	{"id":2952,"date":"2013-07-08T10:56:06","date_gmt":"2013-07-08T03:56:06","guid":{"rendered":"http:\/\/science-technology.vn\/?p=2952"},"modified":"2013-07-08T10:56:06","modified_gmt":"2013-07-08T03:56:06","slug":"an-ninh-may-tinh","status":"publish","type":"post","link":"https:\/\/science-technology.vn\/?p=2952","title":{"rendered":"An ninh m\u00e1y t\u00ednh"},"content":{"rendered":"<p><span style=\"font-size: 14px;\">C\u00f3 m\u1ed9t xu h\u01b0\u1edbng ph\u1ea7n m\u1ec1m \u0111ang n\u1ed5i l\u00ean trong m\u1ecdi n\u01b0\u1edbc do nhu c\u1ea7u cao v\u00e0 cung c\u1ea5p th\u1ea5p: Chuy\u00ean vi\u00ean an ninh m\u00e1y t\u00ednh. Khi m\u1ea1ng m\u00e1y t\u00ednh ph\u00e1t tri\u1ec3n v\u00e0 nhi\u1ec1u d\u1eef li\u1ec7u \u0111\u01b0\u1ee3c l\u01b0u gi\u1eef tr\u00ean m\u00e1y t\u00ednh, nhu c\u1ea7u v\u1ec1 c\u00e1c chuy\u00ean vi\u00ean an ninh c\u00f3 k\u0129 n\u0103ng, ng\u01b0\u1eddi c\u00f3 th\u1ec3 gi\u00fap t\u1ed5 ch\u1ee9c ki\u1ec3m so\u00e1t truy nh\u1eadp v\u00e0o m\u1ea1ng m\u00e1y t\u00ednh c\u1ee7a h\u1ecd v\u00e0 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u quan tr\u1ecdng \u0111\u01b0\u1ee3c l\u01b0u gi\u1eef \u0111\u00e3 tr\u1edf th\u00e0nh m\u1ea5u ch\u1ed1t.<\/span><\/p>\n<p>Chuy\u00ean vi\u00ean an ninh m\u00e1y t\u00ednh thi\u1ebft k\u1ebf v\u00e0 th\u1ef1c hi\u1ec7n c\u01a1 ch\u1ebf ki\u1ec3m so\u00e1t m\u1ea1ng, ph\u1ee5c v\u1ee5 cho vi\u1ec7c ki\u1ec3m so\u00e1t truy nh\u1eadp c\u1ee7a ng\u01b0\u1eddi d\u00f9ng v\u00e0o m\u1ea1ng m\u00e1y t\u00ednh qua c\u00e1c qui tr\u00ecnh nh\u01b0 t\u01b0\u1eddng l\u1eeda v\u00e0 c\u00e1c ph\u01b0\u01a1ng ti\u1ec7n kh\u00e1c. H\u1ecd th\u1ef1c hi\u1ec7n ki\u1ec3m so\u00e1t truy nh\u1eadp \u1ee9ng d\u1ee5ng, nh\u01b0 x\u00e1c th\u1ef1c m\u1eadt kh\u1ea9u, gi\u1eef cho nh\u1eefng ng\u01b0\u1eddi d\u00f9ng kh\u00f4ng \u0111\u01b0\u1ee3c ph\u00e9p kh\u00f4ng truy nh\u1eadp \u0111\u01b0\u1ee3c v\u00e0o m\u1ea1ng m\u00e1y t\u00ednh v\u00e0 thi\u1ebft l\u1eadp c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh ph\u00e1t hi\u1ec7n h\u1eafc kh\u00e1ch th\u1ea9m l\u1eadu v\u00e0o h\u1ec7 th\u1ed1ng. M\u1ed9t c\u00e1ch \u0111i\u1ec3n h\u00ecnh, chuy\u00ean vi\u00ean an ninh m\u00e1y t\u00ednh c\u0169ng c\u1ea3i ti\u1ebfn an ninh b\u1eb1ng ch\u00ednh s\u00e1ch, th\u1ee7 t\u1ee5c v\u00e0 k\u0129 thu\u1eadt truy\u1ec1n th\u00f4ng v\u1edbi ng\u01b0\u1eddi d\u00f9ng h\u1ec7 th\u1ed1ng. H\u1ecd gi\u00e1m s\u00e1t ai \u0111ang d\u00f9ng m\u1ea1ng m\u00e1y t\u00ednh v\u00e0 gi\u1eef ch\u00ednh x\u00e1c c\u00e1c t\u1ec7p sao l\u01b0u \u0111\u01b0\u1ee3c c\u1eadp nh\u1eadt v\u1ec1 t\u1ea5t c\u1ea3 d\u1eef li\u1ec7u quan tr\u1ecdng \u0111\u01b0\u1ee3c d\u00f9ng chung tr\u00ean m\u1ea1ng m\u00e1y t\u00ednh.