{"id":19047,"date":"2020-03-19T13:00:45","date_gmt":"2020-03-19T13:00:45","guid":{"rendered":"https:\/\/\/white_papers\/anatomie-des-microcontroleurs-de-securite-pour-les-applications-iot\/"},"modified":"2022-01-26T15:06:54","modified_gmt":"2022-01-26T15:06:54","slug":"anatomie-des-microcontroleurs-de-securite-pour-les-applications-iot","status":"publish","type":"white_papers","link":"https:\/\/www.ecinews.fr\/fr\/white_papers\/anatomie-des-microcontroleurs-de-securite-pour-les-applications-iot\/","title":{"rendered":"Anatomie des microcontr\u00f4leurs de s\u00e9curit\u00e9 pour les applications IoT"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>L&rsquo;impl\u00e9mentation de la s\u00e9curit\u00e9 dans les conceptions embarqu\u00e9es peut sembler \u00eatre une t\u00e2che colossale. C&rsquo;est l\u00e0 que les microcontr\u00f4leurs sp\u00e9cialis\u00e9s dans les fonctionnalit\u00e9s de s\u00e9curit\u00e9 entrent en jeu pour activer la s\u00e9curit\u00e9 d\u00e8s le d\u00e9but de la conception embarqu\u00e9e. C&rsquo;est une bonne chose, car il ne fait aucun doute qu&rsquo;une nouvelle g\u00e9n\u00e9ration de solutions embarqu\u00e9es est n\u00e9cessaire pour s\u00e9curiser les applications Internet des objets (IoT).<br \/>\nD&rsquo;apr\u00e8s une \u00e9tude d&rsquo;ABI Research, on estime que moins de 4 % des dispositifs IoT vendus l&rsquo;an pass\u00e9 int\u00e9graient des fonctionnalit\u00e9s de s\u00e9curit\u00e9 embarqu\u00e9e. Dans le m\u00eame temps, la soci\u00e9t\u00e9 d&rsquo;\u00e9tudes de march\u00e9 pr\u00e9voit que, d&rsquo;ici 2020, pr\u00e8s de 25 % des cyberattaques cibleront les dispositifs IoT, faisant des microcontr\u00f4leurs de s\u00e9curit\u00e9 un sujet br\u00fblant.<\/p>\n","protected":false},"featured_media":19049,"template":"","tags":[],"company":[176],"wp_category":[],"ppma_author":[1141],"class_list":["post-19047","white_papers","type-white_papers","status-publish","has-post-thumbnail","hentry","company-digi-key-electronics"],"acf":[],"yoast_head":"<title>Anatomie des microcontr\u00f4leurs de s\u00e9curit\u00e9 pour les applicati...<\/title>\n<meta name=\"description\" content=\"L&#039;impl\u00e9mentation de la s\u00e9curit\u00e9 dans les conceptions embarqu\u00e9es peut sembler \u00eatre une t\u00e2che colossale. C&#039;est l\u00e0 que les microcontr\u00f4leurs...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/white_papers\/19047\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anatomie des microcontr\u00f4leurs de s\u00e9curit\u00e9 pour les applications IoT\" \/>\n<meta property=\"og:description\" content=\"L&#039;impl\u00e9mentation de la s\u00e9curit\u00e9 dans les conceptions embarqu\u00e9es peut sembler \u00eatre une t\u00e2che colossale. C&#039;est l\u00e0 que les microcontr\u00f4leurs sp\u00e9cialis\u00e9s dans les fonctionnalit\u00e9s de s\u00e9curit\u00e9 entrent en jeu pour activer la s\u00e9curit\u00e9 d\u00e8s le d\u00e9but de la conception embarqu\u00e9e. C&#039;est une bonne chose, car il ne fait aucun doute qu&#039;une nouvelle g\u00e9n\u00e9ration de solutions embarqu\u00e9es est n\u00e9cessaire pour s\u00e9curiser les applications Internet des objets (IoT). D&#039;apr\u00e8s une \u00e9tude d&#039;ABI Research, on estime que moins de 4 % des dispositifs IoT vendus l&#039;an pass\u00e9 int\u00e9graient des fonctionnalit\u00e9s de s\u00e9curit\u00e9 embarqu\u00e9e. Dans le m\u00eame temps, la soci\u00e9t\u00e9 d&#039;\u00e9tudes de march\u00e9 pr\u00e9voit que, d&#039;ici 2020, pr\u00e8s de 25 % des cyberattaques cibleront les dispositifs IoT, faisant des microcontr\u00f4leurs de s\u00e9curit\u00e9 un sujet br\u00fblant.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/white_papers\/19047\/\" \/>\n<meta property=\"og:site_name\" content=\"EENewsEurope\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-26T15:06:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/eci8456_digi-key_applic_rich_miron_bio.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1415\" \/>\n\t<meta property=\"og:image:height\" content=\"1769\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/white_papers\/anatomie-des-microcontroleurs-de-securite-pour-les-applications-iot\/\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/white_papers\/anatomie-des-microcontroleurs-de-securite-pour-les-applications-iot\/\",\"name\":\"Anatomie des microcontr\u00f4leurs de s\u00e9curit\u00e9 pour les applications IoT -\",\"isPartOf\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\"},\"datePublished\":\"2020-03-19T13:00:45+00:00\",\"dateModified\":\"2022-01-26T15:06:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/white_papers\/anatomie-des-microcontroleurs-de-securite-pour-les-applications-iot\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ecinews.fr\/fr\/white_papers\/anatomie-des-microcontroleurs-de-securite-pour-les-applications-iot\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/white_papers\/anatomie-des-microcontroleurs-de-securite-pour-les-applications-iot\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ecinews.fr\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Anatomie