	{"id":2106,"date":"2013-07-05T10:17:02","date_gmt":"2013-07-05T03:17:02","guid":{"rendered":"http:\/\/science-technology.vn\/?p=2106"},"modified":"2013-07-05T10:17:02","modified_gmt":"2013-07-05T03:17:02","slug":"van-de-an-ninh-may-tinh","status":"publish","type":"post","link":"https:\/\/science-technology.vn\/?p=2106","title":{"rendered":"V\u1ea5n \u0111\u1ec1 an ninh m\u00e1y t\u00ednh"},"content":{"rendered":"<p><span style=\"font-size: 14px;\">Ng\u00e0y nay, an ninh m\u00e1y t\u00ednh l\u00e0 khu v\u1ef1c t\u0103ng tr\u01b0\u1edfng nhanh nh\u1ea5t trong c\u00f4ng nghi\u1ec7p ph\u1ea7n m\u1ec1m. V\u1edbi nhi\u1ec1u hacker h\u01a1n, nhi\u1ec1u t\u1ea5n c\u00f4ng xi be, t\u1ed9i ph\u1ea1m xi be, vi r\u00fat m\u00e1y t\u00ednh, gi\u00e1n \u0111i\u1ec7p c\u00f4ng nghi\u1ec7p, \u0103n c\u1eafp c\u0103n c\u01b0\u1edbc, v\u00e0 l\u1eeba g\u1ea1t, an ninh tr\u1edf th\u00e0nh quan tr\u1ecdng h\u01a1n bao gi\u1edd. Khi h\u1ec7 th\u1ed1ng c\u00f4ng ngh\u1ec7 th\u00f4ng tin (CNTT) tr\u1edf n\u00ean l\u1edbn h\u01a1n v\u00e0 ph\u1ee9c t\u1ea1p h\u01a1n, ch\u00fang y\u00eau c\u1ea7u nhi\u1ec1u h\u1ec7 th\u1ed1ng an ninh ph\u1ee9c t\u1ea1p h\u01a1n.<\/span><\/p>\n<p>Ng\u01b0\u1ee3c v\u1edbi nhi\u1ec1u tin t\u01b0\u1edfng, an ninh KH\u00d4NG ph\u1ea3i l\u00e0 s\u1ea3n ph\u1ea9m b\u1ea1n c\u00f3 th\u1ec3 mua \u0111\u01b0\u1ee3c v\u00e0 th\u00eam v\u00e0o cho h\u1ec7 th\u1ed1ng. N\u00f3 ph\u1ea3i l\u00e0 m\u1ed9t ph\u1ea7n t\u00edch h\u1ee3p c\u1ee7a h\u1ec7 th\u1ed1ng khi h\u1ec7 th\u1ed1ng \u0111\u01b0\u1ee3c x\u00e2y d\u1ef1ng. T\u1ea5t nhi\u00ean, b\u1ea1n c\u00f3 th\u1ec3 s\u1eeda c\u00e1c l\u1ed7i an ninh sau khi h\u1ec7 th\u1ed1ng \u0111\u01b0\u1ee3c x\u00e2y d\u1ef1ng nh\u01b0ng \u0111i\u1ec1u \u0111\u00f3 s\u1ebd t\u1ed1n k\u00e9m cho b\u1ea1n nhi\u1ec1u h\u01a1n v\u00e0 kh\u00f4ng ai c\u00f3 th\u1ec3 \u0111\u1ea3m b\u1ea3o r\u1eb1ng m\u1ecdi l\u1ed7i \u0111\u01b0\u1ee3c s\u1eeda h\u1ebft. An ninh c\u1ee7a h\u1ec7 th\u1ed1ng CNTT ph\u1ee5 thu\u1ed9c v\u00e0o thi\u1ebft k\u1ebf c\u1ee7a h\u1ec7 th\u1ed1ng cho n\u00ean \u0111i\u1ec1u t\u1ed1t nh\u1ea5t l\u00e0 x\u00e2y d\u1ef1ng an ninh khi b\u1ea1n thi\u1ebft k\u1ebf h\u1ec7 th\u1ed1ng. V\u1ea5n \u0111\u1ec1 l\u00e0 bao nhi\u00eau sinh vi\u00ean \u0111\u01b0\u1ee3c d\u1ea1y v\u1ec1 an ninh trong m\u00f4n thi\u1ebft k\u1ebf? Bao nhi\u00eau tr\u01b0\u1eddng c\u00f3 m\u00f4n an ninh trong ch\u01b0\u01a1ng tr\u00ecnh gi\u1ea3ng d\u1ea1y? Ngay c\u1ea3\u00a0 trong m\u00f4n l\u1eadp tr\u00ecnh, bao nhi\u00eau sinh vi\u00ean \u0111\u01b0\u1ee3c d\u1ea1y r\u1eb1ng vi\u1ebft m\u00e3 l\u00e0 n\u1ec1n t\u1ea3ng cho an ninh? Vi\u1ec7c thi\u1ebfu tri th\u1ee9c an ninh