{"id":80389,"date":"2025-12-01T13:14:01","date_gmt":"2025-12-01T12:14:01","guid":{"rendered":"https:\/\/www.zennio.com\/?p=80389"},"modified":"2025-12-01T13:38:24","modified_gmt":"2025-12-01T12:38:24","slug":"securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx","status":"publish","type":"post","link":"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/","title":{"rendered":"S\u00e9curit\u00e9 dans les installations : pr\u00e9venir les attaques sur les syst\u00e8mes KNX"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><strong>Pourquoi la s\u00e9curit\u00e9 dans les installations KNX est-elle cruciale ?<\/strong><\/h3>\n\n\n\n<p>Dans un monde o\u00f9 les b\u00e2timents deviennent de plus en plus connect\u00e9s, la <strong>s\u00e9curit\u00e9 dans les installations<\/strong> domotiques est un enjeu prioritaire. Les syst\u00e8mes KNX, largement utilis\u00e9s pour automatiser les fonctions d\u2019un b\u00e2timent (\u00e9clairage, chauffage, contr\u00f4le d\u2019acc\u00e8s, etc.), peuvent \u00eatre la cible de cyberattaques si aucune mesure pr\u00e9ventive n\u2019est mise en place.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Les failles les plus fr\u00e9quentes dans les installations KNX<\/strong><\/h3>\n\n\n\n<p>Un des points critiques de vuln\u00e9rabilit\u00e9 est le <strong>port 3671<\/strong>, utilis\u00e9 pour la communication entre \u00e9quipements KNX via IP. En cas de piratage, les cons\u00e9quences peuvent \u00eatre graves :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Inondation du r\u00e9seau par des t\u00e9l\u00e9grammes malveillants,<br><\/li>\n\n\n\n<li>Blocage des dispositifs,<br><\/li>\n\n\n\n<li>Activation de <strong>mots de passe BCU al\u00e9atoires<\/strong>, rendant le syst\u00e8me inutilisable.<br><\/li>\n<\/ul>\n\n\n\n<p>Les utilisateurs victimes de ce type d\u2019attaque rapportent souvent l\u2019<strong>arr\u00eat complet<\/strong> de certaines fonctions du b\u00e2timent : plus de r\u00e9ponse aux ordres, impossibilit\u00e9 de reprogrammer, sentiment de perte totale de contr\u00f4le.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Que faire en cas d\u2019attaque sur votre installation ?<\/strong><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>\u00c9tape 1 : tenter les mots de passe BCU les plus courants<\/strong><\/h4>\n\n\n\n<p>Dans de nombreux cas, les attaques utilisent des mots de passe standards pour verrouiller les dispositifs. Voici une liste de mots de passe fr\u00e9quemment rencontr\u00e9s :<\/p>\n\n\n\n<p>mathematica<\/p>\n\n\n\n<p>0000000A \u2013 0000000D \u2013 0000000E \u2013 0000000F&nbsp;&nbsp;<\/p>\n\n\n\n<p>A56DC68B \u2013 B19B981A \u2013 FEC88146 \u2013 98719981&nbsp;&nbsp;<\/p>\n\n\n\n<p>00000BAC \u2013 11197196 \u2013 66BC88A4 \u2013 2021AAFF<\/p>\n\n\n\n<p>Essayez-les avant de passer \u00e0 l\u2019\u00e9tape suivante.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>\u00c9tape 2 : r\u00e9initialisation usine<\/strong><\/h4>\n\n\n\n<p>Si aucun mot de passe ne fonctionne, une <strong>r\u00e9initialisation d\u2019usine<\/strong> peut permettre de restaurer l\u2019acc\u00e8s. Attention, cette option n\u2019est disponible que sur certains appareils. Consultez la fiche technique de votre mat\u00e9riel.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>\u00c9tape 3 : contactez le fabricant<\/strong><\/h4>\n\n\n\n<p>En dernier recours, il peut \u00eatre n\u00e9cessaire de <strong>renvoyer les \u00e9quipements au fabricant<\/strong> via votre distributeur.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Comment renforcer la s\u00e9curit\u00e9 dans les installations KNX ?<\/strong><\/h3>\n\n\n\n<p>Voici 5 recommandations essentielles pour <strong>\u00e9viter les cyberattaques<\/strong> :<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>1. Fermer les ports du routeur apr\u00e8s configuration<\/strong><\/h4>\n\n\n\n<p>Une erreur fr\u00e9quente est de laisser le <strong>port 3671<\/strong> ouvert apr\u00e8s un acc\u00e8s distant. Cela ouvre la porte \u00e0 toute intrusion. Une fois l\u2019installation termin\u00e9e, <strong>fermez imm\u00e9diatement ce port<\/strong>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>2. Remplacer le routeur par d\u00e9faut<\/strong><\/h4>\n\n\n\n<p>Les routeurs fournis par les FAI sont souvent peu s\u00e9curis\u00e9s. Optez pour un <strong>routeur professionnel<\/strong> disposant de fonctions avanc\u00e9es de s\u00e9curit\u00e9 r\u00e9seau.