{"id":2701,"date":"2020-02-11T09:00:43","date_gmt":"2020-02-11T08:00:43","guid":{"rendered":"https:\/\/curtispc.fr\/blog\/?p=2701"},"modified":"2020-03-23T00:45:25","modified_gmt":"2020-03-22T23:45:25","slug":"authentification-par-mot-de-passe","status":"publish","type":"post","link":"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/","title":{"rendered":"Authentification par mot de passe"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2701\" class=\"elementor elementor-2701\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-c6f8296 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c6f8296\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8ecd007\" data-id=\"8ecd007\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50b8143 elementor-widget elementor-widget-image\" data-id=\"50b8143\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/elementor\/thumbs\/motes-de-passe-pei1mar6daw99xs0srus2kzvyegcmyb9cifuwrzivc.png\" title=\"motes-de-passe\" alt=\"motes-de-passe\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1c3390 elementor-widget elementor-widget-post-info\" data-id=\"c1c3390\" data-element_type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-87450e9 elementor-inline-item\" itemprop=\"author\">\n\t\t\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/author\/curtispc\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"elementor-avatar\" src=\"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&amp;d=monsterid&amp;r=g\" alt=\"Picture of curtispc\" loading=\"lazy\">\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-author\">\n\t\t\t\t\t\t\t<span class=\"elementor-post-info__item-prefix\">Publi\u00e9 par<\/span>\n\t\t\t\t\t\t\t\t\t\tcurtispc\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-753aac4 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/2020\/02\/11\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>11\/02\/2020<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-a085001 elementor-inline-item\" itemprop=\"commentCount\">\n\t\t\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/#comments\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-comments\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-comments\">\n\t\t\t\t\t\t\t\t\t\tOne Comment\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-e93eb70 elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\t <div class=\"post-views content-post post-2864 entry-meta load-static\">\r\n\t\t\t\t<span class=\"post-views-icon dashicons dashicons-chart-bar\"><\/span> <span class=\"post-views-label\">Vues:<\/span> <span class=\"post-views-count\">3\u00a0862<\/span>\r\n\t\t\t<\/div>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afb1a63 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"afb1a63\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/curtispc.fr\/cyberattaques.html\">Authentification par mot de passe<\/a><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-42a9016 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"42a9016\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-49e4f0c\" data-id=\"49e4f0c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a114e69 elementor-widget elementor-widget-text-editor\" data-id=\"a114e69\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Le mot de passe reste le moyen d\u2019authentification le plus r\u00e9pandu. Alors que les compromissions de bases enti\u00e8res de mots de passe se multiplient, la CNIL a adopt\u00e9 une nouvelle recommandation sur les mots de passe. Elle fixe les mesures minimales \u00e0 mettre en \u0153uvre.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-ffb5059 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ffb5059\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-41cbccb\" data-id=\"41cbccb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-a081e79 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a081e79\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6f6cc67\" data-id=\"6f6cc67\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-578073f elementor-widget elementor-widget-text-editor\" data-id=\"578073f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Bas\u00e9e sur la gestion d\u2019un secret, l\u2019authentification par identifiant et mot de passe est un moyen simple et peu co\u00fbteux \u00e0 d\u00e9ployer pour contr\u00f4ler un acc\u00e8s.<\/p><p>\u00a0<\/p><p>Toutefois, cette m\u00e9thode d\u2019authentification pr\u00e9sente un niveau de s\u00e9curit\u00e9 faible.<\/p><p>\u00a0<\/p><p>Ces derni\u00e8res ann\u00e9es, de nombreuses attaques informatiques ont entra\u00een\u00e9 la compromission de bases de donn\u00e9es enti\u00e8res de comptes et des mots de passe associ\u00e9s. Ces fuites de donn\u00e9es ont notamment contribu\u00e9 \u00e0 enrichir les connaissances des attaquants\u00a0en mati\u00e8re de mots de passe. Les risques de compromission des comptes associ\u00e9s \u00e0 cette m\u00e9thode d\u2019authentification se sont fortement accrus et imposent une vigilance particuli\u00e8re.<\/p><p>\u00a0<\/p><p>Les risques li\u00e9s \u00e0 la gestion des mots de passe sont multiples et reposent notamment sur :<\/p><p>\u00a0<\/p><ol><li>la simplicit\u00e9 du mot de passe ;<\/li><li>l\u2019\u00e9coute sur le r\u00e9seau afin de collecter les mots de passe transmis ;<\/li><li>la conservation en clair du mot de passe ;<\/li><li>la faiblesse des modalit\u00e9s de renouvellement du mot de passe en cas d\u2019oubli (cas des questions \u00ab secr\u00e8tes \u00bb).\u00a0<\/li><\/ol><p><strong>Les principaux risques identifi\u00e9s au cours du cycle de vie d&rsquo;un mot de passe<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d56a196 elementor-widget elementor-widget-image\" data-id=\"d56a196\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/menaces-mot-de-passe.