{"id":7442,"date":"2023-12-24T21:35:19","date_gmt":"2023-12-24T21:35:19","guid":{"rendered":"https:\/\/www.outlying.works\/vitrine\/?p=7442&#038;preview=true&#038;preview_id=7442"},"modified":"2024-03-29T23:30:35","modified_gmt":"2024-03-29T23:30:35","slug":"l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace","status":"publish","type":"post","link":"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/","title":{"rendered":"L&#8217; odyss\u00e9e de la cybers\u00e9curit\u00e9 : retour sur une histoire qui a chang\u00e9 le cyberespace."},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7442\" class=\"elementor elementor-7442\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-76afbd7d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"76afbd7d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-500da994\" data-id=\"500da994\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5fd6a70b elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"5fd6a70b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Au cr\u00e9puscule des ann\u00e9es 50, le professeur J.C.R. Licklider jetait les bases d&#8217;un concept r\u00e9volutionnaire : le cyberespace. Imaginant un r\u00e9seau de &#8220;centres de pens\u00e9e&#8221; interconnect\u00e9s par des ordinateurs, Licklider aspirait \u00e0 diffuser le savoir \u00e0 travers une toile de communication. En 1962, son r\u00eave de r\u00e9seau &#8220;galactique&#8221; se mat\u00e9rialise gr\u00e2ce \u00e0 Lawrence G. Roberts, qui, en 1965, r\u00e9ussit la premi\u00e8re connexion \u00e0 distance entre deux ordinateurs, inaugurant ainsi l&#8217;\u00e8re de la t\u00e9l\u00e9communication.<\/p><p>Cependant, l&#8217;idylle initiale du cyberespace se heurte \u00e0 la r\u00e9alit\u00e9 des risques num\u00e9riques. D\u00e8s les ann\u00e9es 70, le projet Arpanet, con\u00e7u pour faciliter les \u00e9changes militaires et acad\u00e9miques, se voit confront\u00e9 aux premiers d\u00e9fis de s\u00e9curit\u00e9. En 1971, le programme CREEPER, con\u00e7u par Bob Thomas, \u00e9merge comme le premier virus informatique, explorant les limites du r\u00e9seau sans intentions malveillantes. En r\u00e9ponse, Ray Tomlinson introduit REAPER, marquant les pr\u00e9mices de la cybers\u00e9curit\u00e9.<\/p><p>Cependant, la d\u00e9cennie suivante r\u00e9v\u00e8le des failles plus s\u00e9rieuses. En 1979, Kevin Mitnick, un \u00e9tudiant de 16 ans, utilise l&#8217;ing\u00e9nierie sociale pour pirater le syst\u00e8me DEC, soulignant les risques li\u00e9s \u00e0 l&#8217;humain dans le cyberespace. La cr\u00e9ation de la norme de chiffrement DES en 1977 est une tentative technique de s\u00e9curiser le r\u00e9seau, mais les menaces persistent.<\/p><p>L&#8217;av\u00e8nement d&#8217;Internet dans les ann\u00e9es 80 intensifie les enjeux de s\u00e9curit\u00e9, poussant les administrations \u00e0 se connecter au r\u00e9seau. Les attaques deviennent monnaie courante, conduisant \u00e0 la popularisation de la s\u00e9curit\u00e9 informatique. Des entreprises telles que McAfee \u00e9mergent, commercialisant des antivirus pour r\u00e9pondre \u00e0 la demande croissante.<\/p><p>L&#8217;approche du cyberespace \u00e9volue de la libert\u00e9 per\u00e7ue \u00e0 la n\u00e9cessit\u00e9 s\u00e9curitaire. Cependant, les ann\u00e9es 2000 r\u00e9v\u00e8lent une nouvelle dimension des risques, li\u00e9e aux contextes g\u00e9opolitiques. Le num\u00e9rique devient un instrument de d\u00e9stabilisation politique, illustr\u00e9 par l&#8217;attaque en Estonie en 2007, orchestr\u00e9e par la Russie en r\u00e9ponse \u00e0 un \u00e9v\u00e9nement symbolique.<\/p><p>Ainsi, le cyberespace, autrefois per\u00e7u comme un lieu sans danger, se trouve vuln\u00e9rable aux tensions politiques mondiales. Cette r\u00e9alit\u00e9 nous confronte \u00e0 la n\u00e9cessit\u00e9 d&#8217;une cybers\u00e9curit\u00e9 renforc\u00e9e. Apr\u00e8s avoir retrac\u00e9 l&#8217;histoire et les \u00e9volutions du cyberespace, il est imp\u00e9ratif d&#8217;examiner de pr\u00e8s l&#8217;impact de la cybercriminalit\u00e9 sur notre quotidien.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Au cr\u00e9puscule des ann\u00e9es 50, le professeur J.C.R. Licklider jetait les bases d&#8217;un concept r\u00e9volutionnaire : le cyberespace. Imaginant un r\u00e9seau de &#8220;centres de pens\u00e9e&#8221; interconnect\u00e9s par des ordinateurs, Licklider aspirait \u00e0 diffuser le savoir \u00e0 travers une toile de communication. En 1962, son r\u00eave de r\u00e9seau &#8220;galactique&#8221; se mat\u00e9rialise gr\u00e2ce \u00e0 Lawrence G. Roberts, qui, en 1965, r\u00e9ussit la premi\u00e8re connexion \u00e0 distance entre deux ordinateurs, inaugurant ainsi l&#8217;\u00e8re de la t\u00e9l\u00e9communication. Cependant, l&#8217;idylle initiale du cyberespace se heurte \u00e0 la r\u00e9alit\u00e9 des risques num\u00e9riques. D\u00e8s les ann\u00e9es 70, le projet Arpanet, con\u00e7u pour faciliter les \u00e9changes militaires