	{"id":1809,"date":"2013-07-03T19:10:15","date_gmt":"2013-07-03T12:10:15","guid":{"rendered":"http:\/\/science-technology.vn\/?p=1809"},"modified":"2013-07-03T20:09:54","modified_gmt":"2013-07-03T13:09:54","slug":"chuyen-vien-an-ninh-cong-nghe-thong-tin","status":"publish","type":"post","link":"https:\/\/science-technology.vn\/?p=1809","title":{"rendered":"Chuy\u00ean vi\u00ean an ninh c\u00f4ng ngh\u1ec7 th\u00f4ng tin"},"content":{"rendered":"<p><span style=\"font-size: 13px;\"><span style=\"font-size: 14px;\">Chuy\u00ean vi\u00ean an ninh c\u00f4ng ngh\u1ec7 th\u00f4ng tin (CNTT) l\u00e0 m\u1ed9t trong nh\u1eefng k\u0129 n\u0103ng c\u00f3 nhu c\u1ea7u cao nh\u1ea5t ng\u00e0y nay trong c\u00f4ng nghi\u1ec7p CNTT. V\u1edbi vi\u1ec7c t\u0103ng c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng xi be, l\u00e2y nhi\u1ec5m ph\u1ea7n m\u1ec1m \u0111\u1ed9c, s\u1ef1 x\u00e2m nh\u1eadp c\u1ee7a hacker v.v., c\u00e1c c\u00f4ng ti b\u00e2y gi\u1edd chi nhi\u1ec1u ti\u1ec1n h\u01a1n v\u00e0o an ninh k\u1ebft c\u1ea5u n\u1ec1n v\u00e0 \u1ee9ng d\u1ee5ng CNTT h\u01a1n v\u00e0i n\u0103m tr\u01b0\u1edbc.<\/span><\/span><\/p>\n<p>Trong qu\u00e1 kh\u1ee9, c\u00e1c c\u00f4ng ti d\u1ef1a tr\u00ean t\u01b0\u1eddng l\u1eeda nh\u01b0ng \u0111i\u1ec1u \u0111\u00f3 \u0111\u00e3 kh\u00f4ng c\u00f3 t\u00e1c d\u1ee5ng t\u1ed1t v\u00e0 h\u1ecd ch\u1ecbu nhi\u1ec1u t\u1ed5n th\u1ea5t. Ng\u00e0y nay ph\u1ea7n l\u1edbn c\u00e1c hackers l\u00e0 t\u1ed9i ph\u1ea1m c\u00f3 t\u1ed5 ch\u1ee9c r\u1ea5t gi\u1ecfi x\u00e2m nh\u1eadp v\u00e0o c\u00e1c h\u1ec7 th\u1ed1ng CNTT v\u00e0 t\u1ea1o ra h\u01b0 h\u1ecfng. \u0110\u1ec3 ng\u0103n c\u1ea3n \u0111i\u1ec1u \u0111\u00f3 x\u1ea3y ra, c\u00e1c c\u00f4ng ti ph\u1ea3i ch\u1ea5p nh\u1eadn nhi\u1ec1u c\u00e1ch ti\u1ebfp c\u1eadn ph\u00f2ng ng\u1eeba h\u01a1n l\u00e0 ph\u1ea3n \u1ee9ng. H\u1ecd ph\u1ea3i ki\u1ec3m \u0111i\u1ec3m l\u1ea1i h\u1ec7 th\u1ed1ng CNTT c\u1ee7a h\u1ecd \u0111\u1ec3 nh\u1eadn di\u1ec7n nh\u1eefng ch\u1ed7 mong manh v\u00e0 s\u1eeda ch\u00fang \u0111\u1ec3 tr\u00e1nh b\u1ea5t k\u00ec h\u1eadu qu\u1ea3 n\u00e0o th\u00eam. K\u1ebft qu\u1ea3 l\u00e0 nhi\u1ec1u c\u00f4ng ti \u0111ang thu\u00ea chuy\u00ean vi\u00ean an ninh CNTT, nh\u1eefng ng\u01b0\u1eddi \u0111\u01b0\u1ee3c \u0111\u00e0o t\u1ea1o \u0111\u1ec3 gi\u1ea3i quy\u1ebft v\u1edbi v\u1ea5n \u0111\u1ec1 an ninh \u0111\u1ec3 th\u1ef1c hi\u1ec7n m\u00f4 h\u00ecnh an ninh ph\u00f2ng ng\u1eeba c\u1ee7a h\u1ecd.<\/p>\n<p>Khu v\u1ef1c mong manh nh\u1ea5t c\u1ee7a h\u1ec7 th\u1ed1ng CNTT l\u00e0 m\u00e3 ph\u1ea7n m\u1ec1m. Ngay c\u1ea3 ng\u00e0y nay, ph\u1ea7n l\u1edbn sinh vi\u00ean v\u1eabn kh\u00f4ng \u0111\u01b0\u1ee3c d\u1ea1y l\u1eadp tr\u00ecnh c\u00f3 an ninh trong \u0111\u1ea7u. \u0110\u00f3 l\u00e0 l\u00ed do t\u1ea1i sao &#8220;tr\u00e0n b\u1ed9 \u0111\u1ec7m&#8221; v\u00e0 &#8220;ch\u00e8n l\u1ec7nh SQL&#8221; l\u00e0 chi\u1ebfn thu\u1eadt th\u00f4ng th\u01b0\u1eddng trong c\u00e1c hacker \u0111\u1ec3 c\u00f3 \u0111\u01b0\u1ee3c quy\u1ec1n truy nh\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng CNTT v\u00e0 \u0111\u1ec3 \u0111\u00e1nh