<\/p>\n<p>N\u0103m ngo\u00e1i, t\u00e1m sinh vi\u00ean tr\u01b0\u1eddng \u0110\u1ea1i h\u1ecdc b\u00e1ch khoa bang California, Pomona, \u0111\u1ec3 ra s\u00e1u th\u00e1ng th\u1ef1c h\u00e0nh c\u00e1ch ph\u00f2ng th\u1ee7 cho m\u1ea1ng doanh nghi\u1ec7p \u0111i\u1ec3n h\u00ecnh kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng c\u1ee7a h\u1eafc kh\u00e1ch tr\u01b0\u1edbc khi v\u00e0o tham gia thi v\u00f9ng. H\u1ecd h\u01a1n \u0111i\u1ec3m c\u00e1c t\u1ed5 t\u1eeb n\u0103m \u0111\u1ea1i h\u1ecdc kh\u00e1c v\u1edbi vi\u1ec7c ch\u1eb7n virus, s\u00e2u v\u00e0 c\u00e1c n\u1ed7 l\u1ef1c kh\u00e1c l\u00e0m gi\u00e1n \u0111o\u1ea1n h\u1ec7 th\u1ed1ng email v\u00e0 Internet. V\u1edbi s\u00e1u sinh vi\u00ean n\u00e0y, th\u1eafng l\u1ee3i th\u1eadm ch\u00ed c\u00f2n ng\u1ecdt ng\u00e0o h\u01a1n b\u1edfi v\u00ec Boeing, c\u00f4ng ti h\u00e0ng kh\u00f4ng kh\u00f4ng gian kh\u1ed5ng l\u1ed3 l\u1eadp t\u1ee9c \u0111\u01b0a ra l\u1eddi m\u1eddi vi\u1ec7c v\u1edbi h\u1ecd th\u1eadm ch\u00ed tr\u01b0\u1edbc khi h\u1ecd t\u1ed1t nghi\u1ec7p.<\/p>\n<p>Quy\u1ebft \u0111\u1ecbnh c\u1ee7a Boeing \u0111\u1ec3 thu\u00ea m\u1ecdi sinh vi\u00ean t\u1ed1t nghi\u1ec7p c\u1ee7a t\u1ed5 th\u1eafng ch\u1ec9 ra nhu c\u1ea7u v\u1ec1 chuy\u00ean gia an ninh m\u00e1y t\u00ednh \u0111\u00e3 tr\u1edf n\u00ean kh\u1ea9n thi\u1ebft th\u1ebf n\u00e0o, v\u00e0 gi\u00fap gi\u1ea3i th\u00edch t\u1ea1i sao nhi\u1ec1u \u0111\u1ea1i h\u1ecdc \u0111ang gi\u00e0nh th\u00eam c\u00e1c m\u00f4n trong l\u0129nh v\u1ef1c n\u00e0y v\u00ec ng\u00e0y nay r\u1ea5t \u00edt tr\u01b0\u1eddng c\u00f2n d\u1ea1y v\u1ec1 an ninh m\u1ea1ng. Th\u1ef1c t\u1ebf, khi nh\u1eefng cu\u1ed9c t\u1ea5n c\u00f4ng h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh t\u0103ng l\u00ean, c\u00e1c cu\u1ed9c \u0111i\u1ec1u tra ch\u1ec9 ra s\u1ef1 thi\u1ebfu h\u1ee5t tr\u1ea7m tr\u1ecdng nh\u1eefng ng\u01b0\u1eddi c\u00f3 k\u0129 n\u0103ng \u0111\u1ec3 tranh \u0111\u1ea5u l\u1ea1i ch\u00fang. Ng\u00e2n h\u00e0ng, qu\u00e2n s\u1ef1, ch\u00ednh ph\u1ee7 v\u00e0 c\u00e1c c\u00f4ng ti ph\u1ea7n m\u1ec1m, \u0111ang t\u00ecm ki\u1ebfm &#8220;cyber ninjas&#8221; (nh\u1eefng ng\u01b0\u1eddi gi\u1ecfi v\u1ec1 ph\u00f2ng ph\u1ee7 cho m\u00e1y t\u00ednh) \u0111\u1ec3 ch\u1ed1ng \u0111\u1ee1 v\u1edbi l\u1ef1c l\u01b0\u1ee3ng h\u1eafc kh\u00e1ch, t\u1eeb nh\u1eefng k\u1ebb t\u1ed9i ph\u1ea1m \u0111\u00e1nh c\u1eafp th\u1ebb t\u00edn d\u1ee5ng cho t\u1edbi nh\u1eefng k\u1ebb \u0111\u1ecbch qu\u00e2n s\u1ef1 ti\u1ec1m n\u0103ng. Theo nhi\u1ec1u ngu\u1ed3n tin, c\u00f3 nhu c\u1ea7u kh\u1ed5ng l\u1ed3 trong khu v\u1ef1c n\u00e0y nh\u01b0ng c\u00f3 \u00edt gi\u00e1o s\u01b0 c\u00f3 th\u1ec3 d\u1ea1y v\u1ec1 ch\u1ee7 \u0111\u1ec1 n\u00e0y v\u00e0 kh\u00f4ng c\u00f3 \u0111\u1ee7 sinh vi\u00ean chuy\u00ean m\u00f4n trong khu v\u1ef1c n\u00e0y. C\u00e1c \u0111\u1ea1i h\u1ecdc h\u00e0ng \u0111\u1ea7u nh\u01b0 Carnegie Mellon, Purdue, Georgia Tech, v\u00e0 \u0110\u1ea1i h\u1ecdc B\u00e1ch khoa bang California \u1edf trong s\u1ed1 c\u00e1c \u0111\u1ea1i h\u1ecdc c\u00f3 ch\u01b0\u01a1ng tr\u00ecnh th\u1ea1c s\u0129 v\u1ec1 an ninh xi be v\u00e0 h\u1ecd t\u1ea5t c\u1ea3 \u0111\u1ec1u kinh nghi\u1ec7m vi\u1ec7c tuy\u1ec3n nhi\u1ec1u sinh vi\u00ean trong nh\u1eefng