c\u00f3 th\u1ec3 t\u1ea1o ra nhi\u1ec1u l\u1ed7i an ninh trong m\u00e3. Ch\u1eb3ng h\u1ea1n l\u1ed7i th\u00f4ng th\u01b0\u1eddng nh\u1ea5t l\u00e0 tr\u00e0n ch\u1ed3ng, ch\u1ed7 hacker c\u00f3 th\u1ec3 t\u1eadn d\u1ee5ng \u0111\u1ec3 chi\u1ebfm quy\u1ec1n ki\u1ec3m so\u00e1t h\u1ec7 th\u1ed1ng. Ng\u00e0y nay v\u1edbi nhi\u1ec1u ng\u01b0\u1eddi d\u00f9ng m\u00e1y t\u00ednh tr\u00ean kh\u1eafp th\u1ebf gi\u1edbi, bao nhi\u00eau ng\u01b0\u1eddi \u0111\u01b0\u1ee3c d\u1ea1y ph\u1ea3i tu\u00e2n theo s\u1ef1 th\u1eadn tr\u1ecdng c\u1ea7n thi\u1ebft? Ngay c\u1ea3 khi b\u1ea1n c\u00f3 m\u1eadt kh\u1ea9u m\u1ea1nh, t\u01b0\u1eddng l\u1eeda t\u1ed1t, c\u00e0i \u0111\u1eb7t ph\u1ea7n m\u1ec1m an ninh nh\u01b0ng h\u1ea7u h\u1ebft c\u00e1c hacker \u0111\u1ec1u bi\u1ebft c\u00e1ch v\u01b0\u1ee3t qua ch\u00fang. B\u1ea1n c\u00f3 th\u1ec3 ph\u00f2ng th\u1ee7 cho h\u1ec7 th\u1ed1ng c\u1ee7a b\u1ea1n t\u1edbi m\u1ee9c \u0111\u1ed9 n\u00e0o \u0111\u00f3 nh\u01b0ng \u0111e do\u1ea1 m\u1edbi v\u1eabn t\u1edbi m\u1ecdi l\u00fac cho n\u00ean b\u1ea1n ph\u1ea3i gi\u1eef song h\u00e0nh v\u1edbi m\u1ecdi ph\u00e1t tri\u1ec3n hi\u1ec7n th\u1eddi. B\u1ea1n c\u1ea7n d\u00f9ng c\u00e1c ph\u01b0\u01a1ng ti\u1ec7n ph\u00f2ng ng\u1eeba \u0111\u1ed1i v\u1edbi c\u00e1c r\u1ee7i ro \u0111\u00e3 bi\u1ebft v\u00e0 s\u1eb5n s\u00e0ng \u0111\u1ed1i ph\u00f3 v\u1edbi r\u1ee7i ro m\u1edbi. Ngay khi \u0111e do\u1ea1 an ninh m\u1edbi \u0111\u01b0\u1ee3c ph\u00e1t hi\u1ec7n, n\u00f3 c\u1ea7n \u0111\u01b0\u1ee3c l\u00e0n cho an ninh ngay l\u1eadp t\u1ee9c. \u0110\u00f3 l\u00e0 \u0111i\u1ec1u c\u1eadp nh\u1eadt an ninh ph\u1ea7n m\u1ec1m v\u00e0 mi\u1ebfng v\u00e1 l\u00e0m vi\u1ec7c. Ngay khi t\u00ednh mong manh n\u00e0o \u0111\u00f3 \u0111\u01b0\u1ee3c b\u00e1o c\u00e1o hay ph\u00e1t hi\u1ec7n, l\u1ef1c l\u01b0\u1ee3ng \u0111\u1eb7c nhi\u1ec7m c\u1ee7a c\u00f4ng ti s\u1ebd t\u00ecm c\u00e1ch s\u1eeda n\u00f3. M\u1eb7c d\u1ea7u c\u00e1c mi\u1ebfng v\u00e1 n\u00e0y l\u00e0 c\u1ea7n, b\u1ea3n th\u00e2n ch\u00fang c\u00f3 th\u1ec3 l\u00e0 r\u1ee7i ro an ninh n\u1eefa. Mi\u1ebfng v\u00e1 c\u00f3 th\u1ec3 ch\u1ec9 ra tr\u1ef1c ti\u1ebfp ch\u1ed7 n\u00e0o l\u00e0 \u0111i\u1ec3m y\u1ebfu v\u00e0 hacker s\u1ebd khai th\u00e1c ch\u00fang. \u0110i\u1ec1u \u0111\u00f3 th\u1ec9nh tho\u1ea3ng x\u1ea3y ra cho t\u1edbi khi m\u1ecdi ng\u01b0\u1eddi \u0111\u00e3 c\u1eadp nh\u1eadt ph\u1ea7n m\u1ec1m v\u00e0 nhi\u1ec1u ng\u01b0\u1eddi c\u00f3 th\u1ec3 kh\u00f4ng bao gi\u1edd l\u00e0m \u0111i\u1ec1u \u0111\u00f3 cho t\u1edbi khi qu\u00e1 tr\u1ec5.