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"menaces-mot-de-passe\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MjcwNiwidXJsIjoiaHR0cHM6XC9cL2N1cnRpc3BjLmZyXC9ibG9nXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDIwXC8wM1wvbWVuYWNlcy1tb3QtZGUtcGFzc2UucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"394\" src=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/menaces-mot-de-passe-768x394.png\" class=\"attachment-medium_large size-medium_large wp-image-2706\" alt=\"\" srcset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/menaces-mot-de-passe-768x394.png 768w, https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/menaces-mot-de-passe-300x154.png 300w, https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/menaces-mot-de-passe-585x300.png 585w, https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/menaces-mot-de-passe.png 975w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a11932 elementor-widget elementor-widget-text-editor\" data-id=\"2a11932\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Il n\u2019existe pas de d\u00e9finition universelle d\u2019un bon mot de passe, mais sa complexit\u00e9 et sa longueur permettent de diminuer le risque de r\u00e9ussite d\u2019une attaque informatique qui consisterait \u00e0 tester successivement de nombreux mots de passe (attaque dite en force brute).\u00a0<\/p><p>On consid\u00e8re que la longueur du mot de passe suffit pour r\u00e9sister aux attaques courantes\u00a0\u00e0 partir de 12 caract\u00e8res. Lorsque la taille du mot de passe diminue, des mesures compensatoires doivent \u00eatre pr\u00e9vues.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26376f7 elementor-widget elementor-widget-text-editor\" data-id=\"26376f7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><span class=\"ctn-gen-mise-avant-titre\">PHRASE2PASSE : UN OUTIL POUR ACCOMPAGNER LES UTILISATEURS<\/span><\/h2><div class=\"ctn-gen-mise-avant-texte\"><p>Pour aider les utilisateurs \u00e0 choisir un mot de passe robuste et un moyen mn\u00e9motechnique, la CNIL a d\u00e9velopp\u00e9\u00a0<a href=\"https:\/\/www.cnil.fr\/fr\/generer-un-mot-de-passe-solide\">un outil pour g\u00e9n\u00e9rer un mot de passe \u00e0 partir d\u2019une phrase<\/a>.<\/p><p><br \/>Le code de cet outil est disponible sous la forme d\u2019une extension logicielle en javascript,\u00a0afin que vous puissiez l\u2019int\u00e9grer dans vos applications.<\/p><p><a href=\"https:\/\/github.com\/LINCnil\/Phrase2passe\">&gt;T\u00e9l\u00e9charger l\u2019extension<\/a><\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-926c034 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"926c034\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-99ca02e\" data-id=\"99ca02e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3cfa767 elementor-widget elementor-widget-text-editor\" data-id=\"3cfa767\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>1. L\u2019authentification par mot de passe : longueur, complexit\u00e9, mesures compl\u00e9mentaires<\/h1>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-f6803e7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f6803e7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a7c18a9\" data-id=\"a7c18a9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e52b216 elementor-widget elementor-widget-text-editor\" data-id=\"e52b216\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les exigences minimales de la CNIL en termes de taille et de complexit\u00e9 du mot de passe varient en fonction des mesures compl\u00e9mentaires mises en place\u00a0pour fiabiliser le processus d\u2019authentification :\u00a0<\/p><p>\u00a0<\/p><p>Ainsi, si une authentification est bas\u00e9e exclusivement sur un mot de passe, cela implique a minima l\u2019utilisation d\u2019un mot de passe complexe d\u2019au moins 12 caract\u00e8res compos\u00e9 de majuscules de minuscules, de chiffres et de caract\u00e8res sp\u00e9ciaux.\u00a0\u00a0<\/p><p>\u00a0<\/p><p>Des mesures compl\u00e9mentaires \u00e0 la saisie d\u2019un mot de passe (restrictions\u00a0d\u2019acc\u00e8s, collecte d\u2019autres donn\u00e9es, support d\u00e9tenu en propre par l\u2019utilisateur) permettent de r\u00e9duire la longueur et la complexit\u00e9 du mot de passe, car ces mesures permettent d\u2019assurer un niveau de s\u00e9curit\u00e9 \u00e9quivalent au mot de passe seul.<\/p><p>\u00a0<\/p><p><strong>Le tableau ci-dessous fait \u00e9tat des 4 cas d\u2019authentification par mot de passe identifi\u00e9s par la CNIL dans sa recommandation\u00a0<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14af498 elementor-widget elementor-widget-image\" data-id=\"14af498\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/Capture.jpg\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"Capture\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MjcwNywidXJsIjoiaHR0cHM6XC9cL2N1cnRpc3BjLmZyXC9ibG9nXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDIwXC8wM1wvQ2FwdHVyZS5qcGcifQ%3D%3D\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"232\" height=\"300\" src=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/Capture-232x300.jpg\" class=\"attachment-medium size-medium wp-image-2707\" alt=\"\" srcset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/Capture-232x300.jpg 232w, https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/Capture-792x1024.jpg 792w, https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/Capture-768x993.jpg 768w, https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/Capture-1188x1536.jpg 1188w, https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/Capture-1170x1512.jpg 1170w, https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/Capture-585x756.jpg 585w, https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/Capture.jpg 1336w\" sizes=\"(max-width: 232px) 100vw, 232px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-deb53d2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"deb53d2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ae33a9e\" data-id=\"ae33a9e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b0c965 elementor-widget elementor-widget-text-editor\" data-id=\"5b0c965\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"apparte\"><p><strong>Dans tous les cas,<\/strong><br \/>le mot de passe ne doit pas \u00eatre communiqu\u00e9 \u00e0 l&rsquo;utilisateur en clair par courrier \u00e9lectronique.