{"version":"1.0","provider_name":"C\u00f4ng Ty C\u1ed5 Ph\u1ea7n \u0110\u1ea7u T\u01b0 V\u00e0 C\u00f4ng Ngh\u1ec7 BAP","provider_url":"https:\/\/bap-software.net\/vi","author_name":"Dao Thanh","author_url":"https:\/\/bap-software.net\/vi\/author\/daothanh\/","title":"An To\u00e0n Th\u00f4ng Tin (ATTT) T\u1ea1i BAP","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"7f7U1fMXBm\"><a href=\"https:\/\/bap-software.net\/vi\/information-security-at-bap\/\">An To\u00e0n Th\u00f4ng Tin (ATTT) T\u1ea1i BAP<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/bap-software.net\/vi\/information-security-at-bap\/embed\/#?secret=7f7U1fMXBm\" width=\"600\" height=\"338\" title=\"&#8220;An To\u00e0n Th\u00f4ng Tin (ATTT) T\u1ea1i BAP&#8221; &#8212; C\u00f4ng Ty C\u1ed5 Ph\u1ea7n \u0110\u1ea7u T\u01b0 V\u00e0 C\u00f4ng Ngh\u1ec7 BAP\" data-secret=\"7f7U1fMXBm\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/bap-software.net\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/cdn.bap-software.net\/2020\/06\/information-security-1.jpg","thumbnail_width":650,"thumbnail_height":433,"description":"B\u1ed9 c\u00e1c quy \u0111\u1ecbnh v\u1ec1 ATTT \u0111\u00e3 \u0111\u01b0\u1ee3c BAP ban h\u00e0nh v\u1edbi m\u1ee5c \u0111\u00edch quy \u0111\u1ecbnh v\u00e0 h\u01b0\u1edbng d\u1eabn c\u00e1c b\u01b0\u1edbc th\u1ef1c hi\u1ec7n nh\u1eb1m b\u1ea3o m\u1eadt an to\u00e0n th\u00f4ng tin, d\u1eef li\u1ec7u c\u1ee7a t\u1ea5t c\u1ea3 nh\u00e2n vi\u00ean thu\u1ed9c c\u00e1c ph\u00f2ng ban trong qu\u00e1 tr\u00ecnh l\u00e0m vi\u1ec7c t\u1ea1i C\u00f4ng ty. T\u00e0i li\u1ec7u s\u1eed d\u1ee5ng \u0111\u01b0\u1ee3c d\u1ef1a theo danh m\u1ee5c t\u00e0i li\u1ec7u quy \u0111\u1ecbnh trong \u0111i\u00ea\u0300u khoa\u0309n A15 &#8211; Ti\u00eau chu\u1ea9n ISO\/IEC 27001:2013. M\u1ee5c \u0111\u00edch: B\u1ed9 quy \u0111\u1ecbnh n\u00e0y bao g\u1ed3m c\u00e1c quy \u0111\u1ecbnh chung c\u0169ng nh\u01b0 c\u00e1c quy \u0111\u1ecbnh cho kh\u1ed1i S\u1ea3n xu\u1ea5t v\u00e0 kh\u1ed1i H\u1ed7 tr\u1ee3 nh\u1eb1m \u0111\u1ea3m b\u1ea3o ngu\u1ed3n th\u00f4ng tin c\u1ee7a c\u00f4ng ty kh\u00f4ng b\u1ecb r\u00f2 r\u1ec9 ra b\u00ean ngo\u00e0i c\u0169ng nh\u01b0 n\u00e2ng cao nh\u1eadn th\u1ee9c c\u1ee7a nh\u00e2n vi\u00ean \u0111\u1ed1i v\u1edbi vi\u1ec7c b\u1ea3o \u0111\u1ea3m an to\u00e0n th\u00f4ng tin t\u1ea1i n\u01a1i l\u00e0m vi\u1ec7c. N\u1ed9i dung: C\u00e1c quy \u0111\u1ecbnh chung bao g\u1ed3m 12 \u0111i\u1ec1u Quy \u0111\u1ecbnh v\u1ec1 m\u1eadt kh\u1ea9u: C\u1ea7n \u0111\u1ed5i m\u1eadt kh\u1ea9u 3 th\u00e1ng 1 l\u1ea7n theo quy \u0111\u1ecbnh c\u1ee7a C\u00f4ng ty, kh\u00f4ng n\u00ean t\u1ea1o nh\u1eefng m\u1eadt kh\u1ea9u c\u00f3 t\u1eeb ho\u1eb7c c\u1ee5m t\u1eeb ph\u1ed5 bi\u1ebfn. M\u1eadt kh\u1ea9u t\u1ed1i \u0111a 8 k\u00fd t\u1ef1 v\u00e0 ph\u1ea3i bao g\u1ed3m k\u00fd t\u1ef1 th\u01b0\u1eddng, k\u00fd t\u1ef1 hoa, s\u1ed1 v\u00e0 k\u00fd t\u1ef1 \u0111\u1eb7c bi\u1ec7t. Quy \u0111\u1ecbnh v\u1ec1 email: M\u1ed7i nh\u00e2n vi\u00ean khi m\u1edbi v\u00e0o c\u00f4ng ty s\u1ebd c\u00f3 m\u1ed9t t\u00e0i kho\u1ea3n email c\u00e1 nh\u00e2n do ph\u00eda H\u00e0nh ch\u00ednh nh\u00e2n s\u1ef1 g\u1eedi y\u00eau c\u1ea7u t\u1ea1o l\u1eadp \u0111\u1ebfn ph\u00f2ng IT. Email b\u1ecb gi\u1edbi h\u1ea1n truy c\u1eadp theo b\u1ed9 ph\u1eadn, m\u1ee5c \u0111\u00edch, ch\u1ee9c v\u1ee5 v\u00e0 nhu c\u1ea7u. Quy \u0111\u1ecbnh truy c\u1eadp m\u1ea1ng: Vi\u1ec7c truy c\u1eadp m\u1ea1ng s\u1ebd \u0111\u01b0\u1ee3c chia theo lo\u1ea1i h\u00ecnh m\u1ea1ng l\u00e0 m\u1ea1ng c\u00f3 d\u00e2y v\u00e0 m\u1ea1ng kh\u00f4ng d\u00e2n. \u0110\u1ed1i v\u1edbi t\u1eebng lo\u1ea1i h\u00ecnh s\u1ebd c\u00f3 nh\u1eefng thi\u1ebft l\u1eadp m\u1ea1ng kh\u00e1c nhau v\u00e0 chia theo nh\u1eefng nh\u00f3m nh\u1ecf kh\u00e1c nhau t\u00f9y theo m\u1ee5c \u0111\u00edch s\u1eed d\u1ee5ng, [&hellip;]"}