{"id":7041,"date":"2015-02-04T08:37:17","date_gmt":"2015-02-04T07:37:17","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=7041"},"modified":"2019-12-31T10:42:07","modified_gmt":"2019-12-31T09:42:07","slug":"voiture-connectee-quels-enjeux-de-securite-de-linformation","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/","title":{"rendered":"Voiture connect\u00e9e : quels enjeux de s\u00e9curit\u00e9 de l\u2019information ?"},"content":{"rendered":"<p>Le secteur du transport n\u2019\u00e9chappe pas \u00e0 la transformation num\u00e9rique, et notamment les voitures qui deviennent de plus en plus communicantes. Les projets sont nombreux, pour n\u2019en citer que quelques-uns : la cr\u00e9ation d\u2019un syst\u00e8me europ\u00e9en d\u2019appel d\u2019urgence automatique \u00ab E-call \u00bb, les places de stationnement intelligentes ou encore le d\u00e9ploiement de sites pilotes de voitures connect\u00e9es en France (projet Scoop@f) et sur le corridor Rotterdam-Vienne.<\/p>\n<h2>Les initiatives posent la question de la s\u00e9curit\u00e9 de l\u2019information<\/h2>\n<p>Un syst\u00e8me de transports intelligents, quel qu\u2019il soit, permet de diffuser et partager de l\u2019information, de la traiter de mani\u00e8re autonome et intelligente. Les objectifs de telles \u00e9volutions\u00a0? Ils sont multiples\u00a0: optimiser la gestion de trafic, am\u00e9liorer la s\u00e9curit\u00e9 routi\u00e8re, aider \u00e0 d\u00e9velopper la multi-modalit\u00e9, etc.<\/p>\n<p>De tels usages n\u00e9cessitent l\u2019\u00e9change de nombreuses informations, entre les v\u00e9hicules, ou entre les v\u00e9hicules et les infrastructures routi\u00e8res\u00a0: vitesse, positionnement GPS, changement de trajectoire, alertes sur le trafic\u2026 Protection des donn\u00e9es \u00e0 caract\u00e8re personnel, pr\u00e9servation de l\u2019int\u00e9grit\u00e9 des informations, disponibilit\u00e9 des dispositifs qui concourent \u00e0 la s\u00e9curit\u00e9 routi\u00e8re\u00a0: les enjeux de s\u00e9curit\u00e9 de ces informations ressortent clairement comme essentiels pour que la voiture connect\u00e9e de demain donne confiance aux usagers.<\/p>\n<p>Ces transformations font aujourd\u2019hui l\u2019objet de r\u00e9flexions de standardisation et de normalisation men\u00e9es par divers groupes de travail (l\u2019ISO, la Commission europ\u00e9enne de normalisation,\u00a0 et l\u2019ETSI &#8211; European Telecommunications Standards Institute). Ces organismes m\u00e8nent des r\u00e9flexions qui portent par exemple sur les formats de messages \u00e0 utiliser, les canaux de communications envisageables (Wi-Fi v\u00e9hiculaire, r\u00e9seaux cellulaires ou r\u00e9seau satellite) ou la s\u00e9curisation des protocoles de communication.<\/p>\n<p>En compl\u00e9ment, de nombreux consortiums europ\u00e9ens (<a href=\"http:\/\/www.drive-c2x.eu\/project\" target=\"_blank\" rel=\"noopener noreferrer\">Drive C2X<\/a>, <a href=\"https:\/\/www.car-2-car.org\/index.php?id=5\" target=\"_blank\" rel=\"noopener noreferrer\">CAR2CAR<\/a>, <a href=\"http:\/\/www.fotsis.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">FOTsis<\/a>) m\u00e8nent des r\u00e9flexions sur le d\u00e9ploiement de syst\u00e8mes routiers collaboratifs. Certains d\u2019entre eux peuvent int\u00e9grer le sujet de la s\u00e9curit\u00e9 de l\u2019information.<\/p>\n<p>Si ces r\u00e9flexions portent sur un p\u00e9rim\u00e8tre plus ou moins large, mener un projet li\u00e9 aux voitures connect\u00e9es implique de revenir sur les usages et d\u2019identifier les risques puis les mesures de s\u00e9curit\u00e9 \u00e0 mettre en place sur l\u2019ensemble des briques du dispositif\u00a0: la voiture, les bornes, les syst\u00e8mes d\u2019informations du gestionnaire, etc.<\/p>\n<h2>Focus sur le v\u00e9hicule\u00a0: la prise de contr\u00f4le par un hacker est-elle r\u00e9ellement possible\u00a0?<\/h2>\n<p>Les attaques informatiques sur des syst\u00e8mes embarqu\u00e9s de v\u00e9hicules ne sont pas une nouveaut\u00e9 en soi. Des d\u00e9monstrations d\u2019attaques ont \u00e9t\u00e9 r\u00e9alis\u00e9es par manipulation physique des bo\u00eetiers. Mais aujourd\u2019hui il est indispensable d\u2019int\u00e9grer la dimension communicante du v\u00e9hicule, et donc la capacit\u00e9 \u00e0 prendre le contr\u00f4le \u00e0 distance. En effet, les voitures ont historiquement \u00e9t\u00e9 con\u00e7ues pour fonctionner en syst\u00e8me ferm\u00e9, sans ou avec tr\u00e8s peu d\u2019interactions avec le monde ext\u00e9rieur. La multiplication des connexions des v\u00e9hicules avec le monde ext\u00e9rieur constitue de nouvelles surfaces d\u2019attaque.