{"id":1336,"date":"2023-02-03T21:23:33","date_gmt":"2023-02-03T21:23:33","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1336"},"modified":"2023-02-03T21:23:33","modified_gmt":"2023-02-03T21:23:33","slug":"ban-ghi-lich-su-ve-an-ninh-mang","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/ban-ghi-lich-su-ve-an-ninh-mang\/","title":{"rendered":"T\u00e0i kho\u1ea3n l\u1ecbch s\u1eed c\u1ee7a An ninh m\u1ea1ng"},"content":{"rendered":"<p>Ch\u00fang ta \u0111ang s\u1ed1ng trong th\u1eddi \u0111\u1ea1i th\u00f4ng tin, \u0111i\u1ec1u n\u00e0y ng\u1ee5 \u00fd nhi\u1ec1u thay \u0111\u1ed5i trong cu\u1ed9c s\u1ed1ng con ng\u01b0\u1eddi, c\u00e1c l\u0129nh v\u1ef1c x\u00e3 h\u1ed9i kh\u00e1c nhau, ch\u00ednh ph\u1ee7 v\u00e0 nh\u00e0 n\u01b0\u1edbc. M\u1ecdi th\u1ee9 ch\u00fang ta \u0111\u00e3 x\u00e2y d\u1ef1ng \u0111\u1ec1u b\u1ecb \u1ea3nh h\u01b0\u1edfng b\u1edfi th\u1eddi \u0111\u1ea1i k\u1ef9 thu\u1eadt s\u1ed1, \u0111\u00f3 l\u00e0 l\u00fd do t\u1ea1i sao ch\u00fang ta li\u00ean k\u1ebft C\u00f4ng ngh\u1ec7 Th\u00f4ng tin v\u00e0 Truy\u1ec1n th\u00f4ng v\u1edbi r\u1ea5t nhi\u1ec1u ho\u1ea1t \u0111\u1ed9ng g\u00f3p ph\u1ea7n v\u00e0o vi\u1ec7c nh\u1eadn th\u1ee9c, c\u1ea5u tr\u00fac v\u00e0 hi\u1ec3u bi\u1ebft v\u1ec1 cu\u1ed9c s\u1ed1ng. <\/p>\n\n\n\n<p>Do b\u1ea3n ch\u1ea5t ti\u1ebfn h\u00f3a c\u1ee7a ch\u00fang ta, quy\u1ec1n \u0111\u01b0\u1ee3c c\u1ea3m th\u1ea5y an to\u00e0n trong th\u1eddi \u0111\u1ea1i th\u00f4ng tin th\u00fac \u0111\u1ea9y ch\u00fang ta ph\u00e1t tri\u1ec3n an ninh m\u1ea1ng v\u00e0 ph\u00f2ng th\u1ee7 m\u1ea1ng nh\u1eb1m \u0111\u1ea3m b\u1ea3o quy\u1ec1n ri\u00eang t\u01b0, \u1ea9n danh v\u00e0 b\u1ea3o v\u1ec7 t\u00e0i s\u1ea3n h\u1eefu h\u00ecnh v\u00e0 v\u00f4 h\u00ecnh. \u0110\u00f3 l\u00e0 l\u00fd do t\u1ea1i sao con ng\u01b0\u1eddi quan t\u00e2m \u0111\u1ebfn vi\u1ec7c t\u00ecm hi\u1ec3u th\u00eam v\u1ec1 c\u00e1c nghi\u00ean c\u1ee9u an ninh m\u1ea1ng, ph\u00e2n t\u00edch ph\u00e1p l\u00fd v\u1ec1 lu\u1eadt m\u00e1y t\u00ednh v\u00e0 c\u00e1c c\u00e1ch ti\u1ebfp c\u1eadn t\u1ed9i ph\u1ea1m h\u1ecdc trong kh\u00f4ng gian \u1ea3o, v\u00ec c\u00f3 nhu c\u1ea7u th\u00fac \u0111\u1ea9y an ninh th\u00f4ng tin, c\u1ea3 trong Nh\u00e0 n\u01b0\u1edbc v\u00e0 trong