{"id":70,"date":"2021-12-18T11:15:37","date_gmt":"2021-12-18T10:15:37","guid":{"rendered":"https:\/\/test.cyberdef.org\/?page_id=70"},"modified":"2022-01-30T11:34:36","modified_gmt":"2022-01-30T10:34:36","slug":"cyberdefensedatatech","status":"publish","type":"page","link":"https:\/\/cyberdef.org\/","title":{"rendered":"CYBERDEFENSE@DATATECH"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"70\" class=\"elementor elementor-70\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b6c09ea elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b6c09ea\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-10ef14f\" data-id=\"10ef14f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8afe6bf elementor-widget elementor-widget-text-editor\" data-id=\"8afe6bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.5.0 - 12-12-2021 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<h3><strong>NEWS :<\/strong><\/h3>\n<div>CYBERDEFENSE@DATATECH et POLYMATHEIA vous invitent \u00e0 vous familiariser avec le concept du darknet, le samedi 3 juillet \u00e0 partir de 10 heures.<\/div>\n<div><br><\/div>\n<div>\n<p>Qu&rsquo;est-ce que le darknet ? Quelle est la diff\u00e9rence entre <em>darknet, dark web<\/em> et <em>deep web<\/em> ? \u00c0 quoi sert-il ? Voil\u00e0 quelques unes des questions auxquelles nous nous efforcerons de r\u00e9pondre.<\/p>\n<p>Le darknet, ce n&rsquo;est pas uniquement un repaire de pirates qui se cachent derri\u00e8re l&rsquo;anonymat pour \u00e9changer drogue, armes, <em>bitcoins&#8230;<\/em><br>\n C&rsquo;est aussi pour des centaines de journalistes et militants un endroit<br>\ns\u00e9curis\u00e9 qui encourage la libert\u00e9 d&rsquo;expression dans des pays o\u00f9 elle est<br>\n menac\u00e9e ou inexistante.<\/p>\n<p>Venez d\u00e9couvrir, vous informer, \u00e9changer autour du darknet <strong>le samedi 3 juillet \u00e0 10 heures \u00e0 la maison des associations de Chamb\u00e9ry<\/strong>.<\/p>\n<p><b><em><span style=\"color: #808080;\">Entr\u00e9 libre et gratuite dans la limite des places disponibles<\/span><\/em><\/b><\/p>\n<\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6d642d7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6d642d7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-3c3023a\" data-id=\"3c3023a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd99457 elementor-widget elementor-widget-google_maps\" data-id=\"dd99457\" data-element_type=\"widget\" data-widget_type=\"google_maps.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.5.0 - 12-12-2021 *\/\n.elementor-widget-google_maps .elementor-widget-container{overflow:hidden}.elementor-widget-google_maps iframe{height:300px}<\/style>\t\t<div class=\"elementor-custom-embed\">\n\t\t\t<iframe frameborder=\"0\" scrolling=\"no\" marginheight=\"0\" marginwidth=\"0\"\n\t\t\t\t\tsrc=\"https:\/\/maps.google.com\/maps?q=%2067%20Rue%20Saint-Fran%C3%A7ois%20de%20Sales%2C%2073000%20Chamb%C3%A9ry&#038;t=m&#038;z=13&#038;output=embed&#038;iwloc=near\"\n\t\t\t\t\ttitle=\" 67 Rue Saint-Fran\u00e7ois de Sales, 73000 Chamb\u00e9ry\"\n\t\t\t\t\taria-label=\" 67 Rue Saint-Fran\u00e7ois de Sales, 73000 Chamb\u00e9ry\"\n\t\t\t><\/iframe>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-86d49f2\" data-id=\"86d49f2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b29087 elementor-widget elementor-widget-text-editor\" data-id=\"4b29087\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Parce que la s\u00e9curit\u00e9 informatique, la vie priv\u00e9e et la protection des donn\u00e9es sont des enjeux num\u00e9riques fondamentaux pour les ann\u00e9es \u00e0 venir, Polymatheia a cr\u00e9\u00e9 <strong>CYBERDEFENSE@DATATECH<\/strong>.<\/p>\n<p>L&rsquo;objectif de CYBERDEFENSE@DATATECH est de vous familiariser \u00e0 ces concepts et de vous accompagner au quotidien pour mieux g\u00e9rer votre vie num\u00e9rique.<\/p>\n<p><em><strong>Les pr\u00e9sentation&nbsp; ont lieu \u00e0 la Maison des associations de Chamb\u00e9ry, g\u00e9n\u00e9ralement le samedi matin. Elles sont gratuites, sans inscription pr\u00e9alable et ouvertes \u00e0 tous dans la limite des places disponibles. Elles sont syst\u00e9matiquement confirm\u00e9es sur la page Accueil du site ( News, en haut de la page).<\/strong><\/em><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>NEWS : CYBERDEFENSE@DATATECH et POLYMATHEIA vous invitent \u00e0 vous familiariser avec le concept du darknet, le samedi 3 juillet \u00e0 partir de 10 heures. Qu&rsquo;est-ce que le darknet ? Quelle est la diff\u00e9rence entre darknet, dark web et deep web ? \u00c0 quoi sert-il ? Voil\u00e0 quelques unes des questions auxquelles nous nous efforcerons de&hellip; <br \/> <a class=\"read-more\" href=\"https:\/\/cyberdef.org\/\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CYBERDEFENSE@DATATECH - CYBERDEFENSE@DATATECH<\/title>\n<meta name=\"description\" content=\"s\u00e9curit\u00e9 informatique, vie priv\u00e9e ,protection des donn\u00e9es sont des enjeux num\u00e9riques fondamentaux pour les ann\u00e9es \u00e0 venir, Polymatheia a cr\u00e9\u00e9 CYBERDEFENSE@DATATECH .