<\/p>\n<p>Le \u00ab\u00a0car hacking\u00a0\u00bb\u00a0est donc possible, et pour la s\u00e9curit\u00e9 de l\u2019information dans les v\u00e9hicules de demain, les constructeurs int\u00e8grent la cybers\u00e9curit\u00e9 dans les r\u00e9flexions sur l\u2019architecture technique du v\u00e9hicule\u00a0avec notamment la mise en \u0153uvre d\u2019un cloisonnement entre les r\u00e9seaux de fonctionnement li\u00e9s au syst\u00e8me de conduite (freinage par exemple) et les r\u00e9seaux li\u00e9s \u00ab\u00a0aux m\u00e9dias\u00a0\u00bb et \u00e0 la s\u00e9curisation du bo\u00eetier de communication.<\/p>\n<h2>Au-del\u00e0 des projets en cours, comment anticiper la \u00ab\u00a0smart security\u00a0\u00bb dans le transport routier\u00a0?<\/h2>\n<p>Si le sujet est innovant, la d\u00e9marche de s\u00e9curit\u00e9 est en somme \u00ab\u00a0classique\u00a0\u00bb\u00a0: int\u00e9grer la s\u00e9curit\u00e9 dans toutes les phases du projet\u00a0! Il s\u2019agit d\u2019un point essentiel pour mener la r\u00e9flexion sur l\u2019ensemble des briques. Dans un premier temps, analyser les usages et donc les besoins de s\u00e9curit\u00e9. Ensuite, comprendre les fonctions, l\u2019architecture de s\u00e9curit\u00e9 et donc les menaces et vuln\u00e9rabilit\u00e9s. Puis, en fonction des risques, les mesures de s\u00e9curit\u00e9 \u00e0 mettre en place puis \u00e0 maintenir doivent \u00eatre d\u00e9finies qu\u2019elles soient techniques ou organisationnelles.<\/p>\n<p>Une sp\u00e9cificit\u00e9 n\u00e9anmoins li\u00e9e au caract\u00e8re innovant\u00a0: mener une veille permanente sur le sujet. Quels nouveaux projets peuvent pr\u00e9senter des adh\u00e9rences\u00a0? Quels nouveaux standards\u00a0? Quels travaux des chercheurs sur les vuln\u00e9rabilit\u00e9s, sur les solutions\u00a0? Quels consortiums, groupes de travail portent une r\u00e9flexion sur une brique\u00a0? Le secteur est en pleine transformation, et son \u00e9volution doit donc \u00eatre suivie.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le secteur du transport n\u2019\u00e9chappe pas \u00e0 la transformation num\u00e9rique, et notamment les voitures qui deviennent de plus en plus communicantes. Les projets sont nombreux, pour n\u2019en citer que quelques-uns : la cr\u00e9ation d\u2019un syst\u00e8me europ\u00e9en d\u2019appel d\u2019urgence automatique \u00ab&#8230;<\/p>\n","protected":false},"author":18,"featured_media":5418,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3227,42],"tags":[1241,3300,3286],"coauthors":[796,2847],"class_list":["post-7041","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-manufacturing-industry-4-0","category-transport","tag-cyberattaque","tag-manuf-industry-4-0","tag-vehicule-connecte"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Voiture connect\u00e9e : quels enjeux de s\u00e9curit\u00e9 de l\u2019information ?<\/title>\n<meta name=\"description\" content=\"Les voitures deviennent de plus en plus connect\u00e9es. Pour gagner la confiance des usagers, la question de la s\u00e9curit\u00e9 de l&#039;information devra \u00eatre adress\u00e9e.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Voiture connect\u00e9e : quels enjeux de s\u00e9curit\u00e9 de l\u2019information ?\" \/>\n<meta property=\"og:description\" content=\"Les voitures deviennent de plus en plus connect\u00e9es. Pour gagner la confiance des usagers, la question de la s\u00e9curit\u00e9 de l&#039;information devra \u00eatre adress\u00e9e.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-04T07:37:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T09:42:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/05\/Voiture-connect\u00e9e-resiz\u00e9e-573-217.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"3873\" \/>\n\t<meta property=\"og:image:height\" content=\"3873\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Amal Boutayeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amal Boutayeb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/\"},\"author\":{\"name\":\"Amal Boutayeb\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/1c0cc88b368516b40d1429589130f940\"},\"headline\":\"Voiture connect\u00e9e : quels enjeux de s\u00e9curit\u00e9 de l\u2019information ?\",\"datePublished\":\"2015-02-04T07:37:17+00:00\",\"dateModified\":\"2019-12-31T09:42:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/\"},\"wordCount\":799,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/05\/Voiture-connect\u00e9e-resiz\u00e9e-573-217.jpg\",\"keywords\":[\"Cyberattaque\",\"manuf &amp; industry 4.0\",\"v\u00e9hicule connect\u00e9\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Manufacturing &amp; Industry 4.0\",\"M\u00e9tiers - Transport\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/\",\"name\":\"Voiture connect\u00e9e : quels enjeux de s\u00e9curit\u00e9 de l\u2019information ?