{"id":61455,"date":"2025-11-11T01:52:28","date_gmt":"2025-11-11T00:52:28","guid":{"rendered":"https:\/\/virtual-routes.org\/?page_id=61455"},"modified":"2025-11-18T13:17:54","modified_gmt":"2025-11-18T12:17:54","slug":"lia-dans-la-boite-a-outils-de-la-cybersecurite","status":"publish","type":"page","link":"https:\/\/virtual-routes.org\/fr\/lia-dans-la-boite-a-outils-de-la-cybersecurite\/","title":{"rendered":"Bo\u00eete \u00e0 outils sur l'IA et la cybers\u00e9curit\u00e9"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"61455\" class=\"elementor elementor-61455\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c9d9cb6 e-flex e-con-boxed e-con e-parent\" data-id=\"c9d9cb6\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2b34ab2 e-con-full e-flex e-con e-child\" data-id=\"2b34ab2\" data-element_type=\"container\">\n\t\t\t\t<div data-dce-title-color=\"#0E093A\" class=\"elementor-element elementor-element-38978fb elementor-widget elementor-widget-heading\" data-id=\"38978fb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Bo\u00eete \u00e0 outils sur l'IA et la cybers\u00e9curit\u00e9<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0affaa3 elementor-widget elementor-widget-text-editor\" data-id=\"0affaa3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ressources pour les enseignants en cybers\u00e9curit\u00e9<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d9d3c3 elementor-absolute dce_masking-none elementor-invisible elementor-widget elementor-widget-image\" data-id=\"2d9d3c3\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_animation&quot;:&quot;slideInRight&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img alt=\"\" loading=\"lazy\" decoding=\"async\" width=\"767\" height=\"773\" src=\"https:\/\/virtual-routes.org\/wp-content\/uploads\/2024\/11\/white-stair.svg\" class=\"attachment-full size-full wp-image-10938\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8c80025 e-flex e-con-boxed e-con e-parent\" data-id=\"8c80025\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<a class=\"elementor-element elementor-element-b9e1fa8 e-con-full e-flex e-con e-child\" data-id=\"b9e1fa8\" data-element_type=\"container\" href=\"https:\/\/virtual-routes.org\/fr\/lia-dans-la-boite-a-outils-de-la-cybersecurite\/\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2b7e9a elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"e2b7e9a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Accueil<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<a class=\"elementor-element elementor-element-0b5506a e-con-full e-flex e-con e-child\" data-id=\"0b5506a\" data-element_type=\"container\" href=\"https:\/\/virtual-routes.org\/fr\/lia-dans-la-boite-a-outils-de-la-cybersecurite\/lia-dans-la-cyberdefense\/\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0641b7d elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"0641b7d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">L'IA dans la cyberd\u00e9fense<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<a class=\"elementor-element elementor-element-0406e81 e-con-full e-flex e-con e-child\" data-id=\"0406e81\" data-element_type=\"container\" href=\"https:\/\/virtual-routes.org\/fr\/lia-dans-la-boite-a-outils-de-la-cybersecurite\/ai-en-matiere-de-cybercriminalite\/\">\n\t\t\t\t<div class=\"elementor-element elementor-element-efeb8bd elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"efeb8bd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">L'IA dans la cybercriminalit\u00e9<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9f34be9 pb-0 e-flex e-con-boxed e-con e-child\" data-id=\"9f34be9\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f3f21b elementor-widget elementor-widget-heading\" data-id=\"8f3f21b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Introduction<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf7fadb elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"cf7fadb\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9fb2f9b elementor-widget elementor-widget-text-editor\" data-id=\"9fb2f9b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L'intelligence artificielle (AI) remod\u00e8le rapidement le paysage de la cybers\u00e9curit\u00e9, \u00e0 la fois comme outil de d\u00e9fense et comme arme d'attaque. Pour les \u00e9ducateurs, ce double r\u00f4le cr\u00e9e un besoin urgent de pr\u00e9parer les \u00e9tudiants non seulement \u00e0 exploiter la AI pour se prot\u00e9ger, mais aussi \u00e0 comprendre comment les adversaires peuvent l'exploiter dans leurs attaques.<\/p><p>Sur le plan d\u00e9fensif, le AI est d\u00e9j\u00e0 int\u00e9gr\u00e9 dans les environnements de s\u00e9curit\u00e9 professionnels et a un impact sur les diff\u00e9rentes phases du cycle de vie des cyberincidents (pr\u00e9vention, pr\u00e9paration, r\u00e9ponse et r\u00e9cup\u00e9ration). Il permet l'analyse des journaux, la d\u00e9tection des anomalies, la recherche de logiciels malveillants et m\u00eame la formation \u00e0 la sensibilisation, offrant aux d\u00e9fenseurs plus de rapidit\u00e9, de pr\u00e9cision et d'\u00e9volutivit\u00e9. En classe, AI ouvre \u00e9galement de nouvelles possibilit\u00e9s d'enseignement en automatisant les \u00e9valuations, en g\u00e9n\u00e9rant des \u00e9tudes de cas, en simulant des incidents r\u00e9els et en concevant des exercices interactifs qui aident les \u00e9tudiants \u00e0 appr\u00e9hender plus efficacement des concepts de cybers\u00e9curit\u00e9 complexes.<\/p><p>Parall\u00e8lement, la AI est \u00e0 l'origine d'une nouvelle g\u00e9n\u00e9ration d'op\u00e9rations cybern\u00e9tiques offensives. Les acteurs malveillants utilisent les AI g\u00e9n\u00e9ratives pour automatiser la reconnaissance, personnaliser les campagnes de phishing, acc\u00e9l\u00e9rer la d\u00e9couverte de vuln\u00e9rabilit\u00e9s ou d\u00e9ployer des logiciels malveillants adaptatifs. Cette transformation de la cha\u00eene d'ex\u00e9cution cybern\u00e9tique a intensifi\u00e9 l'ampleur et la sophistication des attaques dans le monde entier, qu'il s'agisse de ransomware, de deepfakes ou de swarm malware. Le AI est donc \u00e0 la fois un catalyseur de cyberattaques et une cible de l'exploitation adverse, avec des vuln\u00e9rabilit\u00e9s telles que l'empoisonnement des donn\u00e9es et des exemples d'adversaires qui posent de nouveaux risques.<\/p><p>Cette bo\u00eete \u00e0 outils a \u00e9t\u00e9 \u00e9labor\u00e9e par\u00a0<strong>Virtual Routes<\/strong>\u00a0dans le cadre de la\u00a0<strong>Programme de s\u00e9minaires sur la cybers\u00e9curit\u00e9 soutenu par Google.org<\/strong>Il s'agit de fournir aux enseignants et aux \u00e9tudiants des ressources dans un domaine en constante \u00e9volution. Il s'appuie sur une enqu\u00eate men\u00e9e aupr\u00e8s des universit\u00e9s participantes et fournit des \u00e9l\u00e9ments permettant de comprendre l'impact du AI sur la cybers\u00e9curit\u00e9, en pr\u00e9sentant son double r\u00f4le d'outil d\u00e9fensif et offensif.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bc73ae5 e-flex e-con-boxed e-con e-parent\" data-id=\"bc73ae5\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-dce-background-color=\"#FFFFFF00\" class=\"elementor-element elementor-element-6b29372 e-con-full e-flex e-con e-child\" data-id=\"6b29372\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dc755b e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"0dc755b\" data-element_type=\"widget\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"14447963\" aria-label=\"Onglets. Ouvrez des \u00e9l\u00e9ments avec Entrer ou Espace, fermez-les avec Echape et naviguez \u00e0 l&#039;aide des touches fl\u00e9ch\u00e9es.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-144479631\" data-tab-title-id=\"e-n-tab-title-144479631\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-144479631\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tIncidences du programme AI sur les comp\u00e9tences et les r\u00f4les en mati\u00e8re de cybers\u00e9curit\u00e9\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-144479632\" data-tab-title-id=\"e-n-tab-title-144479632\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-144479632\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tComp\u00e9tences de base AI pour la cybers\u00e9curit\u00e9\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-144479633\" data-tab-title-id=\"e-n-tab-title-144479633\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-144479633\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tUtilisation \u00e9thique et responsable de AI dans la cyberd\u00e9fense\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-144479634\" data-tab-title-id=\"e-n-tab-title-144479634\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-144479634\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tM\u00e9thodes d'enqu\u00eate et donn\u00e9es\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-144479635\" data-tab-title-id=\"e-n-tab-title-144479635\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-144479635\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tComment naviguer dans la bo\u00eete \u00e0 outils\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-144479636\" data-tab-title-id=\"e-n-tab-title-144479636\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-144479636\" style=\"--n-tabs-title-order: 