c\u00e1c l\u0129nh v\u1ef1c x\u00e3 h\u1ed9i, \u0111\u1ec3 hi\u1ec3u r\u1eb1ng \u0111\u00f3 l\u00e0 quy\u1ec1n \u0111\u00f3ng g\u00f3p v\u00e0o vi\u1ec7c ti\u1ebfp thu ki\u1ebfn th\u1ee9c v\u00e0 c\u00e1c c\u00f4ng c\u1ee5 c\u1ea7n thi\u1ebft \u0111\u1ec3 \u0111\u1ea3m b\u1ea3o an ninh th\u00f4ng tin trong kh\u00f4ng gian h\u00e0nh \u0111\u1ed9ng c\u00e1 nh\u00e2n v\u00e0 ch\u00ednh ph\u1ee7, c\u0169ng nh\u01b0 trong c\u00e1c l\u0129nh v\u1ef1c t\u01b0 nh\u00e2n v\u00e0 c\u00f4ng c\u1ed9ng.<br><\/p>\n\n\n<h2 class=\"simpletoc-title\">M\u1ee5c l\u1ee5c<\/h2>\n<ul class=\"simpletoc-list\">\n<li><a href=\"#what-is-the-origin-of-the-term-cybernetics\">Ngu\u1ed3n g\u1ed1c c\u1ee7a thu\u1eadt ng\u1eef \u201ccybernetics\u201d l\u00e0 g\u00ec?<\/a>\n\n<\/li>\n<li><a href=\"#when-did-you-first-mention-cyberspace\">Khi n\u00e0o b\u1ea1n l\u1ea7n \u0111\u1ea7u ti\u00ean \u0111\u1ec1 c\u1eadp \u0111\u1ebfn kh\u00f4ng gian m\u1ea1ng?<\/a>\n\n<\/li>\n<li><a href=\"#the-beginnings-of-security-in-information-environments\">Kh\u1edfi \u0111\u1ea7u c\u1ee7a an ninh trong m\u00f4i tr\u01b0\u1eddng th\u00f4ng tin<\/a>\n<\/li><\/ul>\n\n<h2 class=\"wp-block-heading\" id=\"what-is-the-origin-of-the-term-cybernetics\">Ngu\u1ed3n g\u1ed1c c\u1ee7a thu\u1eadt ng\u1eef \u201ccybernetics\u201d l\u00e0 g\u00ec?<\/h2>\n\n\n<p>Thu\u1eadt ng\u1eef \u201ccybernetics\u201d c\u1ed5 x\u01b0a nh\u01b0 \u201cpolis\u201d hay \u201cParthenon\u201d c\u1ee7a Hy L\u1ea1p, cho th\u1ea5y r\u1eb1ng \u201cCybernetics\u201c xu\u1ea5t ph\u00e1t t\u1eeb ch\u1eef Hy L\u1ea1p v v\u00e0 c\u00f3 ngh\u0129a l\u00e0 \u201dngh\u1ec7 thu\u1eadt \u0111i\u1ec1u khi\u1ec3n t\u00e0u\u201c, m\u1eb7c d\u00f9 Plato \u0111\u00e3 s\u1eed d\u1ee5ng n\u00f3 trong C\u1ed9ng h\u00f2a v\u1edbi \u00fd ngh\u0129a \u201dngh\u1ec7 thu\u1eadt ch\u1ec9 \u0111\u1ea1o con ng\u01b0\u1eddi\u201c hay \u201dngh\u1ec7 thu\u1eadt cai tr\u1ecb\u201d. Thu\u1eadt ng\u1eef n\u00e0y \u0111\u00e3 b\u1ecb l\u00e3ng qu\u00ean trong nhi\u1ec1u th\u1ebf k\u1ef7 cho \u0111\u1ebfn nh\u1eefng th\u1eadp k\u1ef7 \u0111\u1ea7u c\u1ee7a th\u1ebf k\u1ef7 XX, khi c\u00e1c nh\u00e0 v\u0103n nh\u01b0 Norbert Wiener l\u00e0 nh\u1eefng ng\u01b0\u1eddi ti\u00ean phong trong c\u00e1c nghi\u00ean c\u1ee9u