\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberdef.org\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CYBERDEFENSE@DATATECH - CYBERDEFENSE@DATATECH\" \/>\n<meta property=\"og:description\" content=\"s\u00e9curit\u00e9 informatique, vie priv\u00e9e ,protection des donn\u00e9es sont des enjeux num\u00e9riques fondamentaux pour les ann\u00e9es \u00e0 venir, Polymatheia a cr\u00e9\u00e9 CYBERDEFENSE@DATATECH .\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberdef.org\/\" \/>\n<meta property=\"og:site_name\" content=\"CYBERDEFENSE@DATATECH\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-30T10:34:36+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberdef.org\/#website\",\"url\":\"https:\/\/cyberdef.org\/\",\"name\":\"CYBERDEFENSE@DATATECH\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberdef.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberdef.org\/#webpage\",\"url\":\"https:\/\/cyberdef.org\/\",\"name\":\"CYBERDEFENSE@DATATECH - CYBERDEFENSE@DATATECH\",\"isPartOf\":{\"@id\":\"https:\/\/cyberdef.org\/#website\"},\"datePublished\":\"2021-12-18T10:15:37+00:00\",\"dateModified\":\"2022-01-30T10:34:36+00:00\",\"description\":\"s\\u00e9curit\\u00e9 informatique, vie priv\\u00e9e ,protection des donn\\u00e9es sont des enjeux num\\u00e9riques fondamentaux pour les ann\\u00e9es \\u00e0 venir, Polymatheia a cr\\u00e9\\u00e9 CYBERDEFENSE@DATATECH .\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberdef.org\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberdef.org\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberdef.org\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/cyberdef.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CYBERDEFENSE@DATATECH\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CYBERDEFENSE@DATATECH - CYBERDEFENSE@DATATECH","description":"s\u00e9curit\u00e9 informatique, vie priv\u00e9e ,protection des donn\u00e9es sont des enjeux num\u00e9riques fondamentaux pour les ann\u00e9es \u00e0 venir, Polymatheia a cr\u00e9\u00e9 CYBERDEFENSE@DATATECH .","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberdef.org\/","og_locale":"fr_FR","og_type":"article","og_title":"CYBERDEFENSE@DATATECH - CYBERDEFENSE@DATATECH","og_description":"s\u00e9curit\u00e9 informatique, vie priv\u00e9e ,protection des donn\u00e9es sont des enjeux num\u00e9riques fondamentaux pour les ann\u00e9es \u00e0 venir, Polymatheia a cr\u00e9\u00e9 CYBERDEFENSE@DATATECH .","og_url":"https:\/\/cyberdef.org\/","og_site_name":"CYBERDEFENSE@DATATECH","article_modified_time":"2022-01-30T10:34:36+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/cyberdef.org\/#website","url":"https:\/\/cyberdef.org\/","name":"CYBERDEFENSE@DATATECH","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberdef.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/cyberdef.org\/#webpage","url":"https:\/\/cyberdef.org\/","name":"CYBERDEFENSE@DATATECH - CYBERDEFENSE@DATATECH","isPartOf":{"@id":"https:\/\/cyberdef.org\/#website"},"datePublished":"2021-12-18T10:15:37+00:00","dateModified":"2022-01-30T10:34:36+00:00","description":"s\u00e9curit\u00e9 informatique, vie priv\u00e9e ,protection des donn\u00e9es sont des enjeux num\u00e9riques fondamentaux pour les ann\u00e9es \u00e0 venir, Polymatheia a cr\u00e9\u00e9 CYBERDEFENSE@DATATECH .","breadcrumb":{"@id":"https:\/\/cyberdef.org\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberdef.org\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyberdef.org\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/cyberdef.org\/"},{"@type":"ListItem","position":2,"name":"CYBERDEFENSE@DATATECH"}]}]}},"_links":{"self":[{"href":"https:\/\/cyberdef.org\/index.php\/wp-json\/wp\/v2\/pages\/70"}],"collection":[{"href":"https:\/\/cyberdef.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberdef.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberdef.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberdef.org\/index.php\/wp-json\/wp\/v2\/comments?post=70"}],"version-history":[{"count":30,"href":"https:\/\/cyberdef.org\/index.php\/wp-json\/wp\/v2\/pages\/70\/revisions"}],"predecessor-version":[{"id":280,"href":"https:\/\/cyberdef.org\/index.php\/wp-json\/wp\/v2\/pages\/70\/revisions\/280"}],"wp:attachment":[{"href":"https:\/\/cyberdef.org\/index.php\/wp-json\/wp\/v2\/media?parent=70"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}