n\u0103m qua. Jeffrey M. Henbest, m\u1ed9t trong c\u00e1c sinh vi\u00ean c\u1ee7a \u0110\u1ea1i h\u1ecdc B\u00e1ch khoa \u0111\u01b0\u1ee3c Boeing thu\u00ea, n\u00f3i an ninh xi be \u1edf tr\u01b0\u1eddng anh ta \u0111\u01b0\u1ee3c coi &#8220;nh\u01b0 l\u0129nh v\u1ef1c c\u00f3 y\u00eau c\u1ea7u k\u0129 thu\u1eadt nh\u1ea5t, m\u1ed9t lo\u1ea1i ki\u1ec3u nh\u01b0 &#8220;phi c\u00f4ng chi\u1ebfn \u0111\u1ea5u&#8221; c\u1ee7a ng\u00e0nh c\u00f4ng ngh\u1ec7 th\u00f4ng tin.&#8221;<\/p>\n<p>Trong khi c\u00f3 h\u00e0ng ngh\u00ecn vi\u1ec7c l\u00e0m c\u00f3 s\u1eb5n b\u00e2y gi\u1edd, c\u00e1c quan ch\u1ee9c ch\u00ednh ph\u1ee7 c\u00f3 tham gia v\u00e0o an ninh xi be tr\u00f4ng \u0111\u1ee3i s\u1ed1 vi\u1ec7c l\u00e0m n\u00e0y t\u0103ng tr\u01b0\u1edfng nhanh ch\u00f3ng th\u00e0nh h\u00e0ng tr\u0103m ngh\u00ecn hay h\u01a1n trong v\u00e0i n\u0103m t\u1edbi. Ngay c\u1ea3 v\u1edbi n\u1ec1n kinh t\u1ebf k\u00e9m, v\u1eabn c\u00f3 h\u00e0ng ngh\u00ecn vi\u1ec7c trong an ninh m\u00e1y t\u00ednh kh\u00f4ng \u0111\u01b0\u1ee3c l\u1ea5p k\u00edn do thi\u1ebfu ng\u01b0\u1eddi c\u00f3 \u0111\u1ee7 ph\u1ea9m ch\u1ea5t. L\u00ed do \u0111\u01a1n gi\u1ea3n l\u00e0 thi\u1ebfu h\u1ee5t sinh vi\u00ean quan t\u00e2m t\u1edbi vi\u1ec7c theo \u0111u\u1ed5i ngh\u1ec1 nghi\u1ec7p trong k\u0129 ngh\u1ec7 hay khoa h\u1ecdc trong m\u01b0\u1eddi n\u0103m qua. Trong nh\u1eefng n\u0103m qua, nhi\u1ec1u sinh vi\u00ean \u0111\u00e3 xin v\u00e0o h\u1ecdc \u1edf c\u00e1c tr\u01b0\u1eddng kinh doanh v\u1edbi hi v\u1ecdng l\u00e0m ra nhi\u1ec1u ti\u1ec1n tr\u01b0\u1edbc cu\u1ed9c kh\u1ee7ng ho\u1ea3ng t\u00e0i ch\u00ednh n\u00e0y. T\u1ea5t nhi\u00ean, ng\u00e0y nay sinh vi\u00ean b\u1eaft \u0111\u1ea7u tr\u1edf l\u1ea1i v\u1edbi khoa h\u1ecdc m\u00e1y t\u00ednh v\u00e0 k\u0129 ngh\u1ec7 ph\u1ea7n m\u1ec1m v\u00ec nhi\u1ec1u sinh vi\u00ean kinh doanh kh\u00f4ng th\u1ec3 t\u00ecm \u0111\u01b0\u1ee3c vi\u1ec7c l\u00e0m th\u00eam n\u1eefa nh\u01b0ng s\u1ebd ph\u1ea3i m\u1ea5t v\u00e0i n\u0103m tr\u01b0\u1edbc khi cung c\u00f3 th\u1ec3 \u0111\u00e1p \u1ee9ng \u0111\u01b0\u1ee3c c\u1ea7u.<\/p>\n<p>Thi\u1ebfu h\u1ee5t chuy\u00ean vi\u00ean an ninh m\u00e1y t\u00ednh kh\u00f4ng ch\u1ec9 x\u1ea3y ra \u1edf M\u0129 m\u00e0 c\u00f2n \u1edf ch\u00e2u \u00c2u, ch\u00e2u \u00c1 khi \u0110\u1ee9c, Ph\u00e1p, Anh, Italy, Nh\u1eadt B\u1ea3n v\u00e0 H\u00e0n Qu\u1ed1c c\u0169ng \u0111\u01b0\u1ee3c b\u00e1o c\u00e1o l\u00e0 \u0111ang r\u1ea5t kh\u00f3 kh\u0103n t\u00ecm \u0111\u01b0\u1ee3c ng\u01b0\u1eddi c\u00f3 ph\u1ea9m ch\u1ea5t. Ph\u1ea7n l\u1edbn vi\u1ec7c l\u00e0m an ninh y\u00eau c\u1ea7u b\u1eb1ng \u0111\u1ea1i h\u1ecdc v\u1ec1 khoa h\u1ecdc m\u00e1y t\u00ednh, k\u0129 ngh\u1ec7 ph\u1ea7n m\u1ec1m v\u1edbi c\u00e1c m\u00f4n h\u1ecdc th\u00eam v\u1ec1 \u0111a d\u1ea1ng c\u00f4ng ngh\u1ec7 m\u1ea1ng, nh\u01b0 TCP\/IP, Windows NT, v\u00e0 Unix. Sinh vi\u00ean c\u0169ng ph\u1ea3i c\u00f3 hi\u1ec3u bi\u1ebft th\u1ea5u \u0111\u00e1o v\u1ec1 l\u1eadp tr\u00ecnh m\u00e1y