{"id":9323,"date":"2016-11-30T10:42:59","date_gmt":"2016-11-30T09:42:59","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=9323"},"modified":"2019-12-31T10:14:07","modified_gmt":"2019-12-31T09:14:07","slug":"objets-connectes-4-dimensions-de-securite","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2016\/11\/objets-connectes-4-dimensions-de-securite\/","title":{"rendered":"Objets connect\u00e9s : les 4 dimensions de la s\u00e9curit\u00e9"},"content":{"rendered":"<p><em>Comme toute r\u00e9volution technologique, la transformation num\u00e9rique impacte de nombreux domaines de l\u2019\u00e9conomie\u00a0: la domotique, la s\u00e9curit\u00e9 physique, la mobilit\u00e9, la sant\u00e9, etc. L\u2019Internet des Objets (IoT en anglais) joue un r\u00f4le important dans cette ten\u00addance, avec l\u2019\u00e9mergence de nombreux objets connect\u00e9s. Les chiffres sont en effet significatifs : de nombreux analystes consid\u00e8rent qu\u2019il y aura entre 20 et 200 milliards d\u2019objets connect\u00e9s d\u2019ici 2020. \u00a0<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2>\u00a0<strong>AU COEUR DE LA TRANSFORMATION NUM\u00c9RIQUE<\/strong><\/h2>\n<p>Aucune industrie ne peut aujourd\u2019hui ignorer cette tendance et les entreprises voient un int\u00e9r\u00eat grandissant \u00e0 s\u2019emparer de ce qu\u2019elles per\u00e7oivent comme une v\u00e9ritable opportunit\u00e9.<\/p>\n<p>Alors que des start-ups con\u00e7oivent chaque jour des dispositifs intelligents, des partenariats se mettent en place entre les vendeurs et les industries traditionnelles \u2013 tels les secteurs de l\u2019assurance, automobile, administratif, bancaire \u2013 afin d\u2019offrir de nouveaux services aux consommateurs gr\u00e2ce \u00e0 divers \u00e9l\u00e9ments connect\u00e9s.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>UNE SURFACE D\u2019ATTAQUE DE PLUS EN PLUS EN PLUS VASTE POUR LES CYBERCRIMINELS<\/strong><\/h2>\n<p>L\u2019essor de cet Internet des Objets n\u2019est pas sans danger, d\u2019autant plus que les risques, qui \u00e9taient surtout virtuels, s\u2019\u00e9tendent au domaine du physique.<\/p>\n<p>Une <a href=\"http:\/\/www8.hp.com\/us\/en\/hp-news\/press-release.html?id=1744676#.WD6bZ_nhA2w\">\u00e9tude frappante<\/a> a \u00e9t\u00e9 men\u00e9e par HP Fortify\u00a0en 2014, mettant en avant un constat sans appel : en testant la s\u00e9curit\u00e9 des 10 des objets connect\u00e9s les plus en vogue du moment, une moyenne de 25 vuln\u00e9rabilit\u00e9s par objet a \u00e9t\u00e9 trouv\u00e9e. La plupart d\u2019entre elles sont li\u00e9es \u00e0 des probl\u00e8mes de s\u00e9curit\u00e9 basiques, tels que la <strong>mauvaise gestion de la confidentialit\u00e9 des donn\u00e9es et des droits d\u2019acc\u00e8s<\/strong>, <strong>l\u2019absence de chiffrement des flux<\/strong>, <strong>une interface d\u2019adminis\u00adtration Web non s\u00e9curis\u00e9e<\/strong>, ou encore <strong>une protection g\u00e9n\u00e9rale inadapt\u00e9e<\/strong>. <a href=\"http:\/\/www8.hp.com\/us\/en\/hp-news\/press-release.html?id=2037386#.WD6boPnhA2w\">La suite de cette \u00e9tude en 2015<\/a> a \u00e9galement montr\u00e9 que les 10 smartwatchs et les 10 syst\u00e8mes de s\u00e9curit\u00e9 pour les particuliers les plus vendus pr\u00e9sentaient tous des vuln\u00e9rabilit\u00e9s majeures concernant la confidentialit\u00e9 des donn\u00e9es de l&#8217;utilisateur.<\/p>\n<p>Ce manque de durcissement augmente le risque de vuln\u00e9rabilit\u00e9s pouvant affecter toute sorte d\u2019objets : des r\u00e9frig\u00e9rateurs aux toilettes connect\u00e9es, en passant par les <a href=\"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/crash-test-cyber-solution-securiser-voiture-autonome\/\">voi\u00adtures <\/a>et les serrures. L&#8217;actualit\u00e9 des derniers mois en est la preuve\u00a0avec par exemple l&#8217;<a href=\"http:\/\/searchsecurity.techtarget.com\/news\/450401962\/Details-emerging-on-Dyn-DNS-DDoS-attack-Mirai-IoT-botnet\">attaque DDoS sur le DNS Dyn<\/a>\u00a0avec le botnet Mirai en octobre 2016 ou\u00a0<a href=\"https:\/\/www.wired.com\/2016\/09\/security-news-week-hackers-take-control-moving-teslas-brakes\/\">la prise de contr\u00f4le \u00e0 distance d&#8217;une Tesla<\/a>\u00a0par une \u00e9quipe de hackers chinois en septembre 2016.