6;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tGlossaire\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-144479637\" data-tab-title-id=\"e-n-tab-title-144479637\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-144479637\" style=\"--n-tabs-title-order: 7;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tComment vous pouvez contribuer\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-144479631\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-144479631\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-f4bcf52 e-con-full e-flex e-con e-child\" data-id=\"f4bcf52\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-523d455 e-con-full e-flex e-con e-child\" data-id=\"523d455\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6819ff9 elementor-widget elementor-widget-heading\" data-id=\"6819ff9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Impacts de AI sur les comp\u00e9tences en mati\u00e8re de cybers\u00e9curit\u00e9<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a14b2d3 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a14b2d3\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74bacf7 elementor-widget elementor-widget-text-editor\" data-id=\"74bacf7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Le <a href=\"https:\/\/www.enisa.europa.eu\/topics\/skills-and-competences\/skills-development\/european-cybersecurity-skills-framework-ecsf\">Cadre europ\u00e9en des comp\u00e9tences en mati\u00e8re de cybers\u00e9curit\u00e9 (ECSF)<\/a> d\u00e9finit douze r\u00f4les professionnels cl\u00e9s en mati\u00e8re de cybers\u00e9curit\u00e9, ainsi que les t\u00e2ches, les aptitudes, les connaissances et les comp\u00e9tences requises dans l'ensemble du secteur. Ces r\u00f4les vont de fonctions techniques telles que le renseignement sur les menaces et les tests de p\u00e9n\u00e9tration \u00e0 des t\u00e2ches plus larges telles que la gestion des risques et l'\u00e9ducation. Nous avons identifi\u00e9 cinq principaux moyens par lesquels AI influe sur les aptitudes et les comp\u00e9tences requises pour ces r\u00f4les :<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ed8c408 e-con-full e-flex e-con e-child\" data-id=\"ed8c408\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8e87e37 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"8e87e37\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"8e87e37\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<h4 class=\"marcs-collapsible-heading\">\n\t\t\t\t\tAnalyse des donn\u00e9es et renseignements sur les menaces\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-8e87e37\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-d84f516 e-con-full e-flex e-con e-child\" data-id=\"d84f516\" data-element_type=\"container\">\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-349596a elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"349596a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>ECSF : sp\u00e9cialiste du renseignement sur les cybermenaces ; enqu\u00eateur en criminalistique num\u00e9rique<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-8e87e37\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-ccf2173 e-con-full e-flex e-con e-child\" data-id=\"ccf2173\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b44fbf9 elementor-widget elementor-widget-text-editor\" data-id=\"b44fbf9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les LLM peuvent acc\u00e9l\u00e9rer la collecte, la corr\u00e9lation et la synth\u00e8se de grands volumes de rapports sur les menaces, de journaux et d'indicateurs de compromission. Les analystes sont toujours tenus de valider les r\u00e9sultats, mais ils ne se concentrent plus sur l'analyse r\u00e9p\u00e9titive, mais sur l'interpr\u00e9tation critique.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d47606 e-con-full e-flex e-con e-child\" data-id=\"2d47606\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf0c79e elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"cf0c79e\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"cf0c79e\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<h4 class=\"marcs-collapsible-heading\">\n\t\t\t\t\tD\u00e9tection et r\u00e9ponse aux incidents\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-cf0c79e\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-15e1696 e-con-full e-flex e-con e-child\" data-id=\"15e1696\" data-element_type=\"container\">\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-d1be8a8 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"d1be8a8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>ECSF : R\u00e9pondant aux incidents cybern\u00e9tiques<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-cf0c79e\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-f010b03 e-con-full e-flex e-con e-child\" data-id=\"f010b03\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-47d7989 elementor-widget elementor-widget-text-editor\" data-id=\"47d7989\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI peut contribuer \u00e0 la d\u00e9tection des anomalies, au triage et au signalement initial. Les comp\u00e9tences en mati\u00e8re de validation des alertes, de contextualisation des incidents et de d\u00e9cision sur les r\u00e9ponses proportionnelles deviennent de plus en plus importantes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eefae95 e-con-full e-flex e-con e-child\" data-id=\"eefae95\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-23dd707 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"23dd707\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"23dd707\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<h4 class=\"marcs-collapsible-heading\">\n\t\t\t\t\t\u00c9valuation des risques et conformit\u00e9\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-23dd707\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-e8246c4 e-con-full e-flex e-con e-child\" data-id=\"e8246c4\" data-element_type=\"container\">\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-fda39f3 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"fda39f3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>ECSF : Responsable des questions juridiques, politiques et de conformit\u00e9 ; gestionnaire des risques de cybers\u00e9curit\u00e9 ; auditeur de cybers\u00e9curit\u00e9<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-23dd707\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-459273e e-con-full e-flex e-con e-child\" data-id=\"459273e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ff4f6c elementor-widget elementor-widget-text-editor\" data-id=\"7ff4f6c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Le AI peut prendre en charge la classification automatique des donn\u00e9es sensibles et l'\u00e9valuation pr\u00e9liminaire des risques. Les praticiens doivent faire preuve de discernement pour d\u00e9terminer si les r\u00e9sultats obtenus gr\u00e2ce \u00e0 AI sont conformes aux exigences r\u00e9glementaires et organisationnelles.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2bd1be1 e-con-full e-flex e-con e-child\" data-id=\"2bd1be1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-82c3178 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"82c3178\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"82c3178\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<h4 class=\"marcs-collapsible-heading\">\n\t\t\t\t\tD\u00e9veloppement s\u00e9curis\u00e9 et examen du code\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-82c3178\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-f0c75b0 e-con-full e-flex e-con e-child\" data-id=\"f0c75b0\" data-element_type=\"container\">\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-c177f88 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"c177f88\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>ECSF : impl\u00e9mentation de la cybers\u00e9curit\u00e9 ; architecte de la cybers\u00e9curit\u00e9 ; testeur de p\u00e9n\u00e9tration<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-82c3178\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-dcf4350 e-con-full e-flex e-con e-child\" data-id=\"dcf4350\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fe2ae51 elementor-widget elementor-widget-text-editor\" data-id=\"fe2ae51\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L'analyse du code par AI met en \u00e9vidence les mod\u00e8les peu s\u00fbrs et propose des corrections. Les professionnels restent responsables de la mise en place de pratiques de codage s\u00e9curis\u00e9es et de l'att\u00e9nuation du risque d'hallucinations ou de faux positifs li\u00e9s \u00e0 AI, qui peut \u00e9galement cr\u00e9er des codes non s\u00e9curis\u00e9s.