7KqPH /¶HQMHXGHODFRQQDLVVD   &RU

7KqPH /¶HQMHXGHODFRQQDLVVD   &RUULJp’6Qƒ /HF\EHUHVSDFHFRQIOLFWXDOLWpHWFRR6XMHWGHGLVVHUWDWLRQ  /HF\EHUHVSDFHTXHOOHVUpDOLWpVHWTXHOVGpILV" ,QWURGXFWLRQ  &\EHUHVSDFH Ù LQWHUFRQQH[LRQGHVV\VWqPHVGHGRQQpHVQ 1XPpULVDWLRQFURLVVDQWHGHWRXWHVVSKqUHVG¶DFWLYLWpILQDQFLqUHVHQSDVVDQWSDUODGpPDWpULDOLVDWLRQGHVDG Ù  FHQWUDOLWpGXF\EHUHVSDFHTXLRIIUHGHQRXYHOOHVRSSRUW PDLVDXVVLGHQRXYHOOHVYXOQpUDELOLWpV&IVFDQGDOHGH OHVGRQQpHVGH)DFHERRNSRXULQIOXHQFHUOHVFRPSRUWHPHQpWDWVXQLHQQHVHWGXUpIpUHQGXPVXUOH%UH[LWHQ Pbmatique :&RPPHQWODQXPpULVDWLRQFURLVVDQWHGHVVRFLpWpV GpILV" , /HVUpDOLWpVGXF\EHUHVSDFH XQUpVHDXJOREDODXF ILUPHVHWGHVeWDWV  D  ’¶XQSURMHWPLOLWDLUHHWVFLHQWLILTXHjXQUpVHDXJGHPLOOLRQVj  PLOOLDUGV G¶LQWHUQDXWHV HQWUH  HW   GHV D FRPPHUFHWUDQVDFWLRQVILQDQFLqUHVREMHWVFRQQHFWÙ TXLQWXSOHPHQWGXWUDILF HQWUHHWU{OHFHQWUDOGHV17,& 1RXYHOOHV7H FRPPXQLFDWLRQ GDQVOHVRUJDQLVDWLRQSURGXFWLYHV Ù JHVWLRQGHVIOX[WHQGXVGH  E  La prépondérance des EU dans les trois couches du cyberespace :FRXFKHPDWpULHOOH Ù  GHVVHUYHXUVUDFLQHVGHVGDWDFHQWHUVGHOD HWSDU7H6XEFRPILUPHDPpULFDLQHFRXFKHORJLFLH Ù GRPLQDWLRQGHV *$)$0 *RRJOH  GHVUHFKHUFKHVHQOLJQHPLOOLDU *$)$0   F  Une nouvelle frontière du capitalisme :UHFXOGHODYLVLRQFLWR\HQQHFRR F\EHUHVSDFHLQFDUQpHGDQVGHVSURMHWVFRPPHOHVORJ YLVLRQPHUFDQWLOHFDSLWDOLVPHGHODVXUYHLOODQFH Ù FROOHFWHHWH[SORLWDWLRQG JUDQGHVILUPHVGXQXPpULTXHHQSURSRVDQWGHVVHUYLFH KDFNLQJ SLUDWDJHSRXUUHQGUHDFFHVVLEOHHWGLVSRQLÙ SURWHFWLRQGHVG GHSURSULpWpLQWHOOHFWXHOOH  7KqPH /¶HQMHXGHODFRQQDLVVD   ,, /HVGpILVGXF\EHUHVSDFH GHVHQMHX[PXOWLIRUPHVH WHQVLRQVHWGHULYDOLWpV  a) L’enjeu de la souveraineté numérique : 9RORQWpGHODSDUWGHVeWDWVGHF VWRFNDJHVGHGRQQpHVSRXUSOXVLHXUVUDLVRQV D HQM GRPLQDWLRQGHVILUPHVpWDWVXQLHQQHV E HQMHXGHV DIIDLUH6QRZGHQHQ 5XVVLH KpEHUJHPHQWVXUGHVG VHVFLWR\HQQHVHWFUpDWLRQGH<DQGH[SRXUFRQFXUUH IDFHDX[*$)$0SRVHGHFkEOHVVRXVPDULQVFKLQRLV*UHYHQDQWGHO¶H[WpULHXU9HUVXQHWHUULWRULDOLVDWLR b) L’enjeu de la cybersécurité : ’pSHQGDQFHFURLVVDQWHDX[UpVHDX[QXPp Ù FLEOHSRXUGHV DFWHXUVpWDWLTXHVRXQRQpWDWLTXHV&\EHUDWWDTXH Ù PR\HQGHGpVWDELOLVDWLRQFR DYHFO¶(VWRQLHHQRXOHV(8DYHFO¶,UDQ YHUVVWX[Q OHV UDQoRQJLFLHOV W\SH ZDQQDFU\ JURXSHV FULPLQHOV F\EHUVpFXULWpjO¶pFKHOOHHXURSpHQQHDYHFOHF\EHUVHWRXV