	{"id":4387,"date":"2014-07-22T05:41:17","date_gmt":"2014-07-21T22:41:17","guid":{"rendered":"http:\/\/science-technology.vn\/?p=4387"},"modified":"2014-07-22T05:41:17","modified_gmt":"2014-07-21T22:41:17","slug":"nghe-nghiep-trong-an-ninh-may-tinh","status":"publish","type":"post","link":"https:\/\/science-technology.vn\/?p=4387","title":{"rendered":"Ngh\u1ec1 nghi\u1ec7p trong An ninh m\u00e1y t\u00ednh"},"content":{"rendered":"<p>Theo m\u1ed9t b\u00e1o c\u00e1o c\u00f4ng nghi\u1ec7p, an ninh m\u00e1y t\u00ednh l\u00e0 m\u1ed1i quan ng\u1ea1i h\u00e0ng \u0111\u1ea7u trong nh\u1eefng ng\u01b0\u1eddi \u0111i\u1ec1u h\u00e0nh c\u00f4ng ti v\u00ec s\u1ed1 s\u1ef1 c\u1ed1 an ninh \u0111\u00e3 t\u0103ng l\u00ean trong n\u0103m qua. Khi nhi\u1ec1u cu\u1ed9c t\u1ea5n c\u00f4ng cyber \u0111ang ph\u1ee9c t\u1ea1p l\u00ean, nhi\u1ec1u c\u00f4ng ti th\u1ea5y r\u1eb1ng h\u1ecd kh\u00f4ng th\u1ec3 n\u00e0o ph\u00e1t hi\u1ec7n v\u00e0 ph\u00f2ng th\u1ee7 ch\u1ed1ng l\u1ea1i c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng n\u00e0y. M\u1ed9t ng\u01b0\u1eddi ph\u00e2n t\u00edch c\u00f4ng nghi\u1ec7p gi\u1ea3i th\u00edch: \u201cNg\u00e0y nay t\u01b0\u1eddng l\u1eeda l\u00e0 KH\u00d4NG \u0111\u1ee7; ph\u1ea7n m\u1ec1m qu\u00e9t virus l\u00e0 KH\u00d4NG \u0111\u1ee7 m\u00e0 c\u00f4ng ti c\u1ea7n thi\u1ebft l\u1eadp m\u1ed9t nh\u00f3m an ninh t\u00edch c\u1ef1c \u0111\u1ec3 ph\u00f2ng ng\u1eeba c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng cyber. Kh\u00f4ng c\u00f3 n\u00f3, b\u1ea1n s\u1ebd g\u1eb7p kh\u00f3 kh\u0103n l\u00e0m kinh doanh v\u1edbi ng\u01b0\u1eddi kh\u00e1c v\u00ec n\u1ebfu h\u1ec7 th\u1ed1ng c\u1ee7a ch\u00fang ta \u0111\u01b0\u1ee3c k\u1ebft n\u1ed1i v\u1edbi h\u1ec7 th\u1ed1ng c\u1ee7a kh\u00e1ch h\u00e0ng v\u00e0 nh\u00e0 cung c\u1ea5p, m\u1ed9t s\u1ef1 c\u1ed1 an ninh trong h\u1ec7 th\u1ed1ng c\u1ee7a ch\u00fang ta c\u00f3 th\u1ec3 lan r\u1ed9ng t\u1edbi h\u1ecd v\u00e0 t\u1ea1o ra nhi\u1ec1u thi\u1ec7t h\u1ea1i h\u01a1n. Trong th\u1ebf gi\u1edbi \u0111\u01b0\u1ee3c k\u1ebft n\u1ed1i n\u00e0y, n\u1ebfu c\u00f4ng ti c\u1ee7a b\u1ea1n kh\u00f4ng th\u1ec3 \u0111\u1ea3m b\u1ea3o \u0111\u01b0\u1ee3c an to\u00e0n v\u00e0 t\u00edch h\u1ee3p m\u1ecdi giao t\u00e1c kinh doanh, kh\u00f4ng ai s\u1ebd l\u00e0m kinh doanh v\u1edbi b\u1ea1n.\u201d<\/p>\n<p>Ng\u00e0y nay c\u00e1c c\u00f4ng ti c\u1ea7n c\u00e1c chuy\u00ean vi\u00ean an ninh m\u00e1y t\u00ednh \u0111\u1ec3 ph\u00e1t tri\u1ec3n c\u00e1c gi\u1ea3i ph\u00e1p ph\u00f2ng ng\u1eeba c\u00e1c hacker kh\u1ecfi \u0111\u00e1nh c\u1eafp th\u00f4ng tin hay c\u00e0i ph\u1ea7n m\u1ec1m h\u1ea1i ph\u00e1 v\u1ee1 h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh. Theo b\u00e1o c\u00e1o n\u00e0y, nhu c\u1ea7u v\u1ec1 c\u00e1c chuy\u00ean vi\u00ean an ninh m\u00e1y t\u00ednh c\u00f3 th\u1ec3 t\u0103ng t\u1edbi 50,000 v\u1ecb