t\u00ednh, h\u1ec7 \u0111i\u1ec1u h\u00e0nh, v\u00e0 qu\u1ea3n l\u00ed r\u1ee7i ro. C\u00f3 c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh c\u00f3 ch\u1ee9ng ch\u1ec9 \u0111\u01b0\u1ee3c Li\u00ean \u0111o\u00e0n ch\u1ee9ng nh\u1eadn an ninh h\u1ec7 th\u1ed1ng qu\u1ed1c t\u1ebf c\u1ea5p, c\u00f3 t\u00ean l\u00e0 Nh\u00e0 chuy\u00ean nghi\u1ec7p an ninh h\u1ec7 th\u1ed1ng th\u00f4ng tin \u0111\u01b0\u1ee3c ch\u1ee9ng nh\u1eadn (CISSP) d\u00e0nh cho nh\u1eefng c\u00e1 nh\u00e2n qua \u0111\u01b0\u1ee3c k\u00ec thi v\u1ec1 th\u1ee7 t\u1ee5c an ninh m\u00e1y t\u00ednh.<\/p>\n<p>&nbsp;<\/p>\n<p>&#8212;-English version&#8212;-<\/p>\n<p>&nbsp;<\/p>\n<p>Computer Security<\/p>\n<p>There is an emergent software trend in every country due to high demand and low supply: Computer Security Specialist. As computer networks grow and more data is stored on computer, the need for skilled security specialists who can help organizations to control access to their computer networks and protect important data stored has becoming critical.<\/p>\n<p>Computer security specialists design and implement network control mechanisms that serve to control users&#8217; access to a computer network through such processes as firewalls and other means. They implement application access controls, such as password authentication, that keep unauthorized users from accessing computer network and set up programs that detect hackers who do intrude onto a system. Typically, computer security specialist also improve the security by communicate policies, procedures and techniques to users of the systems. They monitor who is using a computer network and keeping accurate and up-to-date backup files of all important data shared on a computer network<\/p>\n<p>Last year, eight students from CaliforniaStatePolytechnicUniversity, Pomona, spent six months practicing how to defend a typical business computer network from hacker attacks before entered a regional competition. They outscored teams from five other universities at blocking viruses, worms and other efforts to disrupt e-mail and Internet systems. For the six students, the victory was even sweeter because Boeing, the giant aerospace company immediately offered them jobs before they even graduate.<\/p>\n<p>Boeing&#8217;s decision to hire all graduates on the winning team shows how urgent the demand for computer-security experts has become, and helps explain why so many universities are scrambling to add courses in this field as today very few schools even teach network security. In fact, as attacks on computer systems increases, surveys show a serious shortage of skilled people to combat them. Banks, military, government and software companies, are looking for &#8220;cyber ninjas&#8221; to fend off a sophisticated array of hackers, from criminals stealing credit card numbers to potential military adversaries. According to several sources, there is a huge demand in this area but there are few professors