{"id":24770,"date":"2022-02-15T09:56:37","date_gmt":"2022-02-15T09:56:37","guid":{"rendered":"https:\/\/www.cyberguru.it\/2022\/02\/15\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\/"},"modified":"2023-02-14T21:31:22","modified_gmt":"2023-02-14T21:31:22","slug":"social-engineering-les-emotions-le-facteur-humain-de-lescroquerie","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/fr\/2022\/02\/15\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\/","title":{"rendered":"Social Engineering&nbsp;: les \u00e9motions, le facteur humain de l\u2019escroquerie"},"content":{"rendered":"\n<p>Il peut arriver \u00e0 quelqu\u2019un, peut-\u00eatre dans un moment difficile de l\u2019existence, la pens\u00e9e inavouable de devenir un hacker. Pour r\u00e9soudre quelques probl\u00e8mes, r\u00e9gler quelques affaires, peut-\u00eatre acheter cette maison tant d\u00e9sir\u00e9e qui est inaccessible avec le travail quotidien. Bref, pour donner une belle couche de peinture fra\u00eeche \u00e0 sa vie et ensuite retourner au travail normalement.<\/p>\n\n\n\n<p>La mauvaise nouvelle, en plus des explications que nous devrions donner \u00e0 notre conscience et aux nuits pass\u00e9es sans sommeil par peur d\u2019\u00eatre d\u00e9couverts, est que le m\u00e9tier de hacker n\u2019est pas du tout facile.<\/p>\n\n\n\n<p>Il faut \u00eatre tr\u00e8s pr\u00e9par\u00e9, avoir de hautes comp\u00e9tences techniques et \u00eatre de tr\u00e8s grands connaisseurs de la psychologie humaine. Surtout si le filon choisi pour vos \u00ab&nbsp;affaires&nbsp;\u00bb est justement le num\u00e9rique. Ce n\u2019est pas une co\u00efncidence si les connaissances qui tournent autour de la manipulation des victimes ont \u00e9t\u00e9 dot\u00e9es d\u2019une d\u00e9finition qui sonne bien&nbsp;: l\u2019ing\u00e9nierie sociale.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"social-engineering-psicologia-e-tecnica\"><strong>Social engineering&nbsp;: psychologie et technique<\/strong><\/h5>\n\n\n\n<p>Le <strong>Social Engineering <\/strong>ou ing\u00e9nierie sociale, est l\u2019\u00e9tude du comportement des gens afin de les manipuler et de les tromper en se concentrant sur leurs \u00e9motions. L\u2019objectif&nbsp;? Tirer parti des faiblesses humaines pour cr\u00e9er un espace d\u2019acc\u00e8s aux donn\u00e9es et informations prot\u00e9g\u00e9es.<\/p>\n\n\n\n<p>Il s\u2019agit d\u2019une v\u00e9ritable manipulation psychologique qui agit principalement sur certains leviers tels que&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>la <strong>soumission \u00e0<\/strong> l\u2019<strong>autorit\u00e9<\/strong>&nbsp;;<\/li>\n\n\n\n<li>la <strong>preuve sociale<\/strong>, c\u2019est-\u00e0-dire la pression des pairs pour encourager un certain comportement&nbsp;;<\/li>\n\n\n\n<li>les sentiments de <strong>sympathie et de ressemblance<\/strong>&nbsp;;<\/li>\n\n\n\n<li><strong>la n\u00e9cessit\u00e9 de faire preuve d\u2019engagement, de r\u00e9ciprocit\u00e9 et de coh\u00e9rence<\/strong>&nbsp;: les gens aiment, par exemple, rendre une faveur&nbsp;;<\/li>\n\n\n\n<li>la <strong>pr\u00e9cipitation<\/strong> et la <strong>distraction<\/strong>&nbsp;;<\/li>\n\n\n\n<li><strong>la cupidit\u00e9,<\/strong> qui se traduit souvent par l\u2019incapacit\u00e9 de r\u00e9sister \u00e0 des offres tr\u00e8s abordables,<\/li>\n\n\n\n<li>la <strong>compassion et les bons sentiments<\/strong>.<\/li>\n<\/ul>\n\n\n\n<p>\u00c9tant donn\u00e9 que chaque type d\u2019attaque informatique joue sur un type sp\u00e9cifique de faiblesse humaine, on peut affirmer que l\u2019ing\u00e9nierie sociale traverse plus ou moins toutes les formes d\u2019attaque informatique, et en constitue l\u2019humus sur lequel le crime s\u2019enracine et se r\u00e9pand.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"ogni-hacker-punta-alla-risposta-emotiva\">Chaque hacker vise la r\u00e9ponse \u00e9motionnelle<\/h5>\n\n\n\n<p>Les courriels tr\u00e8s r\u00e9pandus de <strong>hame\u00e7onnage,<\/strong> qui agissent sur l\u2019origine trompeuse d\u2019un courrier apparemment l\u00e9gitime et digne de confiance, \u00e0 l\u2019attaque, plus sophistiqu\u00e9e, dite de <strong><a href=\"https:\/\/www.cyberguru.it\/2021\/12\/20\/bec-a-volte-non-fidarsi-e-meglio-anche-se-a-chiedercelo-e-il-grande-capo\/\" target=\"_blank\" rel=\"noreferrer noopener\">Business Email Compromise (BEC)<\/a><\/strong>o\u00f9 l\u2019on sollicite le d\u00e9sir de faire quelque chose qui fera plaisir au patron&nbsp;; en passant par l\u2019escroquerie du <strong><a href=\"https:\/\/www.cyberguru.it\/2022\/01\/31\/attenzione-ai-contact-form-possono-riservare-brutte-sorprese\/\" target=\"_blank\" rel=\"noreferrer noopener\">formulaire de contact<\/a><\/strong>, qui s\u2019appuie sur l\u2019anxi\u00e9t\u00e9 suscit\u00e9e par la menace d\u2019une action en justice, \u00e0 l\u2019utilisation du probl\u00e8me li\u00e9 au <strong><a href=\"https:\/\/www.cyberguru.it\/2022\/01\/17\/omicron-attrazione-fatale-per-i-cyber-criminali\/\" target=\"_blank\" rel=\"noreferrer noopener\">Covid<\/a><\/strong> dans toutes ses nuances (variantes, passe sanitaire, etc.) pour tromper le malheureux \u00e0 travers les diff\u00e9rentes \u00e9motions que cela suscite.