	{"id":2877,"date":"2013-07-08T09:23:52","date_gmt":"2013-07-08T02:23:52","guid":{"rendered":"http:\/\/science-technology.vn\/?p=2877"},"modified":"2013-07-08T09:23:52","modified_gmt":"2013-07-08T02:23:52","slug":"de-doa-an-ninh-may-tinh","status":"publish","type":"post","link":"https:\/\/science-technology.vn\/?p=2877","title":{"rendered":"\u0110e do\u1ea1 an ninh m\u00e1y t\u00ednh"},"content":{"rendered":"<p><span style=\"font-size: 14px;\">N\u0103m nay v\u00e0 v\u00e0i n\u0103m t\u1edbi, v\u1ea5n \u0111\u1ec1 ch\u00ednh cho nhi\u1ec1u c\u00f4ng ti s\u1ebd l\u00e0 c\u00e1ch chu\u1ea9n b\u1ecb cho \u0111e do\u1ea1 an ninh ti\u1ebfp \u0111\u00e2y hay c\u00f2n g\u1ecdi l\u00e0 t\u1ea5n c\u00f4ng xi be. \u0110i\u1ec1u n\u00e0y bao gi\u1edd c\u0169ng l\u00e0 th\u00e1ch th\u1ee9c khi ng\u00e0y c\u00e0ng nhi\u1ec1u &#8220;hacker&#8221; t\u1ea5n c\u00f4ng v\u00e0o h\u1ec7 th\u00f4ng tin c\u1ee7a c\u00f4ng tin tr\u00ean c\u01a1 s\u1edf h\u00e0ng ng\u00e0y. Trong qu\u00e1 kh\u1ee9, c\u00e1c hacker ph\u1ea7n l\u1edbn l\u00e0 ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n ph\u1ea7n m\u1ec1m ch\u00e1n ch\u01b0\u1eddng v\u00e0 mu\u1ed1n l\u00e0m c\u00e1i g\u00ec \u0111\u00f3 vui \u0111\u00f9a b\u1ea5t k\u1ec3 h\u1eadu qu\u1ea3. Ng\u00e0y nay hacker ph\u1ea7n l\u1edbn l\u00e0 &#8220;t\u1ed9i ph\u1ea1m c\u00f3 t\u1ed5 ch\u1ee9c\u201d nh\u1eefng ng\u01b0\u1eddi tuy\u1ec3n m\u1ed9 c\u00e1c ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n ph\u1ea7n m\u1ec1m \u0111\u1ec3 \u0111\u00e1nh c\u1eafp th\u00f4ng tin nh\u01b0 s\u1ed1 th\u1ebb t\u00edn d\u1ee5ng, t\u00e0i kho\u1ea3n ng\u00e2n h\u00e0ng, v\u00e0 th\u00f4ng tin s\u1edf h\u1eefu ri\u00eang c\u1ee7a c\u00f4ng ti, hay g\u00e2y t\u1ed5n h\u1ea1i cho kinh doanh c\u1ee7a c\u00f4ng ti (ph\u00e1 ho\u1ea1i, kh\u1ee7ng b\u1ed1).<\/span><\/p>\n<p>V\u1ea5n \u0111\u1ec1 ch\u00ednh l\u00e0 h\u1ea7u h\u1ebft nh\u1eefng ng\u01b0\u1eddi ch\u1ecbu tr\u00e1ch nhi\u1ec7m v\u1ec1 h\u1ec7 th\u00f4ng tin KH\u00d4NG c\u00f3 tri th\u1ee9c hay nh\u00e2n l\u1ef1c \u0111\u1ec3 qu\u1ea3n l\u00ed h\u1ecd. Theo cu\u1ed9c kh\u1ea3o c\u1ee9u \u0111i\u1ec3m b\u00e0i v\u1ec1 an ninh \u1edf 25 n\u01b0\u1edbc \u0111\u00e3 ph\u00e1t tri\u1ec3n tr\u00ean th\u1ebf gi\u1edbi, h\u1ecd th\u1ea5y r\u1eb1ng 75% ng\u01b0\u1eddi ch\u1ecbu tr\u00e1ch nhi\u1ec7m h\u1ec7 th\u00f4ng tin c\u1ee7a ch\u00ednh ph\u1ee7 KH\u00d4NG ph\u1ea3i l\u00e0 ng\u01b0\u1eddi ph\u1ea7n m\u1ec1m, nhi\u1ec1u ng\u01b0\u1eddi trong s\u1ed1 n\u00e0y l\u00e0 c\u00e1c quan ch\u1ee9c ch\u00ednh ph\u1ee7 \u0111\u01b0\u1ee3c \u0111\u1ec1 b\u1ea1t v\u00e0o ch\u1ee9c v\u1ee5 \u0111\u00f3. Nghi\u00ean c\u1ee9u n\u00e0y c\u0169ng th\u1ea5y