{"id":5822,"date":"2014-10-08T12:28:13","date_gmt":"2014-10-08T11:28:13","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=5822"},"modified":"2019-12-31T11:10:25","modified_gmt":"2019-12-31T10:10:25","slug":"securite-des-services-bancaires-en-ligne-ou-en-sommes-nous","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/","title":{"rendered":"S\u00e9curit\u00e9 des services bancaires en ligne : o\u00f9 en sommes-nous ?"},"content":{"rendered":"<p><em>R\u00e9aliser un virement, commander un ch\u00e9quier ou consulter son relev\u00e9 de banques sont aujourd\u2019hui autant d\u2019op\u00e9rations sensibles r\u00e9alis\u00e9es facilement via son ordinateur ou son smartphone. Ces services, pl\u00e9biscit\u00e9s par les utilisateurs, sont autant d\u2019opportunit\u00e9s de fraude pour les pirates informatiques.<\/em><\/p>\n<p><em>La s\u00e9curisation de ces plateformes repr\u00e9sente ainsi un triple enjeu pour les banques. Tout d\u2019abord un enjeu financier direct, li\u00e9 au pr\u00e9judice que pourraient subir les clients et leur \u00e9ventuel d\u00e9dommagement. Enjeu d\u2019image ensuite, \u00a0les banques devant rassurer sur leur capacit\u00e9 \u00e0 prot\u00e9ger leurs clients. Enfin, un enjeu de conformit\u00e9 aux directives \u00e9mises par les organismes r\u00e9gulateurs tels que la Banque de France et la Banque Centrale Europ\u00e9enne.<\/em><\/p>\n<p><em><strong>Que font concr\u00e8tement les \u00e9tablissements pour s\u00e9curiser leur banque en ligne\u00a0? Est-ce suffisant\u00a0?<\/strong><\/em><\/p>\n<p><!--more--><\/p>\n<div>\n<h2>La s\u00e9curit\u00e9, int\u00e9gr\u00e9e <em>by design<\/em> aux services bancaires en ligne\u00a0?<\/h2>\n<h4>S\u00e9curiser l\u2019acc\u00e8s au service, premier imp\u00e9ratif<\/h4>\n<p>La grande majorit\u00e9 des banques fran\u00e7aises requiert la saisie d\u2019un mot de passe compos\u00e9 de quatre \u00e0 six chiffres, via un clavier virtuel\u00a0:<\/p>\n<address class=\"mceTemp mceIEcenter\">\n<dl id=\"attachment_5823\" class=\"wp-caption aligncenter\" style=\"width: 355px;\">\n<dt class=\"wp-caption-dt\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5823\" src=\"http:\/\/www.solucominsight.fr\/wp-content\/uploads\/2014\/10\/capure-1.jpg\" alt=\"Exemples de claviers virtuels pr\u00e9sent\u00e9s pour l\u2019acc\u00e8s au site\" width=\"345\" height=\"181\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/capure-1.jpg 345w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/capure-1-71x37.jpg 71w\" sizes=\"auto, (max-width: 345px) 100vw, 345px\" \/><\/dt>\n<dd class=\"wp-caption-dd\"><strong>Exemples de claviers virtuels pr\u00e9sent\u00e9s pour l\u2019acc\u00e8s au site<\/strong><\/dd>\n<\/dl>\n<\/address>\n<p>&nbsp;<\/p>\n<p>Un nombre plus limit\u00e9 de banques ne propose pas de clavier virtuel mais un champ \u00ab\u00a0classique\u00a0\u00bb de saisie de mot de passe.<\/p>\n<p>Chacune des deux solutions pr\u00e9sente ses propres forces.<\/p>\n<p>Le champ \u00ab\u00a0classique\u00a0\u00bb pr\u00e9sente l\u2019avantage de pouvoir imposer une politique de mot de passe plus complexe (majuscules, minuscules, chiffres, etc.) qu\u2019une simple succession de chiffres, rendant ainsi le mot de passe plus difficile \u00e0 deviner. Autre argument en faveur du champ \u00ab\u00a0classique\u00a0\u00bb, une personne situ\u00e9e \u00e0 proximit\u00e9 du client a plus de difficult\u00e9s \u00e0 identifier les caract\u00e8res saisis sur un clavier physique que ceux cliqu\u00e9s sur un \u00e9cran, plus visible.<\/p>\n<p>Le clavier virtuel, quant \u00e0 lui, est prot\u00e9g\u00e9 des logiciels malveillants (malwares) les plus basiques de type keylogger. Lorsqu\u2019il est correctement impl\u00e9ment\u00e9, il permet \u00e9galement de complexifier la saisie automatis\u00e9e du mot de passe et ainsi limiter les usurpations d\u2019identit\u00e9s \u00ab\u00a0opportunistes\u00a0\u00bb.