\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/05\/Voiture-connect\u00e9e-resiz\u00e9e-573-217.jpg\",\"datePublished\":\"2015-02-04T07:37:17+00:00\",\"dateModified\":\"2019-12-31T09:42:07+00:00\",\"description\":\"Les voitures deviennent de plus en plus connect\u00e9es. Pour gagner la confiance des usagers, la question de la s\u00e9curit\u00e9 de l'information devra \u00eatre adress\u00e9e.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/05\/Voiture-connect\u00e9e-resiz\u00e9e-573-217.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/05\/Voiture-connect\u00e9e-resiz\u00e9e-573-217.jpg\",\"width\":3873,\"height\":3873},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Voiture connect\u00e9e : quels enjeux de s\u00e9curit\u00e9 de l\u2019information ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/1c0cc88b368516b40d1429589130f940\",\"name\":\"Amal Boutayeb\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/amal-boutayeb\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Voiture connect\u00e9e : quels enjeux de s\u00e9curit\u00e9 de l\u2019information ?","description":"Les voitures deviennent de plus en plus connect\u00e9es. Pour gagner la confiance des usagers, la question de la s\u00e9curit\u00e9 de l'information devra \u00eatre adress\u00e9e.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/","og_locale":"en_US","og_type":"article","og_title":"Voiture connect\u00e9e : quels enjeux de s\u00e9curit\u00e9 de l\u2019information ?","og_description":"Les voitures deviennent de plus en plus connect\u00e9es. Pour gagner la confiance des usagers, la question de la s\u00e9curit\u00e9 de l'information devra \u00eatre adress\u00e9e.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/","og_site_name":"RiskInsight","article_published_time":"2015-02-04T07:37:17+00:00","article_modified_time":"2019-12-31T09:42:07+00:00","og_image":[{"width":3873,"height":3873,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/05\/Voiture-connect\u00e9e-resiz\u00e9e-573-217.jpg","type":"image\/jpeg"}],"author":"Amal Boutayeb","twitter_misc":{"Written by":"Amal Boutayeb","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/"},"author":{"name":"Amal Boutayeb","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/1c0cc88b368516b40d1429589130f940"},"headline":"Voiture connect\u00e9e : quels enjeux de s\u00e9curit\u00e9 de l\u2019information ?","datePublished":"2015-02-04T07:37:17+00:00","dateModified":"2019-12-31T09:42:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/"},"wordCount":799,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/05\/Voiture-connect\u00e9e-resiz\u00e9e-573-217.jpg","keywords":["Cyberattaque","manuf &amp; industry 4.0","v\u00e9hicule connect\u00e9"],"articleSection":["Cybersecurity &amp; Digital Trust","Manufacturing &amp; Industry 4.0","M\u00e9tiers - Transport"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/","url":"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/","name":"Voiture connect\u00e9e : quels enjeux de s\u00e9curit\u00e9 de l\u2019information ?","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/05\/Voiture-connect\u00e9e-resiz\u00e9e-573-217.jpg","datePublished":"2015-02-04T07:37:17+00:00","dateModified":"2019-12-31T09:42:07+00:00","description":"Les voitures deviennent de plus en plus connect\u00e9es. Pour gagner la confiance des usagers, la question de la s\u00e9curit\u00e9 de l'information devra \u00eatre adress\u00e9e.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/05\/Voiture-connect\u00e9e-resiz\u00e9e-573-217.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/05\/Voiture-connect\u00e9e-resiz\u00e9e-573-217.jpg","width":3873,"height":3873},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/02\/voiture-connectee-quels-enjeux-de-securite-de-linformation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Voiture connect\u00e9e : quels enjeux de s\u00e9curit\u00e9 de l\u2019information ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/1c0cc88b368516b40d1429589130f940","name":"Amal Boutayeb","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/amal-boutayeb\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/7041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=7041"}],"version-history":[{"count":8,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/7041\/revisions"}],"predecessor-version":[{"id":9919,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/7041\/revisions\/9919"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/5418"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=7041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=7041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=7041"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=7041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}