<\/p>\n\n\n\n<p>Ce qui assure le succ\u00e8s du cybercriminel, c\u2019est toujours l\u2019action r\u00e9active de la victime. C\u2019est-\u00e0-dire une r\u00e9ponse imm\u00e9diate et instinctive \u00e0 la provocation. Quand la victime se mettra \u00e0 r\u00e9fl\u00e9chir, si c\u2019est le cas, il sera trop tard.<\/p>\n\n\n\n<p>En effet, les r\u00e9ponses \u00e9motionnelles sont pr\u00e9cis\u00e9ment les plus profond\u00e9ment enracin\u00e9es en chacun de nous. L\u2019utilisation de la persuasion et de la manipulation \u00e9motionnelle dans les campagnes de phishing a fait l\u2019objet d\u2019une <a href=\"https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC6005691\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u00e9tude<\/a> publi\u00e9e par l\u2019<strong>American Psychological Society <\/strong> en 2018, laquelle examine \u00ab&nbsp;l\u2019excitation \u00e9motionnelle en tant que tactique de fraude&nbsp;\u00bb.<\/p>\n\n\n\n<p>Selon l\u2019\u00e9tude, les personnes examin\u00e9es ont pris de mauvaises d\u00e9cisions en r\u00e9pondant \u00e0 des messages de persuasion \u00e0 la fois n\u00e9gatifs et positifs, car \u00ab&nbsp;l\u2019excitation \u00e9motionnelle peut affecter la sensibilit\u00e9 \u00e0 l\u2019information trompeuse&nbsp;\u00bb. Et c\u2019est exactement le comportement que l\u2019escroc attend.<\/p>\n\n\n\n<p>La dangerosit\u00e9 de ce type de risque r\u00e9side donc pr\u00e9cis\u00e9ment dans le <strong>facteur humain<\/strong>. Ce clic, effectu\u00e9 avec l\u00e9g\u00e8ret\u00e9 et rapidit\u00e9 inconscientes, peut \u00eatre fatal et entra\u00eener la victime dans un enchev\u00eatrement de probl\u00e8mes qui, pour \u00eatre r\u00e9solus, demandent de l\u2019argent et du temps. En bref, une mauvaise histoire.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"come-si-puo-correre-ai-ripari\"><strong>Comment y rem\u00e9dier&nbsp;?<\/strong> <\/h5>\n\n\n\n<p>Il n\u2019y a pas de techniques ou de logiciels particuliers pouvant nous prot\u00e9ger contre ce type d\u2019attaque. La seule solution est une formation continue et actualis\u00e9e de sensibilisation \u00e0 la cybers\u00e9curit\u00e9. Une plus grande sensibilisation aux cyber-risques est n\u00e9cessaire pour reconna\u00eetre les tromperies qui manipulent les r\u00e9ponses \u00e9motionnelles. <\/p>\n\n\n\n<p>Ne perdez donc jamais votre concentration sur vos gestes informatiques et sur les cons\u00e9quences qu\u2019ils peuvent engendrer. Et ne prenez jamais de retard en mati\u00e8re d\u2019\u00e9ducation et de formation. Ce n\u2019est qu\u2019ainsi que nous rendrons la vie difficile au hacker en service qui devra partir \u00e0 la recherche d\u2019une autre victime moins bien pr\u00e9par\u00e9e que nous.<\/p>\n\n\n\n<p> <\/p>\n\n\n\n<div class=\"wp-block-group has-very-light-gray-background-color has-background is-layout-flow wp-block-group-is-layout-flow\">\n<p class=\"has-text-align-center\"><strong>En savoir plus sur les parcours de formation de Cyber Guru<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.cyberguru.it\/soluzioni-cyber-security-awareness\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"785\" height=\"602\" src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/05\/CGA_new.png\" alt=\"\" class=\"wp-image-5779\" srcset=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/05\/CGA_new.png 785w, https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/05\/CGA_new-480x368.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 785px, 100vw\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.cyberguru.it\/soluzioni-cyber-security-awareness\/cyber-guru-phishing\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"785\" height=\"602\" src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/05\/CGP_new.png\" alt=\"\" class=\"wp-image-5780\" srcset=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/05\/CGP_new.png 785w, https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/05\/CGP_new-480x368.