	{"id":4332,"date":"2014-06-28T08:02:29","date_gmt":"2014-06-28T01:02:29","guid":{"rendered":"http:\/\/science-technology.vn\/?p=4332"},"modified":"2014-06-28T08:02:29","modified_gmt":"2014-06-28T01:02:29","slug":"an-ninh-may-tinh-2","status":"publish","type":"post","link":"https:\/\/science-technology.vn\/?p=4332","title":{"rendered":"An ninh m\u00e1y t\u00ednh"},"content":{"rendered":"<p><span style=\"font-size: 14px; line-height: 1.428571429;\">Ng\u00e0y nay an ninh m\u00e1y t\u00ednh l\u00e0 m\u1ed1i quan t\u00e2m ch\u00ednh tr\u00ean to\u00e0n th\u1ebf gi\u1edbi v\u00ec vi\u1ec7c hack v\u00e0 t\u1ea5n c\u00f4ng cyber l\u00e0 nh\u1eefng \u0111e do\u1ea1 l\u1edbn cho m\u1ecdi doanh nghi\u1ec7p v\u00e0 ng\u01b0\u1eddi d\u00f9ng. Kh\u00f4ng may l\u00e0 ph\u1ea7n l\u1edbn c\u00f4ng nh\u00e2n C\u00f4ng ngh\u1ec7 th\u00f4ng tin (CNTT) kh\u00f4ng \u0111\u01b0\u1ee3c \u0111\u00e0o t\u1ea1o \u0111\u1ec3 nh\u1eadn ra v\u00e0 ng\u0103n ng\u1eeba nh\u1eefng cu\u1ed9c t\u1ea5n c\u00f4ng n\u00e0y. Theo m\u1ed9t b\u00e1o c\u00e1o c\u00f4ng nghi\u1ec7p, c\u00f3 tr\u00ean 4 tri\u1ec7u cu\u1ed9c t\u1ea5n kh\u00f4ng cyber trong n\u0103m 2013 v\u00e0 n\u00f3 s\u1ebd t\u0103ng l\u00ean trong n\u0103m t\u1edbi. M\u1ed9t s\u1ed1 trong ch\u00fang t\u1edbi t\u1eeb nh\u1eefng ch\u00ednh ph\u1ee7 n\u00e0o \u0111\u00f3 l\u00e0m do th\u00e1m ch\u00ednh ph\u1ee7 kh\u00e1c, nh\u01b0ng nhi\u1ec1u cu\u1ed9c t\u1ea5n c\u00f4ng t\u1edbi t\u1eeb t\u1ed9i ph\u1ea1m c\u00f3 t\u1ed5 ch\u1ee9c v\u00e0 nh\u1eefng hacker ri\u00eang l\u1ebb, ng\u01b0\u1eddi th\u00edch \u0111\u00e1nh c\u1eafp th\u00f4ng tin t\u1eeb ng\u01b0\u1eddi d\u00f9ng.<\/span><\/p>\n<p>B\u1ea5t k\u1ec3 li\u1ec7u vi\u1ec7c hack t\u1edbi t\u1eeb \u0111\u00e2u, ph\u1ea7n l\u1edbn c\u00f4ng nh\u00e2n CNTT kh\u00f4ng c\u00f3 k\u0129 n\u0103ng an ninh \u0111\u1ec3 nh\u1eadn ra nh\u1eefng ch\u1ed7 mong manh c\u1ee7a h\u1ecd tr\u01b0\u1edbc khi qu\u00e1 tr\u1ec5. \u0110\u00f3 l\u00e0 l\u00ed do t\u1ea1i sao k\u0129 n\u0103ng an ninh m\u00e1y t\u00ednh \u0111\u01b0\u1ee3c c\u1ea7n v\u00e0 n\u00ean \u0111\u01b0\u1ee3c d\u1ea1y trong m\u1ecdi ch\u01b0\u01a1ng tr\u00ecnh CNTT. Ng\u00e0y nay k\u0129 n\u0103ng an ninh m\u00e1y t\u00ednh v\u00e0 Big data c\u00f3 nhu c\u1ea7u cao nh\u1ea5t v\u00e0 th\u01b0\u1eddng l\u00e0 vi\u1ec7c l\u00e0m tr\u1ea3 l\u01b0\u01a1ng cao nh\u1ea5t nh\u01b0ng \u00edt sinh vi\u00ean bi\u1ebft \u0111i\u1ec1u \u0111\u00f3. M\u1ed9t quan ch\u1ee9c \u0111i\u1ec1u h\u00e0nh gi\u1ea3i th\u00edch: \u201cSinh vi\u00ean kh\u00f4ng ch\u00fa \u00fd t\u1edbi nhu c\u1ea7u c\u00f4ng nghi\u1ec7p; h\u1ecd th\u01b0\u1eddng \u0111i t\u1edbi tr\u01b0\u1eddng v\u00e0 h\u1ecdc b\u1ea5t k\u00ec c\u00e1i g\u00ec tr\u01b0\u1eddng d\u1ea1y cho h\u1ecd m\u00e0 kh\u00f4ng bi\u1ebft r\u1eb1ng h\u1ecd ph\u1ea3i ph\u00e1t tri\u1ec3n chuy\u00ean m\u00f4n. Ph\u1ea7n l\u1edbn c\u00e1c tr\u01b0\u1eddng ch\u1ec9 d\u1ea1y c\u00e1c k\u0129 n\u0103ng chung nh\u01b0 l\u1eadp tr\u00ecnh hay ki\u1ec3m th\u1eed cho n\u00ean sinh vi\u00ean kh\u00f4ng c\u00f3 nh\u1eefng k\u0129 n\u0103ng \u0111\u1eb7c bi\u1ec7t m\u00e0 c\u00f4ng nghi\u1ec7p c\u1ea7n. N\u1ebfu t\u00f4i mu\u1ed1n thu\u00ea ng\u01b0\u1eddi l\u1eadp tr\u00ecnh m\u00e1y