et<\/p>\n","protected":false},"author":1,"featured_media":9373,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pagelayer_contact_templates":[],"_pagelayer_content":"","two_page_speed":[],"footnotes":""},"categories":[7],"tags":[122,119,117,118,123,120,121],"class_list":["post-7442","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cat_technologie","tag-bob-thomas","tag-creeper","tag-cybersecurite","tag-licklider","tag-mcafee","tag-ray-tomlinson","tag-reaper"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>L&#039; odyss\u00e9e de la cybers\u00e9curit\u00e9 : retour sur une histoire qui a chang\u00e9 le cyberespace. - Vitrine outlYing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"L&#039; odyss\u00e9e de la cybers\u00e9curit\u00e9 : retour sur une histoire qui a chang\u00e9 le cyberespace. - Vitrine outlYing\" \/>\n<meta property=\"og:description\" content=\"Au cr\u00e9puscule des ann\u00e9es 50, le professeur J.C.R. Licklider jetait les bases d&#8217;un concept r\u00e9volutionnaire : le cyberespace. Imaginant un r\u00e9seau de &#8220;centres de pens\u00e9e&#8221; interconnect\u00e9s par des ordinateurs, Licklider aspirait \u00e0 diffuser le savoir \u00e0 travers une toile de communication. En 1962, son r\u00eave de r\u00e9seau &#8220;galactique&#8221; se mat\u00e9rialise gr\u00e2ce \u00e0 Lawrence G. Roberts, qui, en 1965, r\u00e9ussit la premi\u00e8re connexion \u00e0 distance entre deux ordinateurs, inaugurant ainsi l&#8217;\u00e8re de la t\u00e9l\u00e9communication. Cependant, l&#8217;idylle initiale du cyberespace se heurte \u00e0 la r\u00e9alit\u00e9 des risques num\u00e9riques. D\u00e8s les ann\u00e9es 70, le projet Arpanet, con\u00e7u pour faciliter les \u00e9changes militaires et\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/\" \/>\n<meta property=\"og:site_name\" content=\"Vitrine outlYing\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-24T21:35:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-29T23:30:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2023\/12\/L-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace.png\" \/>\n\t<meta property=\"og:image:width\" content=\"8858\" \/>\n\t<meta property=\"og:image:height\" content=\"6201\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"outlying\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"outlying\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/\"},\"author\":{\"name\":\"outlying\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8\"},\"headline\":\"L&#8217; odyss\u00e9e de la cybers\u00e9curit\u00e9 : retour sur une histoire qui a chang\u00e9 le cyberespace.\",\"datePublished\":\"2023-12-24T21:35:19+00:00\",\"dateModified\":\"2024-03-29T23:30:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/\"},\"wordCount\":420,\"publisher\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2023\/12\/L-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace.png\",\"keywords\":[\"bob thomas\",\"CREEPER\",\"cybers\u00e9curit\u00e9\",\"Licklider\",\"McAfee\",\"Ray Tomlinson\",\"REAPER\"],\"articleSection\":[\"Technologies de l'information\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/\",\"name\":\"L' odyss\u00e9e de la cybers\u00e9curit\u00e9 : retour sur une histoire qui a chang\u00e9 le cyberespace. - Vitrine outlYing\",\"isPartOf\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2023\/12\/L-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace.png\",\"datePublished\":\"2023-12-24T21:35:19+00:00\",\"dateModified\":\"2024-03-29T23:30:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/#primaryimage\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2023\/12\/L-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace.png\",\"contentUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2023\/12\/L-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace.png\",\"width\":8858,\"height\":6201},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.outlying.works\/vitrine\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L&#8217; odyss\u00e9e de la cybers\u00e9curit\u00e9 : retour sur une histoire qui a chang\u00e9 le cyberespace.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#website\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/\",\"name\":\"Vitrine outlYing\",\"description\":\"Site vitrine de outlYing SUARL\",\"publisher\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.outlying.works\/vitrine\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\",\"name\":\"Vitrine outlYing\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Vitrine outlYing\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8\",\"name\":\"outlying\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g\",\"caption\":\"outlying\"},\"sameAs\":[\"https:\/\/www.outlying.works\/vitrine\"],\"url\":\"https:\/\/www.outlying.works\/vitrine\/author\/outlying\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"L' odyss\u00e9e de la cybers\u00e9curit\u00e9 : retour sur une histoire qui a chang\u00e9 le cyberespace. - Vitrine outlYing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/","og_locale":"fr_FR","og_type":"article","og_title":"L' odyss\u00e9e de la cybers\u00e9curit\u00e9 : retour sur une histoire qui a chang\u00e9 le cyberespace. - Vitrine outlYing","og_description":"Au cr\u00e9puscule des ann\u00e9es 50, le professeur J.C.R. Licklider jetait les bases d&#8217;un concept