<?xml version='1.0' encoding='UTF-8'?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<url>
<loc>https://www.akaoma.com/</loc>
<changefreq>daily</changefreq>
<priority>1.0</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation</loc>
<changefreq>daily</changefreq>
<priority>1.0</priority>
</url>
<url>
<loc>https://www.akaoma.com/audit</loc>
<changefreq>daily</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.akaoma.com/services</loc>
<changefreq>daily</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.akaoma.com/investigation</loc>
<changefreq>daily</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.akaoma.com/societe</loc>
<changefreq>daily</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://www.akaoma.com/contact</loc>
<changefreq>daily</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.akaoma.com/faq</loc>
<changefreq>daily</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://www.akaoma.com/mentions-legales</loc>
<changefreq>daily</changefreq>
<priority>0.1</priority>
</url>
<url>
<loc>https://www.akaoma.com/politique-confidentialite</loc>
<changefreq>daily</changefreq>
<priority>0.1</priority>
</url>
<url>
<loc>https://www.akaoma.com/cgv</loc>
<changefreq>daily</changefreq>
<priority>0.1</priority>
</url>
<url>
<loc>https://www.akaoma.com/chiffres-cles-cybersecurite</loc>
<changefreq>daily</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources</loc>
<changefreq>daily</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://www.akaoma.com/divulgation-responsable-failles-securite</loc>
<changefreq>daily</changefreq>
<priority>0.1</priority>
</url>
<url>
<loc>https://www.akaoma.com/cert-akaoma</loc>
<changefreq>daily</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.akaoma.com/politique-cookies</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/cgu</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/e3c</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/promo</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/conditions-de-retour</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/ceh-certified-ethical-hacker</loc>
<changefreq>daily</changefreq>
<priority>1.0</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/cissp-certified-information-systems-security-professional</loc>
<changefreq>daily</changefreq>
<priority>1.0</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/cnd-network-defender</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/isc2</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/choisir-akaoma</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/comparer-formations-certifications-cybersecurite</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/plateforme-elearning-cybersecurite</loc>
<changefreq>daily</changefreq>
<priority>1.0</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/comment-choisir-formation-certification-cybersecurite</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/ec-council</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/inscription</loc>
<changefreq>daily</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/sscp-systems-security-certified-practitioner</loc>
<changefreq>daily</changefreq>
<priority>1.0</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/ccsp-certified-cloud-security-professional</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/cc-certified-in-cybersecurity</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/packs-certifications-entreprises</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/audit/tests-intrusion-pentests</loc>
<changefreq>daily</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.akaoma.com/audit/audits-securite-site-web</loc>
<changefreq>daily</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.akaoma.com/audit/audit-securite</loc>
<changefreq>daily</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.akaoma.com/services/delegation-cybersecurite</loc>
<changefreq>daily</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.akaoma.com/services/ereputation</loc>
<changefreq>daily</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.akaoma.com/services/consulting</loc>
<changefreq>daily</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.akaoma.com/investigation/preuves-numeriques</loc>
<changefreq>daily</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.akaoma.com/investigation/expertises</loc>
<changefreq>daily</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.akaoma.com/investigation/osint</loc>
<changefreq>daily</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/comparer-formations-certifications-cybersecurite/ceh-vs-cissp</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/comparer-formations-certifications-cybersecurite/ceh-vs-cnd</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/comparer-formations-certifications-cybersecurite/cissp-vs-ccsp</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/comparer-formations-certifications-cybersecurite/oscp-vs-ceh</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/comparer-formations-certifications-cybersecurite/sscp-vs-ccsp</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/comparer-formations-certifications-cybersecurite/cpent-vs-oscp</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/comparer-formations-certifications-cybersecurite/cisa-vs-cism</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/formation/comparer-formations-certifications-cybersecurite/chfi-vs-ceh</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique</loc>
<changefreq>daily</changefreq>
<priority>0.1</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/e3c/english</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/e3c/francais</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/e3c/quiz-fr</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/e3c/quiz-en</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/agence-tributaria-data-breach-2024</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/alcampo-data-breach-2024</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/anonymous</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/anthem-breach-2015</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/apt1-report-2013</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/apt42-mint-sandstorm-charming-kitten-2024</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/ashley-madison-2015</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/bangladesh-bank-heist-2016</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/black-basta-2022</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/blackcat-alphv-2024</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/bluekeep-exploit-2019</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/capital-one-breach-2019</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/colonial-pipeline-2021</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/conficker-worm-2008</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/conti-2020</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/conti-team-2020</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/costa-rica-government-cyberattack-2022</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/cozy-bear-apt29-2016</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/cuckoos-egg-1986-1989</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/darkside-2021</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/darkside-group-2021</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/emotet-malware-campaign-2014</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/equifax-breach-2017</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/estonian-cyberattacks-2007</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/eternalblue-exploit-2017</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/facebook-leak-2021</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/fancy-bear-apt28-2004</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/french-diplomatic-services-targeted-by-russian-hackers-2024</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/fulton-county-data-breach-2024</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/ghostnet-2009</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/heartland-payment-systems-2008</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/iloveyou-worm-2000</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/irish-health-service-hse-2021</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/jbs-meatpacking-2021</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/kaseya-vsa-2021</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/lapsus-2022</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/lastpass-breach-2022</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/lazarus-group-2009</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/lockbit-2022</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/log4shell-2021</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/london-drugs-stores-2024</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/marriott-breach-2018</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/maze-2019</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/medibank-2022</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/melissa-virus-1999</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/microsoft-and-hpe-email-compromise-2024</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/microsoft-exchange-server-2021</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/mirai-botnet-2016</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/morris-worm-1988</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/national-public-data-breach-2024</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/nhs-ransomware-attack-2017</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/notpetya-2017</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/office-of-personnel-management-2015</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/operation-aurora-2009</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/pegasus-spyware-2016</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/ransomhub-2024</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/revil-2021</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/sandworm-2014</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/shadow-brokers-2016</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/snowflake-accounts-breach-2024</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/solarwinds-2020</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/sony-pictures-hack-2014</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/stuxnet-2010</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/t-mobile-data-breach-2021</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/target-breach-2013</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/tjx-companies-breach-2007</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/trickbot-trojan-2016</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/uber-data-breach-2022</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/ukraine-power-grid-attack-2015</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/volt-typhoon-2023</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/wannacry-2017</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/cyberattaques/yahoo-data-breach-2013-2014</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/activex</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/ad-hoc</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/address-spoofing</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/adware</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/ais</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/alert</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/algorithme</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