	{"id":6082,"date":"2018-10-30T10:39:04","date_gmt":"2018-10-30T03:39:04","guid":{"rendered":"http:\/\/science-technology.vn\/?p=6082"},"modified":"2018-10-30T10:39:04","modified_gmt":"2018-10-30T03:39:04","slug":"viec-lam-an-ninh-cyber","status":"publish","type":"post","link":"https:\/\/science-technology.vn\/?p=6082","title":{"rendered":"Vi\u1ec7c l\u00e0m an ninh cyber"},"content":{"rendered":"<p>M\u1ed9t sinh vi\u00ean Khoa h\u1ecdc m\u00e1y t\u00ednh n\u0103m th\u1ee9 nh\u1ea5t h\u1ecfi: \u201cEm c\u1ea7n l\u00e0m g\u00ec \u0111\u1ec3 tr\u1edf th\u00e0nh chuy\u00ean gia an ninh cyber th\u00e0nh c\u00f4ng? Em c\u00f3 th\u1ec3 l\u00e0m \u0111\u01b0\u1ee3c bao nhi\u00eau ti\u1ec1n \u1edf m\u1ee9c m\u1edbi v\u00e0o ngh\u1ec1? Ngh\u1ec1 nghi\u1ec7p c\u1ee7a ng\u01b0\u1eddi an ninh cyber l\u00e0 g\u00ec? Xin th\u1ea7y l\u1eddi khuy\u00ean.\u201d<\/p>\n<p>&nbsp;<\/p>\n<p>\u0110\u00e1p: An ninh cyber l\u00e0 m\u1ed9t trong nh\u1eefng ngh\u1ec1 nghi\u1ec7p t\u0103ng tr\u01b0\u1edfng nhanh nh\u1ea5t v\u1edbi nhu c\u1ea7u c\u1ef1c k\u00ec cao tr\u00ean kh\u1eafp th\u1ebf gi\u1edbi.\u00a0 Theo S\u1edf th\u1ed1ng k\u00ea lao \u0111\u1ed9ng M\u0129 (2017), \u00a0ng\u01b0\u1eddi chuy\u00ean nghi\u1ec7p an ninh Cyber c\u00f3 th\u1ec3 l\u00e0m \u0111\u01b0\u1ee3c gi\u1eefa $116,000 t\u1edbi $125,000 \u0111\u00f4 la \u1edf v\u1ecb tr\u00ed m\u1ee9c v\u00e0o ngh\u1ec1, v\u00e0 nhi\u1ec1u h\u01a1n n\u1eefa khi h\u1ecd c\u00f3 kinh nghi\u1ec7m. \u0110\u00f3 l\u00e0 m\u1ed9t trong nh\u1eefng l\u01b0\u01a1ng cao nh\u1ea5t trong nh\u1eefng ng\u01b0\u1eddi t\u1ed1t nghi\u1ec7p \u0111\u1ea1i h\u1ecdc.<\/p>\n<p>Ph\u1ea7n l\u1edbn c\u00e1c ch\u1ee9c v\u1ee5 trong an ninh cyber \u0111\u1ec1u y\u00eau c\u1ea7u b\u1eb1ng c\u1eed nh\u00e2n 4 n\u0103m trong Khoa h\u1ecdc m\u00e1y t\u00ednh, Qu\u1ea3n l\u00ed h\u1ec7 th\u1ed1ng th\u00f4ng tin, hay K\u0129 ngh\u1ec7 m\u00e1y t\u00ednh. Ph\u1ea7n l\u1edbn nh\u1eefng ng\u01b0\u1eddi t\u1ed1t nghi\u1ec7p \u0111\u1ec1u b\u1eaft \u0111\u1ea7u l\u00e0 k\u0129 s\u01b0 an ninh th\u00f4ng tin m\u1ee9c v\u00e0o ngh\u1ec1, sau ba t\u1edbi n\u0103m n\u0103m, m\u1ed9t s\u1ed1 ng\u01b0\u1eddi chuy\u1ec3n l\u00e0 l\u00e0m ng\u01b0\u1eddi ph\u00e2n t\u00edch an ninh, r\u1ed3i ng\u01b0\u1eddi l\u00e3nh \u0111\u1ea1o an ninh, v\u00e0 chung cu\u1ed9c l\u00ean t\u1edbi gi\u00e1m \u0111\u1ed1c an ninh th\u00f4ng tin.