{"id":940,"date":"2023-01-19T16:13:47","date_gmt":"2023-01-19T16:13:47","guid":{"rendered":"https:\/\/guide.trustvalley.swiss\/?post_type=chapter&#038;p=940"},"modified":"2023-06-30T10:20:24","modified_gmt":"2023-06-30T10:20:24","slug":"les-scans-de-vulnerabilites","status":"publish","type":"chapter","link":"https:\/\/guide.trustvalley.swiss\/fr\/chapitre\/les-scans-de-vulnerabilites\/","title":{"rendered":"Les scans de vuln\u00e9rabilit\u00e9s"},"content":{"rendered":"\n<p>Lorsque que les collaborateurs ne sont pas mis en cause, les cyberattaques sont souvent la cause d\u2019une exploitation d\u2019une faille logiciel ou informatique. Il est par cons\u00e9quent utile de r\u00e9aliser des scans de vuln\u00e9rabilit\u00e9s afin de d\u00e9tecter des failles, des services vuln\u00e9rables ou des mises \u00e0 jour manquantes.<\/p>\n\n\n\n<p>Les scans de vuln\u00e9rabilit\u00e9s peuvent se faire de mani\u00e8re interne ou externe.<\/p>\n","protected":false},"featured_media":0,"template":"","categories":[],"searchablecategory":[],"class_list":["post-940","chapter","type-chapter","status-publish","hentry"],"taxonomy_info":[],"featured_image_src_large":false,"author_info":[],"comment_info":"","_links":{"self":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/chapter\/940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/chapter"}],"about":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/types\/chapter"}],"wp:attachment":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/media?parent=940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/categories?post=940"},{"taxonomy":"searchablecategory","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/searchablecategory?post=940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}