<\/p>\n<p>Quelques rares banques fran\u00e7aises ont d\u00e9cid\u00e9 de mettre en place une authentification non-rejouable pour contr\u00f4ler l\u2019acc\u00e8s \u00e0 leurs services. Ainsi, en compl\u00e9ment de l\u2019identifiant et du mot de passe, il est n\u00e9cessaire de saisir un code \u00e0 usage unique (OTP &#8211; one time password) fourni par la banque via SMS, mat\u00e9riel d\u00e9di\u00e9 ou encore application smartphone.<\/p>\n<p>Les autres banques ont d\u00e9cid\u00e9 de n\u2019utiliser ces m\u00e9canismes d\u2019authentification non-rejouable que pour la r\u00e9alisation d\u2019op\u00e9rations sensibles.<\/p>\n<div>\n<h4>Des op\u00e9rations \u00ab\u00a0sensibles\u00a0\u00bb sous surveillance<\/h4>\n<p>La Banque de France a \u00e9mis en 2009 des recommandations en mati\u00e8re de protection des op\u00e9rations en ligne, avec un accent fort sur les op\u00e9rations sensibles\u00a0:<\/p>\n<div>\n<p><a href=\"https:\/\/www.banque-france.fr\/fileadmin\/user_upload\/banque_de_france\/Stabilite_financiere\/rapport-surveillance-des-moyens-de-paiement-et-des-systemes-d-echange-2009.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><i>\u00ab\u00a0Sont consid\u00e9r\u00e9es en premier lieu comme op\u00e9rations sensibles toutes les op\u00e9rations permettant d\u2019effectuer directement ou indirectement un transfert de fonds sortant, entra\u00eenant l\u2019appauvrissement du compte client.\u00a0\u00bb<\/i><\/a><\/p>\n<p>Pour la Banque de France, la mise en \u0153uvre d\u2019une authentification non-rejouable (ANR) est indispensable pour prot\u00e9ger l\u2019ex\u00e9cution d\u2019op\u00e9rations sensibles, notamment les op\u00e9rations de virement, mais aussi la commande de moyens de paiement, la mise \u00e0 jour des donn\u00e9es du client et l\u2019\u00e9mission de ch\u00e8ques d\u00e9mat\u00e9rialis\u00e9s.<\/p>\n<p>Dans les faits, seul l\u2019ajout de b\u00e9n\u00e9ficiaire est consid\u00e9r\u00e9 comme une op\u00e9ration sensible par l\u2019ensemble des banques fran\u00e7aises.<\/p>\n<p>A l\u2019heure actuelle, la solution la plus r\u00e9pandue pour la validation des op\u00e9rations sensibles par les particuliers est l\u2019OTP SMS. Ainsi, \u00e0 chaque demande d\u2019op\u00e9ration sensible, le client re\u00e7oit un SMS contenant un code unique qu\u2019il saisit sur la banque en ligne pour valider l\u2019op\u00e9ration.<\/p>\n<p>D\u2019autres solutions sont utilis\u00e9es, mais de mani\u00e8re minoritaire, comme la carte TAN (grille papier contenant un nombre fini de codes \u00e0 usage unique) ou le lecteur CAP-EMV (lecteur de carte bancaire muni d\u2019un \u00e9cran et d\u2019un clavier).<\/p>\n<address class=\"mceTemp mceIEcenter\">\n<dl id=\"attachment_5848\" class=\"wp-caption aligncenter\" style=\"width: 534px;\">\n<dt class=\"wp-caption-dt\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5848\" src=\"http:\/\/www.solucominsight.fr\/wp-content\/uploads\/2014\/10\/autres-solutions-de-validation.png\" alt=\"Autres solutions de validation (EMV, out of band, token, TAN)\" width=\"524\" height=\"186\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/autres-solutions-de-validation.png 524w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/autres-solutions-de-validation-437x155.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/autres-solutions-de-validation-71x25.png 71w\" sizes=\"auto, (max-width: 524px) 100vw, 524px\" \/><\/dt>\n<dd class=\"wp-caption-dd\"><strong>Autres solutions de validation (EMV, out of band, token, TAN)<\/strong><\/dd>\n<\/dl>\n<\/address>\n<div>\n<p>&nbsp;<\/p>\n<p>Plus r\u00e9cemment de nombreux projets de validation \u00ab\u00a0Out of Band\u00a0\u00bb ont \u00e9t\u00e9 initi\u00e9s. Cette solution vise \u00e0 dissocier les canaux d\u2019initialisation et de validation des op\u00e9rations, par exemple via l\u2019utilisation d\u2019une application mobile compl\u00e9mentaire au site Internet.