<\/p>\n<p>Ng\u01b0\u1eddi chuy\u00ean nghi\u1ec7p an ninh cyber th\u1ef1c hi\u1ec7n v\u00e0 gi\u00e1m s\u00e1t c\u00e1c bi\u1ec7n ph\u00e1p an ninh \u0111\u1ec3 b\u1ea3o v\u1ec7 h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng v\u00e0 truy nh\u1eadp kh\u00f4ng th\u1ea9m quy\u1ec1n. Kh\u00f4ng c\u00f3 nhi\u1ec1u tr\u01b0\u1eddng d\u1ea1y l\u0129nh v\u1ef1c n\u00e0y v\u00ec n\u00f3 \u0111ang thay \u0111\u1ed5i nhanh ch\u00f3ng do b\u1ea3n ch\u1ea5t c\u1ee7a c\u00f4ng vi\u1ec7c, nh\u01b0ng c\u00f3 nhi\u1ec1u m\u00f4n h\u1ecdc tr\u1ef1c tuy\u1ebfn xu\u1ea5t s\u1eafc t\u1ea1i Coursera v\u00e0 edX v\u1ec1 l\u0129nh v\u1ef1c n\u00e0y. C\u00f3 nhi\u1ec1u \u0111\u00e0o t\u1ea1o an ninh cyber d\u1eabn t\u1edbi ch\u1ee9ng ch\u1ec9 nh\u01b0 C\u00e1c n\u1ec1n t\u1ea3ng an ninh MTA (Microsoft); Qu\u1ea3n l\u00ed an ninh th\u00f4ng tin c\u00f3 ch\u1ee9ng ch\u1ec9 (CISM); Ki\u1ec3m \u0111\u1ecbnh h\u1ec7 th\u1ed1ng an ninh c\u00f3 ch\u1ee9ng ch\u1ec9 (CISA); Chuy\u00ean nghi\u1ec7p an ninh h\u1ec7 th\u1ed1ng th\u00f4ng tin c\u00f3 ch\u1ee9ng ch\u1ec9 (CISSP); ch\u1ee9ng ch\u1ec9 an ninh CompTIA; v\u00e0 An ninh th\u00f4ng tin GIAC v.v.<\/p>\n<p>Tr\u01b0\u1edbc khi h\u1ecdc c\u00e1c m\u00f4n n\u00e0y, em c\u1ea7n bi\u1ebft C v\u00e0 C++ v\u00ec nh\u1eefng ng\u00f4n ng\u1eef n\u00e0y cung c\u1ea5p truy nh\u1eadp v\u00e0o k\u1ebft c\u1ea5u n\u1ec1n m\u1ee9c th\u1ea5p nh\u01b0 RAM v\u00e0 c\u00e1c qui tr\u00ecnh h\u1ec7 th\u1ed1ng, \u0111i\u1ec1u kh\u00f4ng \u0111\u01b0\u1ee3c b\u1ea3o v\u1ec7 t\u1ed1t, c\u00e1c hackers c\u00f3 th\u1ec3 d\u1ec5 d\u00e0ng khai th\u00e1c. Ng\u00f4n ng\u1eef l\u1eadp tr\u00ecnh C l\u00e0 l\u00f5i cho h\u1ea7u h\u1ebft c\u00e1c h\u1ec7 \u0111i\u1ec1u h\u00e0nh. N\u00f3 l\u00e0 ng\u00f4n ng\u1eef hi\u1ec7u qu\u1ea3 m\u00e0 c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c d\u00f9ng \u0111\u1ec3 ho\u00e0n th\u00e0nh mi\u1ec1n r\u1ed9ng c\u00e1c nhi\u1ec7m v\u1ee5 nh\u01b0 m\u1eadt m\u00e3 ho\u00e1, x\u1eed l\u00ed \u1ea3nh, v\u00e0 k\u1ebft m\u1ea1ng socket. C++ l\u00e0 ng\u00f4n ng\u1eef h\u01b0\u1edbng \u0111\u1ed1i t\u01b0\u1ee3ng d\u1ef1a tr\u00ean nhi\u1ec1u m\u00e3 C. H\u1ec7 th\u1ed1ng Nmap an ninh cyber ph\u1ed5 bi\u1ebfn, m\u1ed9t c\u00f4ng c\u1ee5 \u00e1nh x\u1ea1 m\u1ea1ng \u0111\u01b0\u1ee3c vi\u1ebft trong C++. N\u1ebfu em gi\u1ecfi trong C v\u00e0 C++, em s\u1ebd bi\u1ebft c\u00e1ch \u0111\u00e1p \u1ee9ng v\u1edbi c\u00e1c t\u1ea5n c\u00f4ng nh\u1eafm v\u00e0o k\u1ebft c\u1ea5u n\u1ec1n m\u1ee9c th\u1ea5p h\u01a1n c\u1ee7a h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh.<\/p>\n<p>Ng\u00f4n ng\u1eef l\u1eadp tr\u00ecnh ph\u1ed5 bi\u1ebfn kh\u00e1c \u0111\u01b0\u1ee3c d\u00f9ng r\u1ed9ng r\u00e3i trong c\u00e1c nh\u00e0 chuy\u00ean nghi\u1ec7p an ninh cyber l\u00e0 Python. N\u00f3 l\u00e0 ph\u1ed5 bi\u1ebfn v\u00ec Python l\u00e0 r\u00f5 r\u00e0ng, \u0111\u01a1n gi\u1ea3n, v\u00e0 s\u1eb5n c\u00f3 r\u1ed9ng r\u00e3i \u0111\u1ec3 th\u1ef1c hi\u1ec7n ph\u00e2n t\u00edch ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i v\u00e0 t\u1ea1o ra h\u1ec7 th\u1ed1ng ph\u00e1t hi\u1ec7n x\u00e2m nh\u1eadp. Tuy nhi\u00ean, Python l\u00e0 ng\u00f4n ng\u1eef m\u1ee9c cao, n\u00f3 s\u1ebd kh\u00f4ng cung c\u1ea5p \u0111\u1ee7 t\u00ednh th\u1ea5y \u0111\u01b0\u1ee3c cho c\u00e1c t\u00e0i nguy\u00ean ph\u1ea7n c\u1ee9ng nh\u01b0 C v\u00e0 C++ cho n\u00ean em c\u1ea7n bi\u1ebft c\u1ea3 ba ng\u00f4n ng\u1eef n\u00e0y \u0111\u1ec3 l\u00e0m c\u00f4ng vi\u1ec7c t\u1ed1t.