{"id":864,"date":"2021-05-12T15:05:33","date_gmt":"2021-05-12T15:05:33","guid":{"rendered":"https:\/\/www.krypto-kids.de\/?page_id=864"},"modified":"2021-11-01T16:30:43","modified_gmt":"2021-11-01T16:30:43","slug":"wiki","status":"publish","type":"page","link":"https:\/\/www.krypto-kids.de\/fr\/wiki\/","title":{"rendered":"Wiki"},"content":{"rendered":"\n\n\n<div class=\"moduleHeader contentBlock kleineVersion\">\n\n        <div class=\"container h-100\">\n        <div class=\"row align-items-center h-100 \">\n            <div class=\"col-12 col-sm-7 col-md-5\">\n                <h1>Wiki<\/h1>\n                <h2 class=\" \"><\/h2>\n\n                            <\/div>\n\n\n                            <div class=\"col-12 col-sm-5 col-md-5 offset-md-1 text-center h-100 d-none d-sm-block\">\n\n                    <div class=\"row align-content-end h-100\">\n                        <div class=\"col-12\">\n                            <img decoding=\"async\" data-src=\"https:\/\/www.krypto-kids.de\/wp-content\/uploads\/2020\/02\/dieKryptoKids-900x690.png\" src=\"\" class=\"lazy img-fluid\"\/>\n\n                        <\/div>\n                    <\/div>\n\n\n                <\/div>\n\n            \n        <\/div>\n    <\/div>\n<\/div>\n<\/div>\n\n\n\n\n\n<div class=\"moduleAccordion contentBlock\n\n\npt-9 pt-md-10 pt-lg-11 bg-white \n\" id=\"block_5e4d783e96ad2\" data-appear-top-offset=\"300\"\n\n    \n>\n\n\n\n\n<div class=\"container\">\n\n    <div class=\"row\">\n\n        <div class=\"col-12 col-md-9 col-lg-8\">\n            <h4>Au secours, je ne comprends pas !<\/h4>\n            <h3 class=\"mb-8\">Explication de tous les termes techniques importants<\/h3>\n\n                            <div class=\"accordionItem\" itemscope itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\">\n                    <h2 itemprop=\"name\">01. Hackers criminels<\/h2>\n                    <div class=\"accordionContent\" itemscope itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\">\n                        <div itemprop=\"text\">\n                            <p class=\"p1\"><span style=\"font-weight: 400;\">Les hackers criminels sont des personnes qui p\u00e9n\u00e8trent ill\u00e9galement dans un syst\u00e8me informatique. De cette mani\u00e8re, ils peuvent avoir acc\u00e8s \u00e0 certaines donn\u00e9es ou modifier le fonctionnement d&#8217;un syst\u00e8me.<\/span><\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"accordionItem\" itemscope itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\">\n                    <h2 itemprop=\"name\">02. Donn\u00e9es personnelles<\/h2>\n                    <div class=\"accordionContent\" itemscope itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\">\n                        <div itemprop=\"text\">\n                            <p><span style=\"font-weight: 400;\">Les donn\u00e9es personnelles sont toujours li\u00e9es \u00e0 une personne sp\u00e9cifique. Ce sont, par exemple, des informations sur toi et ta famille, ton lieu de r\u00e9sidence, ton num\u00e9ro de t\u00e9l\u00e9phone portable, tes r\u00e9sultats scolaires ou m\u00eame tes maladies.<\/span><\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"accordionItem\" itemscope itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\">\n                    <h2 itemprop=\"name\">03. March\u00e9 noir<\/h2>\n                    <div class=\"accordionContent\" itemscope itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\">\n                        <div itemprop=\"text\">\n                            <p><span style=\"font-weight: 400;\">Le march\u00e9 noir est un endroit sur internet o\u00f9 on peut acheter ill\u00e9galement des biens ou des services qui sont normalement interdits par la loi ou contr\u00f4l\u00e9s de mani\u00e8re tr\u00e8s stricte : par exemple le commerce d&#8217;armes, de m\u00e9dicaments, de biens vol\u00e9s ou d&#8217;informations secr\u00e8tes.<\/span><\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"accordionItem\" itemscope itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\">\n                    <h2 itemprop=\"name\">04. Geeks \/ Nerds<\/h2>\n                    <div class=\"accordionContent\" itemscope itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\">\n                        <div itemprop=\"text\">\n                            <p><span style=\"font-weight: 400;\">Les geeks (appel\u00e9s aussi de mani\u00e8re un peu n\u00e9gative nerds) sont des personnes qui ont un int\u00e9r\u00eat marqu\u00e9 pour un ou plusieurs sujets technologiques. Les ordinateurs et les m\u00e9dias num\u00e9riques font partie de leurs sp\u00e9cialit\u00e9s<\/span><\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"accordionItem\" itemscope itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\">\n                    <h2 itemprop=\"name\">05. Mot de passe<\/h2>\n                    <div class=\"accordionContent\" itemscope itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\">\n                        <div itemprop=\"text\">\n                            <p><span style=\"font-weight: 400;\">Un mot de passe fonctionne comme une cl\u00e9 qui te donne acc\u00e8s \u00e0 quelque chose. Il ne s&#8217;agit pas toujours d&#8217;un programme sur internet. Il existe \u00e9galement des mots de passe pour les cadenas de v\u00e9lo, les smartphones ou pour acc\u00e9der \u00e0 ton compte bancaire.