gi\u1ea3i th\u00edch m\u1ed1i quan h\u1ec7 v\u00e0 s\u1ef1 kh\u00e1c bi\u1ec7t gi\u1eefa sinh v\u1eadt s\u1ed1ng v\u00e0 c\u1ea5u tr\u00fac do con ng\u01b0\u1eddi t\u1ea1o ra. <\/p>\n\n\n\n<p>Wiener g\u1ee3i \u00fd r\u1eb1ng m\u1ee5c ti\u00eau c\u1ee7a \u201ccybernetics\u201d l\u00e0 ph\u00e1t tri\u1ec3n \u201c[\u2026] m\u1ed9t ng\u00f4n ng\u1eef v\u00e0 k\u1ef9 thu\u1eadt cho ph\u00e9p ch\u00fang ta th\u1ef1c s\u1ef1 t\u1ea5n c\u00f4ng v\u1ea5n \u0111\u1ec1 ki\u1ec3m so\u00e1t v\u00e0 truy\u1ec1n th\u00f4ng n\u00f3i chung, nh\u01b0ng c\u0169ng t\u00ecm ra m\u1ed9t kho \u00fd t\u01b0\u1edfng v\u00e0 k\u1ef9 thu\u1eadt t\u1ed1t \u0111\u1ec3 ph\u00e2n lo\u1ea1i c\u00e1c bi\u1ec3u hi\u1ec7n c\u1ee5 th\u1ec3 c\u1ee7a n\u00f3 trong nh\u1eefng kh\u00e1i ni\u1ec7m nh\u1ea5t \u0111\u1ecbnh\u201d. C\u1ea7n l\u01b0u \u00fd r\u1eb1ng Wiener \u0111\u00e3 c\u00f3 nh\u1eefng cu\u1ed9c x\u00e2m nh\u1eadp l\u00fd thuy\u1ebft \u0111\u1ea7u ti\u00ean t\u1eeb tay c\u1ee7a Arturo Rosenblueth Stearns, l\u00e0 m\u1ed9t trong nh\u1eefng ng\u01b0\u1eddi c\u1ea5u tr\u00fac n\u1ec1n t\u1ea3ng \u0111i\u1ec1u khi\u1ec3n h\u1ecdc n\u1ed5i b\u1eadt \u201cv\u1ea5n \u0111\u1ec1 t\u01b0\u01a1ng t\u00e1c gi\u1eefa con ng\u01b0\u1eddi v\u00e0 m\u00e1y m\u00f3c\u201d. <\/p>\n\n\n\n<p>Do \u0111\u00f3, n\u1ec1n t\u1ea3ng c\u1ee7a nh\u1eefng g\u00ec s\u1ebd tr\u1edf th\u00e0nh \u201ccybernetics\u201d \u0111\u00e3 \u0111\u01b0\u1ee3c \u0111\u1eb7t ra, nghi\u00ean c\u1ee9u ki\u1ec3m so\u00e1t v\u00e0 truy\u1ec1n th\u00f4ng trong m\u1ed1i quan h\u1ec7 gi\u1eefa con ng\u01b0\u1eddi, \u0111\u1ed9ng v\u1eadt v\u00e0 m\u00e1y m\u00f3c.<\/p>\n\n\n\n<p>Ross Ashby l\u00e0 m\u1ed9t trong nh\u1eefng ki\u1ebfn tr\u00fac s\u01b0 c\u1ee7a nh\u1eefng suy ng\u1eabm hi\u1ec7n t\u1ea1i trong giai \u0111o\u1ea1n \u0111\u1ea7u c\u1ee7a t\u01b0 t\u01b0\u1edfng \u201ccybernetic\u201d, bao g\u1ed3m c\u00e1c gi\u1ea3i th\u00edch sinh h\u1ecdc v\u00e0 v\u1eadt l\u00fd. Ashby \u0111\u00e3 h\u00ecnh dung trong t\u00e1c ph\u1ea9m \u201cAn Introduction to Cybernetics\u201d c\u1ee7a m\u00ecnh, s\u1ef1 r\u1ed9ng l\u1edbn v\u00e0 k\u1ebft n\u1ed1i c\u1ee7a ch\u1ee7 \u0111\u1ec1, v\u00e0 ch\u1ec9 ra r\u1eb1ng nh\u00e1nh t\u01b0 t\u01b0\u1edfng n\u00e0y s\u1ebd c\u00f3 