des microcontr\u00f4leurs de s\u00e9curit\u00e9 pour les applications IoT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"name\":\"EENewsEurope\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\",\"name\":\"EENewsEurope\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"contentUrl\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"width\":283,\"height\":113,\"caption\":\"EENewsEurope\"},\"image\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>","yoast_head_json":{"title":"Anatomie des microcontr\u00f4leurs de s\u00e9curit\u00e9 pour les applicati...","description":"L'impl\u00e9mentation de la s\u00e9curit\u00e9 dans les conceptions embarqu\u00e9es peut sembler \u00eatre une t\u00e2che colossale. C'est l\u00e0 que les microcontr\u00f4leurs...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/white_papers\/19047\/","og_locale":"fr_FR","og_type":"article","og_title":"Anatomie des microcontr\u00f4leurs de s\u00e9curit\u00e9 pour les applications IoT","og_description":"L'impl\u00e9mentation de la s\u00e9curit\u00e9 dans les conceptions embarqu\u00e9es peut sembler \u00eatre une t\u00e2che colossale. C'est l\u00e0 que les microcontr\u00f4leurs sp\u00e9cialis\u00e9s dans les fonctionnalit\u00e9s de s\u00e9curit\u00e9 entrent en jeu pour activer la s\u00e9curit\u00e9 d\u00e8s le d\u00e9but de la conception embarqu\u00e9e. C'est une bonne chose, car il ne fait aucun doute qu'une nouvelle g\u00e9n\u00e9ration de solutions embarqu\u00e9es est n\u00e9cessaire pour s\u00e9curiser les applications Internet des objets (IoT). D'apr\u00e8s une \u00e9tude d'ABI Research, on estime que moins de 4 % des dispositifs IoT vendus l'an pass\u00e9 int\u00e9graient des fonctionnalit\u00e9s de s\u00e9curit\u00e9 embarqu\u00e9e. Dans le m\u00eame temps, la soci\u00e9t\u00e9 d'\u00e9tudes de march\u00e9 pr\u00e9voit que, d'ici 2020, pr\u00e8s de 25 % des cyberattaques cibleront les dispositifs IoT, faisant des microcontr\u00f4leurs de s\u00e9curit\u00e9 un sujet br\u00fblant.","og_url":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/white_papers\/19047\/","og_site_name":"EENewsEurope","article_modified_time":"2022-01-26T15:06:54+00:00","og_image":[{"width":1415,"height":1769,"url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/eci8456_digi-key_applic_rich_miron_bio.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ecinews.fr\/fr\/white_papers\/anatomie-des-microcontroleurs-de-securite-pour-les-applications-iot\/","url":"https:\/\/www.ecinews.fr\/fr\/white_papers\/anatomie-des-microcontroleurs-de-securite-pour-les-applications-iot\/","name":"Anatomie des microcontr\u00f4leurs de s\u00e9curit\u00e9 pour les applications IoT -","isPartOf":{"@id":"https:\/\/www.eenewseurope.com\/en\/#website"},"datePublished":"2020-03-19T13:00:45+00:00","dateModified":"2022-01-26T15:06:54+00:00","breadcrumb":{"@id":"https:\/\/www.ecinews.fr\/fr\/white_papers\/anatomie-des-microcontroleurs-de-securite-pour-les-applications-iot\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ecinews.fr\/fr\/white_papers\/anatomie-des-microcontroleurs-de-securite-pour-les-applications-iot\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ecinews.fr\/fr\/white_papers\/anatomie-des-microcontroleurs-de-securite-pour-les-applications-iot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ecinews.fr\/fr\/"},{"@type":"ListItem","position":2,"name":"Anatomie des microcontr\u00f4leurs de s\u00e9curit\u00e9 pour les applications IoT"}]},{"@type":"WebSite","@id":"https:\/\/www.eenewseurope.com\/en\/#website","url":"https:\/\/www.eenewseurope.com\/en\/","name":"EENewsEurope","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.eenewseurope.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.eenewseurope.com\/en\/#organization","name":"EENewsEurope","url":"https:\/\/www.eenewseurope.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","contentUrl":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","width":283,"height":113,"caption":"EENewsEurope"},"image":{"@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/white_papers\/19047"}],"collection":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/white_papers"}],"about":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/types\/white_papers"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media\/19049"}],"wp:attachment":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media?parent=19047"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/tags?post=19047"},{"taxonomy":"company","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/company?post=19047"},{"taxonomy":"wp_category","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/wp_category?post=19047"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/ppma_author?post=19047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}