
{"id":1012,"date":"2021-06-30T17:07:53","date_gmt":"2021-06-30T16:07:53","guid":{"rendered":"https:\/\/collective-protection.info\/?p=1012"},"modified":"2021-06-30T17:07:55","modified_gmt":"2021-06-30T16:07:55","slug":"security-in-a-box-outils-et-tactiques-de-securite-numerique","status":"publish","type":"post","link":"https:\/\/collective-protection.info\/fr\/security-in-a-box-outils-et-tactiques-de-securite-numerique\/","title":{"rendered":"Security in a Box &#8211; Outils et tactiques de s\u00e9curit\u00e9 num\u00e9rique"},"content":{"rendered":"<p>[vc_row full_height=\u00a0\u00bbyes\u00a0\u00bb columns_placement=\u00a0\u00bbstretch\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/4&Prime; css=\u00a0\u00bb.vc_custom_1616602966813{border-right-width: 1px !important;padding-top: 12px !important;border-right-color: #000000 !important;border-right-style: solid !important;}\u00a0\u00bb][vc_column_text css=\u00a0\u00bb.vc_custom_1619798132459{margin-bottom: 15px !important;border-bottom-width: 1px !important;padding-bottom: 12px !important;border-bottom-color: #000000 !important;border-bottom-style: solid !important;}\u00a0\u00bb]<\/p>\n<h2>Filtrer les r\u00e9sultats<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbRetour aux ressources\u00a0\u00bb style=\u00a0\u00bbclassic\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb color=\u00a0\u00bbwhite\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fcollective-protection.info%2Ffr%2F\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb3\/4&Prime; css=\u00a0\u00bb.vc_custom_1616680183879{padding-top: 12px !important;}\u00a0\u00bb][vc_column_text css=\u00a0\u00bb.vc_custom_1625067979616{margin-bottom: 12px !important;border-bottom-width: 1px !important;padding-bottom: 12px !important;border-bottom-color: #000000 !important;border-bottom-style: solid !important;}\u00a0\u00bb]<\/p>\n<h2>Security in a Box &#8211; Outils et tactiques de s\u00e9curit\u00e9 num\u00e9rique<\/h2>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-lg-8 vc_col-md-12 vc_col-xs-12&Prime;][vc_column_text css=\u00a0\u00bb.vc_custom_1625068247976{margin-bottom: 25px !important;}\u00a0\u00bb]Organisation: <strong>Tactical Technology Collective; Frontline Defenders<\/strong><\/p>\n<p>Pays\/R\u00e9gion: <strong>International<\/strong><\/p>\n<p>Type: <strong>Outil Num\u00e9rique<\/strong><\/p>\n<p>Security-in-a-box est un guide de s\u00e9curit\u00e9 num\u00e9rique destin\u00e9 aux activistes et d\u00e9fenseurs des droits humains dans le monde entier.<\/p>\n<p>Si la s\u00e9curit\u00e9 num\u00e9rique est une nouveaut\u00e9 pour vous, les\u00a0guides tactiques\u00a0vous pr\u00e9senteront les principes de base, notamment des conseils pour une utilisation plus s\u00fbre des plateformes de r\u00e9seaux sociaux et des t\u00e9l\u00e9phones portables. Les\u00a0guides d\u2019outils pratiques\u00a0fournissent des instructions pour vous aider \u00e0 installer pas \u00e0 pas et utiliser les logiciels et services essentiels \u00e0 votre s\u00e9curit\u00e9 num\u00e9rique.<\/p>\n<p>Les\u00a0community guides\u00a0sont destin\u00e9s \u00e0 des groupes sp\u00e9cifiques &#8211; parfois r\u00e9gionaux &#8211; qui sont expos\u00e9s \u00e0 des menaces num\u00e9riques s\u00e9v\u00e8res. Ces guides comportent des conseils sur mesures sur les outils et tactiques adapt\u00e9s aux besoins sp\u00e9cifiques de ces groupes.<\/p>\n<p>Security-in-a-box est un projet conjoint de\u00a0<a href=\"https:\/\/www.frontlinedefenders.org\/\">Front Line Defenders<\/a>\u00a0et\u00a0<a href=\"https:\/\/tacticaltech.org\/\">du collectif Tactical Technology<\/a>, \u00e9labor\u00e9 \u00e9galement avec l&rsquo;appui d&rsquo;un r\u00e9seau mondial d&rsquo;activistes, de formateurs et d&rsquo;experts en s\u00e9curit\u00e9 num\u00e9rique.