xu h\u01b0\u1edbng ti\u1ebft l\u1ed9 \u201c[\u2026] m\u1ed9t s\u1ed1 l\u01b0\u1ee3ng l\u1edbn c\u00e1c \u0111i\u1ec3m t\u01b0\u01a1ng \u0111\u1ed3ng th\u00fa v\u1ecb v\u00e0 g\u1ee3i \u00fd gi\u1eefa m\u00e1y m\u00f3c, n\u00e3o b\u1ed9 v\u00e0 x\u00e3 h\u1ed9i. V\u00e0 n\u00f3 c\u00f3 th\u1ec3 cung c\u1ea5p m\u1ed9t ng\u00f4n ng\u1eef chung qua \u0111\u00f3 c\u00e1c ph\u00e1t hi\u1ec7n trong m\u1ed9t l\u0129nh v\u1ef1c c\u00f3 th\u1ec3 d\u1ec5 d\u00e0ng \u00e1p d\u1ee5ng cho c\u00e1c l\u0129nh v\u1ef1c kh\u00e1c.\u201d<\/p>\n\n\n\n<p><br>Ba y\u1ebfu t\u1ed1 nghi\u00ean c\u1ee9u n\u00e0y (m\u00e1y m\u00f3c\/ n\u00e3o b\u1ed9\/ x\u00e3 h\u1ed9i) t\u01b0\u01a1ng t\u00e1c theo c\u00e1ch ho\u1ea1t \u0111\u1ed9ng nh\u01b0 m\u1ed9t tr\u1ee5c ngang, d\u1eabn \u0111\u1ebfn m\u1ed9t t\u1eadp h\u1ee3p m\u1edbi c\u00e1c quy tr\u00ecnh, m\u1ed1i quan h\u1ec7 v\u00e0 ng\u00f4n ng\u1eef x\u00e3 h\u1ed9i. Ph\u1ea1m vi \u1ee9ng d\u1ee5ng m\u1edf r\u1ed9ng theo th\u1eddi gian, bi\u1ebfn \u201ccybernetics\u201d th\u00e0nh m\u1ed9t l\u0129nh v\u1ef1c \u0111a ng\u00e0nh. Theo Heylighen v\u00e0 Joslyn (2001), \u201ctri\u1ebft l\u00fd \u0111i\u1ec1u khi\u1ec3n h\u1ecdc r\u1ed9ng l\u1edbn r\u1eb1ng c\u00e1c h\u1ec7 th\u1ed1ng \u0111\u01b0\u1ee3c \u0111\u1ecbnh ngh\u0129a b\u1edfi c\u00e1c m\u1ed1i quan h\u1ec7 tr\u1eebu t\u01b0\u1ee3ng, ch\u1ee9c n\u0103ng v\u00e0 lu\u1ed3ng th\u00f4ng tin c\u1ee7a ch\u00fang, thay v\u00ec v\u1eadt li\u1ec7u c\u1ee5 th\u1ec3 ho\u1eb7c th\u00e0nh ph\u1ea7n c\u1ee7a ch\u00fang, \u0111ang b\u1eaft \u0111\u1ea7u th\u1ea5m v\u00e0o v\u0103n h\u00f3a \u0111\u1ea1i ch\u00fang, m\u1eb7c d\u00f9 v\u1eabn c\u00f2n \u1edf m\u1ee9c \u0111\u1ed9 n\u00f4ng c\u1ea1n [\u2026]\u201d.<\/p>\n\n\n\n<p><br>B\u1eb1ng c\u00e1ch n\u00e0o \u0111\u00f3, s\u1ef1 bi\u1ec3u \u0111\u1ea1t c\u1ee7a c\u00e1c t\u00e1c gi\u1ea3 tr\u01b0\u1edbc \u0111\u00f3 v\u1ec1 s\u1ef1 th\u1ea5m nhu\u1ea7n v\u0103n h\u00f3a \u0111\u00e3 \u0111\u01b0\u1ee3c th\u1ea5m nhu\u1ea7n v\u1edbi m\u1ed9t s\u1ef1 m\u1edf r\u1ed9ng \u2019kh\u00f4ng th\u1ec3 hi\u1ec3u \u0111\u01b0\u1ee3c\u00ab, li\u00ean k\u1ebft v\u1edbi ng\u00f4n ng\u1eef \u0111\u1eb7c tr\u01b0ng c\u1ee7a th\u1eadp ni\u00ean 1980, trong \u0111\u00f3 vi\u1ec7c s\u1eed d\u1ee5ng