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8744b09 e-con-full e-flex e-con e-child\" data-id=\"8744b09\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8161eb7 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"8161eb7\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"8161eb7\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<h4 class=\"marcs-collapsible-heading\">\n\t\t\t\t\t\u00c9ducation et sensibilisation\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-8161eb7\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-b276113 e-con-full e-flex e-con e-child\" data-id=\"b276113\" data-element_type=\"container\">\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-4b807ef elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"4b807ef\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>ECSF : Enseignant en cybers\u00e9curit\u00e9 ; Chercheur en cybers\u00e9curit\u00e9<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-8161eb7\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-46da457 e-con-full e-flex e-con e-child\" data-id=\"46da457\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f47722 elementor-widget elementor-widget-text-editor\" data-id=\"1f47722\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les LLM permettent de g\u00e9n\u00e9rer des sc\u00e9narios de formation adaptatifs, des ensembles de donn\u00e9es synth\u00e9tiques et un retour d'information automatis\u00e9. L'ensemble des comp\u00e9tences de l'\u00e9ducateur \u00e9volue vers la conservation, la validation et l'int\u00e9gration responsable des ressources AI dans les programmes d'\u00e9tudes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-144479632\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-144479632\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-b89ec8d e-con-full e-flex e-con e-child\" data-id=\"b89ec8d\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-bda226e e-con-full e-flex e-con e-child\" data-id=\"bda226e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b0e50d6 elementor-widget elementor-widget-heading\" data-id=\"b0e50d6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Comp\u00e9tences de base AI pour la cybers\u00e9curit\u00e9<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4d0abf elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f4d0abf\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c245190 elementor-widget elementor-widget-text-editor\" data-id=\"c245190\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L'adoption g\u00e9n\u00e9ralis\u00e9e du AI exige de tous les professionnels de la cybers\u00e9curit\u00e9, quel que soit leur r\u00f4le, qu'ils acqui\u00e8rent de nouvelles comp\u00e9tences qui contribuent \u00e0 l'utilisation responsable, adaptative et efficace des outils du AI. Ces comp\u00e9tences fondamentales en mati\u00e8re de AI vont au-del\u00e0 de la familiarisation avec des outils sp\u00e9cifiques et se concentrent plut\u00f4t sur les capacit\u00e9s sous-jacentes requises pour travailler efficacement dans cet environnement en \u00e9volution rapide :<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-277a3c0 e-con-full e-flex e-con e-child\" data-id=\"277a3c0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-790da38 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"790da38\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"790da38\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\t1. Compr\u00e9hension des fondements\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-790da38\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-cbe257b e-con-full e-flex e-con e-child\" data-id=\"cbe257b\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-790da38\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-b263582 e-con-full e-flex e-con e-child\" data-id=\"b263582\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f82569 elementor-widget elementor-widget-text-editor\" data-id=\"7f82569\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>AI alphab\u00e9tisation<\/strong> comprendre les capacit\u00e9s et les limites de AI et l'int\u00e9grer en toute s\u00e9curit\u00e9 dans les flux de travail, sans d\u00e9pendance excessive ni confiance mal plac\u00e9e.<\/li><li><strong>Sensibilisation \u00e0 l'\u00e9thique<\/strong> identifier les risques li\u00e9s \u00e0 la partialit\u00e9, au respect de la vie priv\u00e9e, \u00e0 la responsabilit\u00e9 et \u00e0 la s\u00e9curit\u00e9, en veillant \u00e0 ce que les syst\u00e8mes AI soient d\u00e9ploy\u00e9s de mani\u00e8re \u00e0 respecter les normes professionnelles et soci\u00e9tales.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a13ed55 e-con-full e-flex e-con e-child\" data-id=\"a13ed55\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d2dd312 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"d2dd312\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"d2dd312\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\t2. \u00c9valuation et supervision\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-d2dd312\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-61223ed e-con-full e-flex e-con e-child\" data-id=\"61223ed\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-d2dd312\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-294be13 e-con-full e-flex e-con e-child\" data-id=\"294be13\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c3347b1 elementor-widget elementor-widget-text-editor\" data-id=\"c3347b1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li><strong>\u00c9valuation critique<\/strong> \u00e9valuer les r\u00e9sultats g\u00e9n\u00e9r\u00e9s par AI par rapport \u00e0 des sources fiables et \u00e0 l'expertise contextuelle, en reconnaissant quand une validation suppl\u00e9mentaire ou un jugement humain est n\u00e9cessaire.<\/li>\n \t<li><strong>Explicabilit\u00e9 et transparence<\/strong> d'interpr\u00e9ter les r\u00e9sultats de AI, d'interroger les mod\u00e8les de la \"bo\u00eete noire\" et de communiquer clairement les r\u00e9sultats aux parties prenantes techniques et non techniques, renfor\u00e7ant ainsi la confiance dans les d\u00e9cisions assist\u00e9es par AI.<\/li>\n \t<li><strong>R\u00e9silience et contr\u00f4le humain<\/strong> concevoir des garde-fous qui emp\u00eachent une d\u00e9pendance excessive \u00e0 l'\u00e9gard de l'automatisation, en garantissant des garde-fous solides et en pr\u00e9servant la responsabilit\u00e9 humaine pour les d\u00e9cisions critiques.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2c3b8c4 e-con-full e-flex e-con e-child\" data-id=\"2c3b8c4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-659ba9d elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"659ba9d\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"659ba9d\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\t3. Gestion des risques et des donn\u00e9es\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-659ba9d\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-50c9597 e-con-full e-flex e-con e-child\" data-id=\"50c9597\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-659ba9d\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-931f294 e-con-full e-flex e-con e-child\" data-id=\"931f294\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b400dd elementor-widget elementor-widget-text-editor\" data-id=\"2b400dd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li><strong>Gouvernance des donn\u00e9es<\/strong> garantir la qualit\u00e9, la diversit\u00e9 et la s\u00e9curit\u00e9 des donn\u00e9es utilis\u00e9es dans les syst\u00e8mes AI, sachant qu'une mauvaise gestion des donn\u00e9es peut entra\u00eener des vuln\u00e9rabilit\u00e9s syst\u00e9miques.<\/li>\n \t<li><strong>AI gestion des risques<\/strong> anticiper et att\u00e9nuer les risques sp\u00e9cifiques \u00e0 AI tels que les hallucinations, les manipulations adverses, la g\u00e9n\u00e9ration de codes non s\u00e9curis\u00e9s et l'empoisonnement des donn\u00e9es, en int\u00e9grant ces consid\u00e9rations dans des cadres plus larges de risques cybern\u00e9tiques.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ad4e196 e-con-full e-flex e-con e-child\" data-id=\"ad4e196\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-def8212 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"def8212\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"def8212\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\t4. Une capacit\u00e9 d'adaptation tourn\u00e9e vers l'avenir\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-def8212\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-5bec00e e-con-full e-flex e-con e-child\" data-id=\"5bec00e\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-def8212\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-86f6260 e-con-full e-flex e-con e-child\" data-id=\"86f6260\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f5a16a elementor-widget elementor-widget-text-editor\" data-id=\"8f5a16a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li><strong>Apprentissage continu<\/strong> pour mettre \u00e0 jour leurs comp\u00e9tences, surveiller les menaces \u00e9mergentes et s'int\u00e9resser aux nouveaux d\u00e9veloppements des applications AI pour la cybers\u00e9curit\u00e9.<\/li>\n \t<li><strong>R\u00e9flexion sur les sc\u00e9narios et anticipation<\/strong> anticiper la mani\u00e8re dont les progr\u00e8s de la AI peuvent remodeler les niveaux techniques, organisationnels et strat\u00e9giques de la cybers\u00e9curit\u00e9, et pr\u00e9parer les professionnels \u00e0 relever les d\u00e9fis futurs de mani\u00e8re proactive.