{"id":8300,"date":"2015-09-24T17:49:12","date_gmt":"2015-09-24T16:49:12","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=8300"},"modified":"2019-12-31T10:32:11","modified_gmt":"2019-12-31T09:32:11","slug":"la-fraude-en-ligne-comment-la-detecter-et-sen-premunir","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/","title":{"rendered":"La fraude en ligne : comment la d\u00e9tecter et s\u2019en pr\u00e9munir ?"},"content":{"rendered":"<p><em>L&#8217;authentification est au c\u0153ur de la s\u00e9curit\u00e9 du syst\u00e8me d&#8217;information de toute organisation. Authentifier clients, collaborateurs ou partenaires est essentiel pour s\u2019assurer que la bonne personne acc\u00e8de \u00e0 la bonne ressource. Ceci est d\u2019autant plus critique pour les banques en lignes et sites de e-commerce, une usurpation d\u2019identit\u00e9 dans ces contextes ayant un impact financier et d\u2019image imm\u00e9diat pour le client et\/ou le site en question. <\/em><\/p>\n<h2>Une \u00e9volution indispensable de l\u2019approche \u00ab\u00a0traditionnelle\u00a0\u00bb\u00a0 de l\u2019authentification<\/h2>\n<p>Si les solutions d\u2019authentification classiques (normale, forte ou renforc\u00e9e) constituent bien une premi\u00e8re couche de s\u00e9curit\u00e9 essentielle pour la protection des ressources, force est de constater qu\u2019elles affichent aujourd\u2019hui certaines limites\u00a0:<\/p>\n<ul>\n<li>L\u2019authentification \u00e9tant bien souvent le premier niveau de s\u00e9curit\u00e9 rencontr\u00e9 par un client (par exemple sur sa banque en ligne), il est aussi fort logiquement le premier \u00e0 \u00eatre attaqu\u00e9. On constate par exemple depuis quelques ann\u00e9es une course entre les banques en ligne pour renforcer leurs solutions d\u2019authentification propos\u00e9es \u00e0 leurs clients.<\/li>\n<li>Comme souvent, la course au renforcement de la s\u00e9curit\u00e9 au niveau de l\u2019authentification se fait au d\u00e9triment de l\u2019exp\u00e9rience utilisateur avec des solutions par toujours tr\u00e8s ergonomiques, lors de leur activation ou de leur utilisation. Certaines (token mat\u00e9riel, certificats) ne sont par ailleurs pas adapt\u00e9es aux nouveaux usages mobiles.<\/li>\n<\/ul>\n<p>Trouver un bon compromis entre niveau de s\u00e9curit\u00e9 et exp\u00e9rience utilisateur reste pour autant un point essentiel pour des acteurs tels que des banques en ligne ou les sites de e-commerce qui savent bien qu\u2019une authentification trop complexe risque de d\u00e9courager un client d\u2019utiliser ses services en ligne, voire de le faire abandonner un achat.<\/p>\n<p>Am\u00e9liorer la s\u00e9curit\u00e9 en ayant un impact limit\u00e9 sur l\u2019exp\u00e9rience des clients, apporter une strat\u00e9gie de s\u00e9curisation compl\u00e9mentaire \u00e0 l\u2019authentification, telles sont les promesses des solutions de d\u00e9tection de fraude dont le march\u00e9 est aujourd\u2019hui florissant. Les derniers rapports des analystes tels que Gartner ou Forrester montrent bien l\u2019expansion de ce type de solution, ces derniers \u00e9valuant d\u00e9sormais plus de 40 solutions dans leurs \u00e9tudes.<\/p>\n<h2>La fraude en ligne\u00a0: quelle strat\u00e9gie adopter\u00a0?<\/h2>\n<p>S\u2019il existe aujourd\u2019hui un march\u00e9 tr\u00e8s riche de solutions de d\u00e9tection de fraude en ligne, on retrouve une approche souvent semblable, s\u2019articulant autour de trois piliers.<\/p>\n<p>Le premier enjeu consiste \u00e0 collecter un maximum d&#8217;informations afin de permettre une \u00e9valuation du contexte dans lequel se pr\u00e9sente un client et d\u2019estimer si les op\u00e9rations qu&#8217;il est en train de r\u00e9aliser sont l\u00e9gitimes. \u00c0 ce titre, diff\u00e9rents types de donn\u00e9es peuvent \u00eatre pertinentes \u00e0 collecter\u00a0:<\/p>\n<ul>\n<li>Des donn\u00e9es li\u00e9es au contexte de connexion de l\u2019utilisateur, telles que le fingerprint de son device, l\u2019IP, la localisation et l\u2019horaire de la connexion, ainsi que des donn\u00e9es techniques permettant par exemple de d\u00e9tecter la pr\u00e9sence de malwares connus.