t\u00ednh, t\u00f4i c\u00f3 v\u00e0i ngh\u00ecn ng\u01b0\u1eddi \u0111\u1ec3 ch\u1ecdn nh\u01b0ng n\u1ebfu t\u00f4i mu\u1ed1n thu\u00ea m\u1ed9t chuy\u00ean vi\u00ean an ninh, t\u00f4i c\u00f3 th\u1ec3 ch\u1ec9 c\u00f3 v\u00e0i ng\u01b0\u1eddi \u0111\u1ec3 ch\u1ecdn. N\u1ebfu t\u00f4i kh\u00f4ng cung c\u1ea5p cho h\u1ecd l\u01b0\u01a1ng r\u1ea5t t\u1ed1t, ai \u0111\u00f3 s\u1ebd l\u00e0m vi\u1ec7c \u0111\u00f3 v\u00ec ch\u1ec9 c\u00f3 \u00edt ng\u01b0\u1eddi trong s\u1ed1 h\u1ecd. Tr\u00ean kh\u1eafp th\u1ebf gi\u1edbi c\u00f3 h\u00e0ng tri\u1ec7u ng\u01b0\u1eddi l\u1eadp tr\u00ecnh \u0111ang t\u00ecm c\u00f4ng vi\u1ec7c nh\u01b0ng ch\u1ec9 c\u00f3 v\u00e0i ngh\u00ecn chuy\u00ean vi\u00ean an ninh. V\u00ec c\u00f4ng ti c\u1ee7a t\u00f4i ph\u1ee5 thu\u1ed9c v\u00e0o CNTT, t\u00f4i kh\u00f4ng th\u1ec3 ch\u1ecbu \u0111\u01b0\u1ee3c vi\u1ec7c \u0111\u1ec3 cho hacker v\u00e0o \u0111\u00e1nh c\u1eafp th\u00f4ng tin v\u00e0 ph\u00e1 hu\u1ef7 kinh doanh c\u1ee7a t\u00f4i cho n\u00ean t\u00f4i s\u1eb5n l\u00f2ng tr\u1ea3 l\u01b0\u01a1ng cao nh\u1ea5t c\u00f3 th\u1ec3 \u0111\u1ec3 c\u00f3 \u0111\u01b0\u1ee3c c\u00e1c chuy\u00ean vi\u00ean an ninh.\u201d<\/p>\n<p>Do nhu c\u1ea7u cao n\u00e0y, g\u1ea7n \u0111\u00e2y v\u00e0i \u0111\u1ea1i h\u1ecdc \u0111\u00e3 b\u1eaft \u0111\u1ea7u \u0111\u00e0o t\u1ea1o trong an ninh m\u00e1y t\u00ednh v\u00e0 m\u1ed9t s\u1ed1 c\u00f4ng ti \u0111ang ph\u00e1t tri\u1ec3n\u00a0 ch\u01b0\u01a1ng tr\u00ecnh \u0111\u00e0o t\u1ea1o ri\u00eang c\u1ee7a h\u1ecd cho c\u00f4ng nh\u00e2n c\u1ee7a h\u1ecd. M\u1ecdi c\u00f4ng ti CNTT \u00edt nh\u1ea5t ph\u1ea3i hi\u1ec3u c\u00e1c c\u01a1 s\u1edf c\u1ee7a an ninh CNTT nh\u01b0 ph\u00f2ng th\u1ee7 v\u00f2ng ngo\u00e0i, x\u00e1c th\u1ef1c truy nh\u1eadp ng\u01b0\u1eddi d\u00f9ng, b\u1ea3n ch\u1ea5t c\u1ee7a \u0111e do\u1ea1 v\u00e0 c\u00f4ng c\u1ee5 c\u00e1c hacker th\u01b0\u1eddng d\u00f9ng. H\u1ecd c\u1ea7n bi\u1ebft \u0111\u1ee7 \u0111\u1ec3 nh\u1eadn ra s\u1ef1 \u0111a d\u1ea1ng r\u1ed9ng c\u00e1c v\u1ea5n \u0111\u1ec1 an ninh v\u00e0 hi\u1ec3u khi n\u00e0o c\u1ea7n t\u1edbi tri th\u1ee9c chuy\u00ean gia chuy\u00ean m\u00f4n. \u0110i\u1ec1u quan tr\u1ecdng l\u00e0 nh\u1eadn ra b\u1ea5t k\u00ec d\u1ea5u hi\u1ec7u c\u1ea3nh b\u00e1o n\u00e0o \u0111\u1ec3 ng\u0103n ng\u1eeba cu\u1ed9c t\u1ea5n c\u00f4ng nh\u01b0 c\u00e1c h\u00ecnh m\u1eabu \u0111\u00e1ng ng\u1edd. V\u00ec c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng cyber v\u00e0 \u0111e do\u1ea1 hack v\u1eabn ti\u1ebfp t\u1ee5c t\u0103ng tr\u01b0\u1edfng to\u00e0n th\u1ebf gi\u1edbi, m\u1ecdi c\u00f4ng ti s\u1ebd c\u1ea7n tri th\u1ee9c chuy\u00ean gia an ninh \u0111\u1ec3 ch\u1ed1ng l\u1ea1i nh\u1eefng m\u1ed1i \u0111e do\u1ea1 n\u00e0y v\u00e0 b\u1ea3o v\u1ec7 th\u00f4ng tin b\u00e2y gi\u1edd v\u00e0 trong t\u01b0\u01a1ng lai.<\/p>\n<p>&nbsp;<\/p>\n<p>&#8212;English version&#8212;<\/p>\n<p>&nbsp;<\/p>\n<p>Computer security<\/p>\n<p>Today computer security is a major concern worldwide as hackings and cyber-attacks are significant threats to all businesses and users. Unfortunately most Information Technology (IT) workers are not trained to recognize and prevent these attacks. According to the industry report, there were over 4 million cyber-attacks in 2013 and it will increase in the coming year. Some of them come from certain governments who spy on others, but many come from organized crimes and individual hackers who like to steal information from users.