<\/span><\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"accordionItem\" itemscope itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\">\n                    <h2 itemprop=\"name\">06. Cybercriminalit\u00e9<\/h2>\n                    <div class=\"accordionContent\" itemscope itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\">\n                        <div itemprop=\"text\">\n                            <p><span style=\"font-weight: 400;\">La cybercriminalit\u00e9 est le terme utilis\u00e9 pour d\u00e9crire les crimes qui violent les r\u00e8gles et les lois relatives \u00e0 internet, aux r\u00e9seaux de donn\u00e9es ou aux donn\u00e9es. Les personnes criminelles peuvent espionner les donn\u00e9es des utilisatrices et utilisateurs afin, par exemple, d&#8217;effectuer des transactions bancaires ill\u00e9gales ou de faire du chantage aux personnes auxquelles ils ont vol\u00e9 des donn\u00e9es.<\/span><\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"accordionItem\" itemscope itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\">\n                    <h2 itemprop=\"name\">07. Serveur<\/h2>\n                    <div class=\"accordionContent\" itemscope itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\">\n                        <div itemprop=\"text\">\n                            <p><span style=\"font-weight: 400;\">Un serveur est un ordinateur de r\u00e9seau puissant qui est connect\u00e9 \u00e0 d&#8217;autres appareils et sert de m\u00e9diateur entre eux. Il prend en charge des t\u00e2ches et met \u00e0 disposition des donn\u00e9es et des services, par exemple un espace de stockage plus important ou des programmes sp\u00e9ciaux. <\/span><\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"accordionItem\" itemscope itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\">\n                    <h2 itemprop=\"name\">08. Mise \u00e0 jour<\/h2>\n                    <div class=\"accordionContent\" itemscope itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\">\n                        <div itemprop=\"text\">\n                            <p><span style=\"font-weight: 400;\">Une mise \u00e0 jour actualise un logiciel existant et corrige les bugs, par exemple. Pour prot\u00e9ger tes donn\u00e9es, il est important de maintenir les logiciels de s\u00e9curit\u00e9 \u00e0 jour. <\/span><\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"accordionItem\" itemscope itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\">\n                    <h2 itemprop=\"name\">09. Pare-feu (Firewall)<\/h2>\n                    <div class=\"accordionContent\" itemscope itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\">\n                        <div itemprop=\"text\">\n                            <p><span style=\"font-weight: 400;\">Un pare-feu fonctionne comme un filtre qui contr\u00f4le les donn\u00e9es qui entrent et qui sortent. Cela peut emp\u00eacher que des virus endommagent ton ordinateur ou que des \u00e9trangers acc\u00e8dent \u00e0 tes donn\u00e9es sans autorisation.<\/span><\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"accordionItem\" itemscope itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\">\n                    <h2 itemprop=\"name\">10. Virus<\/h2>\n                    <div class=\"accordionContent\" itemscope itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\">\n                        <div itemprop=\"text\">\n                            <p><span style=\"font-weight: 400;\">En fait, un virus est un agent pathog\u00e8ne. Le terme vient de la biologie. Un virus informatique fonctionne de mani\u00e8re similaire, car c&#8217;est ainsi qu&#8217;on appelle un programme ind\u00e9sirable qui s&#8217;infiltre dans l&#8217;ordinateur d&#8217;autres personnes afin d\u2019y modifier des programmes, d&#8217;y espionner des donn\u00e9es ou d\u2019y causer des dommages.