{"id":223,"date":"2014-04-07T19:04:57","date_gmt":"2014-04-07T17:04:57","guid":{"rendered":"https:\/\/www.pedagogie.ac-nice.fr\/stmg\/2014\/04\/07\/tice-curiosite-2\/"},"modified":"2014-04-07T19:04:57","modified_gmt":"2014-04-07T17:04:57","slug":"tice-curiosite-2","status":"publish","type":"post","link":"https:\/\/www.pedagogie.ac-nice.fr\/economie-gestion\/2014\/04\/07\/tice-curiosite-2\/","title":{"rendered":"TICE : curiosit\u00e9 2"},"content":{"rendered":"<p style=\"margin: 15px 0px; color: #777777; font-family: sourcesanspro; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; orphans: auto; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-align: justify;\"><span style=\"background-color: transparent; color: #000000;\">L&rsquo;\u00e9diteur Kaspersky<span class=\"Apple-converted-space\">\u00a0<\/span>a mis en ligne<span class=\"Apple-converted-space\">\u00a0<\/span>une carte mondiale interactive des cyber-attaques<span class=\"Apple-converted-space\">\u00a0<\/span>(cybermenaces). Cette carte<span class=\"Apple-converted-space\">\u00a0<\/span>en 3D,<span class=\"Apple-converted-space\">\u00a0<\/span>tr\u00e9s p\u00e9dagogique, repr\u00e9sente en temps r\u00e9el le nombre d&rsquo;attaques d\u00e9tect\u00e9es (virus, spams&#8230;) par Kaspersky et leurs lieux d&rsquo;actions g\u00e9ographiques. De quoi sensilbilier le plus grand nombre aux menaces de toutes sortes (virus, spams)&#8230;<\/span><\/p>\n<p style=\"margin: 15px 0px; color: #777777; font-family: sourcesanspro; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; orphans: auto; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-align: justify;\">\u00a0<\/p>\n<p style=\"margin: 15px 0px; color: #777777; font-family: sourcesanspro; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;\"><span style=\"color: #000000;\">Un code couleur pour les menaces \u00a0:<\/span><\/p>\n<p style=\"margin: 15px 0px; color: #777777; font-family: sourcesanspro; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; orphans: auto; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-align: justify;\">\u00a0<\/p>\n<ul style=\"margin: 15px 0px; padding-left: 30px; color: #777777; font-family: sourcesanspro; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;\">\n<li><span style=\"color: #000000;\"><strong style=\"font-weight: bold;\">Vert :<\/strong><span class=\"Apple-converted-space\">\u00a0<\/span>antivirus automatique, scans sur lequels des malwares ont \u00e9t\u00e9 d\u00e9tect\u00e9s,<\/span><\/li>\n<li><span style=\"color: #000000;\"><strong style=\"font-weight: bold;\">Rouge :<\/strong><span class=\"Apple-converted-space\">\u00a0<\/span>analyses \u00e0 la demande,<\/span><\/li>\n<li><span style=\"color: #000000;\"><strong style=\"font-weight: bold;\">Bleu :<\/strong><span class=\"Apple-converted-space\">\u00a0<\/span>virus d\u00e9tect\u00e9s par la protection web,<\/span><\/li>\n<li><span style=\"color: #000000;\"><strong style=\"font-weight: bold;\">Orange :<\/strong><span class=\"Apple-converted-space\">\u00a0<\/span>e-mails avec des logiciels malveillants,<\/span><\/li>\n<li><span style=\"color: #000000;\"><strong style=\"font-weight: bold;\">Violet :<\/strong><span class=\"Apple-converted-space\">\u00a0<\/span>intrusions d\u00e9tect\u00e9es par le scanner,<\/span><\/li>\n<li><span style=\"color: #000000;\"><strong style=\"font-weight: bold;\">Jaune :<\/strong>\u00a0Vuln\u00e9rabilit\u00e9s analys\u00e9s par le logiciel.<\/span><\/li>\n<\/ul>\n<p><a href=\"http:\/\/cyberwar.kaspersky.com\/\" style=\"text-decoration: none; color: #00a3d9; font-family: sourcesanspro; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;\">http:\/\/cyberwar.kaspersky.com\/<\/a><\/p>\n<p style=\"margin: 15px 0px; color: #777777; font-family: sourcesanspro; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; orphans: auto; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-align: justify;\"><span style=\"background-color: transparent;\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>L&rsquo;\u00e9diteur Kaspersky\u00a0a mis en ligne\u00a0une carte mondiale interactive des cyber-attaques\u00a0(cybermenaces). Cette carte\u00a0en 3D,\u00a0tr\u00e9s p\u00e9dagogique, repr\u00e9sente en temps r\u00e9el le nombre<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","ngg_post_thumbnail":0,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-223","post","type-post","status-publish","format-standard","hentry","category-actualites"],"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"norco","author_link":"https:\/\/www.pedagogie.ac-nice.fr\/economie-gestion\/author\/norco\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/www.pedagogie.ac-nice.fr\/economie-gestion\/category\/actualites\/\" rel=\"category tag\">Actualit\u00e9s<\/a>","rttpg_excerpt":"L&rsquo;\u00e9diteur Kaspersky\u00a0a mis en ligne\u00a0une carte mondiale interactive des cyber-attaques\u00a0(cybermenaces). Cette carte\u00a0en 3D,\u00a0tr\u00e9s p\u00e9dagogique, repr\u00e9sente en temps r\u00e9el le nombre","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.pedagogie.ac-nice.fr\/economie-gestion\/wp-json\/wp\/v2\/posts\/223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pedagogie.ac-nice.fr\/economie-gestion\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pedagogie.ac-nice.fr\/economie-gestion\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pedagogie.ac-nice.fr\/economie-gestion\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pedagogie.ac-nice.fr\/economie-gestion\/wp-json\/wp\/v2\/comments?post=223"}],"version-history":[{"count":0,"href":"https:\/\/www.pedagogie.ac-nice.fr\/economie-gestion\/wp-json\/wp\/v2\/posts\/223\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.pedagogie.ac-nice.fr\/economie-gestion\/wp-json\/wp\/v2\/media?parent=223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pedagogie.ac-nice.fr\/economie-gestion\/wp-json\/wp\/v2\/categories?post=223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pedagogie.ac-nice.fr\/economie-gestion\/wp-json\/wp\/v2\/tags?post=223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}