<\/p>\n<p>Khi \u0111i t\u1edbi thi\u1ebft k\u1ebf h\u1ec7 th\u1ed1ng CNTT an ninh, an ninh ph\u1ea3i \u0111\u01b0\u1ee3c t\u00ednh t\u1edbi v\u1edbi to\u00e0n th\u1ec3 v\u00f2ng \u0111\u1eddi ph\u00e1t tri\u1ec3n ph\u1ea7n m\u1ec1m. Kh\u00e1i ni\u1ec7m then ch\u1ed1t l\u00e0 \u1edf ch\u1ed7 b\u1ea1n nh\u1eadn di\u1ec7n r\u1ee7i ro an ninh s\u1edbm trong h\u1ec7 th\u1ed1ng \u0111ang ph\u00e1t tri\u1ec3n v\u00e0 s\u1eeda ch\u00fang \u0111\u1ec3 cho b\u1ea1n c\u00f3 th\u1ec3 c\u00f3 an ninh ch\u1ea5t l\u01b0\u1ee3ng cao. L\u00e0 ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n, b\u1ea1n c\u1ea7n th\u1ea5y r\u1eb1ng y\u00eau c\u1ea7u an ninh l\u00e0 \u0111\u01b0\u1ee3c x\u00e1c \u0111\u1ecbnh r\u00f5 r\u00e0ng cho h\u1ec7 th\u1ed1ng trong pha y\u00eau c\u1ea7u. Trong ki\u1ec3m \u0111i\u1ec3m y\u00eau c\u1ea7u, b\u1ea1n ph\u1ea3i ki\u1ec3m \u0111\u1ec3 xem li\u1ec7u h\u1ec7 th\u1ed1ng l\u00e0 \u0111\u01b0\u1ee3c x\u00e1c \u0111\u1ecbnh th\u00edch h\u1ee3p v\u1edbi an ninh trong \u0111\u1ea7u kh\u00f4ng. Nhi\u1ec1u kh\u00e1ch h\u00e0ng ch\u1ec9 bi\u1ebft c\u00e1ch y\u00eau c\u1ea7u nh\u1eefng ch\u1ee9c n\u0103ng n\u00e0o \u0111\u00f3 m\u00e0 kh\u00f4ng bi\u1ebft v\u1ec1 an ninh cho n\u00ean \u0111i\u1ec1u quan tr\u1ecdng cho ng\u01b0\u1eddi l\u00e3nh \u0111\u1ea1o k\u0129 thu\u1eadt l\u00e0 \u0111i t\u1edbi c\u00e1c y\u00eau c\u1ea7u an ninh m\u1edbi cho h\u1ec7 th\u1ed1ng. Trong pha thi\u1ebft k\u1ebf b\u1ea1n ph\u1ea3i ch\u1eafc r\u1eb1ng an ninh l\u00e0 m\u1ed9t ph\u1ea7n c\u1ee7a thi\u1ebft k\u1ebf v\u00e0 trong pha th\u1ef1c hi\u1ec7n, b\u1ea1n ph\u1ea3i tu\u00e2n theo h\u01b0\u1edbng d\u1eabn cho vi\u1ebft m\u00e3 an ninh v\u00e0 th\u1ef1c hi\u1ec7n m\u1ecdi ki\u1ec3m th\u1eed t\u01b0\u01a1ng \u1ee9ng. B\u1edfi v\u00ec ki\u1ec3m th\u1eed an ninh th\u01b0\u1eddng \u0111\u00e3 \u0111\u01b0\u1ee3c coi nh\u01b0 ki\u1ec3m th\u1eed phi ch\u1ee9c n\u0103ng, nh\u01b0 v\u1edbi ph\u1ea7n l\u1edbn c\u00e1c ki\u1ec3m th\u1eed phi ch\u1ee9c n\u0103ng, nh\u1eefng ki\u1ec3m th\u1eed n\u00e0y \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n \u1edf ph\u1ea7n cu\u1ed1i c\u1ee7a ph\u00e1t tri\u1ec3n sau m\u1ecdi th\u1ee9 kh\u00e1c. H\u1eadu qu\u1ea3 l\u00e0 \u1edf ch\u1ed7 nhi\u1ec1u l\u1ed7i an ninh \u0111\u00e1ng c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c ph\u00e1t hi\u1ec7n v\u00e0 s\u1eeda s\u1edbm l\u1ea1i d\u1ec5 d\u00e0ng \u0111i qua c\u00e1c giai \u0111o\u1ea1n ph\u00e1t tri\u1ec3n cho t\u1edbi ph\u1ea7n cu\u1ed1i c\u00f9ng c\u1ee7a ph\u00e1t tri\u1ec3n. R\u1ee7i ro l\u00e0 \u1edf v\u00e0o l\u00fac \u0111\u00f3, ph\u1ea7n l\u1edbn nh\u1eefng ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n v\u00e0 ki\u1ec3m th\u1eed ki\u1ec7t s\u1ee9c v\u00e0 th\u1eddi gian \u0111\u00e3 h\u1ebft, cho n\u00ean nhi\u1ec1u