<\/p><\/div><p>Ces exigences\u00a0sont des r\u00e8gles minimales. Le contr\u00f4le d\u2019acc\u00e8s peut devoir reposer sur des r\u00e8gles plus robustes selon les risques auxquels le syst\u00e8me est expos\u00e9.\u00a0\u00a0<\/p><p>\u00a0<\/p><ol start=\"2\"><li class=\"hx\"><h3>S\u00e9curisation de l\u2019authentification<\/h3><\/li><\/ol><p>Quelles que soient les mesures mises en place, la fonction d\u2019authentification doit \u00eatre s\u00fbre\u00a0:<\/p><ul><li>elle utilise un algorithme public r\u00e9put\u00e9 fort ;<\/li><li>sa mise en \u0153uvre logicielle est exempte de vuln\u00e9rabilit\u00e9 connue.<\/li><\/ul><p>Lorsque l\u2019authentification n\u2019a pas lieu en local, l\u2019identit\u00e9 du serveur doit \u00eatre contr\u00f4l\u00e9e\u00a0au moyen d\u2019un certificat d\u2019authentification de serveur et le canal de communication entre le serveur authentifi\u00e9 et le client doit \u00eatre chiffr\u00e9 \u00e0 l\u2019aide d\u2019une fonction de chiffrement s\u00fbre. La s\u00e9curit\u00e9 des cl\u00e9s priv\u00e9es doit \u00eatre assur\u00e9e.<\/p><p>\u00a0<\/p><ol start=\"3\"><li class=\"hx\"><h3>La conservation des mots de passe<\/h3><\/li><\/ol><p>Le mot de passe ne doit jamais \u00eatre stock\u00e9 en clair. Lorsque l\u2019authentification a lieu sur un serveur distant, et dans les autres cas si cela est techniquement faisable, \u00a0le mot de passe doit \u00eatre transform\u00e9 au moyen d\u2019une fonction cryptographique non r\u00e9versible et s\u00fbre, int\u00e9grant l\u2019utilisation d\u2019un sel ou d\u2019une cl\u00e9.<\/p><p>\u00a0<\/p><ol start=\"4\"><li class=\"hx\"><h3>Le renouvellement du mot de passe<\/h3><\/li><\/ol><h4>Renouvellement p\u00e9riodique<\/h4><p>Le responsable de traitement veille \u00e0 imposer un renouvellement du mot de passe selon une p\u00e9riodicit\u00e9 pertinente et raisonnable, qui d\u00e9pend notamment de la complexit\u00e9 impos\u00e9e du mot de passe, des donn\u00e9es trait\u00e9es et des risques auxquels il est expos\u00e9.<\/p><p>\u00a0<\/p><p>La personne concern\u00e9e doit \u00eatre en mesure de changer elle-m\u00eame son mot de passe. Dans ce cas, les r\u00e8gles aff\u00e9rentes \u00e0 la cr\u00e9ation de mots de passe s\u2019appliquent.<\/p><p>\u00a0<\/p><h4>Renouvellement sur demande<\/h4><p>\u00c0 la demande de la personne concern\u00e9e, par exemple en cas d\u2019oubli, le responsable de traitement met en \u0153uvre une proc\u00e9dure de renouvellement du mot de passe.<\/p><p>\u00a0<\/p><p><strong>Si ce renouvellement n\u00e9cessite l\u2019intervention d\u2019un administrateur,<\/strong>\u00a0un mot de passe temporaire est attribu\u00e9 \u00e0 la personne concern\u00e9e, le changement du mot de passe attribu\u00e9 temporairement lui est impos\u00e9 lors de sa premi\u00e8re connexion.<\/p><p>\u00a0<\/p><p><strong>Si ce renouvellement intervient de mani\u00e8re automatique\u00a0<\/strong>: le mot de passe ne doit pas \u00eatre transmis en clair. L\u2019utilisateur doit \u00eatre redirig\u00e9 vers une interface\u00a0<strong>depuis une URL temporaire<\/strong>\u00a0dont la validit\u00e9 ne doit pas exc\u00e9der 24 heures,\u00a0 lui permettant de saisir un nouveau mot de passe, et ne permettre qu\u2019un seul renouvellement.\u00a0<\/p><p>\u00a0<\/p><p>Un code d\u2019acc\u00e8s temporaire peut \u00e9galement \u00eatre utilis\u00e9 d\u00e8s lors qu\u2019il dispose des m\u00eames caract\u00e9ristiques que l\u2019URL temporaire, \u00e0 savoir disposer une validit\u00e9 de 24 h et ne permettre qu\u2019un seul renouvellement.<\/p><p>\u00a0<\/p><p><strong>Si le renouvellement fait intervenir un ou plusieurs \u00e9l\u00e9ments suppl\u00e9mentaires<\/strong>\u00a0(num\u00e9ro de t\u00e9l\u00e9phone, adresse postale\u2026) :<\/p><p>\u00a0<\/p><ul><li>ces \u00e9l\u00e9ments ne doivent pas \u00eatre conserv\u00e9s dans le m\u00eame espace de stockage que l\u2019\u00e9l\u00e9ment de v\u00e9rification du mot de passe ; sinon, ils doivent \u00eatre conserv\u00e9s sous forme chiffr\u00e9e \u00e0 l\u2019aide d\u2019un algorithme public r\u00e9put\u00e9 fort, et la s\u00e9curit\u00e9 de la cl\u00e9 de chiffrement doit \u00eatre assur\u00e9e ;<\/li><li>afin de pr\u00e9venir les tentatives d\u2019usurpation s\u2019appuyant sur le changement de ces \u00e9l\u00e9ments, la personne doit \u00eatre imm\u00e9diatement inform\u00e9e de leur changement.<\/li><li>\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49b969e elementor-widget elementor-widget-text-editor\" data-id=\"49b969e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Que faire en cas de risque de compromission du mot de passe ?<\/h2>\n<p>Si un responsable de traitement de donn\u00e9es d\u00e9tecte une violation de donn\u00e9es en rapport avec le mot de passe d\u2019une personne,<\/p><p><br><\/p>\n<ul>\n<li>Le responsable de traitement doit notifier la personne concern\u00e9e, dans un d\u00e9lai n\u2019exc\u00e9dant pas 72 heures ;<\/li>\n<li>Il doit imposer \u00e0 l\u2019utilisateur concern\u00e9 le changement de son mot de passe lors de sa prochaine connexion ;<\/li>\n<li>Il doit lui recommander de veiller \u00e0 changer ses mots de passe d\u2019autres services dans l\u2019hypoth\u00e8se o\u00f9 il aurait utilis\u00e9 le m\u00eame mot de passe pour ceux-ci.