r\u1ed9ng r\u00e3i ti\u1ec1n t\u1ed1 \u00bbciber\u201c c\u00f3 xu h\u01b0\u1edbng x\u00e1c \u0111\u1ecbnh c\u00e1c ho\u1ea1t \u0111\u1ed9ng ho\u1eb7c c\u00e1ch ti\u1ebfp c\u1eadn r\u1ea5t \u0111a d\u1ea1ng. Tuy nhi\u00ean, \u0111i\u1ec1u quan tr\u1ecdng c\u1ea7n l\u01b0u \u00fd l\u00e0 n\u00f3 li\u00ean quan \u0111\u1ebfn t\u00ednh k\u1ebft n\u1ed1i v\u00e0 t\u00ednh xuy\u00ean t\u00e2m c\u1ee7a th\u00f4ng tin \u0111\u1eb7c tr\u01b0ng c\u1ee7a ph\u01b0\u01a1ng ti\u1ec7n t\u00ednh to\u00e1n \u0111\u01b0\u1ee3c cho l\u00e0 c\u00e1c t\u1ebf b\u00e0o c\u1ee7a m\u1ed9t h\u1ec7 th\u1ed1ng \u1ea3o. \u201d[\u2026] \u0111i\u1ec1u khi\u1ec3n h\u1ecdc ph\u00e1t sinh khi c\u00e1c c\u01a1 quan t\u00e1c \u0111\u1ed9ng (ch\u1eb3ng h\u1ea1n nh\u01b0 \u0111\u1ed9ng c\u01a1, m\u00e1y m\u00f3c, c\u01a1 b\u1eafp c\u1ee7a ch\u00fang ta, v.v.) \u0111\u01b0\u1ee3c k\u1ebft n\u1ed1i v\u1edbi m\u1ed9t c\u01a1 quan c\u1ea3m gi\u00e1c, c\u01a1 quan n\u00e0y l\u1ea7n l\u01b0\u1ee3t l\u00e0m vi\u1ec7c v\u1edbi c\u00e1c t\u00edn hi\u1ec7u c\u1ee7a n\u00f3 tr\u00ean c\u00e1c c\u01a1 quan t\u00e1c \u0111\u1ed9ng,\u201c Von Foerster (2003) n\u00f3i. T\u1ed5 ch\u1ee9c v\u00f2ng tr\u00f2n n\u00e0y l\u00e0 \u0111i\u1ec1u t\u1ea1o ra c\u00e1c h\u1ec7 th\u1ed1ng \u0111i\u1ec1u khi\u1ec3n h\u1ecdc [\u2026]\u201d.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"when-did-you-first-mention-cyberspace\">Khi n\u00e0o b\u1ea1n l\u1ea7n \u0111\u1ea7u ti\u00ean \u0111\u1ec1 c\u1eadp \u0111\u1ebfn kh\u00f4ng gian m\u1ea1ng?<\/h2>\n\n\n<p>Nh\u1eefng ph\u1ee9c t\u1ea1p m\u00e0 ch\u00fang ta \u0111\u00e3 h\u00ecnh dung tr\u01b0\u1edbc \u0111\u00f3 trong c\u00e1c t\u1eeb \u0111i tr\u01b0\u1edbc ti\u1ec1n t\u1ed1 \u201ccyber,\u201d \u0111\u01b0\u1ee3c th\u1ec3 hi\u1ec7n trong vi\u1ec7c s\u1eed d\u1ee5ng thu\u1eadt ng\u1eef \u201ccyberspace,\u201d ban \u0111\u1ea7u kh\u00f4ng li\u00ean quan \u0111\u1ebfn c\u00e1c l\u00fd thuy\u1ebft ki\u1ec3m so\u00e1t ho\u1eb7c h\u1ec7 th\u1ed1ng \u0111\u00e3 \u0111\u1ecbnh h\u00ecnh ng\u00e0nh \u0111i\u1ec1u khi\u1ec3n h\u1ecdc. M\u1ed9t s\u1ed1 t\u00e1c gi\u1ea3 x\u00e1c \u0111\u1ecbnh thu\u1eadt ng\u1eef n\u00e0y v\u00e0o n\u0103m 1984, tr\u00edch d\u1eabn t\u00e1c ph\u1ea9m h\u01b0 c\u1ea5u c\u1ee7a William