tr\u00ed trong n\u0103m n\u0103m t\u1edbi. V\u00ec \u0111\u00e2y l\u00e0 v\u1ea5n \u0111\u1ec1 to\u00e0n c\u1ea7u v\u1edbi nhu c\u1ea7u kh\u1ea9n thi\u1ebft nh\u01b0ng c\u00f3 ngu\u1ed3n c\u1ea5p gi\u1edbi h\u1ea1n v\u1ec1 c\u00e1c \u1ee9ng c\u1eed vi\u00ean, c\u00e1c c\u00f4ng ti to\u00e0n c\u1ea7u \u0111ang \u0111\u1eb7t v\u1ecb tr\u00ed n\u00e0y th\u00e0nh &#8220;ph\u1ea3i c\u00f3&#8221; b\u1ea5t k\u1ec3 t\u1edbi l\u01b0\u01a1ng. V\u1ec1 c\u0103n b\u1ea3n, c\u00e1c chuy\u00ean vi\u00ean an ninh l\u1eadp k\u1ebf ho\u1ea1ch v\u00e0 th\u1ef1c hi\u1ec7n c\u00e1c bi\u1ec7n ph\u00e1p an ninh \u0111\u1ec3 b\u1ea3o v\u1ec7 h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh. H\u1ecd ph\u00e2n t\u00edch h\u1ec7 th\u1ed1ng v\u00e0 \u1ee9ng d\u1ee5ng v\u00e0 ph\u00e1t tri\u1ec3n nh\u1eefng c\u00e1ch n\u00e0o \u0111\u00f3 \u0111\u1ec3 b\u1ea3o v\u1ec7 th\u00f4ng tin ch\u1ed1ng l\u1ea1i vi\u1ec7c thay \u0111\u1ed5i d\u1eef li\u1ec7u kh\u00f4ng c\u00f3 th\u1ea9m quy\u1ec1n hay b\u1ecb m\u1ea5t. H\u1ecd l\u00e0m vi\u1ec7c v\u1edbi c\u00e1c chuy\u00ean vi\u00ean m\u1ea1ng \u0111\u1ec3 ki\u1ec3m so\u00e1t truy nh\u1eadp, ph\u00e1t hi\u1ec7n v\u00e0 ng\u0103n ng\u1eeba x\u00e2m nh\u1eadp, b\u1ea3o v\u1ec7 h\u1ec7 th\u1ed1ng ch\u1ed1ng l\u1ea1i c\u00e1c virus v\u00e0 c\u00e1c ph\u1ea7n m\u1ec1m h\u1ea1i kh\u00e1c, ch\u1ea5p thu\u1eadn vi\u1ec7c thi\u1ebft \u0111\u1eb7t t\u01b0\u1eddng l\u1eeda, VPN, b\u1ed9 \u0111\u1ecbnh tuy\u1ebfn, c\u00e1c c\u00f4ng ngh\u1ec7 v\u00e0 m\u00e1y ph\u1ee5c v\u1ee5 qu\u00e9t IDS; ti\u1ebfn h\u00e0nh ki\u1ec3m \u0111\u1ecbnh an ninh, \u0111\u00e1p \u1ee9ng cho s\u1ef1 c\u1ed1 an ninh, ph\u00e1t tri\u1ec3n v\u00e0 th\u1ef1c hi\u1ec7n c\u00e1c ch\u00ednh s\u00e1ch v\u00e0 th\u1ee7 t\u1ee5c an ninh. H\u1ecd c\u0169ng cung c\u1ea5p nh\u1eadn bi\u1ebft an ninh v\u00e0 gi\u00e1o d\u1ee5c c\u00f4ng nh\u00e2n v\u1ec1 ch\u00ednh s\u00e1ch, th\u1ee7 t\u1ee5c v\u00e0 th\u1ef1c h\u00e0nh an ninh.<\/p>\n<p>M\u1ed9t chuy\u00ean vi\u00ean an ninh n\u00f3i v\u1edbi b\u00e1o ch\u00ed: \u201cV\u00ec c\u00e1c chuy\u00ean vi\u00ean an ninh ch\u1ecbu tr\u00e1ch nhi\u1ec7m duy tr\u00ec an ninh c\u1ee7a h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh, h\u1ecd ph\u1ea3i ngh\u0129 nh\u01b0 m\u1ed9t hacker s\u1ebd l\u00e0m, h\u1ecd ph\u1ea3i \u0111o\u00e1n tr\u01b0\u1edbc m\u1ecdi n\u01b0\u1edbc \u0111i v\u00e0 chi\u1ebfn thu\u1eadt m\u00e0 hacker d\u00f9ng \u0111\u1ec3 chi\u1ebfm quy\u1ec1n truy nh\u1eadp kh\u00f4ng th\u1ea9m quy\u1ec1n v\u00e0o h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh. Vi\u1ec7c l\u00e0m n\u00e0y y\u00eau c\u1ea7u nhi\u1ec1u kinh nghi\u1ec7m \u0111\u1ec3 b\u1eaft nh\u1eefng k\u1ebb t\u1ed9i ph\u1ea1m v\u00ec h\u1ecd ph\u1ea3i \u0111i tr\u01b0\u1edbc c\u00e1c t\u1ed9i ph\u1ea1m m\u1ed9t hai b\u01b0\u1edbc. \u0110i\u1ec1u \u0111\u00f3 l\u00e0 kh\u00f4ng