<\/p>\n<p>Ng\u00f4n ng\u1eef l\u1eadp tr\u00ecnh m\u1ee9c cao kh\u00e1c th\u01b0\u1eddng \u0111\u01b0\u1ee3c d\u00f9ng trong web l\u00e0 JavaScript. N\u00f3 l\u00e0 ng\u00f4n ng\u1eef ph\u1ed5 bi\u1ebfn nh\u1ea5t c\u00f3 th\u1ec3 t\u01b0\u01a1ng t\u00e1c v\u1edbi trang web. V\u00ec vi\u1ec7c d\u00f9ng nhi\u1ec1u c\u1ee7a n\u00f3 l\u00e0 trong c\u00e1c websites, vi\u1ec7c bi\u1ebft JavaScript s\u1ebd cho ph\u00e9p em bi\u1ebft c\u00e1ch websites v\u00e0 c\u00e1c \u1ee9ng d\u1ee5ng kh\u00e1c l\u00e0m vi\u1ec7c cho n\u00ean em c\u00f3 th\u1ec3 qu\u1ea3n l\u00ed v\u00e0 ng\u0103n ng\u1eeba nh\u1eefng cu\u1ed9c t\u1ea5n c\u00f4ng hi\u1ec3m \u00e1c nh\u01b0 \u201ccross-site scripting\u201d cu\u1ed9c t\u1ea5n c\u00f4ng d\u1ef1a tr\u00ean JavaScript c\u00f3 bao g\u1ed3m vi\u1ec7c k\u1ebb t\u1ea5n c\u00f4ng c\u00e0i m\u00e3 \u0111\u1ed9c v\u00e0o trong \u1ee9ng d\u1ee5ng web.<\/p>\n<p>V\u00ec ph\u1ea7n l\u1edbn c\u00e1c websites \u0111\u01b0\u1ee3c t\u1ea1o ra b\u1eb1ng vi\u1ec7c d\u00f9ng PHP, bi\u1ebft ng\u00f4n ng\u1eef n\u00e0y s\u1ebd cho ph\u00e9p em bi\u1ebft c\u00e1ch ph\u00f2ng th\u1ee7 ch\u1ed1ng l\u1ea1i k\u1ebb x\u00e2m nh\u1eadp. Nhi\u1ec1u cu\u1ed9c t\u1ea5n c\u00f4ng DDoS (T\u1eeb ch\u1ed1i d\u1ecbch v\u1ee5) th\u01b0\u1eddng c\u1ed1 l\u00e0m cho \u1ee9ng d\u1ee5ng web th\u00e0nh kh\u00f4ng s\u1eb5n c\u00f3 v\u1edbi ng\u01b0\u1eddi d\u00f9ng \u0111\u01b0\u1ee3c ch\u1ee7 \u0111\u1ecbnh. Bi\u1ebft c\u1ea3 PHP v\u00e0 JavaScript, em c\u00f3 th\u1ec3 th\u1ef1c hi\u1ec7n c\u00e1c gi\u1ea3i ph\u00e1p \u0111\u1ec3 gi\u00fap gi\u1eef an ninh c\u00e1c \u1ee9ng d\u1ee5ng web.<\/p>\n<p>\u0110\u00e2y l\u00e0 nh\u1eefng ng\u00f4n ng\u1eef l\u1eadp tr\u00ecnh ph\u1ed5 bi\u1ebft m\u00e0 nh\u00e0 chuy\u00ean nghi\u1ec7p an ninh cyber c\u1ea7n bi\u1ebft, nh\u01b0ng t\u00f4i ch\u1eafc c\u00f3 nhi\u1ec1u ng\u00f4n ng\u1eef m\u1edbi \u0111\u01b0\u1ee3c t\u1ea1o ra v\u00e0 c\u00e1c hackers bao gi\u1edd c\u0169ng d\u00f9ng k\u0129 thu\u1eadt m\u1edbi \u0111\u1ec3 truy nh\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng. \u0110\u1ec3 th\u00e0nh c\u00f4ng l\u00e0 nh\u00e0 chuy\u00ean nghi\u1ec7p An ninh cyber, em c\u00e0ng bi\u1ebft nhi\u1ec1u ng\u00f4n ng\u1eef, em c\u00e0ng c\u00f3 th\u1ec3 qu\u1ea3n l\u00ed t\u1ed1t h\u01a1n h\u1ec7 th\u1ed1ng c\u1ee7a em ch\u1ed1ng l\u1ea1i nh\u1eefng k\u1ebb x\u00e2m nh\u1eadp. Khi em thu \u0111\u01b0\u1ee3c nhi\u1ec1u kinh nghi\u1ec7m h\u01a1n, em c\u00f3 th\u1ec3 l\u00e0m vi\u1ec7c g\u1ea7n nh\u01b0 \u1edf m\u1ecdi n\u01a1i v\u00ec \u0111\u00e2y l\u00e0 m\u1ed9t trong nh\u1eefng ngh\u1ec1 nghi\u1ec7p \u0111\u01b0\u1ee3c c\u1ea7n tr\u00ean kh\u1eafp th\u1ebf gi\u1edbi v\u00e0 nhu c\u1ea7u l\u00e0 r\u1ea5t cao.