{"id":2866,"date":"2013-03-11T08:00:00","date_gmt":"2013-03-11T08:00:00","guid":{"rendered":"http:\/\/fr.le-vpn.net\/la-strategie-de-cybersecurite-de-lunion-europeenne-est-en-retard\/"},"modified":"2020-07-07T01:32:09","modified_gmt":"2020-07-06T23:32:09","slug":"strategie-cybersecurite","status":"publish","type":"post","link":"https:\/\/www.le-vpn.com\/fr\/strategie-cybersecurite\/","title":{"rendered":"La strat\u00e9gie de cybers\u00e9curit\u00e9 de l\u2019Union Europ\u00e9enne est en retard"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div dir=\"ltr\">\n<div><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/2.bp.blogspot.com\/-ARuh9MoxUuY\/UTxhPzmAhDI\/AAAAAAAAAQ8\/aBq-bmSqxa4\/s320\/cyber-crime-Eu-strategy.jpg\" alt=\"strat\u00e9gie \" width=\"320\" height=\"180\" border=\"0\" \/><\/div>\n<p>Plus de dix ans apr\u00e8s l\u2019adoption par le Conseil de l\u2019Europe de la Convention sur la cybercriminalit\u00e9, la Commission europ\u00e9enne a enfin pr\u00e9sent\u00e9 une proposition pour une strat\u00e9gie de cybers\u00e9curit\u00e9. Elle s\u2019adresse aux grands acteurs nationaux et internationaux et \u00e9voque un syst\u00e8me d\u00e9centralis\u00e9 pour la d\u00e9fense du cyberespace, qui aille au-del\u00e0 des fronti\u00e8res nationales.<\/p>\n<p>La d\u00e9couverte de virus ultra-puissants tels que Stuxnet ou Red October donne une id\u00e9e du niveau potentiel des menaces \u00e0 l\u2019aff\u00fbt dans le cyberespace. La Commission se saisit enfin du sujet \u00e0 travers Neelie Kroes, vice-pr\u00e9sidente de la Commission europ\u00e9enne, Cecilia Malmstr\u00f6m, commissaire europ\u00e9enne aux Affaires Int\u00e9rieures et Catherine Ashton, Haute Repr\u00e9sentante de l\u2019Union pour les affaires \u00e9trang\u00e8res et la politique de s\u00e9curit\u00e9, qui viennent de publier une strat\u00e9gie commune pour la cyber-s\u00e9curit\u00e9 de l\u2019Union.<\/p>\n<p><strong>Les cinq points centraux de cette strat\u00e9gie sont :<\/strong><\/p>\n<p>\u00b7 le renforcement des capacit\u00e9s d\u00e9fensives des cyberstructures<\/p>\n<p>\u00b7 une r\u00e9duction drastique de la cybercriminalit\u00e9<\/p>\n<p>\u00b7 le d\u00e9veloppement de comp\u00e9tences dans le domaine de la cyber-d\u00e9fense et de ressources dans le cadre de la politique europ\u00e9enne de s\u00e9curit\u00e9 et de d\u00e9fense<\/p>\n<p>\u00b7 la mise en place de savoir-faire industriels et technologiques dans le domaine de la cyber-s\u00e9curit\u00e9<\/p>\n<p>\u00b7 une approche coh\u00e9rente pour le cyberespace de l\u2019Union europ\u00e9enne et la diffusion des valeurs fondamentales de l\u2019UE.<\/p>\n<p>La strat\u00e9gie doit donc \u00eatre d\u00e9sormais mise en \u0153uvre par des \u00e9quipes d\u2019intervention d\u2019urgence informatique (CERT, Computer Emergency Response Teams), que les \u00c9tats membres devraient mettre en place quand il n\u2019en existe pas encore, pour identifier les menaces num\u00e9riques par la coop\u00e9ration, les analyser et s\u2019en prot\u00e9ger.<\/p>\n<p>Les Etats membres devront aussi mettre en place des agences nationales de s\u00e9curit\u00e9 des r\u00e9seaux et de l\u2019information (NIS \u2013 Network and Information Security), qui d\u00e9velopperont une strat\u00e9gie commune et travailleront ensemble. Les \u00c9tats membres seront \u00e9paul\u00e9s par l\u2019Agence europ\u00e9enne charg\u00e9e de la s\u00e9curit\u00e9 des r\u00e9seaux et de l\u2019information (ENISA), avec des transferts d\u2019informations et de comp\u00e9tences au sein des Etats de l\u2019Union.<\/p>\n<p>Le secteur priv\u00e9 doit \u00eatre aussi int\u00e9gr\u00e9 \u00e0 cette d\u00e9marche, car il est indispensable pour ses comp\u00e9tences informatiques. D\u2019apr\u00e8s le document de la Commission, un \u00ab partenariat public-priv\u00e9 europ\u00e9en efficace pour la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information \u00bb serait un instrument adapt\u00e9, qu\u2019il conviendrait de construire. L\u2019Union Europ\u00e9enne poursuivrait \u00e9galement la pratique depuis 2010 de cyber-exercices pour les \u00c9tats membres et le secteur priv\u00e9.