{"id":917,"date":"2023-01-18T16:54:52","date_gmt":"2023-01-18T16:54:52","guid":{"rendered":"https:\/\/guide.trustvalley.swiss\/?post_type=chapter&#038;p=917"},"modified":"2023-05-28T06:42:24","modified_gmt":"2023-05-28T06:42:24","slug":"chronologie-dune-cyberattaque","status":"publish","type":"chapter","link":"https:\/\/guide.trustvalley.swiss\/fr\/chapitre\/chronologie-dune-cyberattaque\/","title":{"rendered":"Chronologie d\u2019une cyberattaque"},"content":{"rendered":"\n<p>Ce chapitre d\u00e9crit les diff\u00e9rentes phases d\u2019une cyberattaque et les impacts associ\u00e9s, ainsi que les techniques utilis\u00e9es par les attaquants. Il appara\u00eet important de comprendre le mode op\u00e9ratoire des attaquants pour mieux s\u2019en pr\u00e9venir.<\/p>\n","protected":false},"featured_media":0,"template":"","categories":[],"searchablecategory":[],"class_list":["post-917","chapter","type-chapter","status-publish","hentry"],"taxonomy_info":[],"featured_image_src_large":false,"author_info":[],"comment_info":"","_links":{"self":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/chapter\/917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/chapter"}],"about":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/types\/chapter"}],"wp:attachment":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/media?parent=917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/categories?post=917"},{"taxonomy":"searchablecategory","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/searchablecategory?post=917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}