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>DANS QUELLE CAT\u00c9GORIE DE RISQUES VOUS SITUEZ-VOUS ?<\/strong><\/h2>\n<p>En ce qui concernent les entreprises, les risques d\u00e9pendent de la posture adopt\u00e9e. Dans le cas des objets connect\u00e9s, quatre cas sont possibles. Les diff\u00e9rentes postures ont \u00e9t\u00e9 r\u00e9unies sous l\u2019acronyme \u00ab <strong>CARA <\/strong>\u00bb (pour <strong>Concevoir<\/strong>, <strong>Acqu\u00e9rir<\/strong>, <strong>Recommander<\/strong>, <strong>Accueillir<\/strong>) comme le montre le tableau ci-dessous. Une fois la posture identifi\u00e9e, il convient de sp\u00e9cifier les risques g\u00e9n\u00e9riques et les recommandations associ\u00e9es.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-9324 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/CARA1.png\" alt=\"CARA1\" width=\"459\" height=\"496\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/CARA1.png 720w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/CARA1-177x191.png 177w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/CARA1-36x39.png 36w\" sizes=\"auto, (max-width: 459px) 100vw, 459px\" \/><\/p>\n<p>Afin d\u2019\u00e9valuer le risque, le cabinet Wavestone a d\u00e9velopp\u00e9 un outil sp\u00e9cifique, la matrice \u00ab <strong>heat map<\/strong> \u00bb. Elle prend en compte deux dimensions : le niveau de risque et la posture.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>UN OUTIL D\u2019\u00c9VALUATION EFFICACE : LA MATRICE \u00ab HEAT MAP \u00bb<\/strong><\/h2>\n<p>Le sch\u00e9ma ci-dessous pr\u00e9sente l\u2019exemple concret de l\u2019utilisation d\u2019objets connect\u00e9s pour le secteur bancaire et ses divers ser\u00advices. Ce contexte pr\u00e9sente des contraintes particuli\u00e8res. D\u2019un c\u00f4t\u00e9 la r\u00e9alisation d\u2019une transaction financi\u00e8re est plus risqu\u00e9e que la consultation du solde bancaire. Mais d\u2019un autre c\u00f4t\u00e9, la personnalisation des fonctions de s\u00e9curit\u00e9 sur un appareil appartenant \u00e0 un employ\u00e9 ou \u00e0 un client est bien plus compliqu\u00e9 que le durcissement d\u2019un produit choisi par l\u2019entreprise et qui a \u00e9t\u00e9 acquis \u00e0 un fournisseur, ou m\u00eame d\u00e9velopp\u00e9 en interne.<\/p>\n<figure id=\"post-9324 media-9324\" class=\"align-none\">\n<figure id=\"post-9325 media-9325\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-9325 \" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/CARA2.png\" alt=\"CARA2\" width=\"702\" height=\"271\" \/><\/figure>\n<\/figure>\n<p>Cette matrice permet de r\u00e9aliser une <strong>cartographie des risques<\/strong> qui requi\u00e8rent la plus grande attention.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>DES DISPOSITIFS DE S\u00c9CURIT\u00c9 HABITUELS : DE NOUVEAUX MODES D\u2019IMPL\u00c9MENTATION<\/strong><\/h2>\n<p>Une fois la cartographie des risques \u00e9tablie, il faut s\u2019int\u00e9resser aux r\u00e9ponses que l\u2019on peut y apporter. Une r\u00e9f\u00e9rence int\u00e9ressante \u00e0 ce propos est celle de l\u2019<a href=\"https:\/\/www.owasp.org\/index.php\/OWASP_Inter%ADnet_of_Things_Project\">initiative \u00ab IoT Project \u00bb de l\u2019OWASP<\/a> (Open Web Application Security Project \u2013 organisation \u00e0 but non lucratif) qui propose notamment une liste de recommandations de s\u00e9curit\u00e9 int\u00e9ressantes et compr\u00e9hensibles.<\/p>\n<p>La premi\u00e8re chose \u00e0 noter \u00e0 propos de ce guide est qu\u2019il est divis\u00e9 en 3 cat\u00e9gories selon les cibles d\u2019audience vis\u00e9es : fabri\u00adcants, d\u00e9veloppeurs, consommateurs. Cette structure a du sens dans la mesure o\u00f9 <strong>la s\u00e9curit\u00e9 est partag\u00e9e entre ceux qui con\u00e7oivent les composants <\/strong>(mat\u00e9riel ou logiciel), <strong>et ceux qui les utilisent<\/strong>.