/algorithme-cryptographique</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/ankle-biter</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/anti-rootkit</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/anti-spyware</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/anti-virus</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/antispam-challenge-response-system</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/arp</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/asim</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/asm</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/assessment</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/atm</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/authentication-header</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/authentification</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/autorite-de-certification</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/backdoor</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/bastion-host</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/bcrci</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/birthday-attack</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/black-hat-seo</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/blacklist</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/blogosphere</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/bluejacking</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/bluetooth</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/bomb</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/botnet</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/breche</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/broadcast</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/bruteforce</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/bsa</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/buffer-overflow</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/bug</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/bug-bounty</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/bulk-email</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cache-poisoning</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/canular</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/captcha</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/captcha-breaking</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/carte-a-puce</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cert</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/certa</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/certificat-electronique</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/certificat-numerique</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cgi</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cgi-scripts</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/chiffrement</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/chiffrement-a-cle-publique</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/chiffrement-symetrique</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cle-de-cryptage</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/clickjacking</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/code-confidentiel-carte-bancaire</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/commutateur</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/compromise</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/computer-abuse</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/computer-network-attack</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/computer-security</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/confidentialite</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cookie-ephemere</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cookie-persistant</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cookie-tiers</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cookies</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/countermeasures</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/courriel</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/covert-channel</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/crack</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cracker</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cracking</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/crash</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cryptanalysis</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cryptogramme</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cryptography</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cryptologie</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/csi</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/css</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cybercommerce</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cybercriminalite</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cyberdependant</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cyberintimidation</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cyberpolicier</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cyberspace</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/cybersquattage</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/data-driven-attack</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/ddos</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/dechiffrement</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/dechiffrer</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/decrypter</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/defacement</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/defacing</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/dhcp</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/dial-up</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/dialers</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/digg-like</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/digital-watermarking</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/dmca-google</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/dmz</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/dns</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/dns-spoofing</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/dnsquery</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/dnssec</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/dofollow</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/dongle</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/dos</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/e-mail</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/echelon</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/esp</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/espiogiciel</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/exploit</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/fai</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/faille</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/false-positive</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/firewall</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/firmware</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/flood</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/flux-rss</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/fork</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/fork-bomb</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/gateway</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/hacker</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/hacking</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/hammeconnage</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/happy-slapping</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/hash-function</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/heuristique</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/hijacking</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/hoax</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/honey-pot</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/host</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/host-based</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/html</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/hub</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/ibss</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/icp</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/ics</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/ids</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/infecte</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/injection-sql</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/integrite</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/intrusion</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/intrusion-detection</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/ip-splicing</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/ip-spoofing</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/ipconfig</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/ips</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/javascript</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/junk-mail</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/key-loggers</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/letterbomb</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/log</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/logic-bomb</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/logiciel-malveillant</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/login</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/loi-chatel</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/lottery-scam</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/macrovirus</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/mail-harvesting</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/mail-bombing</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/mailbot</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/maliciel</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/malicious-code</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/malware</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/mehari</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/memoire-cache</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/messagerie-instantanee</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/mimicking</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/misuse-detection-model</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/mitm</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/mocking-bird</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/multihost-based-autiding</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/network-address-translation</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/network-based</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/network-level-firewall</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/network-security</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/nigerian-scam</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/norme-set</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/notarisation</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/open-systems-security</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/operational-data-security</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/opt-in</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/opt-out</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/otp</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