<\/p>\n<p>L\u2019approche strat\u00e9gique insiste particuli\u00e8rement sur la n\u00e9cessit\u00e9 d\u2019une coop\u00e9ration de l\u2019Union europ\u00e9enne et de ses \u00c9tats avec les organisations internationales appropri\u00e9es, comme l\u2019OTAN, l\u2019OSCE ou l\u2019Agence europ\u00e9enne de d\u00e9fense (AED). Ces coop\u00e9rations, l\u2019utilisation de technologies am\u00e9lior\u00e9es et une meilleure compr\u00e9hension des attaques permettraient une meilleure d\u00e9fense du cyberespace.<\/p>\n<p>C\u00f4t\u00e9 judiciaire, l\u2019Union Europ\u00e9enne a r\u00e9cemment ouvert le Centre europ\u00e9en de lutte contre la cybercriminalit\u00e9 (EC3) \u00e0 La Haye qui a pour vocation d\u2019aide les enqu\u00eateurs de chaque Etat \u00e0 d\u00e9velopper leurs comp\u00e9tences dans la lutte contre le crime en ligne et permettra la coop\u00e9ration entre les autorit\u00e9s.<\/p>\n<p>Dans ces d\u00e9marches vers une meilleure cybers\u00e9curit\u00e9, la Commission europ\u00e9enne insiste sur le fait qu\u2019elle souhaite respecter les valeurs et droits fondamentaux de l\u2019Union, sans utiliser des outils de surveillance g\u00e9n\u00e9rale ou de censure. La Commission va ainsi renforcer les proc\u00e9d\u00e9s de cryptage et allouer l\u2019importance n\u00e9cessaire au \u00ab dual use \u00bb, c\u2019est-\u00e0-dire l\u2019utilisation de biens et de technologies pour des buts diff\u00e9rents. L\u2019Union europ\u00e9enne milite pour le maintien d\u2019un Internet libre, ouvert et s\u00fbr et davantage de s\u00e9curit\u00e9, mais cette d\u00e9marche vers une meilleure s\u00e9curit\u00e9 Internet reste \u00e0 accomplir.<\/p>\n<p>Pour surfer de fa\u00e7on s\u00e9curis\u00e9e, la bonne solution est de choisir un service <a href=\"http:\/\/www.le-vpn.com\/fr\/\">VPN<\/a>. Sa technologie vous permet d&#8217;\u00e9tablir un tunnel VPN crypt\u00e9 vers un h\u00f4te (ou serveur) sur internet. Vous pouvez surfer de mani\u00e8re <a href=\"http:\/\/www.le-vpn.com\/fr\/surfez-anonymement\">anonyme<\/a> et sans restriction, vu qu\u2019il est impossible pour autrui d&#8217;intercepter votre trafic en raison du serveur VPN. Votre activit\u00e9 sur Internet est donc ind\u00e9tectable. L\u2019installation du VPN ne prend que quelques minutes et vous assure de surfer, faire vos achats sur Internet ou <a href=\"http:\/\/www.le-vpn.com\/fr\/telechargements-securises\">t\u00e9l\u00e9charger<\/a> le contenu que vous souhaitez, en toute s\u00e9curit\u00e9.<\/p>\n<\/div>\n[vc_row][vc_column]<div class=\"templatera_shortcode\"><div class=\"vc_row wpb_row vc_row-fluid mpc-row\"><div class=\"wpb_column vc_column_container vc_col-sm-12 mpc-column\" data-column-id=\"mpc_column-4169f3e0b0e9681\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div data-id=\"mpc_callout-6169f3e0b0e7fd3\" class=\"mpc-callout mpc-init mpc-callout--style_1 \"><div class=\"mpc-callout__icon-wrap mpc-icon--image\"><div class=\"mpc-callout__icon\"><i class=\"mpc-transition \"><img decoding=\"async\" class=\"\" src=\"https:\/\/www.le-vpn.com\/fr\/wp-content\/uploads\/2025\/09\/exclusive-deal.png\" width=\"100\" height=\"100\" alt=\"exclusive-deal\" title=\"exclusive-deal\" loading=\"lazy\"><\/i><\/div><\/div><div class=\"mpc-callout__content\"><h3 class=\"mpc-callout__heading mpc-typography--preset_1\">OFFRE EXCLUSIVE<\/h3><div data-id=\"mpc_divider-1869f3e0b0e80b1\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \"><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-callout__description\"><p>LES 3 PREMI&Egrave;RES ANN&Eacute;ES &Agrave; 2,22 &euro;\/MOIS<\/p>\n<\/div><\/div><div class=\"mpc-callout__button\"><a