r\u1eb1ng tr\u00ean 60% c\u00f4ng ti t\u01b0 nh\u00e2n c\u0169ng kh\u00f4ng c\u00f3 ch\u00ednh s\u00e1ch, th\u1ee7 t\u1ee5c, v\u00e0 ng\u01b0\u1eddi c\u00f3 hi\u1ec3u bi\u1ebft an ninh t\u1ed1t ch\u1ecbu tr\u00e1ch nhi\u1ec7m v\u1ec1 h\u1ec7 th\u1ed1ng an ninh. \u0110i\u1ec1u \u0111\u00f3 ngh\u0129a l\u00e0 c\u1ea3 ch\u00ednh ph\u1ee7 v\u00e0 c\u00e1c c\u00f4ng ti t\u01b0 nh\u00e2n \u0111\u1ec1u mong manh v\u1edbi t\u1ea5n c\u00f4ng xi be.<\/p>\n<p>Ph\u1ea7n m\u1ec1m tr\u1edf n\u00ean ng\u00e0y c\u00e0ng l\u1edbn h\u01a1n v\u00e0 ph\u1ee9c t\u1ea1p h\u01a1n b\u1edfi v\u00ec m\u1ecdi ng\u01b0\u1eddi c\u1ee9 th\u00eam v\u00e0o n\u00f3 v\u00e0 thay \u0111\u1ed5i n\u00f3. M\u1ecdi ng\u01b0\u1eddi mu\u1ed1n c\u00e1c t\u00ednh n\u0103ng m\u1edbi, ch\u1ee9c n\u0103ng m\u1edbi, \u1ee9ng d\u1ee5ng m\u1edbi, v\u00e0 t\u1ea5t c\u1ea3 h\u1ecd \u0111\u1ec1u mu\u1ed1n n\u00f3 nhanh h\u01a1n cho n\u00ean ph\u1ea7n l\u1edbn nh\u1eefng ng\u01b0\u1eddi qu\u1ea3n l\u00ed d\u1ef1 \u00e1n ph\u1ea7n m\u1ec1m \u0111\u1ec1u h\u1ed9i t\u1ee5 v\u00e0o vi\u1ec7c chuy\u1ec3n giao ph\u1ea7n m\u1ec1m \u0111\u00fang h\u1ea1n v\u1edbi nhi\u1ec1u ch\u1ee9c n\u0103ng h\u01a1n nh\u01b0ng \u00edt ch\u00fa \u00fd t\u1edbi an ninh. Ng\u00e0y nay nhi\u1ec1u ph\u1ea7n m\u1ec1m \u0111\u01b0\u1ee3c g\u1eafn v\u1edbi Internet v\u00e0 n\u00f3 t\u1ea1o ra nhi\u1ec1u mong manh h\u01a1n tr\u01b0\u1edbc \u0111\u00e2y. V\u1ea5n \u0111\u1ec1 kh\u00e1c l\u00e0 \u1edf ch\u1ed7 v\u1edbi kho\u00e1n ngo\u00e0i, vi\u1ec7c ph\u00e1t tri\u1ec3n ph\u1ea7n m\u1ec1m \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n tr\u00ean to\u00e0n th\u1ebf gi\u1edbi, \u1edf m\u1ecdi ki\u1ec3u ch\u1ed7. Khi ng\u01b0\u1eddi ta th\u00eam c\u00e1c ch\u1ee9c n\u0103ng m\u1edbi, c\u1ea5u ph\u1ea7n m\u1edbi, h\u1ecd th\u00eam nhi\u1ec1u ph\u1ee9c t\u1ea1p h\u01a1n cho h\u1ec7 th\u1ed1ng ph\u1ea7n m\u1ec1m v\u1edbi nhi\u1ec1u m\u00e3 h\u01a1n v\u00e0 \u0111i\u1ec1u \u0111\u00f3 m\u1edf ra nhi\u1ec1u l\u1ed7i m\u00e0 &#8220;hacker&#8221; c\u00f3 th\u1ec3 t\u1eadn d\u1ee5ng.<\/p>\n<p>B\u1edfi v\u00ec an ninh m\u00e1y t\u00ednh l\u00e0 l\u0129nh v\u1ef1c m\u1edbi trong k\u0129 ngh\u1ec7 ph\u1ea7n m\u1ec1m, r\u1ea5t \u00edt \u0111\u1ea1i h\u1ecdc cung c\u1ea5p \u0111\u00e0o t\u1ea1o n\u00e0y cho n\u00ean c\u00f3 thi\u1ebfu h\u1ee5t tr\u1ea7m tr\u1ecdng v\u1ec1 chuy\u00ean vi\u00ean an ninh m\u00e1y t\u00ednh tr\u00ean kh\u1eafp th\u1ebf gi\u1edbi. Nhi\u1ec1u quan ch\u1ee9c v\u00e0 ng\u01b0\u1eddi qu\u1ea3n l\u00ed tin r\u1eb1ng h\u1ecd \u0111\u00e3 c\u00f3 &#8220;t\u01b0\u1eddng l\u1eeda&#8221; t\u1ea1i ch\u1ed7 n\u00ean h\u1ec7 th\u1ed1ng c\u1ee7a h\u1ecd \u0111\u01b0\u1ee3c an