<\/p>\n<p>&nbsp;<\/p>\n<p>&#8212;English version&#8212;<\/p>\n<p>&nbsp;<\/p>\n<p>Cybersecurity jobs<\/p>\n<p>A first-year Computer Science student asked: \u201cWhat do I need to become a successful Cybersecurity expert? How much could I make as an entry level? What is the career of a Cybersecurity person? Please advise.\u201d<\/p>\n<p>&nbsp;<\/p>\n<p>Answer: Cybersecurity is one of the fastest growing careers with extremely high demand all over the world.\u00a0 According to the U.S. Bureau of Labor Statistics (2017), \u00a0a Cybersecurity professional can make between $116,000 to $125,000 Dollars at the entry-level position, and much more when they have experience. That is one of the highest salaries among college graduates.<\/p>\n<p>Most positions in cybersecurity require a 4-year bachelor&#8217;s degree in Computer Science, Information system Management, or Computer Engineering. Most graduates start as entry-level cybersecurity engineer, after three to five years, some move up to Security Analysts, then Security Leaders, and ultimately to Chief Information Security Officers.<\/p>\n<p>A Cybersecurity professional implement and monitor security measures to protect the computer system against attacks and unauthorized access. Since not many schools are teaching this field because it is changing quickly due to the nature of the works, but there are many excellent online courses at Coursera and edX on this field. There are several cybersecurity trainings that lead to a certification such as MTA security Fundamentals (Microsoft); Certified Information Security Manager (CISM); Certified Information Systems Auditor (CISA); Certified Information Systems Security Professional (CISSP); CompTIA Security certificate; and GIAC Information Security etc.<\/p>\n<p>Before taking these courses, you need to know C and C++ as these languages provide access to low-level infrastructure such as RAM and system processes, which if not well protected, hackers can easily exploit. The C programming language is the core of most operating systems. It is an efficient language that can be used to complete a wide range of tasks such as cryptography, image processing, and socket networking. C++ is an object-oriented language that is based on many C code. The popular cybersecurity Nmap, the network mapper tool is written in C++. If you are good in C and C++, you will know how to respond to attacks targeting lower-level infrastructure of the computer systems.