{"id":8250,"date":"2015-09-14T16:01:16","date_gmt":"2015-09-14T15:01:16","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=8250"},"modified":"2019-12-31T10:32:54","modified_gmt":"2019-12-31T09:32:54","slug":"passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/","title":{"rendered":"Passage au protocole IP : quelles cons\u00e9quences pour la cybers\u00e9curit\u00e9 dans l\u2019espace a\u00e9rien ?"},"content":{"rendered":"<p class=\"Tableau\">Le 21 juin dernier, la compagnie LOT \u00e9tait <a href=\"http:\/\/www.lemonde.fr\/pixels\/article\/2015\/06\/22\/des-avions-cloues-au-sol-a-l-aeroport-de-varsovie-en-raison-d-une-attaque-informatique_4659146_4408996.html#mf_sid=1198790490\" target=\"_blank\" rel=\"noopener noreferrer\">victime d\u2019une attaque<\/a> sur son syst\u00e8me d\u2019op\u00e9rations au sol, clouant ainsi sur le tarmac une vingtaine d\u2019avions pendant plusieurs heures. Quelques mois auparavant, <a href=\"http:\/\/www.gao.gov\/products\/GAO-15-221\">un rapport du GAO<\/a>, l\u2019\u00e9quivalent am\u00e9ricain de la Cour des Comptes, publiait un rapport pointant du doigt les faiblesses du contr\u00f4le a\u00e9rien en mati\u00e8re de s\u00e9curit\u00e9. Cette exploitation de la vuln\u00e9rabilit\u00e9 des syst\u00e8mes alerte les prestataires de services de la navigation a\u00e9rienne, les compagnies a\u00e9riennes et les autorit\u00e9s publiques, alors m\u00eame que les standards d\u2019\u00e9change de donn\u00e9es sont en pleine mutation.<\/p>\n<p class=\"Tableau\">Quels sont les risques de ces \u00e9volutions dans l\u2019environnement a\u00e9rien\u00a0? Comment s\u2019en pr\u00e9munir\u00a0?<\/p>\n<h1>Pourquoi le passage au protocole IP<\/h1>\n<p>Le protocole IP va devenir le standard g\u00e9n\u00e9ral d\u2019\u00e9change de donn\u00e9es pour le contr\u00f4le a\u00e9rien, dans le but de mettre en place un syst\u00e8me de communication performant entre le sol et l\u2019avion, ainsi qu\u2019entre les avions eux-m\u00eames.<\/p>\n<p>Les avions, naviguant d\u00e9sormais tr\u00e8s pr\u00e9cis\u00e9ment, peuvent ainsi n\u00e9gocier des ajustements de trajectoire en permanence. \u00c0 terme, l\u2019usage du protocole IP et des moyens de navigation satellitaires permettront de fluidifier le trafic a\u00e9rien et d\u2019am\u00e9liorer la performance de l\u2019espace a\u00e9rien. Cette nouvelle g\u00e9n\u00e9ration de gestion du trafic a\u00e9rien est mise en place aux \u00c9tats-Unis (programme <em>NextGen<\/em>) comme en Europe (<a href=\"http:\/\/www.sesarju.eu\/newsroom\/all-news\/study-launched-address-cyber-security-sesar\">programme SESAR<\/a> &#8211; <em>Single European Sky Air Traffic Management Research<\/em>).<\/p>\n<p>De nombreux acteurs seront connect\u00e9s en m\u00eame temps par le biais du syst\u00e8me de gestion des donn\u00e9es au sol SWIM (<em>System Wide Information Management). <\/em>Ce syst\u00e8me permet de connecter de nombreux services comme la m\u00e9t\u00e9o, le contr\u00f4le a\u00e9rien, ainsi que diff\u00e9rentes informations transmises par les compagnies a\u00e9riennes et les a\u00e9roports.<\/p>\n<h1>\u00c0 quels risques doit faire face l\u2019environnement a\u00e9rien\u00a0?<\/h1>\n<p>L\u2019augmentation de la connectivit\u00e9 entre les diff\u00e9rents syst\u00e8mes d\u2019information multiplie donc les possibles points d\u2019entr\u00e9e pour une attaque informatique. Des vuln\u00e9rabilit\u00e9s nouvelles sont \u00e0 prendre en compte, notamment par l\u2019attaque des points les plus faibles comme les syst\u00e8mes d\u2019information des compagnies a\u00e9riennes qui sont, par nature, plus ouverts vers le monde ext\u00e9rieur.\u00a0M\u00eame si des syst\u00e8mes de protection peuvent \u00eatre mis en place pour prot\u00e9ger les diff\u00e9rents SI communicant entre eux, la d\u00e9couverte et l\u2019exploitation d\u2019une faille n\u2019est jamais qu\u2019une question de temps.<\/p>\n<p>Par ailleurs, les a\u00e9ronefs communiquent sur le r\u00e9seau hertzien, notamment avec des liaisons de donn\u00e9es non crypt\u00e9es (ADS-B &#8211; <em>Automatic Dependent Surveillance Broadcast<\/em>). Il est donc possible de capter des donn\u00e9es en mode lecture en se connectant \u00e0 la bonne fr\u00e9quence et, par exemple, de g\u00e9olocaliser des avions facilement. C\u2019est ce que font certains sites internet comme <a href=\"http:\/\/www.flightradar24.com\">flightradar24<\/a> qui pr\u00e9sente une carte des avions en temps r\u00e9el.<\/p>\n<p>Des attaques par d\u00e9ni de service ou dans l\u2019objectif de d\u00e9structurer le syst\u00e8me afin de provoquer une crise de confiance (forcer l\u2019envoi de fausses informations) sont donc plausibles. Elles pourraient rendre des centres de contr\u00f4les, et donc des espaces a\u00e9riens entiers, inop\u00e9rants pour des dur\u00e9es potentiellement longues comme dans le cas des avions de LOT.