to\u00e0n. \u0110i\u1ec1u \u0111\u00f3 c\u0169ng gi\u1ed1ng nh\u01b0 c\u00f3 \u1ed5 kho\u00e1 \u1edf c\u1eeda tr\u01b0\u1edbc nh\u00e0 b\u1ea1n cho n\u00ean b\u1ea1n kh\u00f4ng lo ngh\u0129 v\u1ec1 m\u1ecdi ng\u01b0\u1eddi v\u00e0o nh\u00e0 b\u1ea1n. V\u1ea5n \u0111\u1ec1 l\u00e0 t\u01b0\u1eddng l\u1eeda c\u00f3 th\u1ec3 ch\u1eb7n &#8220;hacker nghi\u1ec7p d\u01b0\u201d nh\u01b0ng kh\u00f4ng ch\u1eb7n \u0111\u01b0\u1ee3c &#8220;hacker chuy\u00ean nghi\u1ec7p\u201d, c\u0169ng gi\u1ed1ng nh\u01b0 \u1ed5 kho\u00e1 c\u1eeda c\u00f3 th\u1ec3 ch\u1eb7n \u0111\u01b0\u1ee3c m\u1ed9t s\u1ed1 ng\u01b0\u1eddi kh\u00f4ng cho v\u00e0o nh\u00e0 b\u1ea1n qua c\u1eeda ch\u00ednh nh\u01b0ng KH\u00d4NG ch\u1eb7n \u0111\u01b0\u1ee3c k\u1ebb tr\u1ed9m bi\u1ebft c\u00e1ch v\u00e0o nh\u00e0 b\u1ea1n t\u1eeb c\u00e1c ch\u1ed7 kh\u00e1c. C\u00f3 t\u01b0\u1eddng l\u1eeda l\u00e0 KH\u00d4NG \u0111\u1ee7. B\u1ea1n c\u1ea7n nh\u00e2n l\u1ef1c c\u00f3 k\u0129 n\u0103ng \u0111\u1ec3 l\u1eadp ra ch\u00ednh s\u00e1ch, ch\u1ee7 tr\u01b0\u01a1ng, th\u1ee7 t\u1ee5c v\u00e0 qu\u1ea3n l\u00ed h\u1ec7 th\u1ed1ng an ninh, kh\u00f4ng c\u00f3 h\u1ecd m\u1ecdi ti\u1ec1n b\u1ea1c chi v\u00e0o t\u01b0\u1eddng l\u1eeda hay c\u00f4ng c\u1ee5 an ninh \u0111\u1ec1u s\u1ebd v\u00f4 d\u1ee5ng. T\u00f4i tin r\u1eb1ng an ninh v\u1eefng ch\u1eafc ch\u1ec9 c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c chuy\u1ec3n giao n\u1ebfu c\u00f3 ng\u01b0\u1eddi c\u00f3 k\u0129 n\u0103ng t\u1ea1i ch\u1ed7 \u0111\u1ec3 l\u00e0m cho \u0111i\u1ec1u \u0111\u00f3 x\u1ea3y ra v\u00e0 \u0111i\u1ec1u m\u1ea5u ch\u1ed1t l\u00e0 c\u00f3 nhi\u1ec1u \u0111\u00e0o t\u1ea1o an ninh h\u01a1n cho m\u1ecdi ng\u01b0\u1eddi d\u00f9ng m\u00e1y t\u00ednh. \u0110i\u1ec1u quan tr\u1ecdng l\u00e0 c\u00f4ng ti ph\u1ea3i t\u1eadp trung h\u01a1n n\u1eefa v\u00e0o vi\u1ec7c ki\u1ebfm ng\u01b0\u1eddi c\u00f3 k\u0129 n\u0103ng v\u1edbi trang thi\u1ebft b\u1ecb \u0111\u00fang t\u1ea1i ch\u1ed7 \u0111\u1ec3 gi\u00e1m s\u00e1t v\u00e0 \u0111\u00e1p \u1ee9ng v\u1edbi v\u1ea5n \u0111\u1ec1 an ninh tr\u01b0\u1edbc cu\u1ed9c t\u1ea5n c\u00f4ng xi be.<\/p>\n<p>H\u01a1n n\u1eefa, c\u00f4ng ti ph\u1ea3i h\u1ed9i t\u1ee5 v\u00e0o ch\u01b0\u01a1ng tr\u00ecnh \u0111\u00e0o t\u1ea1o an ninh \u0111\u1ec3 cho nhi\u1ec1u ng\u01b0\u1eddi nh\u1eadn bi\u1ebft v\u1ec1 v\u1ea5n \u0111\u1ec1 n\u00e0y. Vi ph\u1ea1m an ninh th\u01b0\u1eddng l\u00e0 sai l\u1ea7m b\u1ea5t c\u1ea9n trong nh\u1eefng ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n ph\u1ea7n m\u1ec1m. Khi m\u1edf email hay sao m\u1ed9t x\u00e2u v\u00e0o b\u1ed9 nh\u1edb, \u0111\u1ec3 tr\u00e0n ch\u1ed3ng trong m\u00e3 c\u1ee7a h\u1ecd c\u0169ng c\u00f3 th\u1ec3 