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-6824576 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6824576\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb26da7\" data-id=\"bb26da7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7cce3a5 elementor-blockquote--skin-border elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote\" data-id=\"7cce3a5\" data-element_type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tSource: CNIL\t\t\t<\/p>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ec5dd4 elementor-widget elementor-widget-spacer\" data-id=\"7ec5dd4\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c740f61 elementor-widget elementor-widget-penci-text-block\" data-id=\"c740f61\" data-element_type=\"widget\" data-widget_type=\"penci-text-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"penci-block-vc penci-text-editor\">\n\t\t\t        <div class=\"penci-border-arrow penci-homepage-title penci-home-latest-posts style-7 pcalign-left pciconp-right pcicon-right block-title-icon-left\">\n            <h3 class=\"inner-arrow\">\n                <span>\n                    <span>PARTAGER CET ARTICLE<\/a>                <\/span>\n            <\/h3>\n\t\t\t        <\/div>\n\t\t\t\t\t<div class=\"penci-block_content\">\n\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f0e0d0 elementor-share-buttons--view-icon elementor-share-buttons--shape-circle elementor-share-buttons--align-center elementor-share-buttons--skin-gradient elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"0f0e0d0\" data-element_type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_facebook\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on facebook\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_twitter\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on twitter\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_linkedin\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on linkedin\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_whatsapp\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on whatsapp\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-whatsapp\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_email\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on email\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fas fa-envelope\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa01142 elementor-widget elementor-widget-spacer\" data-id=\"fa01142\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e37b3f1 elementor-widget elementor-widget-spacer\" data-id=\"e37b3f1\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-82d7e6c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"82d7e6c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a53f34f\" data-id=\"a53f34f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-64aef9c elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation\" data-id=\"64aef9c\" data-element_type=\"widget\" data-widget_type=\"post-navigation.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation\">\n\t\t\t<div class=\"elementor-post-navigation__prev elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/piratage-informatique\/\" rel=\"prev\"><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-prev\"><i class=\"fa fa-chevron-circle-left\" aria-hidden=\"true\"><\/i><span class=\"elementor-screen-only\">Prev<\/span><\/span><span class=\"elementor-post-navigation__link__prev\"><span class=\"post-navigation__prev--label\">Pr\u00e9c\u00e9dent<\/span><span class=\"post-navigation__prev--title\">Piratage informatique des PME et ETI<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation__separator-wrapper\">\n\t\t\t\t\t<div class=\"elementor-post-navigation__separator\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-post-navigation__next elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/des-pirates-utilisant-des-applications-mobiles-cachees-des-identifiants-de-connexion-tiers-et-des-videos-de-jeu-contrefaites-pour-cibler-les-consommateurs\/\" rel=\"next\"><span class=\"elementor-post-navigation__link__next\"><span class=\"post-navigation__next--label\">Suivant<\/span><span class=\"post-navigation__next--title\">Des pirates utilisant des applications mobiles cach\u00e9es, des identifiants de connexion tiers et des vid\u00e9os de jeu contrefaites pour cibler les consommateurs<\/span><\/span><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-next\"><i class=\"fa fa-chevron-circle-right\" aria-hidden=\"true\"><\/i><span class=\"elementor-screen-only\">Next<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50f7d18 elementor-widget elementor-widget-spacer\" data-id=\"50f7d18\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-848085d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"848085d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cf0e263\" data-id=\"cf0e263\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50c34b0 elementor-headline--style-highlight elementor-widget elementor-widget-animated-headline\" data-id=\"50c34b0\" data-element_type=\"widget\" data-settings=\"{&quot;marker&quot;:&quot;double&quot;,&quot;highlighted_text&quot;:&quot;Articles Similaires&quot;,&quot;headline_style&quot;:&quot;highlight&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;highlight_animation_duration&quot;:1200,&quot;highlight_iteration_delay&quot;:8000}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h2 class=\"elementor-headline\">\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">Articles Similaires<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2fc543e elementor-widget elementor-widget-spacer\" data-id=\"2fc543e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-2932f20 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2932f20\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6a0b773\" data-id=\"6a0b773\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9d2fd96 elementor-widget elementor-widget-penci-featured-sliders\" data-id=\"9d2fd96\" data-element_type=\"widget\" data-widget_type=\"penci-featured-sliders.