who can teach this subject and there are not enough students specialize in this area. Top universities such as Carnegie Mellon, Purdue, Georgia Tech, and California State Poly are among universities with master&#8217;s programs in cyber security and they all have experienced significant enrollment in past years. Jeffrey M. Henbest, one of the Cal Poly students hired by Boeing, says cyber security is seen at his school &#8220;as the most technically demanding field, kind of like the \u201cfighter pilot\u201d of the information technology industry.&#8221;<\/p>\n<p>While there are thousands jobs are available now, government officials involved in cyber-security expect the number to grow rapidly into hundred thousands or more in the next few years. Even with the bad economy, there are thousand of jobs in computer security go unfilled due to lack of qualified people. The simple reason is the shortage of students interested in pursuing careers in engineering or science in the past ten years. In past years, many students were enrolling in business school with the hope of making more money before the financial crisis. Of course, today students are beginning to return to computer science and software engineering as many business students could not find works anymore but it will take several years before supply can meet the demand.<\/p>\n<p>The shortage of computer security specialist is not happen in the U.S but also in Europe, Asia as Germany, France, England, Italy, Japan, S. Korea also reported that it is very difficult to find qualified people. Most security jobs require a bachelor&#8217;s degree in computer science, software engineering with additional courses in a variety of networking technologies, such as TCP\/IP, Windows NT, and Unix. Students must also have a thorough understanding of computer programming, operating system, and risk management. There is a certificate program issues by the International Information Systems Security Certification Consortium, called Certified Information Systems Security Professional (CISSP) to individuals who pass an exam on computer security procedures.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>C\u00f3 m\u1ed9t xu h\u01b0\u1edbng ph\u1ea7n m\u1ec1m \u0111ang n\u1ed5i l\u00ean trong m\u1ecdi n\u01b0\u1edbc do nhu c\u1ea7u cao v\u00e0 cung c\u1ea5p th\u1ea5p: Chuy\u00ean vi\u00ean an ninh m\u00e1y &hellip; <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-2952","post","type-post","status-publish","format-standard","hentry","category-xu-huong-cong-nghe"],"_links":{"self":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/2952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2952"}],"version-history":[{"count":2,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/2952\/revisions"}],"predecessor-version":[{"id":2954,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/2952\/revisions\/2954"}],"wp:attachment":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}