﻿{"id":1386,"date":"2014-10-03T10:41:53","date_gmt":"2014-10-03T10:41:53","guid":{"rendered":"http:\/\/gtopic.net\/blog\/?p=1386"},"modified":"2024-11-21T13:06:05","modified_gmt":"2024-11-21T12:06:05","slug":"confiance-et-securite-dans-le-cyberespace","status":"publish","type":"post","link":"https:\/\/gtopic.net\/blog\/2014\/10\/03\/confiance-et-securite-dans-le-cyberespace\/","title":{"rendered":"Confiance et s\u00e9curit\u00e9 dans le cyberespace"},"content":{"rendered":"\n<p>La confiance &nbsp;\u00e9tant un volet important de toute strat\u00e9gie num\u00e9rique, la CEA l&rsquo;a abord\u00e9e dans &nbsp;les strat\u00e9gies nationales, mais &nbsp;l&rsquo;a &nbsp;aussi trait\u00e9e au niveau sous r\u00e9gional avec les communaut\u00e9s Economiques R\u00e9gionales (CER), &nbsp;et niveau continental, avec l&rsquo;active collaboration du Prof. Abdoullah Ciss\u00e9.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"218\" height=\"300\" src=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/abcisse-218x300.jpg\" alt=\"\" class=\"wp-image-1434\" style=\"width:420px;height:auto\" srcset=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/abcisse-218x300.jpg 218w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/abcisse-747x1024.jpg 747w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/abcisse-109x150.jpg 109w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/abcisse.jpg 1192w\" sizes=\"auto, (max-width: 218px) 100vw, 218px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">&nbsp;Prof. Abdoullah Ciss\u00e9 lors de l&rsquo;atelier sur la cyberl\u00e9gislation au Magnreb<\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>1. Collaboration avec les CER pour l&rsquo;harmonisation de la cyberl\u00e9gislation<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"212\" height=\"300\" src=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/216052495_10222507818542487_3127960723058326183_n-212x300.jpg\" alt=\"\" class=\"wp-image-5546\" style=\"width:424px;height:auto\" srcset=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/216052495_10222507818542487_3127960723058326183_n-212x300.jpg 212w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/216052495_10222507818542487_3127960723058326183_n-106x150.jpg 106w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/216052495_10222507818542487_3127960723058326183_n.jpg 609w\" sizes=\"auto, (max-width: 212px) 100vw, 212px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">Une des premi\u00e8res rencontres&nbsp; en Afrique de l&rsquo;Ouest en 2006<\/p>\n\n\n\n<p>Cette initiative a d&rsquo;abord d\u00e9but\u00e9 avec la CEDEAO et UEMOA &nbsp; avec un premier projet de lignes directrices \u00e9labor\u00e9 par Prof A. Ciss\u00e9, pour aboutir \u00e0 l&rsquo;adoption d&rsquo;un cadre juridiques dans les domaines suivants:<\/p>\n\n\n\n<p>&#8211; Transactions \u00e9lectroniques\/e-commerce<\/p>\n\n\n\n<p>&#8211; Protection des donn\u00e9es \u00e0 caract\u00e8re personnel<\/p>\n\n\n\n<p>&#8211; Lutte contre la cybercriminalit\u00e9<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><a href=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/Pic5.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"210\" src=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/Pic5-300x210.jpg\" alt=\"Pic5\" class=\"wp-image-1311\" style=\"width:432px;height:auto\" srcset=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/Pic5-300x210.jpg 300w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/Pic5-1024x720.jpg 1024w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/Pic5-150x105.jpg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"208\" src=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/Pic4-1-300x208.jpg\" alt=\"\" class=\"wp-image-5556\" style=\"width:428px;height:auto\" srcset=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/Pic4-1-300x208.jpg 300w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/Pic4-1-1024x711.jpg 1024w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/Pic4-1-768x533.jpg 768w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/Pic4-1-1536x1067.jpg 1536w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/Pic4-1-2048x1422.jpg 2048w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/Pic4-1-150x104.jpg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">Atelier \u00e0 Kampala pour l&rsquo;Afrique de l&rsquo;Est en 2006<\/p>\n\n\n\n<p>L\u2019int\u00e9r\u00eat des autres communaut\u00e9s EAC, CEEAC et CEMAC, SADC, et UMA &nbsp; a pouss\u00e9 la CEA \u00e0 travailler avec la Commission de l&rsquo;Union &nbsp;africaine (CUA ),&nbsp; sur un projet d&rsquo;harmonisation, capitalisant sur l&rsquo;exp\u00e9rience avec l&rsquo;Afrique de l&rsquo;Ouest.<\/p>\n\n\n\n<p>C&rsquo;est ainsi que plusieurs ateliers de consultations ont \u00e9t\u00e9 organis\u00e9s avec &nbsp;les CER, &nbsp;couvrant toutes les sous r\u00e9gions africaines.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"213\" src=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/AC-300x213.jpg\" alt=\"\" class=\"wp-image-5548\" style=\"width:428px;height:auto\" srcset=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/AC-300x213.jpg 300w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/AC-150x107.jpg 150w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/AC.jpg 607w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><a href=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/DSC01175.