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3. Toujours passer par un VPN<\/strong><\/h4>\n\n\n\n<p>Utilisez un <strong>r\u00e9seau priv\u00e9 virtuel (VPN)<\/strong> pour toute connexion \u00e0 distance \u00e0 votre syst\u00e8me KNX. Cela garantit un <strong>canal chiffr\u00e9<\/strong> et r\u00e9duit fortement les risques d\u2019interception.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>4. Utiliser des \u00e9quipements KNX Secure<\/strong><\/h4>\n\n\n\n<p>La norme <strong>KNX Secure<\/strong> chiffre les t\u00e9l\u00e9grammes \u00e9chang\u00e9s (via AES 128) et garantit l\u2019int\u00e9grit\u00e9 des communications. Plus d\u2019infos ici : D\u00e9couvrez KNX Secure<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>5. Mettre \u00e0 jour r\u00e9guli\u00e8rement<\/strong><\/h4>\n\n\n\n<p>Assurez-vous que tous vos dispositifs et logiciels (ETS, firmware) sont <strong>\u00e0 jour<\/strong>. Les mises \u00e0 jour corrigent souvent des failles critiques.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Pourquoi faire confiance \u00e0 Zennio ?<\/strong><\/h3>\n\n\n\n<p>Leader europ\u00e9en de la <strong>domotique s\u00e9curis\u00e9e<\/strong>, Zennio vous accompagne dans la mise en \u0153uvre de solutions KNX robustes. Nos produits sont compatibles <strong>KNX Secure<\/strong> et con\u00e7us pour r\u00e9pondre aux exigences des <strong>installations les plus sensibles<\/strong>, qu\u2019elles soient r\u00e9sidentielles ou professionnelles.<\/p>\n\n\n\n<p>D\u00e9couvrez notre catalogue<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Conclusion : mieux vaut pr\u00e9venir que gu\u00e9rir<\/strong><\/h3>\n\n\n\n<p>La <strong>s\u00e9curit\u00e9 dans les installations<\/strong> KNX n\u2019est pas une option, c\u2019est une n\u00e9cessit\u00e9. Gr\u00e2ce \u00e0 des actions simples et \u00e0 l\u2019adoption des bons outils (VPN, routeur s\u00e9curis\u00e9, KNX Secure), vous r\u00e9duisez drastiquement les risques d\u2019attaque.<\/p>\n\n\n\n<p>En cas d\u2019incident, gardez votre calme : des solutions existent, mais <strong>le meilleur rempart reste la pr\u00e9vention<\/strong>.<strong>encillo que solucionarlo<\/strong>. Consulta con expertos y mant\u00e9n tus equipos protegidos para garantizar el buen funcionamiento de tu sistema KNX.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pourquoi la s\u00e9curit\u00e9 dans les installations KNX est-elle cruciale ? Dans un monde o\u00f9 les b\u00e2timents deviennent de plus en plus connect\u00e9s, la s\u00e9curit\u00e9 dans les installations domotiques est un enjeu prioritaire. Les syst\u00e8mes KNX, largement utilis\u00e9s pour automatiser les fonctions d\u2019un b\u00e2timent (\u00e9clairage, chauffage, contr\u00f4le d\u2019acc\u00e8s, etc.), peuvent \u00eatre la cible de cyberattaques si [&hellip;]<\/p>\n","protected":false},"author":30,"featured_media":80230,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-80389","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e9curit\u00e9 dans les installations : pr\u00e9venir les attaques sur les syst\u00e8mes KNX | Zennio<\/title>\n<meta name=\"description\" content=\"Pourquoi la s\u00e9curit\u00e9 dans les installations KNX est-elle cruciale ? Dans un monde o\u00f9 les b\u00e2timents deviennent de plus en plus connect\u00e9s, la s\u00e9curit\u00e9 dans\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 dans les installations : pr\u00e9venir les attaques sur les syst\u00e8mes KNX | Zennio\" \/>\n<meta property=\"og:description\" content=\"Pourquoi la s\u00e9curit\u00e9 dans les installations KNX est-elle cruciale ? Dans un monde o\u00f9 les b\u00e2timents deviennent de plus en plus connect\u00e9s, la s\u00e9curit\u00e9 dans\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/\" \/>\n<meta property=\"og:site_name\" content=\"Zennio\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-01T12:14:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-01T12:38:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zennio.com\/wp-content\/uploads\/2025\/11\/security-in-facilities.