r\u00e9volutionnaire : le cyberespace. Imaginant un r\u00e9seau de &#8220;centres de pens\u00e9e&#8221; interconnect\u00e9s par des ordinateurs, Licklider aspirait \u00e0 diffuser le savoir \u00e0 travers une toile de communication. En 1962, son r\u00eave de r\u00e9seau &#8220;galactique&#8221; se mat\u00e9rialise gr\u00e2ce \u00e0 Lawrence G. Roberts, qui, en 1965, r\u00e9ussit la premi\u00e8re connexion \u00e0 distance entre deux ordinateurs, inaugurant ainsi l&#8217;\u00e8re de la t\u00e9l\u00e9communication. Cependant, l&#8217;idylle initiale du cyberespace se heurte \u00e0 la r\u00e9alit\u00e9 des risques num\u00e9riques. D\u00e8s les ann\u00e9es 70, le projet Arpanet, con\u00e7u pour faciliter les \u00e9changes militaires et","og_url":"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/","og_site_name":"Vitrine outlYing","article_published_time":"2023-12-24T21:35:19+00:00","article_modified_time":"2024-03-29T23:30:35+00:00","og_image":[{"width":8858,"height":6201,"url":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2023\/12\/L-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace.png","type":"image\/png"}],"author":"outlying","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"outlying","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/#article","isPartOf":{"@id":"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/"},"author":{"name":"outlying","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8"},"headline":"L&#8217; odyss\u00e9e de la cybers\u00e9curit\u00e9 : retour sur une histoire qui a chang\u00e9 le cyberespace.","datePublished":"2023-12-24T21:35:19+00:00","dateModified":"2024-03-29T23:30:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/"},"wordCount":420,"publisher":{"@id":"https:\/\/www.outlying.works\/vitrine\/#organization"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/#primaryimage"},"thumbnailUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2023\/12\/L-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace.png","keywords":["bob thomas","CREEPER","cybers\u00e9curit\u00e9","Licklider","McAfee","Ray Tomlinson","REAPER"],"articleSection":["Technologies de l'information"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/","url":"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/","name":"L' odyss\u00e9e de la cybers\u00e9curit\u00e9 : retour sur une histoire qui a chang\u00e9 le cyberespace. - Vitrine outlYing","isPartOf":{"@id":"https:\/\/www.outlying.works\/vitrine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/#primaryimage"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/#primaryimage"},"thumbnailUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2023\/12\/L-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace.png","datePublished":"2023-12-24T21:35:19+00:00","dateModified":"2024-03-29T23:30:35+00:00","breadcrumb":{"@id":"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/#primaryimage","url":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2023\/12\/L-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace.png","contentUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2023\/12\/L-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace.png","width":8858,"height":6201},{"@type":"BreadcrumbList","@id":"https:\/\/www.outlying.works\/vitrine\/2023\/12\/24\/l-odyssee-de-la-cybersecurite-retour-sur-une-histoire-qui-a-change-le-cyberespace\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.outlying.works\/vitrine\/"},{"@type":"ListItem","position":2,"name":"L&#8217; odyss\u00e9e de la cybers\u00e9curit\u00e9 : retour sur une histoire qui a chang\u00e9 le cyberespace."}]},{"@type":"WebSite","@id":"https:\/\/www.outlying.works\/vitrine\/#website","url":"https:\/\/www.outlying.works\/vitrine\/","name":"Vitrine outlYing","description":"Site vitrine de outlYing SUARL","publisher":{"@id":"https:\/\/www.outlying.works\/vitrine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.outlying.works\/vitrine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.outlying.works\/vitrine\/#organization","name":"Vitrine outlYing","url":"https:\/\/www.outlying.works\/vitrine\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Vitrine outlYing"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8","name":"outlying","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g","caption":"outlying"},"sameAs":["https:\/\/www.outlying.works\/vitrine"],"url":"https:\/\/www.outlying.works\/vitrine\/author\/outlying\/"}]}},"_links":{"self":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/7442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/comments?post=7442"}],"version-history":[{"count":6,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/7442\/revisions"}],"predecessor-version":[{"id":7449,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/7442\/revisions\/7449"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/media\/9373"}],"wp:attachment":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/media?parent=7442"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/categories?post=7442"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/tags?post=7442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}