href=\"https:\/\/www.le-vpn.com\/fr\/acheter-le-vpn\/\" title=\"\" data-id=\"mpc_button-4869f3e0b0e8039\" class=\"mpc-button mpc-init mpc-transition mpc-typography--preset_2 \"><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">PROFITEZ EN<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_custom_1725366294400 mpc-row\"><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-7569f3e0b0e8877\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036137534\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>PAS DE JOURNAL<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1699541136156\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>100+ LOCALISATIONS<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-2369f3e0b0e8b5a\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036153466\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>P2P autoris&eacute;<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036161279\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Facile &agrave; utiliser<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-10069f3e0b0e8e0b\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1622661737627\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:13px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Garantie de 30 Jours<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036177713\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Assistance amicale<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-6869f3e0b0e90ac\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036185445\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Bitcoin accept&eacute;<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036194514\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Vitesse de l'&eacute;clair<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1701699917169 mpc-row\"><div class=\"wpb_column vc_column_container vc_col-sm-12 mpc-column\" data-column-id=\"mpc_column-3769f3e0b0e9d95\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div>\r\n<\/div>[\/vc_column][\/vc_row]<\/div>","protected":false},"excerpt":{"rendered":"<p>Plus de dix ans apr\u00e8s l\u2019adoption par le Conseil de l\u2019Europe de la Convention sur la cybercriminalit\u00e9, la Commission europ\u00e9enne a enfin pr\u00e9sent\u00e9 une proposition pour une strat\u00e9gie de cybers\u00e9curit\u00e9. Elle s\u2019adresse aux grands acteurs nationaux et internationaux et \u00e9voque un syst\u00e8me d\u00e9centralis\u00e9 pour la d\u00e9fense du cyberespace, qui aille au-del\u00e0 des fronti\u00e8res nationales. La<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_metadesc":"La Convention sur la cybercriminalit\u00e9, la Commission europ\u00e9enne a enfin pr\u00e9sent\u00e9 une proposition pour une strat\u00e9gie de cybers\u00e9curit\u00e9","footnotes":""},"categories":[833],"tags":[254,35,248],"yst_prominent_words":[3572,5985,7766,7765,4690,7754,7140,7631,3000,1078,7757,7755,2998,2754,7753,7758,1116,6106,7761,7756],"class_list":["post-2866","post","type-post","status-publish","format-standard","hentry","category-blog_old","tag-cooperation-contre-le-cybercrime","tag-cybercrime-2","tag-cybersecurite"],"_links":{"self":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts\/2866","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/comments?post=2866"}],"version-history":[{"count":3,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts\/2866\/revisions"}],"predecessor-version":[{"id":9653,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts\/2866\/revisions\/9653"}],"wp:attachment":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/media?parent=2866"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/categories?post=2866"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/tags?post=2866"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/yst_prominent_words?post=2866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}