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zennio\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zennio\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/\"},\"author\":{\"name\":\"Zennio\",\"@id\":\"https:\/\/www.zennio.com\/fr\/#\/schema\/person\/d99c9824a38eae5699426b3fc85f994c\"},\"headline\":\"S\u00e9curit\u00e9 dans les installations : pr\u00e9venir les attaques sur les syst\u00e8mes KNX\",\"datePublished\":\"2025-12-01T12:14:01+00:00\",\"dateModified\":\"2025-12-01T12:38:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/\"},\"wordCount\":648,\"image\":{\"@id\":\"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.zennio.com\/wp-content\/uploads\/2025\/11\/security-in-facilities.jpg\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/\",\"url\":\"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/\",\"name\":\"S\u00e9curit\u00e9 dans les installations : pr\u00e9venir les attaques sur les syst\u00e8mes KNX | Zennio\",\"isPartOf\":{\"@id\":\"https:\/\/www.zennio.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.zennio.com\/wp-content\/uploads\/2025\/11\/security-in-facilities.jpg\",\"datePublished\":\"2025-12-01T12:14:01+00:00\",\"dateModified\":\"2025-12-01T12:38:24+00:00\",\"author\":{\"@id\":\"https:\/\/www.zennio.com\/fr\/#\/schema\/person\/d99c9824a38eae5699426b3fc85f994c\"},\"description\":\"Pourquoi la s\u00e9curit\u00e9 dans les installations KNX est-elle cruciale ? Dans un monde o\u00f9 les b\u00e2timents deviennent de plus en plus connect\u00e9s, la s\u00e9curit\u00e9 dans\",\"breadcrumb\":{\"@id\":\"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/#breadcrumb\"},\"inLanguage\":\"fr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr\",\"@id\":\"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/#primaryimage\",\"url\":\"https:\/\/www.zennio.com\/wp-content\/uploads\/2025\/11\/security-in-facilities.jpg\",\"contentUrl\":\"https:\/\/www.zennio.com\/wp-content\/uploads\/2025\/11\/security-in-facilities.jpg\",\"width\":1200,\"height\":600,\"caption\":\"Security in facilities\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.zennio.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 dans les installations : pr\u00e9venir les attaques sur les syst\u00e8mes KNX\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.zennio.com\/fr\/#website\",\"url\":\"https:\/\/www.zennio.com\/fr\/\",\"name\":\"Zennio\",\"description\":\"Zennio Global\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.zennio.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.zennio.com\/fr\/#\/schema\/person\/d99c9824a38eae5699426b3fc85f994c\",\"name\":\"Zennio\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr\",\"@id\":\"https:\/\/www.zennio.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.zennio.com\/wp-content\/uploads\/2025\/11\/ISOTIPO_Zennio_2022_PANTONE_perfilRGB_LOGO_ZENNIO_419C--96x96.png\",\"contentUrl\":\"https:\/\/www.zennio.com\/wp-content\/uploads\/2025\/11\/ISOTIPO_Zennio_2022_PANTONE_perfilRGB_LOGO_ZENNIO_419C--96x96.png\",\"caption\":\"Zennio\"},\"description\":\"Soluciones de tecnolog\u00eda para hoteles, viviendas y edificios.\",\"sameAs\":[\"https:\/\/www.zennio.com\/\"],\"url\":\"https:\/\/www.zennio.com\/fr\/blog\/author\/zennio\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 dans les installations : pr\u00e9venir les attaques sur les syst\u00e8mes KNX | Zennio","description":"Pourquoi la s\u00e9curit\u00e9 dans les installations KNX est-elle cruciale ? Dans un monde o\u00f9 les b\u00e2timents deviennent de plus en plus connect\u00e9s, la s\u00e9curit\u00e9 dans","robots":{"index":"noindex","follow":"follow"},"og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curit\u00e9 dans les installations : pr\u00e9venir les attaques sur les syst\u00e8mes KNX | Zennio","og_description":"Pourquoi la s\u00e9curit\u00e9 dans les installations KNX est-elle cruciale ? Dans un monde o\u00f9 les b\u00e2timents deviennent de plus en plus connect\u00e9s, la s\u00e9curit\u00e9 dans","og_url":"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/","og_site_name":"Zennio","article_published_time":"2025-12-01T12:14:01+00:00","article_modified_time":"2025-12-01T12:38:24+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.zennio.com\/wp-content\/uploads\/2025\/11\/security-in-facilities.jpg","type":"image\/jpeg"}],"author":"Zennio","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Zennio","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/#article","isPartOf":{"@id":"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/"},"author":{"name":"Zennio","@id":"https:\/\/www.zennio.com\/fr\/#\/schema\/person\/d99c9824a38eae5699426b3fc85f994c"},"headline":"S\u00e9curit\u00e9 