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c9ac306 e-con-full e-flex e-con e-child\" data-id=\"c9ac306\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f1bd58 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"7f1bd58\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"7f1bd58\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\t5. Collaboration et communication\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-7f1bd58\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-c705831 e-con-full e-flex e-con e-child\" data-id=\"c705831\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-7f1bd58\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-c67afcf e-con-full e-flex e-con e-child\" data-id=\"c67afcf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-76fb44e elementor-widget elementor-widget-text-editor\" data-id=\"76fb44e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Collaboration interdisciplinaire<\/strong> travailler efficacement avec des experts en droit, en politique, en psychologie et en \u00e9thique, en reconnaissant que l'utilisation responsable de AI n\u00e9cessite des perspectives qui vont au-del\u00e0 des domaines purement techniques.<\/li><li><strong>Communication et instauration d'un climat de confiance<\/strong> d'expliquer avec clart\u00e9 et nuance les d\u00e9cisions prises gr\u00e2ce \u00e0 AI, ce qui permet de maintenir la confiance entre tous les acteurs concern\u00e9s.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7b2237 elementor-widget elementor-widget-text-editor\" data-id=\"e7b2237\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L'automatisation des t\u00e2ches r\u00e9p\u00e9titives ou de moindre valeur, induite par les AI, a soulev\u00e9 des questions urgentes sur la transformation de la main-d'\u0153uvre et le d\u00e9placement potentiel d'emplois. Toutefois, si certaines t\u00e2ches des analystes peuvent diminuer, de nouvelles demandes apparaissent concernant la supervision des r\u00e9sultats de la AI, la validation des conclusions et le traitement des risques sp\u00e9cifiques \u00e0 la AI, tels que les hallucinations, la g\u00e9n\u00e9ration de codes non s\u00e9curis\u00e9s ou la manipulation par des adversaires. Plut\u00f4t que d'\u00e9liminer les r\u00f4les en mati\u00e8re de cybers\u00e9curit\u00e9, le AI modifie le profil de comp\u00e9tences en faveur de la surveillance, de la gouvernance et de la collaboration entre l'homme et le AI.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-144479633\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-144479633\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\"elementor-element elementor-element-4b3f3f8 e-con-full e-flex e-con e-child\" data-id=\"4b3f3f8\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2de09f0 e-con-full e-flex e-con e-child\" data-id=\"2de09f0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8e7837d elementor-widget elementor-widget-heading\" data-id=\"8e7837d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Utilisation \u00e9thique et responsable de AI dans la cyberd\u00e9fense<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc7824b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"fc7824b\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe12831 elementor-widget elementor-widget-text-editor\" data-id=\"fe12831\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>En optimisant le temps, l'efficacit\u00e9 et les ressources, AI permet aux d\u00e9fenseurs de faire plus avec moins, en abaissant les barri\u00e8res \u00e0 l'entr\u00e9e et en renfor\u00e7ant la capacit\u00e9 \u00e0 d\u00e9tecter et \u00e0 r\u00e9pondre \u00e0 des cybermenaces de plus en plus complexes. \u00c0 mesure que les cyberincidents gagnent en ampleur et en sophistication, la capacit\u00e9 de AI \u00e0 traiter de grandes quantit\u00e9s de donn\u00e9es le rend indispensable. Cependant, une d\u00e9pendance excessive \u00e0 l'\u00e9gard des r\u00e9sultats de AI introduit de nouvelles vuln\u00e9rabilit\u00e9s, en particulier lorsque ces r\u00e9sultats sont inexacts ou manquent de compr\u00e9hension du contexte, ce qui soul\u00e8ve plusieurs questions en mati\u00e8re d'\u00e9thique et d'utilisation responsable :<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90b2c88 elementor-widget elementor-widget-heading\" data-id=\"90b2c88\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Principales pr\u00e9occupations \u00e9thiques<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-24d82a5 e-con-full e-flex e-con e-child\" data-id=\"24d82a5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9e34c6c elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"9e34c6c\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"9e34c6c\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tPr\u00e9jug\u00e9s et discrimination\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-9e34c6c\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-7e29b98 e-con-full e-flex e-con e-child\" data-id=\"7e29b98\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-9e34c6c\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-b7a58aa e-con-full e-flex e-con e-child\" data-id=\"b7a58aa\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf6799c elementor-widget elementor-widget-text-editor\" data-id=\"bf6799c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Les mod\u00e8les AI form\u00e9s sur des ensembles de donn\u00e9es biais\u00e9s ou d\u00e9s\u00e9quilibr\u00e9s peuvent injustement signaler certains groupes d'utilisateurs ou certaines r\u00e9gions comme \u00e9tant malveillants. Par exemple, <a href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=6-J322AAAAAJ&amp;citation_for_view=6-J322AAAAAJ:qjMakFHDy7sC\">Des chercheurs en cybers\u00e9curit\u00e9 ont form\u00e9 un syst\u00e8me de d\u00e9tection d'intrusion \u00e0 partir de donn\u00e9es d'attaques historiques.<\/a> et a constat\u00e9 qu'il produisait 30% plus de faux positifs pour les utilisateurs des r\u00e9gions sous-repr\u00e9sent\u00e9es, alors qu'une formation \u00e9quilibr\u00e9e conduisait \u00e0 des r\u00e9sultats plus \u00e9quitables. De m\u00eame, AI peut accorder une priorit\u00e9 excessive \u00e0 des types d'attaques familiers tout en sous-estimant les menaces \u00e9mergentes, ce qui cr\u00e9e des lacunes en mati\u00e8re de d\u00e9fense.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1dcdb59 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"1dcdb59\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-alt-circle-right\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Principes cl\u00e9s : L'\u00e9quit\u00e9<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2adfd9 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"b2adfd9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Garantir des r\u00e9sultats non discriminatoires en s'attaquant aux biais algorithmiques et aux biais li\u00e9s aux donn\u00e9es.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-171134b e-con-full e-flex e-con e-child\" data-id=\"171134b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-190061e elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"190061e\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"190061e\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tContr\u00f4le et surveillance\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-190061e\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-4573469 e-con-full e-flex e-con e-child\" data-id=\"4573469\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-190061e\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-9423639 e-con-full e-flex e-con e-child\" data-id=\"9423639\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c0d327 elementor-widget elementor-widget-text-editor\" data-id=\"5c0d327\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>La s\u00e9curit\u00e9 pilot\u00e9e par AI n\u00e9cessite une surveillance \u00e0 grande \u00e9chelle du trafic r\u00e9seau, des tentatives de connexion et du comportement des utilisateurs, <a href=\"https:\/\/researchworkx.com\/index.php\/jci\/article\/view\/69\">la cr\u00e9ation d'empreintes num\u00e9riques d\u00e9taill\u00e9es<\/a>. Cette surveillance constante risque <a href=\"https:\/\/www.authorea.com\/users\/857462\/articles\/1262647-ethical-ai-for-cybersecurity-a-framework-for-balancing-innovation-and-regulation\">saper la confiance des utilisateurs et soulever des probl\u00e8mes de consentement<\/a>. En outre, <a href=\"https:\/\/researchworkx.com\/index.php\/jci\/article\/view\/69\">la conservation \u00e0 long terme des donn\u00e9es augmente les risques de violation<\/a>et le traitement bas\u00e9 sur l'informatique d\u00e9mat\u00e9rialis\u00e9e <a href=\"https:\/\/researchworkx.com\/index.php\/jci\/article\/view\/69\">questions sur la gouvernance des donn\u00e9es transfrontali\u00e8res<\/a>.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a2d40d elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"2a2d40d\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-alt-circle-right\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Principes cl\u00e9s : Vie priv\u00e9e et protection des donn\u00e9es<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aac1828 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"aac1828\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Prot\u00e9ger les donn\u00e9es personnelles et organisationnelles, respecter le consentement et minimiser les collectes inutiles.