ng\u01b0\u1eddi b\u1ecf qua nh\u1eefng ki\u1ec3m th\u1eed n\u00e0y. Nhi\u1ec1u ng\u01b0\u1eddi d\u00f9ng kh\u00f4ng ki\u1ec3m c\u1ea9n th\u1eadn v\u1ec1 v\u1ea5n \u0111\u1ec1 an ninh khi h\u1ecd nh\u1eadn s\u1ea3n ph\u1ea9m ph\u1ea7n m\u1ec1m. Ch\u1eebng n\u00e0o ph\u1ea7n m\u1ec1m c\u00f2n l\u00e0m \u0111\u01b0\u1ee3c \u0111i\u1ec1u h\u1ecd c\u1ea7n v\u00e0 ch\u1ea1y t\u1ed1t, th\u00ec h\u1ecd c\u00f2n h\u00e0i l\u00f2ng v\u1edbi n\u00f3. \u0110\u00f3 l\u00e0 l\u00ed do t\u1ea1i sao ng\u00e0y nay, ph\u1ea7n l\u1edbn ph\u1ea7n m\u1ec1m \u0111\u1ec1u mong manh cho hacker t\u1ea5n c\u00f4ng.<\/p>\n<p>V\u1edbi kho\u00e1n ngo\u00e0i, ph\u00e1t tri\u1ec3n ph\u1ea7n m\u1ec1m \u0111\u01b0\u1ee3c chia cho nhi\u1ec1u t\u1ed5, c\u00e1c th\u00e0nh vi\u00ean t\u1ed5 c\u00f3 th\u1ec3 chia ra \u1edf b\u1ea5t k\u00ec \u0111\u00e2u tr\u00ean th\u1ebf gi\u1edbi. N\u1ebfu d\u1eef li\u1ec7u ki\u1ec3m th\u1eed ch\u1ee9a th\u00f4ng tin t\u01b0, d\u1eef li\u1ec7u s\u1edf h\u1eefu ri\u00eang th\u00ec ng\u01b0\u1eddi qu\u1ea3n l\u00ed ph\u1ea3i ch\u1eafc r\u1eb1ng ch\u00fang kh\u00f4ng \u0111\u01b0\u1ee3c g\u1eedi \u0111i m\u00e0 kh\u00f4ng \u0111\u01b0\u1ee3c b\u1ea3o v\u1ec7 t\u1eeb ch\u1ed7 n\u00e0y sang ch\u1ed7 kh\u00e1c. Tuy nhi\u00ean, nhi\u1ec1u ng\u01b0\u1eddi qu\u1ea3n l\u00ed v\u00e0 ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n kh\u00f4ng \u0111\u01b0\u1ee3c \u0111\u00e0o t\u1ea1o v\u1ec1 an ninh v\u00e0 kh\u00f4ng bi\u1ebft c\u00e1ch ph\u00e2n bi\u1ec7t ch\u00fang. Internet c\u00f3 th\u1ec3 d\u1ec5 d\u00e0ng b\u1ecb h\u01b0 h\u1ecfng cho n\u00ean n\u1ebfu b\u1ea1n d\u00f9ng Internet nh\u01b0 m\u1ed9t ph\u1ea7n c\u1ee7a m\u00f4i tr\u01b0\u1eddng ki\u1ec3m th\u1eed c\u1ee7a b\u1ea1n, b\u1ea1n ph\u1ea3i ch\u1eafc r\u1eb1ng m\u1ecdi \u0111\u01b0\u1eddng truy\u1ec1n \u0111\u1ec1u \u0111\u01b0\u1ee3c an ninh; c\u1ed1 gi\u1eef \u0111i\u1ec1u \u0111\u00f3 c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c nhi\u1ec1u nh\u1ea5t b\u00ean trong m\u1ea1ng c\u00f4ng ti, d\u00f9ng c\u00e1c m\u00f3c n\u1ed1i an ninh VPN, SSL hay m\u1eadt m\u00e3 ho\u00e1 theo t\u00ecnh hu\u1ed1ng.<\/p>\n<p>Ng\u00e0y nay, nhi\u1ec1u ng\u01b0\u1eddi d\u00f9ng Laptop. Ch\u00fang \u0111\u01b0\u1ee3c d\u00f9ng trong m\u1ea1ng c\u00f4ng ti an to\u00e0n, r\u1ed3i \u0111\u01b0\u1ee3c d\u00f9ng b\u00ean ngo\u00e0i trong m\u1ed9t s\u1ed1 m\u1ea1ng kh\u00f4ng d\u00e2y t\u1ea1i qu\u00e1n c\u00e0 ph\u00ea internet, s\u00e2n bay hay \u1edf nh\u00e0 v\u1edbi an ninh k\u00e9m h\u01a1n nhi\u1ec1u. R\u1ee7i ro c\u1ee7a vi\u1ec7c h\u01b0 h\u1ecfng l\u00e0 tr\u00e0n ng\u1eadp kh\u1eafp n\u01a1i n\u1ebfu m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n