{"id":26,"date":"2021-11-12T18:24:23","date_gmt":"2021-11-12T17:24:23","guid":{"rendered":"https:\/\/infosec4you.net\/?page_id=26"},"modified":"2024-10-19T11:44:39","modified_gmt":"2024-10-19T09:44:39","slug":"modusoperandi","status":"publish","type":"page","link":"https:\/\/infosec4you.net\/?page_id=26","title":{"rendered":"MO"},"content":{"rendered":"<style>.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id26_27b2a3-69{margin-top:-32px;}.kb-row-layout-id26_27b2a3-69 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id26_27b2a3-69 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id26_27b2a3-69 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id26_27b2a3-69{background-image:url('https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/11\/anirudh-Xu4Pz7GI9JY-unsplash-scaled.jpg');background-size:cover;background-position:52% 61%;background-attachment:scroll;background-repeat:no-repeat;}.kb-row-layout-id26_27b2a3-69 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id26_27b2a3-69 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id26_27b2a3-69 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id26_27b2a3-69 alignfull kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column26_6aad35-28 > .kt-inside-inner-col,.kadence-column26_6aad35-28 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column26_6aad35-28 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column26_6aad35-28 > .kt-inside-inner-col{flex-direction:column;}.kadence-column26_6aad35-28 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column26_6aad35-28 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column26_6aad35-28{position:relative;}@media all and (max-width: 1024px){.kadence-column26_6aad35-28 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column26_6aad35-28 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column26_6aad35-28 inner-column-1\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading26_06fead-4d, .wp-block-kadence-advancedheading.kt-adv-heading26_06fead-4d[data-kb-block=\"kb-adv-heading26_06fead-4d\"]{text-align:center;font-size:2.4em;line-height:1.3em;font-weight:800;font-style:normal;font-family:Montserrat;}.wp-block-kadence-advancedheading.kt-adv-heading26_06fead-4d mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading26_06fead-4d[data-kb-block=\"kb-adv-heading26_06fead-4d\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading26_06fead-4d img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading26_06fead-4d[data-kb-block=\"kb-adv-heading26_06fead-4d\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading26_06fead-4d wp-block-kadence-advancedheading has-theme-palette-9-color has-text-color\" data-kb-block=\"kb-adv-heading26_06fead-4d\">Modes op\u00e9ratoires des cybercriminels.<\/h2>\n\n\n\n<p class=\"has-theme-palette-9-color has-text-color has-medium-font-size\">Les hackers font preuve d&rsquo;une grande cr\u00e9ativit\u00e9 et de ruses pour vous escroquer. Cependant, leurs m\u00e9thodes sont d\u00e9sormais mieux comprises. Gr\u00e2ce \u00e0 des programmes de sensibilisation combin\u00e9s \u00e0 une strat\u00e9gie de de d\u00e9fense efficace, vous pouvez \u00e9chapper aux pi\u00e8ges tendus par les cybercriminels et leurs stratag\u00e8mes ing\u00e9nieux. L&rsquo;objectif est de vous rendre conscient des tactiques de piratage afin de pouvoir anticiper et d\u00e9jouer les cyberattaques avant qu&rsquo;elles ne causent des dommages.<\/p>\n\n\n\n<p class=\"has-theme-palette-9-color has-text-color\">L&rsquo;objectif est de vous rendre pleinement conscient des tactiques de piratage informatique afin que vous puissiez anticiper les cyberattaques. En comprenant ces strat\u00e9gies, vous serez mieux arm\u00e9 pour reconna\u00eetre les menaces avant qu&rsquo;elles ne puissent causer des d\u00e9g\u00e2ts, renfor\u00e7ant ainsi votre r\u00e9silience face aux cybercriminels.<\/p>\n<\/div><\/div>\n\n<\/div><\/div>\n\n<style>.kb-row-layout-id26_1885bb-26 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id26_1885bb-26 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id26_1885bb-26 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:28px;padding-bottom:217px;}.kb-row-layout-id26_1885bb-26 > .kt-row-column-wrap > div:not(.added-for-specificity){grid-column:initial;}.kb-row-layout-id26_1885bb-26 > .kt-row-column-wrap{grid-template-columns:repeat(3, minmax(0, 1fr));}.kb-row-layout-id26_1885bb-26 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id26_1885bb-26 > .kt-row-column-wrap > div:not(.added-for-specificity){grid-column:initial;}}@media all and (max-width: 1024px){.kb-row-layout-id26_1885bb-26 > .kt-row-column-wrap{grid-template-columns:repeat(3, minmax(0, 1fr));}}@media all and (max-width: 767px){.kb-row-layout-id26_1885bb-26 > .kt-row-column-wrap > div:not(.added-for-specificity){grid-column:initial;}.kb-row-layout-id26_1885bb-26 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id26_1885bb-26 alignfull wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-3-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column26_e7a6ac-b8 > .kt-inside-inner-col,.kadence-column26_e7a6ac-b8 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column26_e7a6ac-b8 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column26_e7a6ac-b8 > .kt-inside-inner-col{flex-direction:column;}.kadence-column26_e7a6ac-b8 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column26_e7a6ac-b8 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column26_e7a6ac-b8{position:relative;}@media all and (max-width: 1024px){.kadence-column26_e7a6ac-b8 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column26_e7a6ac-b8 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column26_e7a6ac-b8 inner-column-1\"><div class=\"kt-inside-inner-col\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/infosec4you.net\/?page_id=979\"><img loading=\"lazy\" decoding=\"async\" width=\"340\" height=\"230\" src=\"https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/hack8.png\" alt=\"\" class=\"wp-image-1543\" srcset=\"https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/hack8.png 340w, https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/hack8-300x203.png 300w\" sizes=\"auto, (max-width: 340px) 100vw, 340px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">5 <a href=\"https:\/\/infosec4you.net\/?page_id=979\">Phases d&rsquo;une cyberattaque<\/a><\/h2>\n<\/div><\/div>\n\n\n<style>.kadence-column26_506e86-4c > .kt-inside-inner-col,.kadence-column26_506e86-4c > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column26_506e86-4c > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column26_506e86-4c > .kt-inside-inner-col{flex-direction:column;}.kadence-column26_506e86-4c > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column26_506e86-4c > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column26_506e86-4c{position:relative;}@media all and (max-width: 1024px){.kadence-column26_506e86-4c > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column26_506e86-4c > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column26_506e86-4c inner-column-2\"><div class=\"kt-inside-inner-col\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/infosec4you.net\/?page_id=976\"><img loading=\"lazy\" decoding=\"async\" width=\"340\" height=\"230\" src=\"https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/vir2.png\" alt=\"\" class=\"wp-image-1297\" srcset=\"https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/vir2.png 340w, https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/vir2-300x203.png 300w\" sizes=\"auto, (max-width: 340px) 100vw, 340px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><a href=\"https:\/\/infosec4you.net\/?page_id=976\">Malwares &amp; Exploits<\/a><\/h2>\n<\/div><\/div>\n\n\n<style>.kadence-column26_b3ffd3-fb > .kt-inside-inner-col,.kadence-column26_b3ffd3-fb > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column26_b3ffd3-fb > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column26_b3ffd3-fb > .kt-inside-inner-col{flex-direction:column;}.kadence-column26_b3ffd3-fb > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column26_b3ffd3-fb > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column26_b3ffd3-fb{position:relative;}@media all and (max-width: 1024px){.kadence-column26_b3ffd3-fb > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column26_b3ffd3-fb > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column26_b3ffd3-fb inner-column-3\"><div class=\"kt-inside-inner-col\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/infosec4you.net\/?page_id=981\"><img loading=\"lazy\" decoding=\"async\" width=\"340\" height=\"230\" src=\"https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/phishi8-1.png\" alt=\"\" class=\"wp-image-1512\" srcset=\"https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/phishi8-1.png 340w, https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/phishi8-1-300x203.png 300w\" sizes=\"auto, (max-width: 340px) 100vw, 340px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><a href=\"https:\/\/infosec4you.net\/?page_id=981\">Ing\u00e9nierie sociale<\/a><\/h2>\n<\/div><\/div>\n\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Modes op\u00e9ratoires des cybercriminels. Les hackers font preuve d&rsquo;une grande cr\u00e9ativit\u00e9 et de ruses pour vous escroquer. Cependant, leurs m\u00e9thodes sont d\u00e9sormais mieux comprises. Gr\u00e2ce \u00e0 des programmes de sensibilisation combin\u00e9s \u00e0 une strat\u00e9gie de de d\u00e9fense efficace, vous pouvez \u00e9chapper aux pi\u00e8ges tendus par les cybercriminels et leurs stratag\u00e8mes ing\u00e9nieux. L&rsquo;objectif est de vous&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"class_list":["post-26","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/infosec4you.net\/index.php?rest_route=\/wp\/v2\/pages\/26","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec4you.net\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec4you.net\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec4you.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec4you.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=26"}],"version-history":[{"count":27,"href":"https:\/\/infosec4you.net\/index.php?rest_route=\/wp\/v2\/pages\/26\/revisions"}],"predecessor-version":[{"id":1915,"href":"https:\/\/infosec4you.net\/index.php?rest_route=\/wp\/v2\/pages\/26\/revisions\/1915"}],"wp:attachment":[{"href":"https:\/\/infosec4you.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=26"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}