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-78a7b78 e-con-full e-flex e-con e-child\" data-id=\"78a7b78\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-db1c086 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"db1c086\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"db1c086\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tPrise de d\u00e9cision autonome et cons\u00e9quences impr\u00e9vues\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-db1c086\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-13ef416 e-con-full e-flex e-con e-child\" data-id=\"13ef416\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-db1c086\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-ab27e4c e-con-full e-flex e-con e-child\" data-id=\"ab27e4c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e6fbe2f elementor-widget elementor-widget-text-editor\" data-id=\"e6fbe2f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Les mesures automatis\u00e9es telles que le verrouillage de comptes, le blocage d'adresses IP ou la fermeture de r\u00e9seaux peuvent avoir des taux de faux positifs ou de faux n\u00e9gatifs inacceptables, en particulier lorsque les d\u00e9cisions automatis\u00e9es ne sont pas suffisamment \u00e9clair\u00e9es par un contexte pertinent. <a href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=6-J322AAAAAJ&amp;citation_for_view=6-J322AAAAAJ:qjMakFHDy7sC\">Lors d'une exp\u00e9rience men\u00e9e par des chercheurs en cybers\u00e9curit\u00e9<\/a>Les syst\u00e8mes bas\u00e9s sur le AI ont r\u00e9ussi \u00e0 bloquer 92% des menaces, mais ont signal\u00e9 \u00e0 tort 8% d'activit\u00e9s l\u00e9gitimes comme \u00e9tant malveillantes. De telles erreurs risquent de perturber des services essentiels, par exemple dans le domaine de la finance ou de la sant\u00e9, et de compliquer l'obligation de rendre compte des dommages caus\u00e9s.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29bfcd2 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"29bfcd2\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-alt-circle-right\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Principes cl\u00e9s : Transparence et explicabilit\u00e9<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bcd62eb elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"bcd62eb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Maintenir des m\u00e9canismes humains dans la boucle et attribuer clairement la responsabilit\u00e9 des r\u00e9sultats obtenus gr\u00e2ce \u00e0 AI.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9cdfae4 e-con-full e-flex e-con e-child\" data-id=\"9cdfae4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c88a82a elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"c88a82a\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"c88a82a\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tOpacit\u00e9 des mod\u00e8les AI\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-c88a82a\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-1c67169 e-con-full e-flex e-con e-child\" data-id=\"1c67169\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-c88a82a\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-10a05d8 e-con-full e-flex e-con e-child\" data-id=\"10a05d8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9baa2fa elementor-widget elementor-widget-text-editor\" data-id=\"9baa2fa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>De nombreux syst\u00e8mes AI fonctionnent comme des \"bo\u00eetes noires\", offrant peu d'informations sur la mani\u00e8re dont ils parviennent \u00e0 des conclusions. <a href=\"https:\/\/www.researchgate.net\/publication\/378571489_The_intersection_of_Artificial_Intelligence_and_cybersecurity_Challenges_and_opportunities\">Dans le domaine de la cybers\u00e9curit\u00e9<\/a>En raison de ce manque d'explicabilit\u00e9, les analystes peuvent avoir du mal \u00e0 comprendre pourquoi le trafic l\u00e9gitime est signal\u00e9 ou pourquoi certaines menaces sont class\u00e9es par ordre de priorit\u00e9, ce qui peut avoir des cons\u00e9quences n\u00e9gatives sur la qualit\u00e9 de l'information. <a href=\"https:\/\/doi.org\/10.60087\/jklst.vol2.n2.p175\">saper la confiance<\/a> et retarder les r\u00e9ponses efficaces.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fae1243 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"fae1243\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-alt-circle-right\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Principes cl\u00e9s : Transparence et explicabilit\u00e9<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fefaef2 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"fefaef2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Rendre les processus d\u00e9cisionnels de AI clairs et interpr\u00e9tables pour les parties prenantes.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d40bd9b elementor-widget elementor-widget-text-editor\" data-id=\"d40bd9b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Pour mettre ces principes en pratique, les organisations peuvent s'appuyer sur une combinaison d'outils r\u00e9glementaires et techniques afin d'am\u00e9liorer la fiabilit\u00e9 des syst\u00e8mes AI :<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e12cb5a e-con-full e-flex e-con e-child\" data-id=\"e12cb5a\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-703dcec e-con-full e-flex e-con e-child\" data-id=\"703dcec\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0decf3b elementor-widget elementor-widget-n-accordion\" data-id=\"0decf3b\" data-element_type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;max_items_expended&quot;:&quot;one&quot;}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Onglets. Ouvrez des \u00e9l\u00e9ments avec Entrer ou Espace, fermez-les avec Echape et naviguez \u00e0 l&#039;aide des touches fl\u00e9ch\u00e9es.\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1460\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1460\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Mesures r\u00e9glementaires <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1460\" class=\"elementor-element elementor-element-d4f27da e-con-full e-flex e-con e-child\" data-id=\"d4f27da\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-466c173 elementor-widget elementor-widget-text-editor\" data-id=\"466c173\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Mesures r\u00e9glementaires<\/strong> comprennent des cadres de conformit\u00e9 tels que le <a href=\"https:\/\/eur-lex.europa.eu\/eli\/reg\/2024\/1689\/oj\/eng\">Loi europ\u00e9enne sur l'intelligence artificielle (loi AI)<\/a>qui introduit des obligations fond\u00e9es sur le risque, des \u00e9valuations d'impact sur les droits fondamentaux et des m\u00e9canismes de responsabilit\u00e9 pour les syst\u00e8mes AI \u00e0 haut risque. D'autres mesures r\u00e9glementaires incluent des \u00e9valuations d'impact algorithmique pour \u00e9valuer les risques avant le d\u00e9ploiement, la conformit\u00e9 avec les lois sur la protection des donn\u00e9es telles que la loi sur la protection des donn\u00e9es \u00e0 caract\u00e8re personnel. <a href=\"https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj\">GDPR<\/a> et <a href=\"https:\/\/oag.ca.gov\/privacy\/ccpa\/regs\">CCPA<\/a>et <a href=\"https:\/\/www.authorea.com\/users\/857462\/articles\/1262647-ethical-ai-for-cybersecurity-a-framework-for-balancing-innovation-and-regulation\">cadres de responsabilisation<\/a> qui attribuent la responsabilit\u00e9 des erreurs li\u00e9es \u00e0 AI. Le d\u00e9veloppement et l'adoption de normes et de certifications internationalement reconnues fournissent des outils de conformit\u00e9 suppl\u00e9mentaires qui contribuent \u00e0 rendre op\u00e9rationnelles les obligations l\u00e9gales, \u00e0 promouvoir la confiance et, dans une certaine mesure, \u00e0 stimuler l'innovation en donnant aux organisations la possibilit\u00e9 d'exp\u00e9rimenter le d\u00e9veloppement de produits dans le cadre de garde-fous pr\u00e9\u00e9tablis.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5119559 e-con-full e-flex e-con e-child\" data-id=\"5119559\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-623fe13 elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"623fe13\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm144 276c0 6.6-5.4 12-12 12h-92v92c0 6.6-5.4 12-12 12h-56c-6.6 0-12-5.4-12-12v-92h-92c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h92v-92c0-6.6 5.4-12 12-12h56c6.6 0 12 5.4 12 12v92h92c6.6 0 12 5.4 12 12v56z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1069ba1 e-con-full e-flex e-con e-child\" data-id=\"1069ba1\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b9a81f5 elementor-widget elementor-widget-n-accordion\" data-id=\"b9a81f5\" data-element_type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;max_items_expended&quot;:&quot;one&quot;}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Onglets. Ouvrez des \u00e9l\u00e9ments avec Entrer ou Espace, fermez-les avec Echape et naviguez \u00e0 l&#039;aide des touches fl\u00e9ch\u00e9es.