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"penci-block-el featured-area featured-style-23\"><div class=\"penci-owl-featured-area elsl-style-23 swiper penci-owl-carousel pcfg-slide-9d2fd96 elsl-style-23\" data-dots=\"false\" data-nav=\"true\" data-ceffect=\"swing\" data-seffect=\"creative\" data-style=\"style-23\" data-auto=\"true\" data-autotime=\"4000\" data-speed=\"600\" data-loop=\"true\"><div class=\"penci-owl-nav\"><div class=\"owl-prev\"><i class=\"penciicon-left-chevron\"><\/i><\/div><div class=\"owl-next\"><i class=\"penciicon-right-chevron\"><\/i><\/div><\/div><div class=\"swiper-wrapper\">    <div class=\"item swiper-slide\">\n        <div class=\"wrapper-item wrapper-item-classess\">\n\t\t\t                <div class=\"penci-item-mag penci-item-1 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2025\/01\/deepseek-ai-icon-logo-png_seeklogo-611473-585x390.png\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2025\/01\/deepseek-ai-icon-logo-png_seeklogo-611473-585x585.png\"\n                           href=\"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/\"\n                           title=\"DeepSeek : La Startup Chinoise qui R\u00e9volutionne l\u2019IA Open-Source\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"DeepSeek : La Startup Chinoise qui R\u00e9volutionne l\u2019IA Open-Source\"\n                           href=\"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"DeepSeek : La Startup Chinoise qui R\u00e9volutionne l\u2019IA Open-Source\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/\">DeepSeek : La Startup Chinoise qui R\u00e9volutionne l\u2019IA Open-Source<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2025-01-28T15:33:19+01:00\">28 janvier 2025<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/#respond \">0 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-2 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/12\/Windows-11-security-585x390.webp\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/12\/Windows-11-security-585x365.webp\"\n                           href=\"https:\/\/curtispc.fr\/blog\/windows-11-un-clic-suffit-pour-renforcer-votre-securite-introduction\/\"\n                           title=\"Windows 11 : un clic suffit pour renforcer votre s\u00e9curit\u00e9 Introduction\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Windows 11 : un clic suffit pour renforcer votre s\u00e9curit\u00e9 Introduction\"\n                           href=\"https:\/\/curtispc.fr\/blog\/windows-11-un-clic-suffit-pour-renforcer-votre-securite-introduction\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Windows 11 : un clic suffit pour renforcer votre s\u00e9curit\u00e9 Introduction\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/windows-11-un-clic-suffit-pour-renforcer-votre-securite-introduction\/\">Windows 11 : un clic suffit pour renforcer votre s\u00e9curit\u00e9 Introduction<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2024-12-22T10:26:54+01:00\">22 d\u00e9cembre 2024<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/windows-11-un-clic-suffit-pour-renforcer-votre-securite-introduction\/#respond \">0 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-3 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/12\/Copilote-512x390.png\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/12\/Copilote.png\"\n                           href=\"https:\/\/curtispc.fr\/blog\/windows-11-la-traduction-en-direct-des-sous-titres-setend-aux-pc-intel-et-amd\/\"\n                           title=\"Windows 11 : la traduction en direct des sous-titres s&rsquo;\u00e9tend aux PC Intel et AMD\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Windows 11 : la traduction en direct des sous-titres s&rsquo;\u00e9tend aux PC Intel et AMD\"\n                           href=\"https:\/\/curtispc.fr\/blog\/windows-11-la-traduction-en-direct-des-sous-titres-setend-aux-pc-intel-et-amd\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Windows 11 : la traduction en direct des sous-titres s&rsquo;\u00e9tend aux PC Intel et AMD\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/windows-11-la-traduction-en-direct-des-sous-titres-setend-aux-pc-intel-et-amd\/\">Windows 11 : la traduction en direct des sous-titres s&rsquo;\u00e9tend aux PC...<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-4 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/12\/windows-11-500x500-01-500x390.png\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/12\/windows-11-500x500-01.png\"\n                           href=\"https:\/\/curtispc.fr\/blog\/windows-11-microsoft-vous-rappelle-a-lordre-si-vous-forcez-linstallation\/\"\n                           title=\"Windows 11 : Microsoft vous rappelle \u00e0 l&rsquo;ordre si vous forcez l&rsquo;installation\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Windows 11 : Microsoft vous rappelle \u00e0 l&rsquo;ordre si vous forcez l&rsquo;installation\"\n                           href=\"https:\/\/curtispc.fr\/blog\/windows-11-microsoft-vous-rappelle-a-lordre-si-vous-forcez-linstallation\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Windows 11 : Microsoft vous rappelle \u00e0 l&rsquo;ordre si vous forcez l&rsquo;installation\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/windows-11-microsoft-vous-rappelle-a-lordre-si-vous-forcez-linstallation\/\">Windows 11 : Microsoft vous rappelle \u00e0 l&rsquo;ordre si vous forcez l&rsquo;installation<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-5 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/06\/cybert-securite-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/06\/cybert-securite-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/la-cybersecurite-en-2024-enjeux-et-strategies-pour-un-monde-connecte\/\"\n                           title=\"La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9\"\n                           href=\"https:\/\/curtispc.fr\/blog\/la-cybersecurite-en-2024-enjeux-et-strategies-pour-un-monde-connecte\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/la-cybersecurite-en-2024-enjeux-et-strategies-pour-un-monde-connecte\/\">La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-0 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/istockphoto-832169838-612x612-1-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/istockphoto-832169838-612x612-1-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\"\n                           title=\"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit\"\n                           href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\">L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution...<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t<\/div><\/div><div class=\"item swiper-slide\"><div class=\"wrapper-item wrapper-item-classess\">\n\t\t\t\t                <div class=\"penci-item-mag penci-item-1 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/byod_risque-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/byod_risque-585x439.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/\"\n                           title=\"Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/\">Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2021-06-14T09:00:30+02:00\">14 juin 2021<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-2 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-security-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-security-585x383.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/\"\n                           title=\"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger\"\n                           href=\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/\">S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2021-05-14T10:00:09+02:00\">14 mai 2021<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-3 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/message-messagerie-chiffre-secret-1024x576-1-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/message-messagerie-chiffre-secret-1024x576-1-585x329.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/messagerie-securisee\/\"\n                           title=\"Messagerie S\u00e9curis\u00e9e\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Messagerie S\u00e9curis\u00e9e\"\n                           href=\"https:\/\/curtispc.fr\/blog\/messagerie-securisee\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Messagerie S\u00e9curis\u00e9e\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/messagerie-securisee\/\">Messagerie S\u00e9curis\u00e9e<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-4 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-computing.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-computing.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/comparatif-des-offres-de-cloud-en-ligne\/\"\n                           title=\"Comparatif des offres de cloud en ligne\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Comparatif des offres de cloud en ligne\"\n                           href=\"https:\/\/curtispc.fr\/blog\/comparatif-des-offres-de-cloud-en-ligne\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Comparatif des offres de cloud en ligne\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/comparatif-des-offres-de-cloud-en-ligne\/\">Comparatif des offres de cloud en ligne<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-5 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/diffamation-professeurs-reseaux-sociaux-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/diffamation-professeurs-reseaux-sociaux-585x401.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/reseaux-sociaux-source-de-piratage-informatique%e2%80%89\/\"\n                           title=\"R\u00e9seaux sociaux, source de piratage informatique\u2009?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"R\u00e9seaux sociaux, source de piratage informatique\u2009?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/reseaux-sociaux-source-de-piratage-informatique%e2%80%89\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"R\u00e9seaux sociaux, source de piratage informatique\u2009?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/reseaux-sociaux-source-de-piratage-informatique%e2%80%89\/\">R\u00e9seaux sociaux, source de piratage informatique\u2009?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-0 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/bigstock_Cloud_Computing-585x390.png\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/bigstock_Cloud_Computing-585x329.png\"\n                           href=\"https:\/\/curtispc.fr\/blog\/cloud-donne-hors-de-controle%e2%80%89\/\"\n                           title=\"Cloud : donn\u00e9 hors de contr\u00f4le\u2009?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Cloud : donn\u00e9 hors de contr\u00f4le\u2009?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/cloud-donne-hors-de-controle%e2%80%89\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Cloud : donn\u00e9 hors de contr\u00f4le\u2009?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/cloud-donne-hors-de-controle%e2%80%89\/\">Cloud : donn\u00e9 hors de contr\u00f4le\u2009?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t<\/div><\/div><div class=\"item swiper-slide\"><div class=\"wrapper-item wrapper-item-classess\">\n\t\t\t\t                <div class=\"penci-item-mag penci-item-1 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/shadow_iot-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/shadow_iot-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/shadow-iot-une-menace-grandissante-pour-les-entreprises\/\"\n                           title=\"Shadow IoT: une menace grandissante pour les entreprises\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Shadow IoT: une menace grandissante pour les entreprises\"\n                           href=\"https:\/\/curtispc.fr\/blog\/shadow-iot-une-menace-grandissante-pour-les-entreprises\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Shadow IoT: une menace grandissante pour les entreprises\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/shadow-iot-une-menace-grandissante-pour-les-entreprises\/\">Shadow IoT: une menace grandissante pour les entreprises<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2021-03-24T09:00:16+01:00\">24 mars 2021<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/shadow-iot-une-menace-grandissante-pour-les-entreprises\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-2 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/vpn_windows-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/vpn_windows-585x384.