<\/p>\n<p>Par ailleurs, les dispositifs de s\u00e9curit\u00e9 doivent \u00eatre <strong>complets \u2013 renfor\u00e7ant non pas les seuls objets connect\u00e9s, mais aussi toute la sur\u00adface d\u2019une attaque <\/strong>(physique, mat\u00e9riel, logiciel, base de donn\u00e9es, local ou \u00e0 distance, etc.). \u00c0 cet \u00e9gard, les mesures de s\u00e9curit\u00e9 propos\u00e9es sont surtout construites sur les bonnes pratiques de l\u2019industrie de la s\u00e9curit\u00e9.<\/p>\n<p>L\u2019Internet des Objets apporte un r\u00e9el changement dans la mise en \u0153uvre des dispositifs de s\u00e9curit\u00e9.<\/p>\n<p>En effet, plusieurs contraintes li\u00e9es aux objets connect\u00e9s sont \u00e0 prendre en compte :<\/p>\n<ul>\n<li><strong>Ergonomie<\/strong> : la taille et le design influenceront les mesures de s\u00e9curit\u00e9 acceptables par les utilisateurs \u2013 par exemple, la taille de l\u2019\u00e9cran pour taper un mot de passe.<\/li>\n<li><strong>Puissance<\/strong> : les petits objets embarqu\u00e9s actuels ont une puissance de calcul limit\u00e9e. Plusieurs op\u00e9rations ne peuvent \u00eatre r\u00e9alis\u00e9es en m\u00eame temps dans un laps de temps raisonnable. Par exemple, Apple a conseill\u00e9 aux d\u00e9veloppeurs de ne pas impl\u00e9menter des fonctionnalit\u00e9s n\u00e9cessitant de long temps d\u2019ex\u00e9cution sur l\u2019Apple Watch.<\/li>\n<li><strong>Connectivit\u00e9<\/strong> : l\u2019Internet des Objets utilise g\u00e9n\u00e9ralement du Bluetooth ou des protocoles NFC, deux technologies ayant une port\u00e9e et un d\u00e9bit limit\u00e9, ce qui ne permet pas toujours d\u2019embarquer un niveau de s\u00e9curit\u00e9 suffisant.<\/li>\n<li><strong>Dur\u00e9e de vie de la batterie<\/strong> : les algo\u00adrithmes cryptographiques (comme du chiffrement \/ d\u00e9chiffrement asym\u00e9\u00adtrique en temps r\u00e9el) peuvent affecter durement la consommation \u00e9nerg\u00e9\u00adtique, m\u00eame s\u2019ils permettent de pro\u00adcurer un meilleur niveau de protection.<\/li>\n<li><strong>Gestion des mises \u00e0 jour<\/strong> : il est indis\u00adpensable de mettre \u00e0 jour le syst\u00e8me, sans interf\u00e9rer avec l\u2019utilisation de l\u2019objet. Cela est particuli\u00e8rement frap\u00adpant dans le cas des voitures connec\u00adt\u00e9es que l\u2019on ne peut pas conduire lorsque le logiciel est en train de se mettre \u00e0 jour. Cela peut prendre plus de 45 minutes.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Au-del\u00e0 de la s\u00e9curit\u00e9, la confidentialit\u00e9 est \u00e9galement indispensable pour les consommateurs ainsi qu\u2019une exigence pour les autorit\u00e9s. L\u2019impl\u00e9mentation pourrait \u00eatre complexe, mais plusieurs initiatives pour la confidentialit\u00e9 des objets connect\u00e9s ont \u00e9merg\u00e9 ces derni\u00e8res ann\u00e9es.<\/p>\n<p>Parmi ces initiatives, le projet <a href=\"https:\/\/www.preserve-project.eu\/\">PRESERVE\u00a0<\/a>est un exemple int\u00e9ressant. Il offre \u00e0 l\u2019industrie automobile un nouveau moyen d\u2019utiliser les PKI et les certificats num\u00e9riques pour les voitures et les routes connect\u00e9es. Le projet utilise des \u00ab pseudonymes \u00bb modifi\u00e9s r\u00e9guli\u00e8rement afin de garantir que le conducteur reste anonyme tout en assurant que les communications entre les v\u00e9hicules et l\u2019infrastructure routi\u00e8re sont authentiques et s\u00e9curis\u00e9es.