<\/span><\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"accordionItem\" itemscope itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\">\n                    <h2 itemprop=\"name\">11. Adresse IP<\/h2>\n                    <div class=\"accordionContent\" itemscope itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\">\n                        <div itemprop=\"text\">\n                            <p><span style=\"font-weight: 400;\">L&#8217;adresse IP d&#8217;un ordinateur est comme le num\u00e9ro de t\u00e9l\u00e9phone d&#8217;une personne. Il s&#8217;agit d&#8217;une s\u00e9quence sp\u00e9cifique de chiffres qui ne peut \u00eatre attribu\u00e9e qu&#8217;\u00e0 un seul ordinateur, mais que l&#8217;on peut modifier. Avec ton adresse IP, tu laisses des traces sur internet qui permettent de remonter jusqu\u2019\u00e0 ton appareil. <\/span><\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"accordionItem\" itemscope itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\">\n                    <h2 itemprop=\"name\">12. Protection des donn\u00e9es<\/h2>\n                    <div class=\"accordionContent\" itemscope itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\">\n                        <div itemprop=\"text\">\n                            <p><span style=\"font-weight: 400;\">Tes donn\u00e9es personnelles sont pr\u00e9cieuses. Personne d\u2019autre que toi n\u2019a le droit de d\u00e9cider de leur utilisation. De nombreuses entreprises souhaitent utiliser tes donn\u00e9es \u00e0 des fins de publicit\u00e9 ou de recherche. D&#8217;autres peuvent utiliser tes donn\u00e9es pour te voler, te faire du chantage ou publier des photos priv\u00e9es de toi. Par cons\u00e9quent, tu dois toujours prot\u00e9ger tes donn\u00e9es personnelles.<\/span><\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n            \n        <\/div>\n    <\/div>\n\n<\/div>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-864","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Wiki - Krypto Kids<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.krypto-kids.de\/fr\/wiki\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wiki - Krypto Kids\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.krypto-kids.de\/fr\/wiki\/\" \/>\n<meta property=\"og:site_name\" content=\"Krypto Kids\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-01T16:30:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.krypto-kids.de\/fr\/wiki\/\",\"url\":\"https:\/\/www.krypto-kids.de\/fr\/wiki\/\",\"name\":\"Wiki - Krypto Kids\",\"isPartOf\":{\"@id\":\"https:\/\/www.krypto-kids.de\/#website\"},\"datePublished\":\"2021-05-12T15:05:33+00:00\",\"dateModified\":\"2021-11-01T16:30:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.krypto-kids.de\/fr\/wiki\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.krypto-kids.de\/fr\/wiki\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.krypto-kids.de\/fr\/wiki\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.krypto-kids.de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wiki\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.krypto-kids.de\/#website\",\"url\":\"https:\/\/www.krypto-kids.de\/\",\"name\":\"Krypto Kids\",\"description\":\"Abenteuerspiele f\u00fcr den p\u00e4dagogischen Kontext zu den Themen Datensicherheit und Demokratiebildung\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.krypto-kids.de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wiki - Krypto Kids","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.krypto-kids.de\/fr\/wiki\/","og_locale":"fr_FR","og_type":"article","og_title":"Wiki - Krypto Kids","og_url":"https:\/\/www.krypto-kids.de\/fr\/wiki\/","og_site_name":"Krypto Kids","article_modified_time":"2021-11-01T16:30:43+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.krypto-kids.de\/fr\/wiki\/","url":"https:\/\/www.krypto-kids.de\/fr\/wiki\/","name":"Wiki - Krypto Kids","isPartOf":{"@id":"https:\/\/www.krypto-kids.de\/#website"},"datePublished":"2021-05-12T15:05:33+00:00","dateModified":"2021-11-01T16:30:43+00:00","breadcrumb":{"@id":"https:\/\/www.krypto-kids.de\/fr\/wiki\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.krypto-kids.de\/fr\/wiki\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.krypto-kids.de\/fr\/wiki\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.krypto-kids.de\/"},{"@type":"ListItem","position":2,"name":"Wiki"}]},{"@type":"WebSite","@id":"https:\/\/www.krypto-kids.de\/#website","url":"https:\/\/www.krypto-kids.de\/","name":"Krypto Kids","description":"Abenteuerspiele f\u00fcr den p\u00e4dagogischen Kontext zu den Themen Datensicherheit und Demokratiebildung","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.krypto-kids.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/www.krypto-kids.de\/fr\/wp-json\/wp\/v2\/pages\/864","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.krypto-kids.de\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.krypto-kids.de\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.krypto-kids.de\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.krypto-kids.de\/fr\/wp-json\/wp\/v2\/comments?post=864"}],"version-history":[{"count":0,"href":"https:\/\/www.krypto-kids.de\/fr\/wp-json\/wp\/v2\/pages\/864\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.krypto-kids.de\/fr\/wp-json\/wp\/v2\/media?parent=864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}