\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1940\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1940\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Solutions techniques <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1940\" class=\"elementor-element elementor-element-5d1c60b e-con-full e-flex e-con e-child\" data-id=\"5d1c60b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a2b2d6 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"6a2b2d6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=6-J322AAAAAJ&amp;citation_for_view=6-J322AAAAAJ:qjMakFHDy7sC\">Solutions techniques<\/a> comprennent des m\u00e9thodes d'apprentissage automatique tenant compte de l'\u00e9quit\u00e9, des techniques de d\u00e9tection et d'att\u00e9nuation des pr\u00e9jug\u00e9s, des technologies de protection de la vie priv\u00e9e telles que le cryptage et l'anonymisation, ainsi que des approches AI explicables qui rendent les processus de prise de d\u00e9cision plus transparents. <a href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=6-J322AAAAAJ&amp;citation_for_view=6-J322AAAAAJ:qjMakFHDy7sC\">Supervision humaine en boucle et contr\u00f4le continu des mod\u00e8les<\/a> veiller \u00e0 ce que les syst\u00e8mes automatis\u00e9s restent pr\u00e9cis, \u00e9thiques et conformes aux valeurs de l'organisation et de la soci\u00e9t\u00e9.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-beaeab9 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"beaeab9\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"beaeab9\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tRessources\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-beaeab9\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-9928e19 e-con-full e-flex e-con e-child\" data-id=\"9928e19\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-beaeab9\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-45ebc8c e-con-full e-flex e-con e-child\" data-id=\"45ebc8c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f90d280 elementor-widget elementor-widget-text-editor\" data-id=\"f90d280\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.zotero.org\/google-docs\/?xOMYUj\"><span style=\"font-weight: 400;\">Chaganti, Krishna Chaitanya. <\/span><i><span style=\"font-weight: 400;\">AI \u00e9thique pour la cybers\u00e9curit\u00e9 : Un cadre pour \u00e9quilibrer l'innovation et la r\u00e9glementation<\/span><\/i><span style=\"font-weight: 400;\">. 2025. https:\/\/www.authorea.com\/users\/857462\/articles\/1262647-ethical-ai-for-cybersecurity-a-framework-for-balancing-innovation-and-regulation.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?xOMYUj\"><span style=\"font-weight: 400;\">Chitimoju, Satish. D\u00e9fis \u00e9thiques de AI dans la cybers\u00e9curit\u00e9 : Bias, Privacy, and Autonomous Decision-Making\". <\/span><i><span style=\"font-weight: 400;\">Journal de l'innovation computationnelle<\/span><\/i><span style=\"font-weight: 400;\"> 3, no. 1 (2023). https:\/\/researchworkx.com\/index.php\/jci\/article\/view\/69.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?xOMYUj\"><span style=\"font-weight: 400;\">Chris, Emmanuel. <\/span><i><span style=\"font-weight: 400;\">Consid\u00e9rations \u00e9thiques dans AI pour la cybers\u00e9curit\u00e9<\/span><\/i><span style=\"font-weight: 400;\">. 1er d\u00e9cembre 2022.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?xOMYUj\"><span style=\"font-weight: 400;\">Sontan, Adewale Daniel, et Segun Victor Samuel. L'intersection de l'intelligence artificielle et de la cybers\u00e9curit\u00e9 : D\u00e9fis et opportunit\u00e9s\". <\/span><i><span style=\"font-weight: 400;\">World Journal of Advanced Research and Review (Journal mondial de la recherche avanc\u00e9e et de la revue)<\/span><\/i><span style=\"font-weight: 400;\"> 21, no. 02 (2024) : 1720-36.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?xOMYUj\"><span style=\"font-weight: 400;\">Vemuri, Naveen, Naresh Thaneeru, et Venkata Manoj Tatikonda. Securing Trust : Ethical Considerations in AI for Cybersecurity\". <\/span><i><span style=\"font-weight: 400;\">Journal of Knowledge Learning and Science Technology ISSN : 2959-6386 (en ligne)<\/span><\/i><span style=\"font-weight: 400;\"> 2, no. 2 (2023) : 167\u201375. https:\/\/doi.org\/10.60087\/jklst.vol2.n2.p175. <\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-144479634\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-144479634\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\"elementor-element elementor-element-a77df21 e-con-full e-flex e-con e-child\" data-id=\"a77df21\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3a22c96 e-con-full e-flex e-con e-child\" data-id=\"3a22c96\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c60928b elementor-widget elementor-widget-heading\" data-id=\"c60928b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">M\u00e9thodes d'enqu\u00eate et donn\u00e9es<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05b963f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05b963f\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c9d00b elementor-widget elementor-widget-text-editor\" data-id=\"9c9d00b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Virtual Routes a men\u00e9 une enqu\u00eate en ligne aupr\u00e8s de 27 enseignants d'universit\u00e9s europ\u00e9ennes. Le questionnaire visait \u00e0 d\u00e9terminer s'ils utilisent actuellement AI dans leur enseignement de la cybers\u00e9curit\u00e9, comment ils l'utilisent, les raisons qui les poussent \u00e0 le faire, les outils et t\u00e2ches sp\u00e9cifiques impliqu\u00e9s, et s'ils appliquent AI dans le contexte du soutien \u00e0 la cybers\u00e9curit\u00e9 fourni aux organisations communautaires locales (OCL). Bien qu'elles ne soient pas statistiquement significatives, les r\u00e9ponses donnent un aper\u00e7u des pratiques et des attentes actuelles, et mettent en \u00e9vidence les possibilit\u00e9s et les difficult\u00e9s li\u00e9es \u00e0 l'int\u00e9gration de AI dans l'enseignement de la cybers\u00e9curit\u00e9. L'enqu\u00eate a \u00e9t\u00e9 compl\u00e9t\u00e9e par des entretiens de suivi afin de mieux comprendre les cas d'utilisation pratiques.<\/p><p>Quelques \u00e9l\u00e9ments cl\u00e9s peuvent \u00eatre mis en \u00e9vidence :<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e4d7623 e-con-full e-flex e-con e-child\" data-id=\"e4d7623\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-62df105 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"62df105\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"62df105\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tUtilisation pr\u00e9coce mais croissante de AI\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-62df105\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-99efa03 e-con-full e-flex e-con e-child\" data-id=\"99efa03\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-62df105\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-b9b92a8 e-con-full e-flex e-con e-child\" data-id=\"b9b92a8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2771260 elementor-widget elementor-widget-text-editor\" data-id=\"2771260\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Sur les 27 personnes interrog\u00e9es, la plupart (22) ont d\u00e9clar\u00e9 qu'elles exp\u00e9rimentaient d\u00e9j\u00e0 les outils AI dans leur enseignement, notamment dans le cadre de s\u00e9minaires sur la cybers\u00e9curit\u00e9 organis\u00e9s par Google.org. Toutefois, l'adoption de ces outils en est encore \u00e0 ses d\u00e9buts et se limite souvent \u00e0 des t\u00e2ches sp\u00e9cifiques plut\u00f4t qu'\u00e0 une int\u00e9gration syst\u00e9matique. Cinq r\u00e9pondants ont indiqu\u00e9 qu'ils n'utilisaient pas encore AI.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-29ea056 e-con-full e-flex e-con e-child\" data-id=\"29ea056\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab48974 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"ab48974\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"ab48974\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tDes cas d'utilisation vari\u00e9s\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-ab48974\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-606863c e-con-full e-flex e-con e-child\" data-id=\"606863c\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-ab48974\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-439e9f1 e-con-full e-flex e-con e-child\" data-id=\"439e9f1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e43d4f8 elementor-widget elementor-widget-text-editor\" data-id=\"e43d4f8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les applications les plus courantes concernent des t\u00e2ches g\u00e9n\u00e9rales de r\u00e9daction et de collecte\/analyse de donn\u00e9es (\u00e0 l'aide de LLM courants), la synth\u00e8se de donn\u00e9es et des t\u00e2ches sp\u00e9cialis\u00e9es dans la cybers\u00e9curit\u00e9 telles que la d\u00e9tection d'anomalies, la cartographie de la surface d'attaque, l'analyse de logiciels malveillants et les laboratoires pratiques.