{"version":"1.0","provider_name":"Sage Advice Maroc","provider_url":"https:\/\/www.sage.com\/fr-ma\/blog","author_name":"Sage Advice Maroc","author_url":"https:\/\/www.sage.com\/fr-ma\/blog","title":"Cybers\u00e9curit\u00e9 : D\u00e9finition de la cybers\u00e9curit\u00e9","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"2hkv4j0E6O\"><a href=\"https:\/\/www.sage.com\/fr-ma\/blog\/glossaire\/cybersecurite\/\">Cybers\u00e9curit\u00e9 : D\u00e9finition de la cybers\u00e9curit\u00e9<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.sage.com\/fr-ma\/blog\/glossaire\/cybersecurite\/embed\/#?secret=2hkv4j0E6O\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Cybers\u00e9curit\u00e9 : D\u00e9finition de la cybers\u00e9curit\u00e9\u00a0\u00bb &#8212; Sage Advice Maroc\" data-secret=\"2hkv4j0E6O\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.sage.com\/fr-ma\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"La cybers\u00e9curit\u00e9 englobe tous les moyens qui permettent d\u2019assurer la protection et l\u2019int\u00e9grit\u00e9 des donn\u00e9es, sensibles ou non, au sein d\u2019une infrastructure num\u00e9rique. C\u2019est une sp\u00e9cialit\u00e9 au sein des m\u00e9tiers des syst\u00e8mes d\u2019information. La notion de cybers\u00e9curit\u00e9 intervient de fa\u00e7on r\u00e9currente gr\u00e2ce \u00e0 la transformation num\u00e9rique des entreprises, qui g\u00e9n\u00e9ralisent l\u2019utilisation d\u2019outils informatiques et la [&hellip;]","thumbnail_url":"https:\/\/www.sage.com\/fr-ma\/blog\/wp-content\/uploads\/sites\/23\/2022\/04\/sage-logo.png","thumbnail_width":1200,"thumbnail_height":675}