<\/li>\n<li>Des donn\u00e9es de type comportemental li\u00e9es \u00e0 l\u2019interaction de l\u2019utilisateur avec son device et son environnement\u00a0: habitude de navigation sur un site web ou biom\u00e9trie comportementale telle que la mani\u00e8re de frapper au clavier, de bouger sa souris, de remplir des formulaires,\u2026<\/li>\n<li>Des donn\u00e9es m\u00e9tier propres aux op\u00e9rations r\u00e9alis\u00e9es par un utilisateur : type de b\u00e9n\u00e9ficiaire ajout\u00e9 pour un virement, montant d\u2019un achat en ligne,&#8230;<\/li>\n<\/ul>\n<p>Une fois ces donn\u00e9es collect\u00e9es, les solutions de d\u00e9tection de fraude en ligne vont chercher \u00e0 mettre en \u0153uvre des strat\u00e9gies permettant d\u2019exploiter en temps r\u00e9el ces donn\u00e9es pour juger de la dangerosit\u00e9 de l\u2019op\u00e9ration en cours. Ces strat\u00e9gies consistent en g\u00e9n\u00e9ral \u00e0 d\u00e9finir des r\u00e8gles de d\u00e9tection (ex\u00a0: interdire une op\u00e9ration depuis un pays \u00e0 risque, lever une alerte en cas de connexion sur de multiples comptes depuis le m\u00eame device en un cours d\u00e9lai,\u2026) et \u00e0 utiliser des profils comportementaux dans une logique de scoring. Dans ce second cas, des \u00e9carts trop importants par rapport \u00e0 l\u2019usage\u00a0\u00ab\u00a0habituel\u00a0\u00bb pourra \u00eatre consid\u00e9r\u00e9 comme risqu\u00e9 et d\u00e9clencher une action de la part de la banque ou du site de e-commerce.<\/p>\n<h2>Comment traiter les contextes suspects\u00a0?<\/h2>\n<p>Ces solutions de d\u00e9tection de fraude en ligne pr\u00e9sentent donc de nombreux avantages\u00a0:<\/p>\n<ul>\n<li>Tout d\u2019abord, elles ne se substituent pas aux solutions d\u2019authentification classiques, mais on bel et bien pour objectif de renforcer et compl\u00e9ter cette premi\u00e8re couche de s\u00e9curit\u00e9.<\/li>\n<li>Ce renforcement de la s\u00e9curit\u00e9 est, dans la majeure partie des cas, transparente pour les utilisateurs, a minima lorsqu\u2019aucun contexte suspicieux n\u2019a \u00e9t\u00e9 d\u00e9tect\u00e9. En cas de d\u00e9tection d\u2019un contexte suspicieux, ces solutions ont \u00e9galement l\u2019avantage de pouvoir adapter les r\u00e9ponses apport\u00e9es en fonction du niveau de risque quantifi\u00e9. Ainsi, des contextes de connexion fortement suspects peuvent conduire par exemple \u00e0 redemander une authentification \u00e0 l\u2019utilisateur, demander une authentification avec un niveau de s\u00e9curit\u00e9 plus \u00e9lev\u00e9e, bloquer l\u2019op\u00e9ration ou encore notifier l\u2019utilisateur via un canal tiers. En revanche, lorsque le niveau de risque d\u00e9tect\u00e9 reste mod\u00e9r\u00e9 (bien que plus \u00e9lev\u00e9 que pour un contexte \u00ab\u00a0normal\u00a0\u00bb), le traitement de ce dernier peut \u00e9galement \u00eatre transparent pour l\u2019utilisateur, par exemple en alertant simplement le centre antifraude du fournisseur de service sans pour autant bloquer ou alerter l\u2019utilisateur.<\/li>\n<li>Enfin, une meilleure d\u00e9tection de ces fraudes ou tentatives de fraudes en amont permet d\u2019all\u00e9ger et simplifier les chaines de traitement des dossiers de fraude en aval, lorsque ces derni\u00e8res sont av\u00e9r\u00e9es.<\/li>\n<\/ul>\n<p>Parall\u00e8lement aux avantages sus-cit\u00e9s, certaines questions ou points d\u2019attention doivent \u00eatre pris en compte avant de d\u00e9ployer ce type de solutions.<\/p>\n<ul>\n<li>Des phases pilotes en amont du d\u00e9ploiement sont indispensables afin de s\u2019assurer que les r\u00e8gles impl\u00e9ment\u00e9es conduisent \u00e0 des taux de faux positifs \/ faux n\u00e9gatifs acceptables. Par exemple, des taux de faux positifs trop importants peuvent rapidement d\u00e9grader l\u2019exp\u00e9rience utilisateur et g\u00e9n\u00e9rer de l\u2019incompr\u00e9hension (pourquoi me demande-t-on une seconde authentification\u00a0? pourquoi suis-je bloqu\u00e9\u00a0? j\u2019ai re\u00e7u une notification par mail, ai-je r\u00e9ellement \u00e9t\u00e9 pirat\u00e9\u00a0? etc.).