{"id":360,"date":"2025-02-16T15:32:00","date_gmt":"2025-02-16T18:32:00","guid":{"rendered":"https:\/\/treinamentolivre.com\/si\/cyber\/?p=360"},"modified":"2025-02-16T15:33:00","modified_gmt":"2025-02-16T18:33:00","slug":"nsa-recomenda-que-nao-se-programe-mais-em-c-e-c","status":"publish","type":"post","link":"https:\/\/treinamentolivre.com\/si\/cyber\/?p=360","title":{"rendered":"NSA recomenda que n\u00e3o se programe mais em C e C++"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>A Ag\u00eancia de Seguran\u00e7a Nacional dos EUA, a NSA, publicou na quinta-feira dia 10 orienta\u00e7\u00f5es para ajudar desenvolvedores e operadores de software a prevenir e mitigar problemas de seguran\u00e7a de mem\u00f3ria de software: eles s\u00e3o respons\u00e1veis grande parte das vulnerabilidades explor\u00e1veis. A ag\u00eancia observa que linguagens muito usadas, como C e C++, fornecem muita liberdade e flexibilidade no gerenciamento de mem\u00f3ria embora dependam muito do programador para as verifica\u00e7\u00f5es necess\u00e1rias nas refer\u00eancias de mem\u00f3ria. Erros simples podem levar a vulnerabilidades explor\u00e1veis baseadas em gerenciamento de mem\u00f3ria.<\/p>\n\n\n\n<p>Cisoadvisor, 13\/11\/2022<\/p>\n\n\n\n<p><\/p>\n<\/blockquote>\n\n\n\n<p>Leia o <a href=\"https:\/\/www.cisoadvisor.com.br\/nsa-recomenda-que-desenvolvedores-abandonem-c-e-c\/\" target=\"_blank\" rel=\"noreferrer noopener\">artigo<\/a>.<\/p>\n\n\n\n<p><a href=\"https:\/\/media.defense.gov\/2022\/Nov\/10\/2003112742\/-1\/-1\/0\/CSI_SOFTWARE_MEMORY_SAFETY.PDF\" target=\"_blank\" rel=\"noreferrer noopener\">Relat\u00f3rio<\/a> original no site da NSA.<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/treinamentolivre.com\/si\/cyber\/wp-content\/uploads\/2025\/02\/CSI_SOFTWARE_MEMORY_SAFETY.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Incorporado de CSI_SOFTWARE_MEMORY_SAFETY.\"><\/object><a id=\"wp-block-file--media-ad0aff40-5c71-4193-b7c9-032db7f853b0\" href=\"https:\/\/treinamentolivre.com\/si\/cyber\/wp-content\/uploads\/2025\/02\/CSI_SOFTWARE_MEMORY_SAFETY.pdf\">CSI_SOFTWARE_MEMORY_SAFETY<\/a><a href=\"https:\/\/treinamentolivre.com\/si\/cyber\/wp-content\/uploads\/2025\/02\/CSI_SOFTWARE_MEMORY_SAFETY.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ad0aff40-5c71-4193-b7c9-032db7f853b0\">Baixar<\/a><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Ag\u00eancia de Seguran\u00e7a Nacional dos EUA, a NSA, publicou na quinta-feira dia 10 orienta\u00e7\u00f5es para ajudar desenvolvedores e operadores de software a prevenir e mitigar problemas de seguran\u00e7a de&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/treinamentolivre.com\/si\/cyber\/?p=360\">Continuar a ler&#8230;<span class=\"screen-reader-text\">NSA recomenda que n\u00e3o se programe mais em C e C++<\/span><\/a><\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29,4],"tags":[],"class_list":["post-360","post","type-post","status-publish","format-standard","hentry","category-programacao","category-seguranca","excerpt"],"_links":{"self":[{"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=\/wp\/v2\/posts\/360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=360"}],"version-history":[{"count":1,"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=\/wp\/v2\/posts\/360\/revisions"}],"predecessor-version":[{"id":362,"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=\/wp\/v2\/posts\/360\/revisions\/362"}],"wp:attachment":[{"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}