d\u1ec5 b\u1edfi v\u00ec b\u1ea1n ph\u1ea3i y\u00eau th\u00edch nh\u00ecn v\u00e0o m\u00e3 v\u00e0 vi\u1ebft m\u00e3 nh\u01b0ng l\u01b0\u01a1ng th\u00ec tuy\u1ec7t v\u1eddi, ph\u1ea7n l\u1edbn c\u00e1c chuy\u00ean vi\u00ean \u0111\u01b0\u1ee3c tr\u1ea3 g\u1ea5p \u0111\u00f4i so v\u1edbi ng\u01b0\u1eddi l\u1eadp tr\u00ecnh v\u00e0 \u0111\u00f3 l\u00e0 l\u00ed do t\u1ea1i sao nhi\u1ec1u chuy\u00ean vi\u00ean an ninh l\u00e0 &#8220;c\u1ef1u hacker\u201d, v\u00ec h\u1ecd hi\u1ec3u c\u00e1ch c\u00e1c hackers v\u1eadn h\u00e0nh. Thay v\u00ec ch\u1ecdc v\u00e0o h\u1ec7 th\u1ed1ng cho vui b\u00e2y gi\u1edd h\u1ecd ng\u0103n c\u1ea3n nh\u1eefng ng\u01b0\u1eddi kh\u00e1c kh\u1ecfi l\u00e0m \u0111i\u1ec1u \u0111\u00f3 v\u00e0 \u0111\u01b0\u1ee3c tr\u1ea3 ti\u1ec1n.\u201d Nhi\u1ec1u chuy\u00ean vi\u00ean an ninh b\u1eaft \u0111\u1ea7u ngh\u1ec1 c\u1ee7a h\u1ecd l\u00e0 ng\u01b0\u1eddi l\u1eadp tr\u00ecnh hay chuy\u00ean vi\u00ean m\u1ea1ng v\u00ec nh\u1eefng vi\u1ec7c l\u00e0m n\u00e0y cung c\u1ea5p \u0111\u00e0o t\u1ea1o c\u1ea7n thi\u1ebft \u0111\u1ec3 tr\u1edf n\u00ean quen thu\u1ed9c v\u1edbi h\u1ec7 th\u1ed1ng m\u1ea1ng, an ninh v\u00e0 gi\u1ea3i quy\u1ebft v\u1ea5n \u0111\u1ec1. Nhi\u1ec1u ng\u01b0\u1eddi h\u1ecdc c\u00e1c l\u1edbp an ninh b\u1ed5 sung v\u00e0 nh\u1eadn \u0111\u01b0\u1ee3c ch\u1ee9ng nh\u1eadn cho vi\u1ec7c l\u00e0m chuy\u00ean m\u00f4n, h\u1ecd c\u00f3 th\u1ec3 b\u1eaft \u0111\u1ea7u \u1edf v\u1ecb tr\u1ecb an ninh m\u1ee9c v\u00e0o ngh\u1ec1 \u0111\u1ec3 gi\u00e1m s\u00e1t v\u00e0 ph\u00e2n t\u00edch th\u00f4ng tin, v\u1edbi nhi\u1ec1u kinh nghi\u1ec7m h\u01a1n h\u1ecd c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c tham gia v\u00e0o c\u00f4ng vi\u1ec7c \u0111i\u1ec1u tra \u0111\u1ec3 x\u00e1c \u0111\u1ecbnh li\u1ec7u vi\u1ec7c vi ph\u1ea1m an ninh \u0111\u00e3 xu\u1ea5t hi\u1ec7n ch\u01b0a.<\/p>\n<p>M\u1ed9t nh\u00e0 ph\u00e2n t\u00edch c\u00f4ng nghi\u1ec7p vi\u1ebft: \u201cNhu c\u1ea7u v\u1ec1 ng\u01b0\u1eddi l\u00e0m an ninh th\u00f4ng tin s\u1ebd l\u00e0 cao v\u00ec ng\u00e0y nay kh\u00f4ng ch\u1ec9 hacker c\u1ed1 truy nh\u1eadp v\u00e0o m\u00e1y t\u00ednh hay t\u1ed9i ph\u1ea1m c\u00f3 t\u1ed5 ch\u1ee9c c\u1ed1 \u0111\u00e1nh c\u1eafp th\u00f4ng tin m\u00e0 c\u1ea3 gi\u00e1n \u0111i\u1ec7p c\u1ee7a c\u00e1c n\u01b0\u1edbc kh\u00e1c c\u0169ng c\u1ed1 t\u00ecm c\u00e1ch ph\u00e1 ho\u1ea1i h\u1ec7 th\u1ed1ng m\u1ea5u ch\u1ed1t c\u1ee7a n\u01b0\u1edbc kh\u00e1c. Th\u00eam v\u00e0o \u0111\u00f3, nhi\u1ec1u c\u00f4ng ti \u0111ang l\u00e0m kinh doanh qua internet, nhi\u1ec1u ng\u01b0\u1eddi \u0111ang d\u00f9ng \u0111i\u1ec7n tho\u1ea1i th\u00f4ng minh v\u00e0 m\u00e1y t\u00ednh b\u1ea3ng, nhi\u1ec1u ng\u01b0\u1eddi \u0111ang mua v\u00e0 b\u00e1n tr\u1ef1c tuy\u1ebfn, c\u00f4ng nghi\u1ec7p ch\u0103m s\u00f3c s\u1ee9c kho\u1ebb \u0111ang d\u00f9ng c\u00e1c y b\u1ea1 \u0111i\u1ec7n t\u1eed, c\u00e1c c\u00f4ng ti t\u00e0i ch\u00ednh \u0111ang bu\u00f4n b\u00e1n ch\u1ee9ng kho\u00e1n v\u00e0 chuy\u1ec3n ti\u1ec1n v.v cho n\u00ean nhi\u1ec1u ng\u01b0\u1eddi l\u00e0m v\u1ec1 an ninh th\u00f4ng tin s\u1ebd \u0111\u01b0\u1ee3c c\u1ea7n \u0111\u1ec3 b\u1ea3o v\u1ec7 cho n\u1ec1n kinh t\u1ebf s\u1ed1 n\u00e0y. V\u1ec1 c\u0103n b\u1ea3n, m\u1ecdi c\u00f4ng ti, m\u1ecdi ch\u00ednh ph\u1ee7, m\u1ecdi b\u1ec7nh vi\u1ec7n, m\u1ecdi c\u00f4ng ti t\u00e0i ch\u00ednh s\u1ebd c\u1ea7n c\u00e1c chuy\u00ean vi\u00ean an ninh m\u00e1y t\u00ednh.<\/p>\n<p>Theo b\u00e1o c\u00e1o c\u00f4ng nghi\u1ec7p, b\u1eb1ng c\u1eed nh\u00e2n trong khoa h\u1ecdc m\u00e1y t\u00ednh, k\u0129 ngh\u1ec7 ph\u1ea7n m\u1ec1m, qu\u1ea3n l\u00ed h\u1ec7 th\u00f4ng tin, hay an ninh th\u00f4ng tin l\u00e0 y\u00eau c\u1ea7u t\u1ed1i thi\u1ec3u cho vi\u1ec7c l\u00e0m n\u00e0y. Nhi\u1ec1u c\u00f4ng ti c\u0169ng y\u00eau c\u1ea7u c\u00e1c \u1ee9ng c\u1eed vi\u00ean c\u00f3 ch\u1ee9ng ch\u1ec9 an ninh chuy\u00ean s\u00e2u nh\u01b0 Certified Information Systems Security Professional (CISSP), Certified Network Security Professional (CNSP) v\u00e0 Certified Hacking Forensics Investigator (CHFI). S\u1edf Lao \u0111\u1ed9ng M\u0129 b\u00e1o c\u00e1o r\u1eb1ng c\u00e1i nh\u00ecn chung v\u1ec1 vi\u1ec7c l\u00e0m cho chuy\u00ean vi\u00ean an ninh \u0111\u01b0\u1ee3c mong \u0111\u1ee3i t\u0103ng l\u00ean qu\u00e3ng 30 ph\u1ea7n tr\u0103m cho t\u1edbi n\u0103m 2025 v\u00ec nhu c\u1ea7u v\u1ec1 ng\u01b0\u1eddi c\u00f3 k\u0129 n\u0103ng an ninh t\u0103ng l\u00ean. L\u01b0\u01a1ng trung b\u00ecnh cho m\u1ed9t chuy\u00ean vi\u00ean an ninh th\u00f4ng tin l\u00e0 $126,000 m\u1ed9t n\u0103m \u1edf M\u0129. Nh\u01b0ng c\u00e1c c\u00f4ng ti to\u00e0n c\u1ea7u tr\u1ea3 nhi\u1ec1u h\u01a1n v\u00ec vi\u1ec7c l\u00e0m n\u00e0y y\u00eau c\u1ea7u nhi\u1ec1u \u0111i l\u1ea1i. C\u00e1c c\u00f4ng ti to\u00e0n c\u1ea7u c\u00f3 v\u0103n ph\u00f2ng v\u00e0 h\u1ec7 th\u1ed1ng \u1edf kh\u1eafp th\u1ebf gi\u1edbi v\u00e0 h\u1ecd mong manh h\u01a1n cho c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng. M\u1ed9t chuy\u00ean vi\u00ean an ninh to\u00e0n c\u1ea7u ng\u01b0\u1eddi s\u1eb5n l\u00f2ng du h\u00e0nh v\u00e0 l\u00e0m vi\u1ec7c \u1edf b\u1ea5t k\u00ec \u0111\u00e2u c\u00f3 th\u1ec3 l\u00e0m \u0111\u01b0\u1ee3c gi\u1eefa $180,000 t\u1edbi $250,000 m\u1ed9t n\u0103m.<\/p>\n<p>&nbsp;<\/p>\n<p>&#8212;English version&#8212;<\/p>\n<p>&nbsp;<\/p>\n<p>Careers in Computer Security<\/p>\n<p>According to an industry report, computer security is the top concerns among company executives as the numbers of security incidents have increased in the past year. As more cyber-attacks are getting sophisticated, many companies find that they are unable to detect and defense against these attacks. An industry analyst explained: \u201cToday