<\/p>\n<p>Il est \u00e0 noter que pour les entreprises, la solution adopt\u00e9e par la grande majorit\u00e9 des acteurs est le certificat (logiciel ou mat\u00e9riel), qui offre \u00e9galement des fonctionnalit\u00e9s de signature et garantit ainsi la non-r\u00e9pudiation des op\u00e9rations.<\/p>\n<div>\n<h2>Des cybercriminels qui s\u2019adaptent<\/h2>\n<\/div>\n<p>Le mouvement de s\u00e9curisation des services bancaires a vu les cybercriminels s\u2019adapter. Plusieurs moyens simples permettent aux attaquants de voler les identifiants et mots de passe\u00a0: messages de phishing menant les victimes sur de fausses mires d\u2019authentification aux couleurs de la banque, d\u00e9ploiement de keyloggers \/ formgrabbersd, interceptions des flux de communication, etc.<\/p>\n<p>Toutefois, depuis que la r\u00e9alisation d\u2019op\u00e9ration sensible est prot\u00e9g\u00e9e par une ANR, la connaissance des identifiants et mots de passe n\u2019est plus suffisante pour appauvrir le compte des clients. Il en est de m\u00eame pour les malwares les plus basiques, qui sont incapables de contourner ces m\u00e9canismes.<\/p>\n<p>Aussi, ces derni\u00e8res ann\u00e9es ont vu se d\u00e9velopper des malwares de type Man-In-The-Browser (MITB) d\u00e9di\u00e9s aux banques en ligne. Lors des navigations Web, ils modifient les pages affich\u00e9es \u00e0 leur victime et \u2013 en parall\u00e8le \u2013 initient des requ\u00eates en leur nom. Les malwares MITB sont particuli\u00e8rement adapt\u00e9s au contournement des authentifications par mot de passe unique.<\/p>\n<address class=\"mceTemp mceIEcenter\">\n<dl id=\"attachment_5849\" class=\"wp-caption aligncenter\" style=\"width: 682px;\">\n<dt class=\"wp-caption-dt\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-5849 \" src=\"http:\/\/www.solucominsight.fr\/wp-content\/uploads\/2014\/10\/MiTB.png\" alt=\"Man-In-The-Browser\" width=\"672\" height=\"181\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/MiTB.png 960w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/MiTB-437x117.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/MiTB-71x19.png 71w\" sizes=\"auto, (max-width: 672px) 100vw, 672px\" \/><\/dt>\n<dd class=\"wp-caption-dd\"><strong>Sch\u00e9ma de fonctionnement d&#8217;un malware de type <em>Man-in-the-browser<\/em><\/strong><\/dd>\n<\/dl>\n<\/address>\n<div>\n<p>&nbsp;<\/p>\n<p>Plus r\u00e9cemment, la tendance est au d\u00e9ploiement de malwares sur smartphone, notamment afin de d\u00e9tourner les OTP SMS \u00e9mis par la banque.<\/p>\n<p>Au-del\u00e0 des impacts financiers pour le client, les attaques par malwares entachent \u00e9galement la r\u00e9putation des banques attaqu\u00e9es, d\u00e8s lors jug\u00e9es incapables de garantir la s\u00e9curit\u00e9 de leurs clients.<\/p>\n<p><a title=\"S\u00e9curit\u00e9 des services bancaires en ligne : combiner d\u00e9tection et r\u00e9action !\" href=\"http:\/\/www.solucominsight.fr\/2014\/10\/securite-des-services-bancaires-en-ligne-comment-se-proteger\/\">Pour autant, de quels autres moyens disposent les plateformes de banque en ligne pour \u00e9lever leur niveau de s\u00e9curit\u00e9\u00a0?<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>R\u00e9aliser un virement, commander un ch\u00e9quier ou consulter son relev\u00e9 de banques sont aujourd\u2019hui autant d\u2019op\u00e9rations sensibles r\u00e9alis\u00e9es facilement via son ordinateur ou son smartphone. Ces services, pl\u00e9biscit\u00e9s par les utilisateurs, sont autant d\u2019opportunit\u00e9s de fraude pour les pirates informatiques&#8230;.