g\u00e2y h\u1eadu qu\u1ea3 nghi\u00eam tr\u1ecdng v\u00ec ch\u00fang t\u1ea1o ra s\u1ef1 mong manh m\u00e0 c\u00f3 th\u1ec3 b\u1ecb k\u1ebb t\u1ea5n c\u00f4ng khai th\u00e1c \u0111\u1ec3 th\u1ef1c hi\u1ec7n c\u00e1c \u0111o\u1ea1n m\u00e3 h\u1ea1i. M\u00e3 h\u1ea1i n\u00e0y c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c d\u00f9ng \u0111\u1ec3 ph\u00e1t t\u00e1n virus, s\u00e2u, hay ch\u00e8n th\u00eam c\u1eeda h\u1eadu v\u00e0o m\u00e1y t\u00ednh \u0111\u1ec3 \u0111\u00e1nh c\u1eafp th\u00f4ng tin nh\u1ea1y c\u1ea3m hay ph\u00e1 hu\u1ef7 m\u1ecdi t\u1ec7p.\u00a0 Theo nghi\u00ean c\u1ee9u m\u1edbi \u0111\u00e2y c\u1ee7a Carnegie Mellon, 64 ph\u1ea7n tr\u0103m nh\u1eefng ch\u1ed7 mong manh tr\u00ean th\u1ebf gi\u1edbi \u0111\u1ec1u l\u00e0 k\u1ebft qu\u1ea3 c\u1ee7a l\u1ed7i vi\u1ebft m\u00e3.<\/p>\n<p>T\u00f4i tin c\u00f4ng ti ph\u1ea3i c\u00f3 ch\u00ednh s\u00e1ch an ninh t\u1ea1i ch\u1ed7 \u0111\u1ec3 x\u00e1c \u0111\u1ecbnh c\u00e1ch th\u1ef1c hi\u1ec7n an ninh. Ch\u00ednh s\u00e1ch an ninh s\u1ebd x\u00e1c \u0111\u1ecbnh m\u1ee9c \u0111\u1ed9 an ninh v\u00e0 vai tr\u00f2 v\u00e0 tr\u00e1ch nhi\u1ec7m c\u1ee7a ng\u01b0\u1eddi d\u00f9ng, ng\u01b0\u1eddi qu\u1ea3n tr\u1ecb v\u00e0 ng\u01b0\u1eddi qu\u1ea3n l\u00ed. T\u1ed5 ch\u1ee9c an ninh c\u0169ng n\u00ean \u0111\u01b0\u1ee3c thi\u1ebft l\u1eadp \u0111\u1ec3 gi\u00e1m s\u00e1t vi\u1ec7c d\u00f9ng t\u00ednh to\u00e1n \u0111\u1ec3 c\u1ea3nh b\u00e1o v\u1ec1 v\u1ea5n \u0111\u1ec1 an ninh (Virus, t\u1ea5n c\u00f4ng xi be v.v.). Ng\u01b0\u1eddi d\u00f9ng n\u00ean ch\u1eafc r\u1eb1ng h\u1ec7 \u0111i\u1ec1u h\u00e0nh v\u00e0 \u1ee9ng d\u1ee5ng m\u00e1y t\u00ednh c\u1ee7a h\u1ecd \u0111\u01b0\u1ee3c v\u00e1 b\u1eb1ng nh\u1eefng mi\u1ebfng v\u00e1 d\u1ecbch v\u1ee5 m\u1edbi nh\u1ea5t v\u00e0 s\u1eeda n\u00f3ng ngay. H\u1ecd kh\u00f4ng n\u00ean m\u1edf email t\u1eeb nh\u1eefng ng\u01b0\u1eddi g\u1eedi kh\u00f4ng bi\u1ebft hay c\u00e1c ngu\u1ed3n kh\u00f4ng bi\u1ebft c\u0169ng nh\u01b0 ch\u1eb7n l\u1ea1i c\u00e1c ki\u1ec3u t\u00e0i li\u1ec7u \u0111\u00ednh k\u00e8m nh\u01b0 .bas, .bat, .exe v\u00e0 .vbs. v\u00ec ch\u00fang c\u00f3 th\u1ec3 ch\u1ee9a m\u00e3 h\u1ea1i.<\/p>\n<p>&nbsp;<\/p>\n<p>&#8212;-English version&#8212;-<\/p>\n<p>&nbsp;<\/p>\n<p>computer security threat<\/p>\n<p>This year and the next few years, the main issues for many companies would be how to prepare for the next security threat or cyber attack. This is always a challenge as more and more \u201cHackers\u201d are attacking company\u2019s information systems on a daily basis. In the past, hackers are mostly software developers who are bore and want to do something for fun regardless of the consequences. Today hackers are mostly \u201cOrganized crimes\u201d who recruit software developers to steal information such as credit card numbers, bank accounts, and company\u2019s proprietary information, or do damage to company\u2019s business (Sabotage, terrorism).