kh\u00f4ng \u0111\u01b0\u1ee3c b\u1ea3o v\u1ec7 \u0111\u00fang. M\u00e1y t\u00ednh b\u1ecb h\u1ecfng c\u00f3 th\u1ec3 quay l\u1ea1i trong m\u1ea1ng an ninh r\u1ed3i g\u00e2y h\u1ecfng cho to\u00e0n th\u1ec3 m\u1ea1ng. M\u1ed9t ch\u01b0\u01a1ng tr\u00ecnh nh\u1ecf b\u1eaft gi\u1eef v\u00e0 truy\u1ec1n th\u00f4ng tin m\u00e0 kh\u00f4ng b\u1ecb ph\u00e1t hi\u1ec7n c\u00f3 th\u1ec3 l\u00e9n v\u00e0o trong m\u00e1y t\u00ednh n\u00e0y, to\u00e0n th\u1ec3 m\u1ea1ng c\u00f3 th\u1ec3 b\u1ecb nguy hi\u1ec3m, v\u00ec th\u1ec9nh tho\u1ea3ng \u0111i\u1ec1u \u0111\u00f3 m\u1edbi c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c ph\u00e1t hi\u1ec7n. \u0110i\u1ec1u n\u00e0y g\u00e2y ra l\u1ed7 h\u1ed5ng an ninh trong to\u00e0n th\u1ec3 m\u1ea1ng c\u00f4ng ti.<\/p>\n<p>\u0110i\u1ec1u quan tr\u1ecdng v\u1edbi m\u1ecdi ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n l\u00e0 h\u1ecdc v\u1ec1 r\u1ee7i ro an ninh v\u00e0 c\u00e1ch \u0111\u1ea5u tranh v\u1edbi ch\u00fang. \u0110i\u1ec1u quan tr\u1ecdng l\u00e0 tu\u00e2n theo th\u1ee7 t\u1ee5c an ninh v\u00e0 ki\u1ec3m th\u1eed nghi\u00eam ng\u1eb7t trong m\u1ecdi ph\u1ea7n m\u1ec1m qua c\u00e1c pha ph\u00e1t tri\u1ec3n. Ch\u1ec9 b\u1eb1ng nh\u1eadn bi\u1ebft, ch\u00fang ta c\u00f3 th\u1ec3 ng\u0103n ng\u1eeba \u0111\u01b0\u1ee3c h\u01b0 h\u1ecfng do hacker g\u00e2y ra.<\/p>\n<p>&nbsp;<\/p>\n<p>&#8212;-English version&#8212;-<\/p>\n<p>&nbsp;<\/p>\n<p>Computer security problems<\/p>\n<p>Today, computer security is the fastest growing area in software industry. With more hackers, cyber attack, cyber crimes, computer viruses, industrial espionage, identity theft, and fraud, security is becoming more important than ever. As Information Technology (IT) systems grow larger and more complex, they require more sophisticated security systems.<\/p>\n<p>Contradict to many beliefs, security is NOT a product you could buy and add to a system. It should be an integrated part of the system when it is built. Of course, you could fix security deficiencies after the system is built but it would cost you more and nobody could guarantee that all deficiencies are fixed. The security of an IT system depends on the design of the system so it is best to build security in when you design the system. The question is how many students are taught about security in the design course? How many school have security course in their curriculum? Even in programming course, how many students are taught that coding is the fundamental for security? A lack of security knowledge can create many security deficiencies in code. For example the most common mistake is stack overflow where hackers can