/p2p</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/packet</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/packet-filter</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/packet-sniffer</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/password</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/password-harvesting</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/patch</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/payload</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/pbf</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/penetration</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/penetration-signature</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/penetration-test</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/penetration-testing</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/perimeter-based-security</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/perpetrator</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/personal-security</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/pgp</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/phage</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/pharming</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/phf-hack</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/phisher</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/phishing</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/phraker</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/phreak</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/phreaker</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/phreaking</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/physical-security</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/piggy-back</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/piggyback</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/ping</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/ping-of-death</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/pirate</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/pirater</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/pki</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/plain-text</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/poc</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/polymorphic</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/pop</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/pop-up</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/port</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/port-scanning</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/pourriel</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/private-key-cryptography</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/privilege-escalation</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/probe</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/promiscuous-mode</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/protocol</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/protocole-ip</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/prowler</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/proxy</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/psychological-operation</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/public-key-cryptography</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/pump-and-dump</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/ransomware</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/reference-monitor</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/replicator</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/retro-virus</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/rexd</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/risk-assessment</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/risk-management</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/rnis</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/root</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/root-server</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/rootkit</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/router</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/routeur</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/routing-controle</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/rsa</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/rtc</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/rules-based-detection</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/samourai</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/satan</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/script-kiddies</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/secure-network-server</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/secure-shell</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/security</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/security-administrative</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/security-architecture</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/security-audit</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/security-countermeasures</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/security-domains</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/security-features</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/security-incident</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/security-kernel</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/security-label</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/security-level</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/security-officier</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/security-perimeter</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/security-policies</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/security-policy-model</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/security-requirement</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/security-service</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/security-violation</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/sefti</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/server</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/shell</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/signature-numerique</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/sio</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/skipjack</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/sla</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/sms</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/smtp</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/smurfing</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/snarf</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/sneaker</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/sniffer</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/snmp</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/snoopware</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/social-engineering</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/sorm</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/spam</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/spambot</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/spearphishing</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/spi</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/spim</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/spoofing</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/spyware</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/ss-7</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/ssh</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/ssid</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/ssl</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/stateful-inspection</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/switch</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/syn-flood</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/tcb</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/tcp-ip</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/tcpwrapper</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/tcsec</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/term-rule-based-security-policy</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/terminal-hijacking</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/threat</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/threat-agent</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/threat-assessment</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/tiger-team</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/tinkerbell</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/topology</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/trace-packet</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/traceroute</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/trackback</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/tranquility</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/tripwire</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/trojan</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/trusted-feed</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/trusted-network-interpretation</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/tty-watcher</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/typosquatting</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/url</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/url-rewriting</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/usb</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/user-agent</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/vaccines</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/virohax</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/virulence</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/virus</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/virus-hoax</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/vishing</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/voip</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/vpn</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/vseo</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/vulnerability</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/vulnerability-analysis</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/wais</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/wan</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/war-dialer</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/wardriving</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/web-bug</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/webmail</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/webspam</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/wep</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/whitelist</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/wi-fi</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/wins</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/worm</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/wpa</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/www</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/xoogler</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/xss</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/zero-day</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://www.akaoma.com/ressources/glossaire-securite-informatique/zombie</loc>
<changefreq>weekly</changefreq>
<priority>0.2</priority>
</url>
</urlset>