<\/p>\n<p>The main problem is most people in charge of information systems do NOT have knowledge or resources to manage them. According to the security review study of 25 developed countries around the world, they found that 75% of people in charge of government information systems are NOT software people, many of them are government officials who got promoted to the positions. The study also found that over 60% of private company also does not have good security policies, procedures and knowledgeable people in charge of security systems. That means both government and private companies are vulnerable to cyber attack.<\/p>\n<p>As software is becoming larger and more complex because people keep adding to it and changing it. People want new features, new functions, new applications, and they all want it faster so most software project managers are focusing on deliver the software on time with more functionalities but few would pay attention to security. Today many softwares are connected to the Internet and it creates more vulnerability than before. Another issue is that with outsourcing, software development is done around the world, in all kinds of places. As people adding new functions, new components, they are adding more complexity to software system with more codes and it opens up more errors that \u201chackers\u201d can take advantage.<\/p>\n<p>Because computer security is a new field in software engineering, very few universities offer this training so there is a critical shortage of computer security specialist all over the world. Many officials and managers believe that they already have \u201cFirewall\u201d in place so their systems are secured. It is just like having a lock in your front door so you do not worry about people enters your house. The problem is firewall can stop some \u201cAmateur hackers\u201d but not \u201cProfessional hackers\u201d, just like the door lock can stop some people from entering your house through the front door but NOT stop a thief who know how to get in your house from other places. Having firewalls is NOT enough. You need to have skilled resources to set policies, directions, procedures and manage your security systems, without them all money spent on security firewall or tools will be worthless. I believe that a robust security can only be delivered if there are skilled people in place to make it happen and it is critical to have more security training for all computer users. It is important that company should be focusing more on getting the skilled people with the right equipment in place to monitor and respond to security issues before cyber attack.