take advantage to seize control of the system. Today with more computer users all over the world, how many are taught to follow certain necessary caution? Even when you have strong password, good firewall, install security software but most hackers know how to by-pass them. You can defense your system to some degrees but new threats come in all the time so you must keep up with all current developments. You need to use preventative means for known risks and be ready to deal with new ones. As soon as a new security threat is detected, it needs to be secured immediately. That is what software security updates and patches do. As soon as some vulnerability is reported or detected, a company task force will find a way to repair it. Although these patches are necessary, they could be a security risk themselves too. Patches could point out directly where the weaknesses are and hackers would then exploit them. It always takes a while until everyone has updated the software and many may never do it unless it is too late.<\/p>\n<p>When it comes to design a secured IT system, security must be taken in consideration with the whole software development life cycle. The key concept is that you identify security risks early in the system under development and fix them so you can have high quality security. As developers, you need to see that security requirements are clearly defined for the system during the requirements phase. During requirements review, you must check to see if the system is adequately defined with security in mind. Many customers only know how to require certain functions but do not know about security so it is important for the technical leader to come up with new security requirements for the system. During design phase you must make sure that security is part of the design and during implementation phase, you must follow guidelines for secure coding and perform all the tests accordingly. Because security testing has usually been considered as non-functional tests. As with most non-functional tests, these testing are performed at the last part of development after everything else. The consequence is that many security defects which could be detected and fixed early, go easily through development stages until the last part of development. The risk is at that time, most developers and testers are exhausted and time is running out, so many skip these tests. Many users did not check carefully on security issue when they receive the software product. As long as the software do what they need and run well, then they are happy with it. That is why today, most software are vulnerable for hackers to attack.