OHV eWDWV PHPEUHV FRQWUH DXWHXU GHV F\EHUPHQ QRUPHVGHVpFXULWp HWjO¶pFKHOOHIUDQoDLVHFRPF\EHU WRXWHF\EHUDWWDTXHHWXWLOLVHUDUPHQXPpULTXHGDQ c) L’enjeu d’une régulation internationale : ’HPDQGHG¶XQHSURWHFWLRQGHODÙ PLVH HQSODFHGX5*3’SDUO¶8(EHVRLQGHUHVWDXUHUODFRQ FDPEULGJHDQDO\WLFD  Ù DSSHOGH3DULVHQSDUDFWHXUVGXF\21* SRXUXQHUpJXODWLRQLQWHUQDWLRQDOH0DLVUHIXV F\EHUHVSDFH UHOqYH G¶XQ IRQFWLRQQHPHQW GpFHQWUDOFRQWUDLQWHVLQWHUQDWLRQDOHVFRPPHGDQVOHFKDQJHP Ù XQLODWpUDOLVPH HW 5XVVLHHWGHOD&KLQHSRXUTXLOHF\EHUHVSDFHUHOqYH &RQFOXVLRQ  &RQWU{OHGHVIOX[HWGXVWRFNDJHGHVGRQQpHV Ù IDFWHXUGHSXLVVDQFHHWGOHVeWDWVHWOHVILUPHV Ù PXOWLSOLFDWLRQGHVULYDOLWpVHWGHVWHQVLÙ WHUULWRULDOLVDWLRQHPHUFDQWLOHGXF\EHUHVSDFHVRXVIRUPHGHFRPSpWLWLRQ Ù TXHVWLRQG¶XQHJRXYHUQDQFHPUpJXODWLRQSDUXQGURLWLQWHUQDWLRQDOSRXUPDLQWHQLU PRUFHOOHPHQWGXF\EHUHVSDFH   7KqPH /¶HQMHXGHODFRQQDLVVD   6XMHWG¶pWXGHFULWLTXHGHGRFXPHQWV  (QDQDO\VDQWOHGRFXPHQWVXLYDQWHWHQYRXVDSSX\DQWVX HWFRPPHQWODVpFXULWpGXF\EHUHVSDFHHVWGHYHQXHXQHQ ,QWURGXFWLRQ  /HF\EHUHVSDFHGpVLJQHO¶LQWHUFRQQH[LRQGHVV\VWq OHVWRFNDJHHWOHVIOX[GHGRQQpHVTXLHQGpFRXOHQW,OpFRQRPLHV GHV HQWUHSULVHV GHV (WDWV« HW GDQV OHV YLMonde FRQoX HQ FROODERUDWLRQ DYHF O¶$)3 $JHQFH )UDQFH 3UHVVH  PRQWUHO¶HQVHPEOHGHVDFWLYLWpVYDGHSDLUDYHFXQHYXOQpUDELO HW XQH VRXUFH GH ULFKHVVH OHF\EHUHVSDFH VXVFLWH GHV pWDWLTXHVSRXUV¶DSSURSULHUOHVGRQQpHVTXL\FLUFXOHQW LOGHFRPSUHQGUHODQDWXUHGHFHVF\EHUDWWDTXHVHWGHF  , /HF\EHUHVSDFH XQHVSDFHFUpDWHXUGHQRXYHOOHVYX  D  La dépendance de toutes les sphères d’activité au réseau numérique global et aux GAFAM : SODFHFHQWUDOHGXF\EHUHVSDFHHWGHV*$)$0UHIOpWpHGH O¶H[SORLWDWLRQ GH OD IDLOOH FKH] 0LFURVRIW pYRT RUJDQLVDWLRQVDPpULFDLQH“JUDQGHGLYHUVLWpGHVD SDUOHSDVVpQRWDPPHQWGDQVOHGRPDLQHGHODUHFKH DXVVL GHV FDELQHWV G¶DYRFDWV GHV XQLYHUVLWpV GH UpIOH[LRQHWGHV21*“ Ù 4XLQWXSOHPHQWGXWUDILFGHGRQQpHVHQW LQWHUQDXWHVjPLOOLDUGVDXMRXUG¶KXL*$)$0  PLO  E  Des cyberattaques permanentes qui exploitent des failles nombreuses : $UWLFOHGX 0RQGH IDLW OHOLHQHQWUHGHX[DWWDTXHVPDMHXUHVHQTXHOTXHVP Ù HQ)UDQFH DWWDTXHPDMHXUHWRXVOHVWURLVMRXUVH[SORLWDW SRXUFRQWRXUQHUHWLQILOWUHUOHVV\VWqPHVGHVpFXU([FKDQJHGH0LFURVRIWXQHPHVVDJHULHXWLOLVpHDXVVL GHVRUGLQDWHXUVSURIHVVLRQQHOV  ,, /HF\EHUHVSDFH DFWHXUVHWREMHFWLIVGHVF\EHUDWW  a) Des cybermenaces multiformes : 9RO GH GRQQpHV Ù  QRXYHOOH IRUPH G¶HVSLRQDFTXpULUGHVFRQQDLVVDQFHVHWGHVWHFKQRORJLHV 'GYROHUGHVUHFKHUFKHVVXUOH&RYLG “GDQVXQREMHFW 7KqPH /¶HQMHXGHODFRQQDLVVD   GHVVHFUHWVG¶eWDWVFRPPHGDQVOHFDVGHO¶DIIDLUH6SXLVVDQFHV  YRO GH GRQQpHV Ù  F\EHUFULPLQDOLWp  'JURXSHV FULPLQH UDQoRQJLFLHOVFRPPH:DQQDFU\HQ RUGLQDWHXUV DXVVLYLVDQWjUHQGUHGLVSRQLEOHGHVLQIRUPDWLRQVD WRXVDXQRPG¶XQHFRQFHSWLRQGpPRFUDWLTXH ZLNLOHDN b) Des acteurs variés : $UWLFOH GX 0RQGH PRQWUHTXH F\EHUHVSDFHHVW GHYH ULYDOLWpVJpRSROLWLTXHV (8DFFXVHQW&KLQHHW5XVV &RUpHGX1RUG F\EHUSXLVVDQFH VRXSoRQG¶DYRLUGLIIXV GHVUHVVRXUFHVSRXUILQDQFHUVRQSURJUDPPHG¶DUPHPHF\EHUDWWDTXHV VWX[QHW HQ  SRXU GpWUXLUH SURJUD JpQpUDOLVp DIIDLUH6QRZGHQHQ  ,,, /HF\EHUHVSDFH OHVGLIILFXOWpVGHODF\EHUVpFXULWp  a) Les défaillances et les insuffisances de la cybersécurité : 'OHGLUHFWHXUGH0LFURV %XUWDYDLW « DYHUWL « Appliquer rapidement les correctifs est la meilleure protection contre cette attaque. » Ù  DFWXDOLVDWLRQ SHUPDQHQWH GH OD F\EHUVp QpFHVVDLUHV FDU OHV JURXSHV GH F\EHUDWWDTXDQWV VVRSKLVWLTXpV“ jODUHFKHUFKHV\VWpPDWLTXHGHVIDLO PRGLILFDWLRQUpJXOLqUH’DQVO¶8(PLVHHQ°XYUHG¶XQHF\EHUVpFXULWp HXURSpHQQH  SRXU TX¶LO \ DLW DGRSWLRQ O¶HQVHPEOHGHVDFWHXUV b) La cyberguerre, une guerre des ombres : ’LIILFXOWpjLGHQWLILHUOHVDXWHHWGHVF\EHUDWWDTXHV Ù FI6RODUZLQGVLPSXWpjOD5XVVLHRXjOD&K KDFNHUVFRPPH+DIQLXP Ù FRUVDLUHVRSpUDQWSRXUGHVHQWUHSULV OLHQ GLIILFLOH j pWDEOLU  RSpUDWLRQV PHQpHV GH O¶HÙ  HQ GHKRUV GHVMXULGLFWLRQVG¶RGLIILFXOWpSRXUOHVDSSUpKHQGHUF ’pYHORSSHPHQWGHGRFWULQHVGHF\EHUGpIHQVH Ù GURLWUHYHQGLTXpSDUOHVeWD GHVF\EHUDWWDTXHV Ù F\EHUJXHUUH &RQFOXVLRQ  &HWWHDUWLFOHGX 0RQGH PRQWUHTXHODF\EHUVpFXULWpHWODF\EH HQMHX[PDMHXUVSRXUOHVLQGLYLGXVOHVILUPHVHWOHVeW UDLVRQGHVVSpFLILFLWpVGXF\EHUHVSDFHUpVHDXJOREDOTXGHSXLVVDQFHSRXUOHV(8LOOHVH[SRVHDXVVLjGHVQRXYHO uploads/Finance/ sujet-ds-cyberespace-corrige.pdf

  • 4
  • 0
  • 0
Afficher les détails des licences
Licence et utilisation
Gratuit pour un usage personnel Attribution requise
Partager
  • Détails
  • Publié le Aoû 06, 2021
  • Catégorie Business / Finance
  • Langue French
  • Taille du fichier 0.5865MB