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"225\" src=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/DSC01175-300x225.jpg\" alt=\"DSC01175\" class=\"wp-image-1388\" style=\"width:428px;height:auto\" srcset=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/DSC01175-300x225.jpg 300w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/DSC01175-1024x768.jpg 1024w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/DSC01175-150x112.jpg 150w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/DSC01175.jpg 1920w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">Atelier \u00e0 Libreville pour l&rsquo;Afrique Centrale en 2011<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><a href=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/ECOWASworkshop.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/ECOWASworkshop-300x150.jpg\" alt=\"ECOWASworkshop\" class=\"wp-image-1389\" style=\"width:432px;height:auto\" srcset=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/ECOWASworkshop-300x150.jpg 300w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/ECOWASworkshop-150x75.jpg 150w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/ECOWASworkshop.jpg 630w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<p class=\"has-text-align-center\">Atelier \u00e0 Abidjan sur l\u2019harmonisation des cyberl\u00e9gislations en Afrique de l\u2019Ouest &nbsp;20-22 F\u00e9vrier 2012<\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>2. Cybers\u00e9curit\u00e9 et cyberl\u00e9gislation au Maghreb<\/strong><\/p>\n\n\n\n<p>Le Maroc ne faisant pas partie de l&rsquo;Union Africaine , un traitement sp\u00e9cial de ce sujet &nbsp;a \u00e9t\u00e9 fait pour la r\u00e9gion UMA, avec l&rsquo;organisation avec le Conseil de l\u2019Europe et Microsoft, d&rsquo;un atelier sur l\u2019harmonisation du cadre l\u00e9gal pour la cybers\u00e9curit\u00e9 en Afrique du Nord. Cet Atelier a eu lieu au Centre National pour la Recherche Scientifique et Technique (CNRST) \u00e0 Rabat du 27 au 28 juillet 2010.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><a href=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/harmMaghreb.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"206\" src=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/harmMaghreb-300x206.jpg\" alt=\"harmMaghreb\" class=\"wp-image-1425\" style=\"width:424px;height:auto\" srcset=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/harmMaghreb-300x206.jpg 300w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/harmMaghreb-1024x704.jpg 1024w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/harmMaghreb-150x103.jpg 150w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/harmMaghreb.jpg 1688w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><a href=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/cyber-legislation.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"209\" src=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/cyber-legislation-300x209.jpg\" alt=\"cyber legislation\" class=\"wp-image-1416\" style=\"width:420px;height:auto\" srcset=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/cyber-legislation-300x209.jpg 300w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/cyber-legislation-150x104.jpg 150w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/cyber-legislation.jpg 609w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/cyber-legislation.jpg\">Mme Eskedar Nega et Maitre Myriam Bennani lors de l&rsquo;atelier sur la cyberl\u00e9gislation au Maghreb<\/a><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><a href=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/UMA3.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"266\" src=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/UMA3-300x266.jpg\" alt=\"UMA3\" class=\"wp-image-1395\" style=\"width:430px;height:auto\" srcset=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/UMA3-300x266.jpg 300w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/UMA3-1024x910.jpg 1024w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/UMA3-150x133.jpg 150w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/UMA3.jpg 1313w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><a href=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/UMA2.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"215\" src=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/UMA2-300x215.jpg\" alt=\"UMA2\" class=\"wp-image-1397\" style=\"width:428px;height:auto\" srcset=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/UMA2-300x215.jpg 300w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/UMA2-1024x733.jpg 1024w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/UMA2-150x107.jpg 150w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/UMA2.jpg 1670w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;  <\/p>\n\n\n\n<p><strong>3. Projet de convention africaine pour la confiance et la s\u00e9curit\u00e9 dans le cyber espace<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><a href=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/UMA3.