firewall is NOT enough; virus scan software is NOT enough but company must establish an active security group to prevent cyber-attacks. Without it, you will have difficulty to do business with others because if your system is connected to customers and suppliers systems, a security incident in your system can spread to them and creates more damages. In this connected world, if your company cannot ensure the safety and integrity of all business transactions, no one would do business with you.\u201d<\/p>\n<p>Today companies need computer security specialists to develop solutions to prevent hackers from stealing information or install malwares that disrupt the computer networks. According to the report, the need for security specialist could grow to 50,000 positions in the next five years. Since this is a global problems with urgent demand but has limited supply of candidates, global companies are putting this position as \u201cMust have\u201d regardless of salary. Basically, security specialists plan and implement security measures to protect computer systems. They analyze systems and applications and develop certain ways to protect information against unauthorized data modification or loss. They works with network specialists to control access, detect and prevent intrusion, protect systems against virus and other malwares, approve installation of firewall, VPN, routers, IDS scanning technologies and servers; conduct security audit, respond to security incidents development and implement security policies and procedures. They also provide security awareness and educating workers on security policies, procedures and practices.<\/p>\n<p>A security specialist told the newspapers: \u201cBecause security specialists are responsible for maintaining the security of a computer system, they must think like a hacker would, they must anticipate every moves and tactics that hackers use to gain unauthorized access to computer systems. This job requires a lot of experiences to catch these criminals as they must be at least one or two steps ahead of criminals. It is not easy because you must love to look at code and write code but the salary is wonderful, most security specialist get paid twice more than programmers and that is why many security specialists are \u201cformer hackers\u201d, since they understand how the hackers operate. Instead of hacking for fun now they are preventing others from doing it and get paid. \u201d Many security specialists begin their careers as Programmers or Network specialists since these job provides the training necessary to become familiar with network systems, security and problem solving. Many took additional security classes and receive certificated for specific jobs, they could begin in an entry-level security position to monitor and analyze information, with more experience they could be engaged in investigative work to determine whether a security breach has occurred.