<\/p>\n","protected":false},"author":292,"featured_media":6080,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3229,36,1729],"tags":[533,3307],"coauthors":[1688],"class_list":["post-5822","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-for-financial-services","category-cybersecurity-digital-trust","category-banque","tag-banque","tag-financial-services-cyber"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e9curit\u00e9 des services bancaires en ligne : o\u00f9 en sommes-nous ? - RiskInsight<\/title>\n<meta name=\"description\" content=\"R\u00e9aliser un virement, commander un ch\u00e9quier ou consulter son relev\u00e9 de banques sont aujourd\u2019hui autant d\u2019op\u00e9rations sensibles r\u00e9alis\u00e9es facilement via son ordinateur ou son smartphone. Ces services, pl\u00e9biscit\u00e9s par les utilisateurs, sont autant d\u2019opportunit\u00e9s de fraude pour les pirates informatiques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 des services bancaires en ligne : o\u00f9 en sommes-nous ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"R\u00e9aliser un virement, commander un ch\u00e9quier ou consulter son relev\u00e9 de banques sont aujourd\u2019hui autant d\u2019op\u00e9rations sensibles r\u00e9alis\u00e9es facilement via son ordinateur ou son smartphone. Ces services, pl\u00e9biscit\u00e9s par les utilisateurs, sont autant d\u2019opportunit\u00e9s de fraude pour les pirates informatiques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2014-10-08T11:28:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T10:10:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1399\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"3tienneC@pgras\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"3tienneC@pgras\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/\"},\"author\":{\"name\":\"3tienneC@pgras\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8e30defbba7df387b82d5658d500bf70\"},\"headline\":\"S\u00e9curit\u00e9 des services bancaires en ligne : o\u00f9 en sommes-nous ?\",\"datePublished\":\"2014-10-08T11:28:13+00:00\",\"dateModified\":\"2019-12-31T10:10:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/\"},\"wordCount\":1063,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg\",\"keywords\":[\"Banque\",\"financial services cyber\"],\"articleSection\":[\"Cyber for Financial Services\",\"Cybersecurity &amp; Digital Trust\",\"M\u00e9tiers - Banque\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/\",\"name\":\"S\u00e9curit\u00e9 des services bancaires en ligne : o\u00f9 en sommes-nous ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg\",\"datePublished\":\"2014-10-08T11:28:13+00:00\",\"dateModified\":\"2019-12-31T10:10:25+00:00\",\"description\":\"R\u00e9aliser un virement, commander un ch\u00e9quier ou consulter son relev\u00e9 de banques sont aujourd\u2019hui autant d\u2019op\u00e9rations sensibles r\u00e9alis\u00e9es facilement via son ordinateur ou son smartphone. Ces services, pl\u00e9biscit\u00e9s par les utilisateurs, sont autant d\u2019opportunit\u00e9s de fraude pour les pirates informatiques.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg\",\"width\":1500,\"height\":1399},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 des services bancaires en ligne : o\u00f9 en sommes-nous ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8e30defbba7df387b82d5658d500bf70\",\"name\":\"3tienneC@pgras\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/3tiennecpgras\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 des services bancaires en ligne : o\u00f9 en sommes-nous ? - RiskInsight","description":"R\u00e9aliser un virement, commander un ch\u00e9quier ou consulter son relev\u00e9 