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/comment-installer-un-vpn-sous-windows-10\/\"\n                           title=\"Comment installer un vpn sous windows 10 ?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Comment installer un vpn sous windows 10 ?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/comment-installer-un-vpn-sous-windows-10\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Comment installer un vpn sous windows 10 ?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/comment-installer-un-vpn-sous-windows-10\/\">Comment installer un vpn sous windows 10 ?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2021-03-20T11:00:07+01:00\">20 mars 2021<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/comment-installer-un-vpn-sous-windows-10\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-3 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/10_hacker-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/10_hacker-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-hackers-les-plus-celebres\/\"\n                           title=\"TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-hackers-les-plus-celebres\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/top-10-des-hackers-les-plus-celebres\/\">TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-4 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/coronavirus-wuhan-ia-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/coronavirus-wuhan-ia-585x351.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/lapplication-de-coronavirus\/\"\n                           title=\"L&rsquo;application de coronavirus propuls\u00e9e par l&rsquo;IA aidera les individus \u00e0 \u00e9valuer le risque de coronavirus\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"L&rsquo;application de coronavirus propuls\u00e9e par l&rsquo;IA aidera les individus \u00e0 \u00e9valuer le risque de coronavirus\"\n                           href=\"https:\/\/curtispc.fr\/blog\/lapplication-de-coronavirus\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"L&rsquo;application de coronavirus propuls\u00e9e par l&rsquo;IA aidera les individus \u00e0 \u00e9valuer le risque de coronavirus\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/lapplication-de-coronavirus\/\">L&rsquo;application de coronavirus propuls\u00e9e par l&rsquo;IA aidera les individus \u00e0 \u00e9valuer le...<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-5 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/infogerance_windows-585x300.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/infogerance_windows-585x293.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/infogerance-informatique-externalisee\/\"\n                           title=\"Infog\u00e9rance informatique externalis\u00e9e\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Infog\u00e9rance informatique externalis\u00e9e\"\n                           href=\"https:\/\/curtispc.fr\/blog\/infogerance-informatique-externalisee\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Infog\u00e9rance informatique externalis\u00e9e\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/infogerance-informatique-externalisee\/\">Infog\u00e9rance informatique externalis\u00e9e<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-0 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/eset-cybersecurite-solutions-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/eset-cybersecurite-solutions-585x329.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/comment-proteger-mon-mac-des-virus\/\"\n                           title=\"Comment prot\u00e9ger mon mac des virus  ?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Comment prot\u00e9ger mon mac des virus  ?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/comment-proteger-mon-mac-des-virus\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Comment prot\u00e9ger mon mac des virus  ?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/comment-proteger-mon-mac-des-virus\/\">Comment prot\u00e9ger mon mac des virus ?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t        <\/div>\n    <\/div>\n<\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb4006e elementor-widget elementor-widget-spacer\" data-id=\"eb4006e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-cc2256e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc2256e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-70d5c9c\" data-id=\"70d5c9c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9f9d352 elementor-widget elementor-widget-spacer\" data-id=\"9f9d352\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Le mot de passe reste le moyen d\u2019authentification le plus r\u00e9pandu. Alors que les compromissions de bases enti\u00e8res de mots de passe se multiplient, la CNIL a adopt\u00e9 une nouvelle&hellip;<\/p>\n","protected":false},"author":1,"featured_media":3106,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[28,27],"tags":[46,50,49,47],"class_list":["post-2701","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite-informatique","category-windows-mac-linux","tag-cyber-securite","tag-linux","tag-mac","tag-windows"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Les principaux risques identifi\u00e9s au cours du cycle de vie d\u2019un password<\/title>\n<meta name=\"description\" content=\"Le mot de passe reste le moyen d\u2019authentification le plus r\u00e9pandu. Alors que les compromissions de bases enti\u00e8res de mots de passe se multiplient\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les principaux risques identifi\u00e9s au cours du cycle de vie d\u2019un password\" \/>\n<meta property=\"og:description\" content=\"Le mot de passe reste le moyen d\u2019authentification le plus r\u00e9pandu. Alors que les compromissions de bases enti\u00e8res de mots de passe se multiplient\" \/>\n<meta property=\"og:url\" content=\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog | Curtis PC 2025\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-11T08:00:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-22T23:45:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/security-password.