<\/p>\n<p>Regardless where the hacking comes from, most IT workers do not have the security skills to recognize their vulnerabilities before it is too late. That is why computer security skills are needed and should be taught in every IT programs. Today computer security and big data skills have the highest demand and often are the highest paying jobs but few students know that. An executive explains: \u201cStudents do not pay attention about industry needs; they routinely go to school and learn whatever the school teaches them without knowing that they must develop a specialty. Most schools only teach general skills such as programming or testing so students do not have the special skills that the industry needs. If I want to hire computer programmers, I have several thousand people to choose but if I want to hire security specialists, I may have only a few to select. If I do not offer them a very good salary, somebody will as there are only few of them. All over the world there are millions of programmers who are looking for work but only several thousand security specialists. Since my company depends on IT, I cannot afford to have hackers get in steal information and disrupt my business so I am willing to pay the highest salary possible to get security specialists.\u201d<\/p>\n<p>Due to this high demand, recently few universities have begun offering training in computer security and some companies are developing their own training programs for their workers. All IT workers must at least understand the basics of IT security such as perimeter defense, user access authentication the nature of threats and the tools hackers often use. They need to know enough to recognize a wide variety of security problems and understand when to call in specialized expertise. It is important to recognize any warning signs to prevent the attack such as suspicious patterns. As cyber-attacks and hacking threats continues to grow worldwide, every company will need security expertise to counter these threats and safeguard information now and into the future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ng\u00e0y nay an ninh m\u00e1y t\u00ednh l\u00e0 m\u1ed1i quan t\u00e2m ch\u00ednh tr\u00ean to\u00e0n th\u1ebf gi\u1edbi v\u00ec vi\u1ec7c hack v\u00e0 t\u1ea5n c\u00f4ng cyber l\u00e0 nh\u1eefng \u0111e &hellip; <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[],"class_list":["post-4332","post","type-post","status-publish","format-standard","hentry","category-loi-khuyen-cho-sinh-vien"],"_links":{"self":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/4332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4332"}],"version-history":[{"count":2,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/4332\/revisions"}],"predecessor-version":[{"id":4334,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/4332\/revisions\/4334"}],"wp:attachment":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}