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7307dba e-con-full e-flex e-con e-child\" data-id=\"7307dba\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27edb76 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"27edb76\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"27edb76\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tMotivations pour l'adoption\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-27edb76\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-f3fc6d4 e-con-full e-flex e-con e-child\" data-id=\"f3fc6d4\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-27edb76\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-e7f5386 e-con-full e-flex e-con e-child\" data-id=\"e7f5386\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4de11eb elementor-widget elementor-widget-text-editor\" data-id=\"4de11eb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les formateurs en cybers\u00e9curit\u00e9 utilisent principalement AI pour aider les \u00e9tudiants \u00e0 se pr\u00e9parer au monde du travail, pour favoriser l'apprentissage autonome et l'auto-\u00e9valuation, et pour gagner du temps sur les t\u00e2ches p\u00e9dagogiques telles que la cr\u00e9ation d'exercices, la notation et la g\u00e9n\u00e9ration de contenu. Nombre d'entre eux consid\u00e8rent \u00e9galement qu'il est utile d'utiliser AI pour illustrer des concepts et des sc\u00e9narios cl\u00e9s en mati\u00e8re de cybers\u00e9curit\u00e9.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e106ea9 e-con-full e-flex e-con e-child\" data-id=\"e106ea9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-801dfc5 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"801dfc5\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"801dfc5\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tApplication dans les services communautaires\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-801dfc5\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-6b68c61 e-con-full e-flex e-con e-child\" data-id=\"6b68c61\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-801dfc5\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-f1c2d23 e-con-full e-flex e-con e-child\" data-id=\"f1c2d23\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d05a6c9 elementor-widget elementor-widget-text-editor\" data-id=\"d05a6c9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Environ la moiti\u00e9 des r\u00e9pondants (15 sur 27) ont d\u00e9clar\u00e9 qu'ils utilisaient d\u00e9j\u00e0 ou pr\u00e9voyaient d'utiliser AI pour apporter un soutien en mati\u00e8re de cybers\u00e9curit\u00e9 aux organisations communautaires locales (LCO), un aspect essentiel des s\u00e9minaires Google.org sur la cybers\u00e9curit\u00e9. Cela d\u00e9montre un lien croissant entre l'exploration des outils AI en classe et leur application dans des contextes communautaires r\u00e9els.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dfe79df e-con-full e-flex e-con e-child\" data-id=\"dfe79df\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-af6b234 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"af6b234\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"af6b234\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tBesoins et attentes des \u00e9ducateurs\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-af6b234\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-077e30e e-con-full e-flex e-con e-child\" data-id=\"077e30e\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-af6b234\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-2dad4b0 e-con-full e-flex e-con e-child\" data-id=\"2dad4b0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-58d99ce elementor-widget elementor-widget-text-editor\" data-id=\"58d99ce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Plusieurs r\u00e9pondants ont exprim\u00e9 le souhait de recevoir des conseils et des exemples sur la mani\u00e8re d'int\u00e9grer efficacement la technologie AI dans l'enseignement de la cybers\u00e9curit\u00e9. Ils ont soulign\u00e9 la n\u00e9cessit\u00e9 de disposer de meilleures pratiques, de ressources partag\u00e9es et d'\u00e9tudes de cas pour passer de l'exp\u00e9rimentation \u00e0 une utilisation plus structur\u00e9e et plus efficace de AI dans l'enseignement et la prestation de services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-144479635\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-144479635\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\"elementor-element elementor-element-7632308 e-con-full e-flex e-con e-child\" data-id=\"7632308\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-41639be e-con-full e-flex e-con e-child\" data-id=\"41639be\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e76861 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"3e76861\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Comment naviguer dans la bo\u00eete \u00e0 outils<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cded736 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"cded736\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4da6677 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"4da6677\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cette bo\u00eete \u00e0 outils est organis\u00e9e en deux parties, refl\u00e9tant le double r\u00f4le de AI dans la cybers\u00e9curit\u00e9.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e0a0348 e-con-full e-flex e-con e-child\" data-id=\"e0a0348\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cc6ed06 elementor-widget elementor-widget-heading\" data-id=\"cc6ed06\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">L'IA dans la cyberd\u00e9fense<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c83c7fa elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"c83c7fa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Comment AI modifie la cyberd\u00e9fense tout au long du cycle de vie d'un cyberincident : <\/strong><\/p><p>La premi\u00e8re partie examine l'impact de AI sur la cyberd\u00e9fense, en soulignant comment les outils de AI soutiennent la cyberd\u00e9fense tout au long du cycle de vie de l'incident : pr\u00e9vention, pr\u00e9paration, r\u00e9ponse et r\u00e9cup\u00e9ration. Elle met en \u00e9vidence des applications concr\u00e8tes telles que la cartographie de la surface d'attaque, la d\u00e9tection des anomalies et le d\u00e9veloppement de codes s\u00e9curis\u00e9s, et les illustre par des \u00e9tudes de cas et des r\u00e9f\u00e9rences pour une \u00e9tude plus approfondie.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2421c9a e-con-full e-flex e-con e-child\" data-id=\"2421c9a\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a357f10 elementor-widget elementor-widget-heading\" data-id=\"a357f10\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">AI en cybercriminalit\u00e9<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7848b6 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"c7848b6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Comment AI modifie la cha\u00eene de la mort cybern\u00e9tique : <\/strong><\/p><p>La deuxi\u00e8me partie traite de l'impact de la AI sur la cyber-offensive, en se concentrant sur la mani\u00e8re dont la AI remod\u00e8le la cha\u00eene de la mort cybern\u00e9tique. Elle examine comment le AI permet aux attaquants d'automatiser et d'am\u00e9liorer des \u00e9tapes telles que la reconnaissance, l'armement et la diffusion, tout en introduisant de nouvelles formes d'attaque. Des exemples de cas et des lectures compl\u00e9mentaires permettent de mieux comprendre ces \u00e9volutions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-144479636\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-144479636\" data-tab-index=\"6\" style=\"--n-tabs-title-order: 6;\" class=\"elementor-element elementor-element-7fc629f e-con-full e-flex e-con e-child\" data-id=\"7fc629f\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-fe376f9 e-con-full e-flex e-con e-child\" data-id=\"fe376f9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cd45469 elementor-widget elementor-widget-heading\" data-id=\"cd45469\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Glossaire<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-683c02b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"683c02b\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df381d2 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"df381d2\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Adversaire AI :<\/strong> un ensemble de techniques par lesquelles les attaquants manipulent les mod\u00e8les AI (par exemple, en contournant les syst\u00e8mes de d\u00e9tection, en empoisonnant les donn\u00e9es d'entra\u00eenement).<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Attaques adverses :<\/strong> donn\u00e9es modifi\u00e9es pour tromper les syst\u00e8mes AI (par exemple, logiciels malveillants l\u00e9g\u00e8rement modifi\u00e9s pour \u00e9chapper aux logiciels antivirus bas\u00e9s sur AI).  <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Exemples contradictoires :<\/strong> les donn\u00e9es malveillantes destin\u00e9es \u00e0 induire en erreur les mod\u00e8les AI (par exemple, images ou textes d\u00e9form\u00e9s).   <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Alignement :<\/strong> veiller \u00e0 ce que les objectifs des syst\u00e8mes AI soient coh\u00e9rents avec les intentions humaines.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Intelligence artificielle (AI) :<\/strong> domaine de l'informatique qui vise \u00e0 cr\u00e9er des syst\u00e8mes capables d'effectuer des t\u00e2ches n\u00e9cessitant une intelligence humaine, telles que la d\u00e9tection des menaces, l'analyse des comportements anormaux ou la r\u00e9ponse automatis\u00e9e aux incidents de cybers\u00e9curit\u00e9.