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 785px, 100vw\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.cyberguru.it\/cyber-guru-channel\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"785\" height=\"602\" src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/10\/CGC_new.png\" alt=\"\" class=\"wp-image-6471\" srcset=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/10\/CGC_new.png 785w, https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/10\/CGC_new-480x368.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 785px, 100vw\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Il peut arriver \u00e0 quelqu\u2019un, peut-\u00eatre dans un moment difficile de l\u2019existence, la pens\u00e9e inavouable de devenir un hacker. Pour r\u00e9soudre quelques probl\u00e8mes, r\u00e9gler quelques affaires, peut-\u00eatre acheter cette maison tant d\u00e9sir\u00e9e qui est inaccessible avec le travail quotidien. Bref, pour donner une belle couche de peinture fra\u00eeche \u00e0 sa vie et ensuite retourner au [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":16889,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[116],"tags":[498,524,502],"class_list":["post-24770","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites","tag-cybersecurite-2","tag-ingenierie-sociale-fr","tag-sensibilisation-a-la-cybersecurite-fr-3"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Social Engineering&nbsp;: les \u00e9motions, le facteur humain de l\u2019escroquerie<\/title>\n<meta name=\"description\" content=\"Social engineering\u00a0: entre manipulation psychologique et techniques cybern\u00e9tiques, il s\u2019agit de la plus insidieuse des activit\u00e9s de cybercriminalit\u00e9, c\u2019est pourquoi...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/fr\/2022\/02\/15\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Engineering&nbsp;: les \u00e9motions, le facteur humain de l\u2019escroquerie\" \/>\n<meta property=\"og:description\" content=\"Social engineering\u00a0: entre manipulation psychologique et techniques cybern\u00e9tiques, il s\u2019agit de la plus insidieuse des activit\u00e9s de cybercriminalit\u00e9, c\u2019est pourquoi...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/fr\/2022\/02\/15\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-15T09:56:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-14T21:31:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/02\/Social-engineering-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"290\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/02\\\/15\\\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/02\\\/15\\\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Social Engineering&nbsp;: les \u00e9motions, le facteur humain de l\u2019escroquerie\",\"datePublished\":\"2022-02-15T09:56:37+00:00\",\"dateModified\":\"2023-02-14T21:31:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/02\\\/15\\\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\\\/\"},\"wordCount\":866,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/02\\\/15\\\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Social-engineering-1.webp\",\"keywords\":[\"Cybers\u00e9curit\u00e9\",\"ing\u00e9nierie sociale\",\"Sensibilisation \u00e0 la cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Security Awareness\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/02\\\/15\\\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/02\\\/15\\\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\\\/\",\"name\":\"Social Engineering&nbsp;: les \u00e9motions, le facteur humain de l\u2019escroquerie\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/02\\\/15\\\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/02\\\/15\\\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Social-engineering-1.webp\",\"datePublished\":\"2022-02-15T09:56:37+00:00\",\"dateModified\":\"2023-02-14T21:31:22+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"Social engineering\u00a0: entre manipulation psychologique et techniques cybern\u00e9tiques, il s\u2019agit de la plus insidieuse des activit\u00e9s de cybercriminalit\u00e9, c\u2019est pourquoi...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/02\\\/15\\\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/02\\\/15\\\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/02\\\/15\\\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Social-engineering-1.webp\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Social-engineering-1.webp\",\"width\":500,\"height\":290,\"caption\":\"Social engineering\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2022\\\/02\\\/15\\\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/page-daccueil-v2-brouillon\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social Engineering&nbsp;: les \u00e9motions, le facteur humain de l\u2019escroquerie\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Social Engineering&nbsp;: les \u00e9motions, le facteur humain de l\u2019escroquerie","description":"Social engineering\u00a0: entre manipulation psychologique et techniques cybern\u00e9tiques, il s\u2019agit de la plus insidieuse des activit\u00e9s de cybercriminalit\u00e9, c\u2019est pourquoi...