{"id":1426,"date":"2023-05-28T06:43:24","date_gmt":"2023-05-28T06:43:24","guid":{"rendered":"https:\/\/guide.trustvalley.swiss\/?post_type=chapter&#038;p=1426"},"modified":"2023-05-28T06:43:26","modified_gmt":"2023-05-28T06:43:26","slug":"infiltration","status":"publish","type":"chapter","link":"https:\/\/guide.trustvalley.swiss\/fr\/chapitre\/infiltration\/","title":{"rendered":"Infiltration"},"content":{"rendered":"\n<p>L&rsquo;attaquant incite un utilisateur \u00e0 ex\u00e9cuter un logiciel malveillant pour compromettre sa machine ou obtenir un acc\u00e8s non autoris\u00e9 au r\u00e9seau avec l\u2019envoi d\u2019un courriel de phishing et\/ou de messages de r\u00e9seaux sociaux malveillants.<\/p>\n\n\n\n<p><strong>\u00c9chelle de temps<\/strong><\/p>\n\n\n\n<p>Heures &#8211; Jours<\/p>\n\n\n\n<p><strong>Tactiques utilis\u00e9es<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Courriels de phishing cibl\u00e9s<\/li>\n\n\n\n<li>Ing\u00e9nierie sociale<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"featured_media":0,"template":"","categories":[],"searchablecategory":[],"class_list":["post-1426","chapter","type-chapter","status-publish","hentry"],"taxonomy_info":[],"featured_image_src_large":false,"author_info":[],"comment_info":"","_links":{"self":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/chapter\/1426","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/chapter"}],"about":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/types\/chapter"}],"wp:attachment":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/media?parent=1426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/categories?post=1426"},{"taxonomy":"searchablecategory","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/searchablecategory?post=1426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}