{"version":"1.0","provider_name":"Hosteko Blog","provider_url":"https:\/\/hosteko.com\/blog","author_name":"Risa Y","author_url":"https:\/\/hosteko.com\/blog\/author\/risa","title":"Common Weakness Enumeration untuk Menjaga Keamanan Data - Hosteko Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"fntzNKZJ44\"><a href=\"https:\/\/hosteko.com\/blog\/common-weakness-enumeration-untuk-menjaga-keamanan-data\">Common Weakness Enumeration untuk Menjaga Keamanan Data<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/hosteko.com\/blog\/common-weakness-enumeration-untuk-menjaga-keamanan-data\/embed#?secret=fntzNKZJ44\" width=\"600\" height=\"338\" title=\"&#8220;Common Weakness Enumeration untuk Menjaga Keamanan Data&#8221; &#8212; Hosteko Blog\" data-secret=\"fntzNKZJ44\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/hosteko.com\/htk-blog\/wp-content\/uploads\/2021\/01\/Common-Weakness-Enumeration-untuk-Menjaga-Keamanan-Data.gif","thumbnail_width":1440,"thumbnail_height":810,"description":"Apa Itu Common Weakness Enumeration (CWE)? Common Weakness Enumeration (CWE) adalah daftar yang menampilkan keberadaan bug pada software atau hardware yang berbahaya bagi perusahaan. Jika biasanya penyerang akan menggunakan celah untuk di bobol, tidak dengan CWE ini, penyerang atau hacker biasanya akan memanfaatkan celah tersebut untuk mencuri data rahasia dari\u00a0website\u00a0yang menjadi target. Informasi rahasia yang [&hellip;]"}