<\/p>\n<h1>Face aux diverses menaces, comment r\u00e9agir\u00a0?<\/h1>\n<p>Le rapport du GAO est un signal d\u2019alerte pour les probl\u00e9matiques similaires que peut rencontrer l\u2019Europe notamment avec le programme SESAR. Il est n\u00e9cessaire de r\u00e9estimer les programmes en cours \u00e0 l\u2019aune de la cybers\u00e9curit\u00e9. Une plus grande coordination \u00e0 l\u2019\u00e9chelle europ\u00e9enne permettrait de prendre conscience d\u2019un plus grand nombre de risques et de mettre en place des mesures de protection appropri\u00e9es.<\/p>\n<p>Le d\u00e9veloppement d\u2019un domaine r\u00e9glementaire fixant clairement les dispositifs de gouvernance et dont les r\u00f4les de chacun permettraient \u00e9galement de coordonner les efforts de chaque acteur afin d\u2019\u00e9viter les redondances ou les impasses sur certains sujets de s\u00e9curit\u00e9.<\/p>\n<p>Toutes ces th\u00e9matiques sont actuellement un sujet d\u2019int\u00e9r\u00eat pour nombre d\u2019autorit\u00e9s europ\u00e9ennes comme en t\u00e9moignent l\u2019\u00e9tude lanc\u00e9e par la SESAR <em>Joint Undertaking<\/em> en mai 2014 et la conf\u00e9rence\u00a0 organis\u00e9e par l\u2019EASA (<em>European Aviation Safety Agency<\/em>) sur la cybers\u00e9curit\u00e9 pour l\u2019a\u00e9rien en mai dernier. \u00c0 l\u2019\u00e9chelle de la France, des groupes de travail existent sur ces sujets au niveau de l\u2019ANSSI et de la DGAC.<\/p>\n<p>Les risques sont donc connus, les acteurs identifi\u00e9s, il faut maintenant aller vite et bien accompagner les acteurs qui con\u00e7oivent les syst\u00e8mes pour \u00e9viter l\u2019apparition de dispositifs vuln\u00e9rables qui ne pourraient pas, notamment, \u00eatre mis \u00e0 jour en cas d\u2019apparition de nouvelles menaces\u00a0!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le 21 juin dernier, la compagnie LOT \u00e9tait victime d\u2019une attaque sur son syst\u00e8me d\u2019op\u00e9rations au sol, clouant ainsi sur le tarmac une vingtaine d\u2019avions pendant plusieurs heures. Quelques mois auparavant, un rapport du GAO, l\u2019\u00e9quivalent am\u00e9ricain de la Cour&#8230;<\/p>\n","protected":false},"author":1027,"featured_media":8251,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3227,42],"tags":[1241,3300,327,310,226],"coauthors":[2440,2441],"class_list":["post-8250","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-manufacturing-industry-4-0","category-transport","tag-cyberattaque","tag-manuf-industry-4-0","tag-piratage","tag-risque","tag-transport-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protocole IP : les cons\u00e9quences pour la cybers\u00e9curit\u00e9 a\u00e9rienne<\/title>\n<meta name=\"description\" content=\"Le protocole IP va devenir le standard g\u00e9n\u00e9ral d\u2019\u00e9change de donn\u00e9es pour le contr\u00f4le a\u00e9rien.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protocole IP : les cons\u00e9quences pour la cybers\u00e9curit\u00e9 a\u00e9rienne\" \/>\n<meta property=\"og:description\" content=\"Le protocole IP va devenir le standard g\u00e9n\u00e9ral d\u2019\u00e9change de donn\u00e9es pour le contr\u00f4le a\u00e9rien.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2015-09-14T15:01:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T09:32:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/09\/Fotolia_88593412_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1378\" \/>\n\t<meta property=\"og:image:height\" content=\"1378\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"anne cecile klein, laurent dubau\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"anne cecile klein, laurent dubau\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/\"},\"author\":{\"name\":\"anne cecile klein\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b7f353ad9c2208bd357ef05b6a192cd9\"},\"headline\":\"Passage au protocole IP : quelles cons\u00e9quences pour la cybers\u00e9curit\u00e9 dans l\u2019espace a\u00e9rien ?\",\"datePublished\":\"2015-09-14T15:01:16+00:00\",\"dateModified\":\"2019-12-31T09:32:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/\"},\"wordCount\":843,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/09\/Fotolia_88593412_Subscription_Monthly_M.jpg\",\"keywords\":[\"Cyberattaque\",\"manuf &amp; industry 4.0\",\"piratage\",\"Risque\",\"transport\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Manufacturing &amp; Industry 4.0\",\"M\u00e9tiers - Transport\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/\",\"name\":\"Protocole IP : les cons\u00e9quences pour la cybers\u00e9curit\u00e9 a\u00e9rienne\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/09\/Fotolia_88593412_Subscription_Monthly_M.jpg\",\"datePublished\":\"2015-09-14T15:01:16+00:00\",\"dateModified\":\"2019-12-31T09:32:54+00:00\",\"description\":\"Le protocole IP va devenir le standard g\u00e9n\u00e9ral d\u2019\u00e9change de donn\u00e9es pour le contr\u00f4le a\u00e9rien.