<\/p>\n<p>Nous sommes entr\u00e9s dans une \u00e8re o\u00f9 s\u00e9curit\u00e9 et confidentialit\u00e9 des donn\u00e9es sont devenues des crit\u00e8res essentiels dans le choix des consommateurs. <strong>Cette \u00e9volution ne peut plus \u00eatre ignor\u00e9e par les acteurs concern\u00e9s, qu\u2019ils con\u00e7oivent, acqui\u00e8rent, recommandent ou accueillent des objets connect\u00e9s<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Comme toute r\u00e9volution technologique, la transformation num\u00e9rique impacte de nombreux domaines de l\u2019\u00e9conomie\u00a0: la domotique, la s\u00e9curit\u00e9 physique, la mobilit\u00e9, la sant\u00e9, etc. L\u2019Internet des Objets (IoT en anglais) joue un r\u00f4le important dans cette ten\u00addance, avec l\u2019\u00e9mergence de nombreux&#8230;<\/p>\n","protected":false},"author":13,"featured_media":9326,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3228],"tags":[2738,1709,3301,1710],"coauthors":[801],"class_list":["post-9323","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-iot-smart-products","tag-cara","tag-iot","tag-iot-consumer-goods","tag-transformation-numerique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Objets connect\u00e9s : les 4 dimensions de la s\u00e9curit\u00e9 - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Objets connect\u00e9s : les 4 dimensions de la s\u00e9curit\u00e9 - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Comme toute r\u00e9volution technologique, la transformation num\u00e9rique impacte de nombreux domaines de l\u2019\u00e9conomie\u00a0: la domotique, la s\u00e9curit\u00e9 physique, la mobilit\u00e9, la sant\u00e9, etc. L\u2019Internet des Objets (IoT en anglais) joue un r\u00f4le important dans cette ten\u00addance, avec l\u2019\u00e9mergence de nombreux...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-30T09:42:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T09:14:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/Fotolia_81590429_Subscription_Monthly_XXL.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"6000\" \/>\n\t<meta property=\"og:image:height\" content=\"3000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chadi Hantouche\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chadi Hantouche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/\"},\"author\":{\"name\":\"Chadi Hantouche\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc\"},\"headline\":\"Objets connect\u00e9s : les 4 dimensions de la s\u00e9curit\u00e9\",\"datePublished\":\"2016-11-30T09:42:59+00:00\",\"dateModified\":\"2019-12-31T09:14:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/\"},\"wordCount\":1317,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/Fotolia_81590429_Subscription_Monthly_XXL.jpg\",\"keywords\":[\"CARA\",\"IoT\",\"IoT &amp; consumer goods\",\"transformation num\u00e9rique\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"IoT &amp; smart products\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/\",\"name\":\"Objets connect\u00e9s : les 4 dimensions de la s\u00e9curit\u00e9 - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/Fotolia_81590429_Subscription_Monthly_XXL.jpg\",\"datePublished\":\"2016-11-30T09:42:59+00:00\",\"dateModified\":\"2019-12-31T09:14:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/Fotolia_81590429_Subscription_Monthly_XXL.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/Fotolia_81590429_Subscription_Monthly_XXL.jpg\",\"width\":6000,\"height\":3000,\"caption\":\"Internet of Things flat iconic illustration thing object\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Objets connect\u00e9s : les 4 dimensions de la s\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc\",\"name\":\"Chadi Hantouche\",\"description\":\"Chadi Hantouche is a Cybersecurity and Digital Trust Senior Manager at Wavestone. For more than a decade, he has helped companies assessing their risk and maturity level, and defining associated solutions. He has a focus on security to support innovative technologies (Big Data, Internet of Things, Cloud computing, Mobility) as well as prevention and reaction against cyberattacks. Chadi is a CISSP, ISO 27001 LI and ITIL certified professional. He is a regular speaker on French and international TV channels, newspapers and conferences, and lecturer in several computer science universities.