c\u1eafp th\u00f4ng tin hay c\u1ea5y ph\u1ea7n m\u1ec1m \u0111\u1ed9c. Nhi\u1ec1u c\u00f4ng ti v\u1eabn c\u00f2n d\u1ef1a v\u00e0o vi\u1ec7c &#8220;v\u00e1&#8221; nh\u01b0 gi\u1ea3i ph\u00e1p \u0111\u1ec3 v\u01b0\u1ee3t qua l\u1ed7i trong m\u00e3. Tuy nhi\u00ean vi\u1ec7c v\u00e1 th\u1ec9nh tho\u1ea3ng c\u0169ng t\u1ea1o ra ch\u1ed7 mong manh kh\u00e1c v\u1ec1 ph\u1ea7n m\u00e3. C\u00e1ch t\u1ed1t h\u01a1n l\u00e0 d\u00e0nh th\u1eddi gian v\u00e0o ki\u1ec3m m\u00e3, ki\u1ec3m th\u1eed r\u00e0 l\u1ea1i, v\u00e0 gi\u00e1m \u0111\u1ecbnh m\u00e3 an ninh nh\u01b0 c\u00f4ng c\u1ee5 ph\u00f2ng ng\u1eeba m\u00e3 \u0111\u1ed9c v\u00e0 x\u00e2m nh\u1eadp c\u1ee7a hacker. \u0110\u1ec3 l\u00e0m cho n\u00f3 hi\u1ec7u qu\u1ea3 h\u01a1n, ng\u01b0\u1eddi l\u1eadp tr\u00ecnh, ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n v\u00e0 ng\u01b0\u1eddi qu\u1ea3n l\u00ed CNTT ph\u1ea3i \u0111\u01b0\u1ee3c \u0111\u00e0o t\u1ea1o v\u1ec1 an ninh h\u1ec7 th\u1ed1ng CNTT.<\/p>\n<p>S\u1ed1 l\u01b0\u1ee3ng t\u0103ng l\u00ean nh\u1eefng ng\u01b0\u1eddi truy nh\u1eadp v\u00e0o website ph\u01b0\u01a1ng ti\u1ec7n x\u00e3 h\u1ed9i c\u0169ng l\u00e0m t\u0103ng r\u1ee7i ro c\u1ee7a l\u00e2y nhi\u1ec5m ph\u1ea7n m\u1ec1m \u0111\u1ed9c. M\u1ed9t ng\u01b0\u1eddi b\u1ea5t c\u1ea9n v\u1edbi laptop b\u1ecb l\u00e2y nhi\u1ec5m c\u00f3 th\u1ec3 l\u00e0m l\u00e2y nhi\u1ec5m ra to\u00e0n th\u1ec3 h\u1ec7 th\u1ed1ng CNTT c\u00f4ng ti. M\u1ed9t \u0111i\u1ec7n tho\u1ea1i th\u00f4ng minh b\u1ecb l\u00e2y nhi\u1ec5m c\u00f3 th\u1ec3 t\u1ea1o ra h\u01b0 h\u1ecfng cho h\u1ec7 th\u1ed1ng CNTT c\u1ee7a c\u00f4ng ti. \u0110\u1ec3 gi\u1eef an ninh cho th\u00f4ng tin nh\u1ea1y c\u1ea3m v\u00e0 t\u1ed1i thi\u1ec3u ho\u00e1 r\u1ee7i ro, c\u00f4ng ti ph\u1ea3i th\u1ef1c hi\u1ec7n nhi\u1ec1u \u0111\u00e0o t\u1ea1o h\u01a1n v\u1ec1 an ninh cho nh\u00e2n vi\u00ean v\u00e0 gi\u00e1m s\u00e1t v\u00e0 l\u00e0m c\u1ea5u h\u00ecnh t\u01b0\u1eddng l\u1eeda v\u1edbi kh\u1ea3 n\u0103ng t\u1ed1t nh\u1ea5t.<\/p>\n<p>V\u1edbi vi\u1ec7c s\u1eed d\u1ee5ng t\u0103ng l\u00ean c\u00e1c thi\u1ebft b\u1ecb di \u0111\u1ed9ng nh\u01b0 m\u00e1y t\u00ednh b\u1ea3ng, \u0111i\u1ec7n tho\u1ea1i th\u00f4ng minh, v.v., r\u1ee7i ro v\u1ec1 \u0103n c\u1eafp th\u00f4ng tin v\u00e0 d\u1eef li\u1ec7u \u0111\u00e3 t\u0103ng l\u00ean. Th\u00e0nh c\u00f4ng c\u1ee7a c\u00f4ng ti b\u00e2y gi\u1edd ph\u1ee5 thu\u1ed9c v\u00e0o kh\u1ea3 n\u0103ng c\u1ee7a n\u00f3 gi\u1eef an ninh th\u00f4ng tin v\u00e0 d\u1eef li\u1ec7u &#8220;nh\u1ea1y c\u1ea3m&#8221; t\u00e1ch kh\u1ecfi nh\u1eefng thi\u1ebft b\u1ecb n\u00e0y b\u1eb1ng vi\u1ec7c \u0111\u1ec3 ch\u00fang l\u01b0u gi\u1eef tr\u00ean &#8220;\u0111\u00e1m m\u00e2y t\u01b0&#8221; c\u1ee7a h\u1ecd thay v\u00ec tr\u00ean thi\u1ebft b\u1ecb. Y\u00eau c\u1ea7u v\u1ec1 m\u00e2y t\u01b0 an ninh c\u0169ng t\u1ea1o ra nhu c\u1ea7u th\u00eam v\u1ec1 chuy\u00ean vi\u00ean an ninh.