<\/p>\n<p>Another popular programming language widely uses among cybersecurity professionals is Python. It is popular because Python is clear, simple, and widely available to perform malware analysis and create intrusion detection systems. However, Python is a high-level language, it will not provide enough visibility to hardware resources like C and C++ so you need to know all three languages to do a good job.<\/p>\n<p>Another high-level programming language which is often used in the web is JavaScript. It is the most popular language that adds interactivity to web pages. Because of its extensive usage in websites, knowing JavaScript will allow you to know how websites and other applications work so you can manage and prevent malicious attacks such as \u201ccross-site scripting\u201d a JavaScript-based attack that involves an attacker implanting malicious code in a web application.<\/p>\n<p>Since most websites are created using PHP. Knowing this language will allow you to know how to defend against intruders. Many DDoS (Denial-of-service) attacks usually attempt to make web applications unavailable to intended users. Knowing both PHP and JavaScript, you can implement solutions to help secure web applications.<\/p>\n<p>These are popular programming languages that a Cybersecurity professional need to know, but I am sure there are more as new languages are created and hackers always use new techniques to access the system. To be successful as the Cybersecurity professional, the more languages you know, the better you can manage your system against intruders. As you gain more experience, you can work almost everywhere as this is one of the careers that is needed all over the world and the demand is very high.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>M\u1ed9t sinh vi\u00ean Khoa h\u1ecdc m\u00e1y t\u00ednh n\u0103m th\u1ee9 nh\u1ea5t h\u1ecfi: \u201cEm c\u1ea7n l\u00e0m g\u00ec \u0111\u1ec3 tr\u1edf th\u00e0nh chuy\u00ean gia an ninh cyber th\u00e0nh c\u00f4ng? &hellip; <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[],"class_list":["post-6082","post","type-post","status-publish","format-standard","hentry","category-hoi-va-dap"],"_links":{"self":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/6082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6082"}],"version-history":[{"count":1,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/6082\/revisions"}],"predecessor-version":[{"id":6083,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/6082\/revisions\/6083"}],"wp:attachment":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}