dans les installations : pr\u00e9venir les attaques sur les syst\u00e8mes KNX","datePublished":"2025-12-01T12:14:01+00:00","dateModified":"2025-12-01T12:38:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/"},"wordCount":648,"image":{"@id":"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zennio.com\/wp-content\/uploads\/2025\/11\/security-in-facilities.jpg","articleSection":["Actualit\u00e9s"],"inLanguage":"fr"},{"@type":"WebPage","@id":"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/","url":"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/","name":"S\u00e9curit\u00e9 dans les installations : pr\u00e9venir les attaques sur les syst\u00e8mes KNX | Zennio","isPartOf":{"@id":"https:\/\/www.zennio.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/#primaryimage"},"image":{"@id":"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zennio.com\/wp-content\/uploads\/2025\/11\/security-in-facilities.jpg","datePublished":"2025-12-01T12:14:01+00:00","dateModified":"2025-12-01T12:38:24+00:00","author":{"@id":"https:\/\/www.zennio.com\/fr\/#\/schema\/person\/d99c9824a38eae5699426b3fc85f994c"},"description":"Pourquoi la s\u00e9curit\u00e9 dans les installations KNX est-elle cruciale ? Dans un monde o\u00f9 les b\u00e2timents deviennent de plus en plus connect\u00e9s, la s\u00e9curit\u00e9 dans","breadcrumb":{"@id":"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/#breadcrumb"},"inLanguage":"fr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/"]}]},{"@type":"ImageObject","inLanguage":"fr","@id":"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/#primaryimage","url":"https:\/\/www.zennio.com\/wp-content\/uploads\/2025\/11\/security-in-facilities.jpg","contentUrl":"https:\/\/www.zennio.com\/wp-content\/uploads\/2025\/11\/security-in-facilities.jpg","width":1200,"height":600,"caption":"Security in facilities"},{"@type":"BreadcrumbList","@id":"https:\/\/www.zennio.com\/fr\/blog\/securite-dans-les-installations-prevenir-les-attaques-sur-les-systemes-knx\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.zennio.com\/fr\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 dans les installations : pr\u00e9venir les attaques sur les syst\u00e8mes KNX"}]},{"@type":"WebSite","@id":"https:\/\/www.zennio.com\/fr\/#website","url":"https:\/\/www.zennio.com\/fr\/","name":"Zennio","description":"Zennio Global","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.zennio.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr"},{"@type":"Person","@id":"https:\/\/www.zennio.com\/fr\/#\/schema\/person\/d99c9824a38eae5699426b3fc85f994c","name":"Zennio","image":{"@type":"ImageObject","inLanguage":"fr","@id":"https:\/\/www.zennio.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/www.zennio.com\/wp-content\/uploads\/2025\/11\/ISOTIPO_Zennio_2022_PANTONE_perfilRGB_LOGO_ZENNIO_419C--96x96.png","contentUrl":"https:\/\/www.zennio.com\/wp-content\/uploads\/2025\/11\/ISOTIPO_Zennio_2022_PANTONE_perfilRGB_LOGO_ZENNIO_419C--96x96.png","caption":"Zennio"},"description":"Soluciones de tecnolog\u00eda para hoteles, viviendas y edificios.","sameAs":["https:\/\/www.zennio.com\/"],"url":"https:\/\/www.zennio.com\/fr\/blog\/author\/zennio\/"}]}},"_links":{"self":[{"href":"https:\/\/www.zennio.com\/fr\/wp-json\/wp\/v2\/posts\/80389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.zennio.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.zennio.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.zennio.com\/fr\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/www.zennio.com\/fr\/wp-json\/wp\/v2\/comments?post=80389"}],"version-history":[{"count":1,"href":"https:\/\/www.zennio.com\/fr\/wp-json\/wp\/v2\/posts\/80389\/revisions"}],"predecessor-version":[{"id":80392,"href":"https:\/\/www.zennio.com\/fr\/wp-json\/wp\/v2\/posts\/80389\/revisions\/80392"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.zennio.com\/fr\/wp-json\/wp\/v2\/media\/80230"}],"wp:attachment":[{"href":"https:\/\/www.zennio.com\/fr\/wp-json\/wp\/v2\/media?parent=80389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.zennio.com\/fr\/wp-json\/wp\/v2\/categories?post=80389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.zennio.com\/fr\/wp-json\/wp\/v2\/tags?post=80389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}