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>l'explicabilit\u00e9 AI (XAI) :<\/strong> des m\u00e9thodes qui rendent les d\u00e9cisions de AI compr\u00e9hensibles pour les humains.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>AI s\u00e9curit\u00e9 :<\/strong> veiller \u00e0 ce que les syst\u00e8mes AI se comportent comme pr\u00e9vu et n'introduisent pas de nouvelles vuln\u00e9rabilit\u00e9s.  <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Biais dans AI :<\/strong> des erreurs syst\u00e9miques dans les r\u00e9sultats du AI caus\u00e9es par des donn\u00e9es de formation d\u00e9s\u00e9quilibr\u00e9es ou biais\u00e9es.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Empoisonnement des donn\u00e9es :<\/strong> un type d'attaque contradictoire o\u00f9 des donn\u00e9es malveillantes ou corrompues sont ins\u00e9r\u00e9es dans des ensembles de donn\u00e9es d'apprentissage afin de d\u00e9grader les performances du mod\u00e8le ou d'introduire des vuln\u00e9rabilit\u00e9s.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Apprentissage en profondeur (DL) :<\/strong>un type d'apprentissage automatique qui utilise des r\u00e9seaux neuronaux multicouches pour analyser des donn\u00e9es complexes (par exemple, des images, des journaux de r\u00e9seau), souvent utilis\u00e9 pour la classification des logiciels malveillants ou la d\u00e9tection des intrusions. Les r\u00e9seaux neuronaux aident \u00e0 traiter les donn\u00e9es brutes au c\u0153ur des algorithmes d'apprentissage automatique, en aidant \u00e0 identifier, classer et am\u00e9liorer les corr\u00e9lations et les mod\u00e8les cach\u00e9s dans les donn\u00e9es brutes (les r\u00e9seaux neuronaux comprennent les r\u00e9seaux neuronaux artificiels, les r\u00e9seaux neuronaux convolutifs et les r\u00e9seaux neuronaux r\u00e9currents en fonction des applications).<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Changement de distribution :<\/strong> le risque que les mod\u00e8les AI deviennent inefficaces si les donn\u00e9es r\u00e9elles diff\u00e8rent des donn\u00e9es de formation.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Ethique AI :<\/strong> des principes garantissant que le AI est utilis\u00e9 de mani\u00e8re \u00e9quitable, responsable et transparente dans le domaine de la cybers\u00e9curit\u00e9.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Ajustement minutieux :<\/strong> le processus d'adaptation d'un mod\u00e8le pr\u00e9-entra\u00een\u00e9 \u00e0 une t\u00e2che ou \u00e0 un ensemble de donn\u00e9es sp\u00e9cifique, n\u00e9cessitant souvent moins de donn\u00e9es et de ressources informatiques que l'entra\u00eenement \u00e0 partir de z\u00e9ro.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Apprentissage machine (ML) :<\/strong> un sous-ensemble de AI dans lequel les syst\u00e8mes apprennent \u00e0 partir de donn\u00e9es pour identifier des mod\u00e8les (par exemple, signatures de logiciels malveillants, trafic r\u00e9seau suspect) et prendre des d\u00e9cisions ou faire des pr\u00e9dictions.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Mod\u00e8le :<\/strong> repr\u00e9sentation math\u00e9matique d'un syst\u00e8me form\u00e9 sur des donn\u00e9es pour effectuer des t\u00e2ches telles que la classification, la pr\u00e9diction ou la g\u00e9n\u00e9ration dans AI et l'apprentissage automatique.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Poids du mod\u00e8le :<\/strong> param\u00e8tres num\u00e9riques appris au cours de la formation qui d\u00e9terminent la mani\u00e8re dont un mod\u00e8le AI traite les entr\u00e9es pour produire des sorties. L'ajustement des poids permet au mod\u00e8le de reconna\u00eetre des mod\u00e8les et de faire des pr\u00e9dictions pr\u00e9cises.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Injection rapide :<\/strong> Technique utilis\u00e9e pour manipuler des mod\u00e8les de langage de grande taille en ins\u00e9rant des instructions artisanales dans les entr\u00e9es, ce qui am\u00e8ne le mod\u00e8le \u00e0 ignorer ou \u00e0 outrepasser sa t\u00e2che initiale et \u00e0 produire des r\u00e9sultats inattendus.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Apprentissage par renforcement :<\/strong> une m\u00e9thode dans laquelle AI apprend \u00e0 prendre des d\u00e9cisions optimales par essais et erreurs dans des environnements simul\u00e9s.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Robustesse :<\/strong> la capacit\u00e9 de la AI \u00e0 fonctionner de mani\u00e8re fiable dans des conditions changeantes (par exemple lorsqu'elle est confront\u00e9e \u00e0 de nouveaux adversaires).<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Apprentissage supervis\u00e9 :<\/strong> une m\u00e9thode qui consiste \u00e0 former des mod\u00e8les en utilisant des donn\u00e9es \u00e9tiquet\u00e9es pour la classification.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Donn\u00e9es synth\u00e9tiques :<\/strong> donn\u00e9es g\u00e9n\u00e9r\u00e9es artificiellement et utilis\u00e9es pour former les mod\u00e8les AI lorsque les donn\u00e9es r\u00e9elles sont rares ou sensibles.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Apprentissage non supervis\u00e9 :<\/strong> une m\u00e9thode d'identification de mod\u00e8les cach\u00e9s dans des donn\u00e9es non \u00e9tiquet\u00e9es.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-144479637\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-144479637\" data-tab-index=\"7\" style=\"--n-tabs-title-order: 7;\" class=\"elementor-element elementor-element-ee77a59 e-con-full e-flex e-con e-child\" data-id=\"ee77a59\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-346d1f9 e-con-full e-flex e-con e-child\" data-id=\"346d1f9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f1d0c05 elementor-widget elementor-widget-heading\" data-id=\"f1d0c05\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Comment vous pouvez contribuer<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-794b2d7 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"794b2d7\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dcecd4a elementor-widget elementor-widget-text-editor\" data-id=\"dcecd4a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Utilisez-vous une solution AI en libre acc\u00e8s pour former les \u00e9tudiants \u00e0 la cybers\u00e9curit\u00e9, ou avez-vous d'autres ressources accessibles au public \u00e0 partager pour l'enseignement du AI et de la cybers\u00e9curit\u00e9 (qu'elles soient bas\u00e9es sur le AI ou non) ?<br \/><br \/><span style=\"font-weight: 400;\">Nous aimerions avoir de vos nouvelles. Envoyez-nous un courriel \u00e0 l'adresse suivante <\/span><b><span \n                data-original-string='364tlGIyGUsvQtLeW3UtSA==d01xf+CYvSWa3w6loVZw9VrV5dgi9VL3KRMyCHy8w3wbyA='\n                class='apbct-email-encoder'\n                title='Ce contact a \u00e9t\u00e9 encod\u00e9 par Anti-Spam by CleanTalk. Cliquez pour d\u00e9coder. Pour terminer le d\u00e9codage, assurez-vous que JavaScript est activ\u00e9 dans votre navigateur.'>co*****@************es.org<\/span><\/b><span style=\"font-weight: 400;\">Nous partagerons vos contributions avec l'ensemble de la communaut\u00e9 et veillerons \u00e0 ce que cette bo\u00eete \u00e0 outils soit tenue \u00e0 jour.<\/span><br \/><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Cette bo\u00eete \u00e0 outils a \u00e9t\u00e9 \u00e9labor\u00e9e par Virtual Routes dans le cadre du programme de s\u00e9minaires sur la cybers\u00e9curit\u00e9 soutenu par Google.org, afin de fournir aux enseignants et aux \u00e9tudiants des ressources dans un domaine en constante \u00e9volution. Elle s'appuie sur une enqu\u00eate men\u00e9e aupr\u00e8s des universit\u00e9s participantes et fournit des \u00e9l\u00e9ments permettant de comprendre l'impact de AI sur la cybers\u00e9curit\u00e9, en pr\u00e9sentant son double r\u00f4le d'outil d\u00e9fensif et offensif.<\/p>","protected":false},"author":1,"featured_media":55699,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"This toolkit was developed by\u00a0Virtual Routes\u00a0as part of the\u00a0Cybersecurity Seminars Programme supported by Google.org, to provide teachers and students with resources in a constantly evolving field. It is based on a survey of participating universities and provides materials to help understand the impact of AI on cybersecurity, presenting its dual role as both a defensive and offensive tool.","_seopress_robots_index":"","inline_featured_image":false,"footnotes":""},"class_list":["post-61455","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/pages\/61455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/comments?post=61455"}],"version-history":[{"count":21,"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/pages\/61455\/revisions"}],"predecessor-version":[{"id":62967,"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/pages\/61455\/revisions\/62967"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/media\/55699"}],"wp:attachment":[{"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/media?parent=61455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}