Gibson, trong \u0111\u00f3 \u201ccyberspace\u201d \u0111\u01b0\u1ee3c m\u00f4 t\u1ea3 l\u00e0 \u201cm\u1ed9t \u1ea3o gi\u00e1c \u0111\u1ed3ng thu\u1eadn \u0111\u01b0\u1ee3c tr\u1ea3i nghi\u1ec7m h\u00e0ng ng\u00e0y b\u1edfi h\u00e0ng t\u1ef7 ng\u01b0\u1eddi \u0111i\u1ec1u h\u00e0nh h\u1ee3p ph\u00e1p, \u1edf t\u1ea5t c\u1ea3 c\u00e1c qu\u1ed1c gia, b\u1edfi tr\u1ebb em \u0111\u01b0\u1ee3c d\u1ea1y c\u00e1c kh\u00e1i ni\u1ec7m to\u00e1n h\u1ecdc cao\u2026 M\u1ed9t bi\u1ec3u di\u1ec5n \u0111\u1ed3 h\u1ecda c\u1ee7a th\u00f4ng tin \u0111\u01b0\u1ee3c tr\u00edch xu\u1ea5t t\u1eeb t\u1ea5t c\u1ea3 c\u00e1c m\u00e1y t\u00ednh trong ng\u00e2n h\u00e0ng h\u1ec7 th\u1ed1ng con ng\u01b0\u1eddi. S\u1ef1 ph\u1ee9c t\u1ea1p kh\u00f4ng th\u1ec3 hi\u1ec3u \u0111\u01b0\u1ee3c.\u201d M\u1eb7c d\u00f9 \u0111\u1ec1 xu\u1ea5t n\u00e0y m\u1edbi l\u1ea1, nh\u1eefng g\u00ec Gibson ph\u01a1i b\u00e0y \u0111\u00e3 \u0111\u01b0a ra m\u1ed9t m\u00f3n khai v\u1ecb v\u1ec1 nh\u1eefng g\u00ec ch\u1eafc ch\u1eafn s\u1ebd l\u00e0 k\u1ecbch b\u1ea3n k\u1ef9 thu\u1eadt s\u1ed1 k\u1ebft n\u1ed1i trong v\u00e0i th\u1eadp k\u1ef7 sau, \u0111i\u1ec1u n\u00e0y ph\u00f9 h\u1ee3p v\u1edbi nh\u1eefng g\u00ec \u0111\u01b0\u1ee3c \u0111\u1ec1 xu\u1ea5t trong t\u00e1c ph\u1ea9m \u201cNeuromancer\u201d c\u1ee7a \u00f4ng.<\/p>\n\n\n\n<p><br>\u0110i v\u00e0o m\u1ed9t l\u0129nh v\u1ef1c l\u00fd thuy\u1ebft h\u01a1n, Cicognani c\u1ed1 g\u1eafng \u0111\u1ed9t ph\u00e1 v\u00e0o \u0111\u1ed9 s\u00e2u thu\u1eadt ng\u1eef \u0111\u1ec3 \u0111\u1ec1 xu\u1ea5t r\u1eb1ng: \u201c[\u2026] trong thu\u1eadt ng\u1eef cyber+space, kh\u00f4ng gian gi\u1ea3 \u0111\u1ecbnh \u00fd ngh\u0129a c\u1ee7a v\u1eadt ch\u1ea5t v\u1eadt l\u00fd, trong khi cyber mang l\u1ea1i cho n\u00f3 c\u00e1c \u0111\u1eb7c \u0111i\u1ec3m phi v\u1eadt ch\u1ea5t\u201d. Vi\u1ec7c h\u00f2a gi\u1ea3i th\u1ebf gi\u1edbi v\u1eadt l\u00fd v\u00e0 \u1ea3o kh\u00f4ng h\u1ec1 d\u1ec5 d\u00e0ng, v\u00e0 n\u00f3 \u0111\u00e3 \u0111\u00f2i h\u1ecfi m\u1ed9t b\u00e0i t\u1eadp ph\u00e2n t\u00edch k\u1ef9 l\u01b0\u1ee1ng \u0111\u1ec3 m\u1edf r\u1ed9ng v\u00e0 ph\u00e1 v\u1ee1 c\u00e1c m\u00f4 h\u00ecnh c\u0169 khi\u1ebfn v\u1eadt ch\u1ea5t b\u1eaft bu\u1ed9c ph\u1ea3i ch\u1ea5p nh\u1eadn l\u00e0 th\u1ef1c.