{"version":"1.0","provider_name":"Tech Posts French - Latest Trends in AI, Software, and Digital Innovation","provider_url":"https:\/\/www.tech-posts.com\/fr","author_name":"vpadmin","author_url":"https:\/\/www.tech-posts.com\/fr\/author\/vpadmin\/","title":"Identification et att\u00e9nuation des risques avec les diagrammes de flux de donn\u00e9es","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"zdRgf2Pr4Y\"><a href=\"https:\/\/www.tech-posts.com\/fr\/risk-identification-mitigation-data-flow-diagram-analysis\/\">Guide DFD : Identification et att\u00e9nuation des risques \u00e0 l\u2019aide de l\u2019analyse des diagrammes de flux de donn\u00e9es<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.tech-posts.com\/fr\/risk-identification-mitigation-data-flow-diagram-analysis\/embed\/#?secret=zdRgf2Pr4Y\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Guide DFD : Identification et att\u00e9nuation des risques \u00e0 l\u2019aide de l\u2019analyse des diagrammes de flux de donn\u00e9es\u00a0\u00bb &#8212; Tech Posts French - Latest Trends in AI, Software, and Digital Innovation\" data-secret=\"zdRgf2Pr4Y\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.tech-posts.com\/fr\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.tech-posts.com\/fr\/wp-content\/uploads\/sites\/6\/2026\/03\/dfd-risk-analysis-security-infographic-sketch-16x9-1.jpg","thumbnail_width":1664,"thumbnail_height":928,"description":"Guide complet sur l'utilisation des diagrammes de flux de donn\u00e9es pour l'identification des risques de s\u00e9curit\u00e9. Apprenez \u00e0 cartographier les menaces, \u00e0 d\u00e9finir les fronti\u00e8res de confiance et \u00e0 att\u00e9nuer les vuln\u00e9rabilit\u00e9s."}