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/chadi-hantouche\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Objets connect\u00e9s : les 4 dimensions de la s\u00e9curit\u00e9 - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/","og_locale":"en_US","og_type":"article","og_title":"Objets connect\u00e9s : les 4 dimensions de la s\u00e9curit\u00e9 - RiskInsight","og_description":"Comme toute r\u00e9volution technologique, la transformation num\u00e9rique impacte de nombreux domaines de l\u2019\u00e9conomie\u00a0: la domotique, la s\u00e9curit\u00e9 physique, la mobilit\u00e9, la sant\u00e9, etc. L\u2019Internet des Objets (IoT en anglais) joue un r\u00f4le important dans cette ten\u00addance, avec l\u2019\u00e9mergence de nombreux...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/","og_site_name":"RiskInsight","article_published_time":"2016-11-30T09:42:59+00:00","article_modified_time":"2019-12-31T09:14:07+00:00","og_image":[{"width":6000,"height":3000,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/Fotolia_81590429_Subscription_Monthly_XXL.jpg","type":"image\/jpeg"}],"author":"Chadi Hantouche","twitter_misc":{"Written by":"Chadi Hantouche","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/"},"author":{"name":"Chadi Hantouche","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc"},"headline":"Objets connect\u00e9s : les 4 dimensions de la s\u00e9curit\u00e9","datePublished":"2016-11-30T09:42:59+00:00","dateModified":"2019-12-31T09:14:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/"},"wordCount":1317,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/Fotolia_81590429_Subscription_Monthly_XXL.jpg","keywords":["CARA","IoT","IoT &amp; consumer goods","transformation num\u00e9rique"],"articleSection":["Cybersecurity &amp; Digital Trust","IoT &amp; smart products"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/","url":"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/","name":"Objets connect\u00e9s : les 4 dimensions de la s\u00e9curit\u00e9 - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/Fotolia_81590429_Subscription_Monthly_XXL.jpg","datePublished":"2016-11-30T09:42:59+00:00","dateModified":"2019-12-31T09:14:07+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/Fotolia_81590429_Subscription_Monthly_XXL.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/Fotolia_81590429_Subscription_Monthly_XXL.jpg","width":6000,"height":3000,"caption":"Internet of Things flat iconic illustration thing object"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/11\/objets-connectes-4-dimensions-de-securite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Objets connect\u00e9s : les 4 dimensions de la s\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc","name":"Chadi Hantouche","description":"Chadi Hantouche is a Cybersecurity and Digital Trust Senior Manager at Wavestone. For more than a decade, he has helped companies assessing their risk and maturity level, and defining associated solutions. He has a focus on security to support innovative technologies (Big Data, Internet of Things, Cloud computing, Mobility) as well as prevention and reaction against cyberattacks. Chadi is a CISSP, ISO 27001 LI and ITIL certified professional. He is a regular speaker on French and international TV channels, newspapers and conferences, and lecturer in several computer science universities.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/chadi-hantouche\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/9323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=9323"}],"version-history":[{"count":6,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/9323\/revisions"}],"predecessor-version":[{"id":12391,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/9323\/revisions\/12391"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/9326"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=9323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=9323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=9323"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=9323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}