<\/p>\n<p>B\u1edfi v\u00ec t\u00ednh to\u00e1n &#8220;m\u00e2y t\u01b0&#8221; bao g\u1ed3m m\u1ed9t s\u1ed1 r\u1ee7i ro g\u1eafn li\u1ec1n v\u1edbi an ninh d\u1eef li\u1ec7u v\u00e0 t\u00ednh truy nh\u1eadp \u0111\u01b0\u1ee3c. C\u00e1c c\u00f4ng ti ng\u1ea7n ng\u1ea1i chuy\u1ec3n v\u00e0o t\u00ednh to\u00e1n m\u00e2y. \u0110\u1ec3 thu \u0111\u01b0\u1ee3c tin t\u01b0\u1edfng c\u1ee7a kh\u00e1ch h\u00e0ng, nhi\u1ec1u nh\u00e0 cung c\u1ea5p d\u1ecbch v\u1ee5 ph\u1ea3i l\u00e0m cho m\u00e2y c\u1ee7a h\u1ecd truy nh\u1eadp \u0111\u01b0\u1ee3c v\u00e0 \u0111\u01b0\u1ee3c x\u00e1c nh\u1eadn b\u1edfi nh\u00e0 b\u00e1n an ninh b\u00ean th\u1ee9 ba. \u0110\u1ec3 l\u00e0m \u0111i\u1ec1u \u0111\u00f3, c\u1ea3 hai nh\u00e0 cung c\u1ea5p t\u00ednh to\u00e1n m\u00e2y v\u00e0 nh\u00e0 b\u00e1n \u0111\u00e1nh gi\u00e1 an ninh \u0111\u1ec1u c\u1ea7n thu\u00ea chuy\u00ean vi\u00ean an ninh. V\u1ea5n \u0111\u1ec1 th\u01b0\u1eddng \u0111\u01b0\u1ee3c n\u00eau ra l\u00e0 li\u1ec7u h\u1ecd c\u00f3 t\u00ecm \u0111\u01b0\u1ee3c c\u00e1c chuy\u00ean vi\u00ean n\u00e0y kh\u00f4ng? M\u1ecdi ng\u01b0\u1eddi l\u1ea5y \u0111\u00e0o t\u1ea1o v\u1ec1 h\u1ec7 th\u1ed1ng an ninh \u1edf \u0111\u00e2u? C\u00f3 v\u00e0i ch\u01b0\u01a1ng tr\u00ecnh ch\u1ee9ng ch\u1ec9 an ninh trong c\u00f4ng nghi\u1ec7p nh\u01b0ng ch\u1eebng n\u00e0o ng\u01b0\u1eddi ta c\u00f2n ch\u01b0a c\u00f3 nhi\u1ec1u n\u0103m kinh nghi\u1ec7m, th\u1ec9nh tho\u1ea3ng m\u1edbi c\u00f3 v\u00e0i th\u00e1ng \u0111\u00e0o t\u1ea1o c\u00f3 th\u1ec3 l\u00e0 kh\u00f4ng \u0111\u1ee7. Ng\u00e0y nay an ninh CNTT \u0111ang tr\u1edf th\u00e0nh m\u00f4n h\u1ecdc trong m\u1ed9t s\u1ed1 \u0111\u1ea1i h\u1ecdc. C\u00f3 th\u1ec3 c\u00f3 \u0111\u01b0\u1ee3c b\u1eb1ng t\u1ed1t nghi\u1ec7p \u0111\u1ea1i h\u1ecdc hay b\u1eb1ng th\u1ea1c s\u0129 trong an ninh CNTT v\u00e0 ng\u01b0\u1eddi t\u1ed1t nghi\u1ec7p c\u00f3 th\u1ec3 mong \u0111\u1ee3i l\u00e0m \u0111\u01b0\u1ee3c $95,000 t\u1edbi $130,000 m\u1ed9t n\u0103m.<\/p>\n<p>&nbsp;<\/p>\n<p>&#8212;-English version&#8212;-<\/p>\n<p>&nbsp;<\/p>\n<p>Informatio\u200bn Technology Security specialist<\/p>\n<p>Information Technology (IT) Security specialist is one of the highest demand skills in IT industry today. With increasing cyber attacks, malwares infections, hacker\u2019s penetration etc., companies are now spending more money to secure their IT infrastructures and applications than few years ago.<\/p>\n<p>In the past, companies relied on firewalls but it did not work well and they suffered a lot of damages. Today most hackers are organized crimes that are very good at penetrate IT systems and create damages. To prevent it from happening, companies have to adopt more preventive rather than reactive approach. They must review their IT systems to identify vulnerabilities and fix them to avoid any further consequences. As a result, more companies are hiring IT security specialists, people who are trained to deal with security issues to implement their preventive security model.