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/fr\/2022\/02\/15\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\/","og_locale":"fr_FR","og_type":"article","og_title":"Social Engineering&nbsp;: les \u00e9motions, le facteur humain de l\u2019escroquerie","og_description":"Social engineering\u00a0: entre manipulation psychologique et techniques cybern\u00e9tiques, il s\u2019agit de la plus insidieuse des activit\u00e9s de cybercriminalit\u00e9, c\u2019est pourquoi...","og_url":"https:\/\/www.cyberguru.it\/fr\/2022\/02\/15\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2022-02-15T09:56:37+00:00","article_modified_time":"2023-02-14T21:31:22+00:00","og_image":[{"width":500,"height":290,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/02\/Social-engineering-1.webp","type":"image\/webp"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"m.baciucco"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/fr\/2022\/02\/15\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/2022\/02\/15\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Social Engineering&nbsp;: les \u00e9motions, le facteur humain de l\u2019escroquerie","datePublished":"2022-02-15T09:56:37+00:00","dateModified":"2023-02-14T21:31:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2022\/02\/15\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\/"},"wordCount":866,"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2022\/02\/15\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/02\/Social-engineering-1.webp","keywords":["Cybers\u00e9curit\u00e9","ing\u00e9nierie sociale","Sensibilisation \u00e0 la cybers\u00e9curit\u00e9"],"articleSection":["Security Awareness"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/fr\/2022\/02\/15\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\/","url":"https:\/\/www.cyberguru.it\/fr\/2022\/02\/15\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\/","name":"Social Engineering&nbsp;: les \u00e9motions, le facteur humain de l\u2019escroquerie","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2022\/02\/15\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2022\/02\/15\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/02\/Social-engineering-1.webp","datePublished":"2022-02-15T09:56:37+00:00","dateModified":"2023-02-14T21:31:22+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"Social engineering\u00a0: entre manipulation psychologique et techniques cybern\u00e9tiques, il s\u2019agit de la plus insidieuse des activit\u00e9s de cybercriminalit\u00e9, c\u2019est pourquoi...","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/fr\/2022\/02\/15\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/fr\/2022\/02\/15\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberguru.it\/fr\/2022\/02\/15\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/02\/Social-engineering-1.webp","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/02\/Social-engineering-1.webp","width":500,"height":290,"caption":"Social engineering"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/fr\/2022\/02\/15\/social-engineering-les-emotions-le-facteur-humain-de-lescroquerie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/fr\/page-daccueil-v2-brouillon\/"},{"@type":"ListItem","position":2,"name":"Social Engineering&nbsp;: les \u00e9motions, le facteur humain de l\u2019escroquerie"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/fr\/#website","url":"https:\/\/www.cyberguru.it\/fr\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/fr\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/24770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/comments?post=24770"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/24770\/revisions"}],"predecessor-version":[{"id":25573,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/24770\/revisions\/25573"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media\/16889"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media?parent=24770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/categories?post=24770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/tags?post=24770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}