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/09\/Fotolia_88593412_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/09\/Fotolia_88593412_Subscription_Monthly_M.jpg\",\"width\":1378,\"height\":1378,\"caption\":\"Le protocole IP va devenir le standard g\u00e9n\u00e9ral d\u2019\u00e9change de donn\u00e9es pour le contr\u00f4le a\u00e9rien, dans le but de mettre en place un syst\u00e8me de communication performant entre le sol et l\u2019avion, ainsi qu\u2019entre les avions eux-m\u00eames.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Passage au protocole IP : quelles cons\u00e9quences pour la cybers\u00e9curit\u00e9 dans l\u2019espace a\u00e9rien ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b7f353ad9c2208bd357ef05b6a192cd9\",\"name\":\"anne cecile klein\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/anne-cecile-klein\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protocole IP : les cons\u00e9quences pour la cybers\u00e9curit\u00e9 a\u00e9rienne","description":"Le protocole IP va devenir le standard g\u00e9n\u00e9ral d\u2019\u00e9change de donn\u00e9es pour le contr\u00f4le a\u00e9rien.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/","og_locale":"en_US","og_type":"article","og_title":"Protocole IP : les cons\u00e9quences pour la cybers\u00e9curit\u00e9 a\u00e9rienne","og_description":"Le protocole IP va devenir le standard g\u00e9n\u00e9ral d\u2019\u00e9change de donn\u00e9es pour le contr\u00f4le a\u00e9rien.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/","og_site_name":"RiskInsight","article_published_time":"2015-09-14T15:01:16+00:00","article_modified_time":"2019-12-31T09:32:54+00:00","og_image":[{"width":1378,"height":1378,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/09\/Fotolia_88593412_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"anne cecile klein, laurent dubau","twitter_misc":{"Written by":"anne cecile klein, laurent dubau","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/"},"author":{"name":"anne cecile klein","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b7f353ad9c2208bd357ef05b6a192cd9"},"headline":"Passage au protocole IP : quelles cons\u00e9quences pour la cybers\u00e9curit\u00e9 dans l\u2019espace a\u00e9rien ?","datePublished":"2015-09-14T15:01:16+00:00","dateModified":"2019-12-31T09:32:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/"},"wordCount":843,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/09\/Fotolia_88593412_Subscription_Monthly_M.jpg","keywords":["Cyberattaque","manuf &amp; industry 4.0","piratage","Risque","transport"],"articleSection":["Cybersecurity &amp; Digital Trust","Manufacturing &amp; Industry 4.0","M\u00e9tiers - Transport"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/","url":"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/","name":"Protocole IP : les cons\u00e9quences pour la cybers\u00e9curit\u00e9 a\u00e9rienne","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/09\/Fotolia_88593412_Subscription_Monthly_M.jpg","datePublished":"2015-09-14T15:01:16+00:00","dateModified":"2019-12-31T09:32:54+00:00","description":"Le protocole IP va devenir le standard g\u00e9n\u00e9ral d\u2019\u00e9change de donn\u00e9es pour le contr\u00f4le a\u00e9rien.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/09\/Fotolia_88593412_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/09\/Fotolia_88593412_Subscription_Monthly_M.jpg","width":1378,"height":1378,"caption":"Le protocole IP va devenir le standard g\u00e9n\u00e9ral d\u2019\u00e9change de donn\u00e9es pour le contr\u00f4le a\u00e9rien, dans le but de mettre en place un syst\u00e8me de communication performant entre le sol et l\u2019avion, ainsi qu\u2019entre les avions eux-m\u00eames."},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/09\/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Passage au protocole IP : quelles cons\u00e9quences pour la cybers\u00e9curit\u00e9 dans l\u2019espace a\u00e9rien ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b7f353ad9c2208bd357ef05b6a192cd9","name":"anne cecile klein","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/anne-cecile-klein\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1027"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=8250"}],"version-history":[{"count":6,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8250\/revisions"}],"predecessor-version":[{"id":12403,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8250\/revisions\/12403"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/8251"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=8250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=8250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=8250"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=8250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}