<\/p>\n<p>With outsourcing, software development is divided to many teams, team members can be split anywhere in the world. If the test data contain private information, proprietary data then manager must make sure that they are not sent unprotected from one place to another. However, many managers and developers are not trained in security and do not know how to distinguish them. The Internet can be easily contaminated so if you use Internet as a part of your test environment, you must make sure that all communication lines are secured; try to keep it as much as possible inside the corporate networks, use VPN, SSL-secured links or encryption depending on the situation.<\/p>\n<p>Today, many people use Laptops. They are used in the secure company network, then are used outside in some wireless network at a internet coffee shop, airport or home with much less security. The risk of contamination is overwhelming if your computer is not properly protected. A contaminated computer can comes back in the secure network then endangering the whole network. A small program that captures and transmits information without being discovered can sneaked in this computer, the whole network can be endangered, since it might take a while to be detected. This causes a security hole in the entire company network.<\/p>\n<p>It is important for all developers to learn about security risks and how to fight them. It is important to follow a security procedures and rigorous testing in all software throughout the development phases. Only by awareness, we can prevent damages caused by hackers.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ng\u00e0y nay, an ninh m\u00e1y t\u00ednh l\u00e0 khu v\u1ef1c t\u0103ng tr\u01b0\u1edfng nhanh nh\u1ea5t trong c\u00f4ng nghi\u1ec7p ph\u1ea7n m\u1ec1m. V\u1edbi nhi\u1ec1u hacker h\u01a1n, nhi\u1ec1u t\u1ea5n c\u00f4ng &hellip; <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[],"class_list":["post-2106","post","type-post","status-publish","format-standard","hentry","category-ki-nghe-phan-mem"],"_links":{"self":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/2106","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2106"}],"version-history":[{"count":1,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/2106\/revisions"}],"predecessor-version":[{"id":2107,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/2106\/revisions\/2107"}],"wp:attachment":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2106"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2106"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2106"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}