitime-defense-numerique\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/lepineuse-question-de-la-legitime-defense-numerique\\\/\",\"name\":\"Les mirages de la l\u00e9gitime d\u00e9fense num\u00e9rique | Stormshield\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/lepineuse-question-de-la-legitime-defense-numerique\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/lepineuse-question-de-la-legitime-defense-numerique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_506815861.jpg\",\"datePublished\":\"2018-06-28T07:15:33+00:00\",\"dateModified\":\"2024-06-20T13:12:13+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\"},\"description\":\"Honeypot, hack back, dark web\u2026 Certaines voies de riposte aux attaques informatiques sont souvent tentantes. Encore faut-il en ma\u00eetriser l\u2019usage !\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/lepineuse-question-de-la-legitime-defense-numerique\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/lepineuse-question-de-la-legitime-defense-numerique\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/lepineuse-question-de-la-legitime-defense-numerique\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_506815861.jpg\",\"contentUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_506815861.jpg\",\"width\":500,\"height\":334},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/lepineuse-question-de-la-legitime-defense-numerique\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L\u2019\u00e9pineuse question de la \u00ab&nbsp;l\u00e9gitime d\u00e9fense num\u00e9rique&nbsp;\u00bb\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\",\"name\":\"Victor Poitevin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"caption\":\"Victor Poitevin\"},\"description\":\"Victor is Stormshield\u2019s Editorial &amp; Digital Manager. Attached to the Marketing Department, his role is to improve the Group\u2019s online visibility. This involves Stormshield\u2019s entire ecosystem, including websites, social networks and blogs. He will make use of his diverse experience, gained in several major French and international groups and communications agencies, to fulfill the Group\u2019s high digital aspirations.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les mirages de la l\u00e9gitime d\u00e9fense num\u00e9rique | Stormshield","description":"Honeypot, hack back, dark web\u2026 Certaines voies de riposte aux attaques informatiques sont souvent tentantes. Encore faut-il en ma\u00eetriser l\u2019usage !","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/lepineuse-question-de-la-legitime-defense-numerique\/","og_locale":"fr_FR","og_type":"article","og_title":"Les mirages de la l\u00e9gitime d\u00e9fense num\u00e9rique | Stormshield","og_description":"Honeypot, hack back, dark web\u2026 Certaines voies de riposte aux attaques informatiques sont souvent tentantes. Encore faut-il en ma\u00eetriser l\u2019usage !","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/lepineuse-question-de-la-legitime-defense-numerique\/","og_site_name":"Stormshield","article_published_time":"2018-06-28T07:15:33+00:00","article_modified_time":"2024-06-20T13:12:13+00:00","og_image":[{"width":500,"height":334,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_506815861.jpg","type":"image\/jpeg"}],"author":"Victor Poitevin","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Victor Poitevin","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/lepineuse-question-de-la-legitime-defense-numerique\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/lepineuse-question-de-la-legitime-defense-numerique\/"},"author":{"name":"Victor Poitevin","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2"},"headline":"L\u2019\u00e9pineuse question de la \u00ab&nbsp;l\u00e9gitime d\u00e9fense num\u00e9rique&nbsp;\u00bb","datePublished":"2018-06-28T07:15:33+00:00","dateModified":"2024-06-20T13:12:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/lepineuse-question-de-la-legitime-defense-numerique\/"},"wordCount":1528,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/lepineuse-question-de-la-legitime-defense-numerique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_506815861.jpg","keywords":["La cybers\u00e9curit\u00e9 - par Stormshield"],"articleSection":["Veille s\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/lepineuse-question-de-la-legitime-defense-numerique\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/lepineuse-question-de-la-legitime-defense-numerique\/","name":"Les mirages de la l\u00e9gitime d\u00e9fense num\u00e9rique | Stormshield","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/lepineuse-question-de-la-legitime-defense-numerique\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/lepineuse-question-de-la-legitime-defense-numerique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_506815861.jpg","datePublished":"2018-06-28T07:15:33+00:00","dateModified":"2024-06-20T13:12:13+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2"},"description":"Honeypot, hack back, dark web\u2026 Certaines voies de riposte aux attaques informatiques sont souvent tentantes. Encore faut-il en ma\u00eetriser l\u2019usage !","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/lepineuse-question-de-la-legitime-defense-numerique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/lepineuse-question-de-la-legitime-defense-numerique\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/lepineuse-question-de-la-legitime-defense-numerique\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_506815861.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_506815861.jpg","width":500,"height":334},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/lepineuse-question-de-la-legitime-defense-numerique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"L\u2019\u00e9pineuse question de la \u00ab&nbsp;l\u00e9gitime d\u00e9fense num\u00e9rique&nbsp;\u00bb"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2","name":"Victor Poitevin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","caption":"Victor Poitevin"},"description":"Victor is Stormshield\u2019s Editorial &amp; Digital Manager. Attached to the Marketing Department, his role is to improve the Group\u2019s online visibility. This involves Stormshield\u2019s entire ecosystem, including websites, social networks and blogs. He will make use of his diverse experience, gained in several major French and international groups and communications agencies, to fulfill the Group\u2019s high digital aspirations."}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/98525","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=98525"}],"version-history":[{"count":11,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/98525\/revisions"}],"predecessor-version":[{"id":548874,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/98525\/revisions\/548874"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/98526"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=98525"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=98525"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=98525"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=98525"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=98525"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=98525"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=98525"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=98525"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=98525"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=98525"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=98525"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=98525"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=98525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}