<\/li>\n<li>Ces solutions, si elles ont pour but de r\u00e9duire le nombre de fraudes, ont \u00e9galement pour cons\u00e9quence d\u2019augmenter le nombre d\u2019alertes en amont, comme dit pr\u00e9c\u00e9demment. Il est donc indispensable, pour le fournisseur de service, d\u2019\u00eatre en mesure de traiter ces alertes remont\u00e9es et donc dimensionner les \u00e9quipes en charge de ces traitements en cons\u00e9quence.<\/li>\n<li>Enfin, afin de complexifier le contournement (toujours possible\u00a0!) de ces solutions par les hackers, il est important notamment de diversifier au maximum les types de donn\u00e9es collect\u00e9es, les r\u00e8gles utilis\u00e9es pour \u00e9valuer le risque de fraude, de s\u2019assurer que les traitements de ces donn\u00e9es sont bien r\u00e9alis\u00e9s c\u00f4t\u00e9 serveur et non c\u00f4t\u00e9 client, etc.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>L&#8217;authentification est au c\u0153ur de la s\u00e9curit\u00e9 du syst\u00e8me d&#8217;information de toute organisation. Authentifier clients, collaborateurs ou partenaires est essentiel pour s\u2019assurer que la bonne personne acc\u00e8de \u00e0 la bonne ressource. Ceci est d\u2019autant plus critique pour les banques en&#8230;<\/p>\n","protected":false},"author":301,"featured_media":8097,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3224],"tags":[164,550,3305],"coauthors":[1719,2604],"class_list":["post-8300","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-digital-identity","tag-authentification","tag-fraude","tag-identity-access-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La fraude en ligne : comment la d\u00e9tecter et s\u2019en pr\u00e9munir ? - RiskInsight<\/title>\n<meta name=\"description\" content=\"Si les solutions d\u2019authentification classiques constituent bien une premi\u00e8re couche de s\u00e9curit\u00e9 essentielle, elles affichent aujourd\u2019hui certaines limites.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La fraude en ligne : comment la d\u00e9tecter et s\u2019en pr\u00e9munir ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Si les solutions d\u2019authentification classiques constituent bien une premi\u00e8re couche de s\u00e9curit\u00e9 essentielle, elles affichent aujourd\u2019hui certaines limites.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2015-09-24T16:49:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T09:32:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/08\/cible.png\" \/>\n\t<meta property=\"og:image:width\" content=\"888\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Matthieu Guillaume\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthieu Guillaume\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/\"},\"author\":{\"name\":\"Matthieu Guillaume\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/2f6ec09bc838859b8684850734bd2a9d\"},\"headline\":\"La fraude en ligne : comment la d\u00e9tecter et s\u2019en pr\u00e9munir ?\",\"datePublished\":\"2015-09-24T16:49:12+00:00\",\"dateModified\":\"2019-12-31T09:32:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/\"},\"wordCount\":1211,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/08\/cible.png\",\"keywords\":[\"authentification\",\"fraude\",\"identity &amp; access management\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Digital Identity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/\",\"name\":\"La fraude en ligne : comment la d\u00e9tecter et s\u2019en pr\u00e9munir ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/08\/cible.png\",\"datePublished\":\"2015-09-24T16:49:12+00:00\",\"dateModified\":\"2019-12-31T09:32:11+00:00\",\"description\":\"Si les solutions d\u2019authentification classiques constituent bien une premi\u00e8re couche de s\u00e9curit\u00e9 essentielle, elles affichent aujourd\u2019hui certaines limites.