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/215480169_10222507820902546_3528094400916082919_n-300x200.jpg\" alt=\"\" class=\"wp-image-5517\" style=\"width:430px;height:auto\" srcset=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/215480169_10222507820902546_3528094400916082919_n-300x200.jpg 300w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/215480169_10222507820902546_3528094400916082919_n-768x511.jpg 768w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/215480169_10222507820902546_3528094400916082919_n-150x100.jpg 150w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/215480169_10222507820902546_3528094400916082919_n.jpg 901w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>Par rapport \u00e0 ce qui a \u00e9t\u00e9 adopt\u00e9 par la CEDEAO, deux th\u00e9matiques ont ainsi \u00e9t\u00e9 ajout\u00e9es au projet de convention de l&rsquo;union africaine:<\/p>\n\n\n\n<p>&#8211; Certification \u00e9lectronique<\/p>\n\n\n\n<p>&#8211; Cybers\u00e9curit\u00e9<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/au.int\/en\/treaties\/african-union-convention-cyber-security-and-personal-data-protection\n<\/div><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"224\" src=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/khartoum1-300x224.jpg\" alt=\"\" class=\"wp-image-5553\" style=\"width:430px;height:auto\" srcset=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/khartoum1-300x224.jpg 300w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/khartoum1-150x112.jpg 150w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/khartoum1.jpg 737w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">Avec le Juge Mohamed Chawki \u00e0 Khartoum<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><a href=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/CMCIT4Khartoum.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"140\" src=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/CMCIT4Khartoum-300x140.jpg\" alt=\"CMCIT4Khartoum\" class=\"wp-image-1413\" style=\"width:430px;height:auto\" srcset=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/CMCIT4Khartoum-300x140.jpg 300w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/CMCIT4Khartoum-150x70.jpg 150w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/CMCIT4Khartoum.jpg 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">R\u00e9union des experts en pr\u00e9paration de la Conf\u00e9rence de &lsquo;Union Africaine des ministres en charge de la Communication et des Technologies de l&rsquo;information (CITMC-4) 4\u00e8me Session ordinaire Khartoum,Soudan 02-06 septembre 2012<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><a href=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/dsc_0086.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"199\" src=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/dsc_0086-300x199.jpg\" alt=\"dsc_0086\" class=\"wp-image-1412\" style=\"width:428px;height:auto\" srcset=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/dsc_0086-300x199.jpg 300w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/dsc_0086-150x99.jpg 150w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/dsc_0086.jpg 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>4. Harmonisation de la cyberlegislation dans le monde arabe<\/strong><\/p>\n\n\n\n<p>Une coordination s&rsquo;est faite entre la CEA et l&rsquo;ESCWA dans le domaine de l&rsquo;harmonisation de la l\u00e9gislation. C&rsquo;est ainsi que la CEA &nbsp;a fait partie du comit\u00e9 directeur de ce projet \u00e0 l&rsquo;ESCWA, &nbsp;et celle ci a&nbsp; \u00e9t\u00e9 repr\u00e9sent\u00e9e&nbsp; aux ateliers organis\u00e9s par la CEA en Afrique du Nord.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><a href=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/UMA4.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"213\" src=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/UMA4-300x213.jpg\" alt=\"UMA4\" class=\"wp-image-1394\" style=\"width:424px;height:auto\" srcset=\"https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/UMA4-300x213.jpg 300w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/UMA4-1024x729.jpg 1024w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/UMA4-150x106.jpg 150w, https:\/\/gtopic.net\/blog\/wp-content\/uploads\/2014\/10\/UMA4.jpg 1688w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>La confiance &nbsp;\u00e9tant un volet important de toute strat\u00e9gie num\u00e9rique, la CEA l&rsquo;a abord\u00e9e dans &nbsp;les strat\u00e9gies nationales, mais &nbsp;l&rsquo;a&#8230; <a class=\"continue-reading-link\" href=\"https:\/\/gtopic.net\/blog\/2014\/10\/03\/confiance-et-securite-dans-le-cyberespace\/\">Suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":5517,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[106,105,103,104],"class_list":["post-1386","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tic","tag-cer","tag-conventionafricaine","tag-cybelegilation","tag-cybersecurite"],"_links":{"self":[{"href":"https:\/\/gtopic.net\/blog\/wp-json\/wp\/v2\/posts\/1386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gtopic.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gtopic.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gtopic.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gtopic.net\/blog\/wp-json\/wp\/v2\/comments?post=1386"}],"version-history":[{"count":85,"href":"https:\/\/gtopic.net\/blog\/wp-json\/wp\/v2\/posts\/1386\/revisions"}],"predecessor-version":[{"id":12050,"href":"https:\/\/gtopic.net\/blog\/wp-json\/wp\/v2\/posts\/1386\/revisions\/12050"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gtopic.net\/blog\/wp-json\/wp\/v2\/media\/5517"}],"wp:attachment":[{"href":"https:\/\/gtopic.net\/blog\/wp-json\/wp\/v2\/media?parent=1386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gtopic.net\/blog\/wp-json\/wp\/v2\/categories?post=1386"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gtopic.net\/blog\/wp-json\/wp\/v2\/tags?post=1386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}