<\/p>\n<p>An industry analyst wrote: \u201cDemand for information security people will be high because today it is not just hackers try to access computers or organized crimes try to steal information but also other countries\u2019 spies try to find ways to sabotage another country\u2019s critical systems. In addition, more companies are doing business over the internet, more people are using smartphones and tablets, more people are buying and selling online, healthcare industry are using electronic medical records, financial companies are trading stocks and transferring money etc. so more information security people will be needed to safeguard this digital economy. Basically, every company, every government, every hospital, every financial company will need computer security specialists.<\/p>\n<p>According to the industry report, a bachelor&#8217;s degree in computer science, software engineering, information system management, or information security is the minimum requirement for this job. Many companies also require candidates to have advanced security certifications such as Certified Information Systems Security Professional (CISSP), Certified Network Security Professional (CNSP) and Certified Hacking Forensics Investigator (CHFI). The U.S Bureau of Labor Statistics reports that the employment outlook for security specialists is expected to grow about 30 percent through the year 2025 as the need for people with security skills increases. The average pay for an information security specialist is $126,000 per year in the U.S. But global companies pay more since the job requires a lot of travel. Global companies have offices and systems located all over the world and they are more vulnerable for attacks. A global company security specialist who is willing to travel and work anywhere could make between $180,000 to $250,000 a year.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Theo m\u1ed9t b\u00e1o c\u00e1o c\u00f4ng nghi\u1ec7p, an ninh m\u00e1y t\u00ednh l\u00e0 m\u1ed1i quan ng\u1ea1i h\u00e0ng \u0111\u1ea7u trong nh\u1eefng ng\u01b0\u1eddi \u0111i\u1ec1u h\u00e0nh c\u00f4ng ti v\u00ec s\u1ed1 &hellip; <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-4387","post","type-post","status-publish","format-standard","hentry","category-xu-huong-cong-nghe"],"_links":{"self":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/4387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4387"}],"version-history":[{"count":1,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/4387\/revisions"}],"predecessor-version":[{"id":4388,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/4387\/revisions\/4388"}],"wp:attachment":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}