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/08\/cible.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/08\/cible.png\",\"width\":888,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La fraude en ligne : comment la d\u00e9tecter et s\u2019en pr\u00e9munir ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/2f6ec09bc838859b8684850734bd2a9d\",\"name\":\"Matthieu Guillaume\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/mttguillaume\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La fraude en ligne : comment la d\u00e9tecter et s\u2019en pr\u00e9munir ? - RiskInsight","description":"Si les solutions d\u2019authentification classiques constituent bien une premi\u00e8re couche de s\u00e9curit\u00e9 essentielle, elles affichent aujourd\u2019hui certaines limites.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/","og_locale":"en_US","og_type":"article","og_title":"La fraude en ligne : comment la d\u00e9tecter et s\u2019en pr\u00e9munir ? - RiskInsight","og_description":"Si les solutions d\u2019authentification classiques constituent bien une premi\u00e8re couche de s\u00e9curit\u00e9 essentielle, elles affichent aujourd\u2019hui certaines limites.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/","og_site_name":"RiskInsight","article_published_time":"2015-09-24T16:49:12+00:00","article_modified_time":"2019-12-31T09:32:11+00:00","og_image":[{"width":888,"height":667,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/08\/cible.png","type":"image\/png"}],"author":"Matthieu Guillaume","twitter_misc":{"Written by":"Matthieu Guillaume","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/"},"author":{"name":"Matthieu Guillaume","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/2f6ec09bc838859b8684850734bd2a9d"},"headline":"La fraude en ligne : comment la d\u00e9tecter et s\u2019en pr\u00e9munir ?","datePublished":"2015-09-24T16:49:12+00:00","dateModified":"2019-12-31T09:32:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/"},"wordCount":1211,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/08\/cible.png","keywords":["authentification","fraude","identity &amp; access management"],"articleSection":["Cybersecurity &amp; Digital Trust","Digital Identity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/","name":"La fraude en ligne : comment la d\u00e9tecter et s\u2019en pr\u00e9munir ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/08\/cible.png","datePublished":"2015-09-24T16:49:12+00:00","dateModified":"2019-12-31T09:32:11+00:00","description":"Si les solutions d\u2019authentification classiques constituent bien une premi\u00e8re couche de s\u00e9curit\u00e9 essentielle, elles affichent aujourd\u2019hui certaines limites.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/08\/cible.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/08\/cible.png","width":888,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/09\/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"La fraude en ligne : comment la d\u00e9tecter et s\u2019en pr\u00e9munir ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/2f6ec09bc838859b8684850734bd2a9d","name":"Matthieu Guillaume","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/mttguillaume\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/301"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=8300"}],"version-history":[{"count":5,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8300\/revisions"}],"predecessor-version":[{"id":8303,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8300\/revisions\/8303"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/8097"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=8300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=8300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=8300"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=8300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}