<\/p>\n<p>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1625068165453{margin-bottom: 0px !important;border-top-width: 1px !important;padding-top: 8px !important;padding-bottom: 30px !important;border-top-color: #000000 !important;border-top-style: solid !important;}\u00a0\u00bb]<\/p>\n<h5>Organisation: <strong>Tactical Technology Collective; Frontline Defenders<\/strong><\/h5>\n<h5>An(s): <strong>N\/A<\/strong><\/h5>\n<h5>Langue(s):<strong> Anglais, fran\u00e7ais, espagnol, portugais, bahasa, russe, tha\u00ef, arabe, turc, vietnamien, chinois<\/strong><\/h5>\n<h5>Pays\/R\u00e9gion: <strong>International<\/strong><\/h5>\n<h5>Domaine: <strong>S\u00e9curit\u00e9 Num\u00e9rique, Recherche, campagnes et plaidoyer<\/strong><\/h5>\n<h5>Rating:<strong> 9,5<\/strong><\/h5>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbLien vers la ressource\u00a0\u00bb style=\u00a0\u00bbclassic\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb color=\u00a0\u00bbwhite\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fsecurityinabox.org%2Ffr%2F|target:_blank\u00a0\u00bb][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/3&Prime; offset=\u00a0\u00bbvc_hidden-md vc_hidden-sm vc_hidden-xs\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_height=\u00a0\u00bbyes\u00a0\u00bb columns_placement=\u00a0\u00bbstretch\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/4&Prime; css=\u00a0\u00bb.vc_custom_1616602966813{border-right-width: 1px !important;padding-top: 12px !important;border-right-color: #000000 !important;border-right-style: solid !important;}\u00a0\u00bb][vc_column_text css=\u00a0\u00bb.vc_custom_1619798132459{margin-bottom: 15px !important;border-bottom-width: 1px !important;padding-bottom: 12px !important;border-bottom-color: #000000 !important;border-bottom-style: solid !important;}\u00a0\u00bb] Filtrer les r\u00e9sultats [\/vc_column_text][vc_btn title=\u00a0\u00bbRetour aux ressources\u00a0\u00bb style=\u00a0\u00bbclassic\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb color=\u00a0\u00bbwhite\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fcollective-protection.info%2Ffr%2F\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb3\/4&Prime; css=\u00a0\u00bb.vc_custom_1616680183879{padding-top: 12px !important;}\u00a0\u00bb][vc_column_text css=\u00a0\u00bb.vc_custom_1625067979616{margin-bottom: 12px !important;border-bottom-width: 1px !important;padding-bottom: 12px !important;border-bottom-color: #000000 !important;border-bottom-style: solid !important;}\u00a0\u00bb] Security in a Box &#8211;&hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[4],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/collective-protection.info\/fr\/wp-json\/wp\/v2\/posts\/1012"}],"collection":[{"href":"https:\/\/collective-protection.info\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/collective-protection.info\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/collective-protection.info\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/collective-protection.info\/fr\/wp-json\/wp\/v2\/comments?post=1012"}],"version-history":[{"count":2,"href":"https:\/\/collective-protection.info\/fr\/wp-json\/wp\/v2\/posts\/1012\/revisions"}],"predecessor-version":[{"id":1014,"href":"https:\/\/collective-protection.info\/fr\/wp-json\/wp\/v2\/posts\/1012\/revisions\/1014"}],"wp:attachment":[{"href":"https:\/\/collective-protection.info\/fr\/wp-json\/wp\/v2\/media?parent=1012"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/collective-protection.info\/fr\/wp-json\/wp\/v2\/categories?post=1012"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/collective-protection.info\/fr\/wp-json\/wp\/v2\/tags?post=1012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}