de banques sont aujourd\u2019hui autant d\u2019op\u00e9rations sensibles r\u00e9alis\u00e9es facilement via son ordinateur ou son smartphone. Ces services, pl\u00e9biscit\u00e9s par les utilisateurs, sont autant d\u2019opportunit\u00e9s de fraude pour les pirates informatiques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/","og_locale":"en_US","og_type":"article","og_title":"S\u00e9curit\u00e9 des services bancaires en ligne : o\u00f9 en sommes-nous ? - RiskInsight","og_description":"R\u00e9aliser un virement, commander un ch\u00e9quier ou consulter son relev\u00e9 de banques sont aujourd\u2019hui autant d\u2019op\u00e9rations sensibles r\u00e9alis\u00e9es facilement via son ordinateur ou son smartphone. Ces services, pl\u00e9biscit\u00e9s par les utilisateurs, sont autant d\u2019opportunit\u00e9s de fraude pour les pirates informatiques.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/","og_site_name":"RiskInsight","article_published_time":"2014-10-08T11:28:13+00:00","article_modified_time":"2019-12-31T10:10:25+00:00","og_image":[{"width":1500,"height":1399,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg","type":"image\/jpeg"}],"author":"3tienneC@pgras","twitter_misc":{"Written by":"3tienneC@pgras","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/"},"author":{"name":"3tienneC@pgras","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8e30defbba7df387b82d5658d500bf70"},"headline":"S\u00e9curit\u00e9 des services bancaires en ligne : o\u00f9 en sommes-nous ?","datePublished":"2014-10-08T11:28:13+00:00","dateModified":"2019-12-31T10:10:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/"},"wordCount":1063,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg","keywords":["Banque","financial services cyber"],"articleSection":["Cyber for Financial Services","Cybersecurity &amp; Digital Trust","M\u00e9tiers - Banque"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/","url":"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/","name":"S\u00e9curit\u00e9 des services bancaires en ligne : o\u00f9 en sommes-nous ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg","datePublished":"2014-10-08T11:28:13+00:00","dateModified":"2019-12-31T10:10:25+00:00","description":"R\u00e9aliser un virement, commander un ch\u00e9quier ou consulter son relev\u00e9 de banques sont aujourd\u2019hui autant d\u2019op\u00e9rations sensibles r\u00e9alis\u00e9es facilement via son ordinateur ou son smartphone. Ces services, pl\u00e9biscit\u00e9s par les utilisateurs, sont autant d\u2019opportunit\u00e9s de fraude pour les pirates informatiques.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg","width":1500,"height":1399},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/10\/securite-des-services-bancaires-en-ligne-ou-en-sommes-nous\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 des services bancaires en ligne : o\u00f9 en sommes-nous ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8e30defbba7df387b82d5658d500bf70","name":"3tienneC@pgras","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/3tiennecpgras\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/292"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=5822"}],"version-history":[{"count":17,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5822\/revisions"}],"predecessor-version":[{"id":12419,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5822\/revisions\/12419"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6080"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=5822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=5822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=5822"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=5822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}