<\/p>\n<p>Moreover, company should focus on security-training program so more people are aware of this problem. Security breach is a frequent yet unintended mistake among software developers.\u00a0 When open an email or copying a string in memory, having a stack overflow in their code could all have serious consequences as they create a vulnerability that can be used to execute malicious code by an attacker. The malicious code may be used to spread a virus, a worm, or insert a back door on a machine to steal sensitive information or destroy all the files.\u00a0 According to a recent Carnegie Mellon study, 64 percent of vulnerabilities in the world are the result of coding errors.<\/p>\n<p>I believe company should have a security policy in place to determine how security will be implemented. A security policy will define the level of security and the roles and responsibilities of users, administrators and managers. A security organization should also be established to monitor computing usages to alert of security issues (Virus, cyber attack etc.). Users should make sure that their computers operating systems and applications are patched with the latest service packs and hot fixes. They should not open email from unknown senders or unknown sources as well as block certain email attachment types such as .bas, .bat, .exe and .vbs. since they could contain malicious codes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>N\u0103m nay v\u00e0 v\u00e0i n\u0103m t\u1edbi, v\u1ea5n \u0111\u1ec1 ch\u00ednh cho nhi\u1ec1u c\u00f4ng ti s\u1ebd l\u00e0 c\u00e1ch chu\u1ea9n b\u1ecb cho \u0111e do\u1ea1 an ninh ti\u1ebfp \u0111\u00e2y &hellip; <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-2877","post","type-post","status-publish","format-standard","hentry","category-xu-huong-cong-nghe"],"_links":{"self":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/2877","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2877"}],"version-history":[{"count":1,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/2877\/revisions"}],"predecessor-version":[{"id":2878,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/2877\/revisions\/2878"}],"wp:attachment":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2877"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2877"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2877"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}