<\/p>\n\n\n\n<p><br>Cu\u1ed9c tranh lu\u1eadn s\u00f4i n\u1ed5i n\u00e0y v\u1ec1 \u201ccyberspace\u201d \u0111\u00e3 d\u1eabn \u0111\u1ebfn nh\u1eefng quan s\u00e1t nh\u01b0 c\u1ee7a Post (2013), ng\u01b0\u1eddi tuy\u00ean b\u1ed1 r\u1eb1ng \u201c[\u2026] c\u00e2u h\u1ecfi \u2018kh\u00f4ng gian m\u1ea1ng th\u1ef1c s\u1ef1 c\u00f3 ph\u1ea3i l\u00e0 m\u1ed9t n\u01a1i kh\u00f4ng\u2019?\u201d gi\u1ed1ng nh\u01b0 h\u1ecfi li\u1ec7u cu\u1ed9c s\u1ed1ng tr\u00ean \u0111\u1ea5t li\u1ec1n c\u00f3 \u201cgi\u1ed1ng h\u1ec7t v\u1edbi\u201d hay \u201ckh\u00e1c v\u1edbi\u201d cu\u1ed9c s\u1ed1ng tr\u00ean bi\u1ec3n. C\u00e2u tr\u1ea3 l\u1eddi l\u00e0 n\u00f3 v\u1eeba gi\u1ed1ng v\u1eeba kh\u00e1c c\u00f9ng m\u1ed9t l\u00fac. Ngay c\u1ea3 khi gi\u1ea3 \u0111\u1ecbnh m\u1ed9t v\u1ecb tr\u00ed c\u00f4ng nh\u1eadn kh\u00f4ng gian m\u1ea1ng, c\u00e1c d\u00f2ng suy ngh\u0129 kh\u00e1c nhau l\u1ea1i r\u01a1i v\u00e0o m\u1ed9t s\u1ef1 ph\u00e2n nh\u00e1nh ph\u00e2n t\u00edch kh\u00e1c, bao g\u1ed3m vi\u1ec7c tr\u1eebu t\u01b0\u1ee3ng h\u00f3a \u201ccyberspace\u201d kh\u1ecfi x\u00e3 h\u1ed9i v\u00e0 t\u1eadp trung v\u00e0o c\u00e1c gi\u1ea3i th\u00edch \u201cc\u00f4ng c\u1ee5\u201d, m\u1eb7c d\u00f9 quan tr\u1ecdng, nh\u01b0ng cu\u1ed1i c\u00f9ng v\u1eabn kh\u00f4ng \u0111\u1ee7, t\u00ecm th\u1ea5y c\u00e1c gi\u1ea3i th\u00edch c\u00f3 h\u1ec7 th\u1ed1ng nh\u01b0 c\u1ee7a Folsom (2007), chi ti\u1ebft n\u00f3: \u201c[\u2026] nh\u01b0 m\u1ed9t m\u1ea1ng chuy\u1ec3n m\u1ea1ch nh\u00fang \u0111\u1ec3 di chuy\u1ec3n l\u01b0u l\u01b0\u1ee3ng d\u1eef li\u1ec7u, \u0111\u01b0\u1ee3c \u0111\u1eb7c tr\u01b0ng th\u00eam b\u1edfi c\u00e1c m\u1ee9c \u0111\u1ed9 k\u1ebft n\u1ed1i kh\u00e1c nhau.\u201d<\/p>\n\n\n\n<p><br>C\u00e1c \u0111\u1ecbnh ngh\u0129a c\u00f3 xu h\u01b0\u1edbng gi\u1ea3i quy\u1ebft kh\u00f4ng gian \u1ea3o n\u00e0y, thu h\u1eb9p n\u00f3 v\u1edbi con ng\u01b0\u1eddi, n\u1ed5i b\u1eadt, b\u1edfi v\u00ec c\u00e1c kh\u00e1i ni\u1ec7m h\u00f3a, s\u1eed d\u1ee5ng v\u00e0 \u0111\u00f3ng g\u00f3p kh\u00f4ng th\u1ec3 t\u00e1ch r\u1eddi kh\u1ecfi b\u1ea3n ch\u1ea5t x\u00e3 h\u1ed9i c\u1ee7a n\u00f3, v\u00e0 \u201ccyberspace\u201d cu\u1ed1i c\u00f9ng l\u00e0 m\u1ed9t s\u00e1ng t\u1ea1o nh\u00e2n v\u0103n. \u201cCh\u00fang