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"curtispc\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@curtispcfr\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"curtispc\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/\",\"url\":\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/\",\"name\":\"Les principaux risques identifi\u00e9s au cours du cycle de vie d\u2019un password\",\"isPartOf\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/security-password.jpg\",\"datePublished\":\"2020-02-11T08:00:43+00:00\",\"dateModified\":\"2020-03-22T23:45:25+00:00\",\"author\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653\"},\"description\":\"Le mot de passe reste le moyen d\u2019authentification le plus r\u00e9pandu. Alors que les compromissions de bases enti\u00e8res de mots de passe se multiplient\",\"breadcrumb\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/#primaryimage\",\"url\":\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/security-password.jpg\",\"contentUrl\":\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/security-password.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/curtispc.fr\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Authentification par mot de passe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/curtispc.fr\/blog\/#website\",\"url\":\"https:\/\/curtispc.fr\/blog\/\",\"name\":\"Blog | Curtis PC 2025\",\"description\":\"Pour une vie num\u00e9rique plus simple\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/curtispc.fr\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653\",\"name\":\"curtispc\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g\",\"caption\":\"curtispc\"},\"sameAs\":[\"https:\/\/www.curtispc.fr\/\",\"https:\/\/x.com\/curtispcfr\"],\"url\":\"https:\/\/curtispc.fr\/blog\/author\/curtispc\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les principaux risques identifi\u00e9s au cours du cycle de vie d\u2019un password","description":"Le mot de passe reste le moyen d\u2019authentification le plus r\u00e9pandu. Alors que les compromissions de bases enti\u00e8res de mots de passe se multiplient","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/","og_locale":"fr_FR","og_type":"article","og_title":"Les principaux risques identifi\u00e9s au cours du cycle de vie d\u2019un password","og_description":"Le mot de passe reste le moyen d\u2019authentification le plus r\u00e9pandu. Alors que les compromissions de bases enti\u00e8res de mots de passe se multiplient","og_url":"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/","og_site_name":"Blog | Curtis PC 2025","article_published_time":"2020-02-11T08:00:43+00:00","article_modified_time":"2020-03-22T23:45:25+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/security-password.jpg","type":"image\/jpeg"}],"author":"curtispc","twitter_card":"summary_large_image","twitter_creator":"@curtispcfr","twitter_misc":{"\u00c9crit par":"curtispc","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/","url":"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/","name":"Les principaux risques identifi\u00e9s au cours du cycle de vie d\u2019un password","isPartOf":{"@id":"https:\/\/curtispc.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/#primaryimage"},"image":{"@id":"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/#primaryimage"},"thumbnailUrl":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/security-password.jpg","datePublished":"2020-02-11T08:00:43+00:00","dateModified":"2020-03-22T23:45:25+00:00","author":{"@id":"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653"},"description":"Le mot de passe reste le moyen d\u2019authentification le plus r\u00e9pandu. Alors que les compromissions de bases enti\u00e8res de mots de passe se multiplient","breadcrumb":{"@id":"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/#primaryimage","url":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/security-password.jpg","contentUrl":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/security-password.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/curtispc.fr\/blog\/"},{"@type":"ListItem","position":2,"name":"Authentification par mot de passe"}]},{"@type":"WebSite","@id":"https:\/\/curtispc.fr\/blog\/#website","url":"https:\/\/curtispc.fr\/blog\/","name":"Blog | Curtis PC 2025","description":"Pour une vie num\u00e9rique plus simple","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/curtispc.fr\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653","name":"curtispc","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g","caption":"curtispc"},"sameAs":["https:\/\/www.curtispc.fr\/","https:\/\/x.com\/curtispcfr"],"url":"https:\/\/curtispc.fr\/blog\/author\/curtispc\/"}]}},"_links":{"self":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts\/2701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/comments?post=2701"}],"version-history":[{"count":16,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts\/2701\/revisions"}],"predecessor-version":[{"id":3328,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts\/2701\/revisions\/3328"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/media\/3106"}],"wp:attachment":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/media?parent=2701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/categories?post=2701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/tags?post=2701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}