{"version":"1.0","provider_name":"RiskInsight","provider_url":"https:\/\/www.riskinsight-wavestone.com\/en\/","title":"DDoS, quelle strat\u00e9gie de protection ?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"3PHhln5yvS\"><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/07\/ddos-quelle-strategie-de-protection\/\">DDoS, quelle strat\u00e9gie de protection ?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/07\/ddos-quelle-strategie-de-protection\/embed\/#?secret=3PHhln5yvS\" width=\"600\" height=\"338\" title=\"&#8220;DDoS, quelle strat\u00e9gie de protection ?&#8221; &#8212; RiskInsight\" data-secret=\"3PHhln5yvS\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.riskinsight-wavestone.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg","thumbnail_width":1500,"thumbnail_height":1125,"description":"Au vu de la multiplication et de la d\u00e9mocratisation des attaques par d\u00e9ni de service, la question de la \u00ab protection anti-DDoS \u00bb entre au c\u0153ur des d\u00e9cisions SSI pour les grandes entreprises. Il est aujourd\u2019hui n\u00e9cessaire d\u2019allier des mesures \u00e0 la fois techniques et organisationnelles permettant de r\u00e9pondre \u00e0 deux enjeux cruciaux : la d\u00e9tection (avant l\u2019attaque) et la r\u00e9action (apr\u00e8s l\u2019attaque)."}