<\/p>\n<p>The most vulnerable area of the IT system is software code. Even today, most students are not taught to programming with security in mind. That is why \u201cBuffer overflow\u201d and \u201cSQL injection\u201d are common tactics among hackers to get access to IT systems and to steal information or plant malwares. Many companies are still relying on \u201cpatching\u201d as a solution to overcome defects on the code. However patching sometime also creates another vulnerable on the other parts of code. The better way is to spend time on code review, regression testing, and secured code inspection as a tool to prevent malwares and hackers penetrations. To make it more effective, programmers, developers, and IT managers must be trained in IT system security.<\/p>\n<p>The increasing number of people accessing social media web sites also increases the risk of malware infections. One careless person with an infected laptop can infect the whole company IT system. One infected smart phone can create damages to a phone company\u2019s IT systems. In order to secure the sensitive information and minimize the risk, company must implement more training on security to employees and monitoring mechanism and configure firewall to the best possible.<\/p>\n<p>With the increasing usage of mobile devices like tablets, smart-phones, etc. the risk of information and data theft has gone up. The success of company now depends on its ability to secure their \u201csensitive\u201d information and data off these devices by having them store on their \u201cprivate cloud\u201d instead of the devices. The requirement of secured private cloud also increase demand for more security specialists.<\/p>\n<p>Because \u201cpublic cloud\u201d computing involves certain risk pertaining to data security and accessibility. Companies are reluctant to move into cloud computing. To gain customers\u2019 confidence, many service providers must get their cloud assessed and certified by a third party security vendor. To do that, both cloud computing providers and security assessment vendors need to hire more security specialists. The question often raised is where do they find these specialists? Where do people get training on security system? There are several security certificate programs in the industry but unless people have many years of experiences, sometime few months of training may not be enough. Today IT security is becoming a major in some universities. It is possible to get a bachelor or master degrees in IT security and graduates can expected to make $95,000 to $130,000 per year.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chuy\u00ean vi\u00ean an ninh c\u00f4ng ngh\u1ec7 th\u00f4ng tin (CNTT) l\u00e0 m\u1ed9t trong nh\u1eefng k\u0129 n\u0103ng c\u00f3 nhu c\u1ea7u cao nh\u1ea5t ng\u00e0y nay trong c\u00f4ng nghi\u1ec7p &hellip; <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-1809","post","type-post","status-publish","format-standard","hentry","category-cong-nghe-thong-tin"],"_links":{"self":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/1809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1809"}],"version-history":[{"count":3,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/1809\/revisions"}],"predecessor-version":[{"id":1811,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/1809\/revisions\/1811"}],"wp:attachment":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}