ta c\u00f3 th\u1ec3 \u0111\u1eb7c tr\u01b0ng h\u00f3a kh\u00f4ng gian m\u1ea1ng nh\u01b0 tham chi\u1ebfu kh\u00f4ng gian \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng trong ph\u01b0\u01a1ng ti\u1ec7n \u0111i\u1ec7n t\u1eed, nh\u01b0ng \u0111i\u1ec1u \u0111\u00f3 l\u00e0m t\u0103ng nhu c\u1ea7u c\u1ee7a ch\u00fang ta \u0111\u1ec3 x\u00e1c \u0111\u1ecbnh kh\u00f4ng gian t\u1ef1 n\u00f3, \u0111\u1ec3 ch\u00fang ta c\u00f3 th\u1ec3 tr\u1ea3i nghi\u1ec7m c\u00e1ch kh\u00f4ng gian th\u1ef1c s\u1ef1 l\u00e0 s\u1ea3n ph\u1ea9m c\u1ee7a c\u00e1c qu\u00e1 tr\u00ecnh tinh th\u1ea7n,\u201d Anders (2001) vi\u1ebft.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-beginnings-of-security-in-information-environments\">Kh\u1edfi \u0111\u1ea7u c\u1ee7a an ninh trong m\u00f4i tr\u01b0\u1eddng th\u00f4ng tin<\/h2>\n\n\n<p>K\u00edch th\u01b0\u1edbc tuy\u1ec7t \u0111\u1ed1i m\u00e0 C\u00f4ng ngh\u1ec7 Th\u00f4ng tin v\u00e0 Truy\u1ec1n th\u00f4ng \u0111ang tri\u1ec3n khai tr\u00ean c\u00e1c l\u0129nh v\u1ef1c kh\u00e1c nhau c\u1ea5u th\u00e0nh x\u00e3 h\u1ed9i tr\u1edf n\u00ean \u00e1p \u0111\u1ea3o, v\u00e0 an ninh b\u1eaft \u0111\u1ea7u b\u1ecb \u1ea3nh h\u01b0\u1edfng b\u1edfi hi\u1ec7n t\u01b0\u1ee3ng n\u00e0y do s\u1ed1 l\u01b0\u1ee3ng \u0111\u1ed9ng l\u1ef1c m\u1edbi xu\u1ea5t hi\u1ec7n do n\u00f3. Theo Caro, \u201cc\u0169ng nh\u01b0 c\u00e1i g\u1ecdi l\u00e0 m\u1ea1ng th\u1ebf gi\u1edbi hay World Wide Web \u0111\u00e3 ph\u00e1t tri\u1ec3n, c\u00e1c m\u1ed1i \u0111e d\u1ecda m\u00e0 n\u00f3 ph\u1ea3i \u0111\u1ed1i m\u1eb7t c\u0169ng v\u1eady.\u201d C\u00e1c ph\u00e2n t\u00edch chi\u1ebfn l\u01b0\u1ee3c, theo ngh\u0129a n\u00e0y, ph\u1ea3i lu\u00f4n ch\u1ea1y song song v\u1edbi c\u00e1c c\u1ea5u h\u00ecnh l\u1ea1i ho\u1eb7c s\u1ef1 xu\u1ea5t hi\u1ec7n c\u1ee7a m\u1ed1i \u0111e d\u1ecda \u0111\u1ec3 ph\u00e1c th\u1ea3o s\u1ef1 chi\u1ebfu c\u1ee7a ch\u00fang \u0111\u1ed1i v\u1edbi an ninh v\u00e0 qu\u1ed1c ph\u00f2ng. <\/p>\n\n\n\n<p>Khi Fred Cohen m\u1ea1o hi\u1ec3m tuy\u00ean b\u1ed1 m\u1ed9t t\u00ednh n\u0103ng ch\u01b0a t\u1eebng bi\u1ebft tr\u01b0\u1edbc \u0111\u00e2y c\u1ee7a m\u00e1y t\u00ednh, ch\u1eb3ng h\u1ea1n nh\u01b0 virus, c\u00e1c kh\u00e1i ni\u1ec7m b\u1eaft ngu\u1ed3n t\u1eeb n\u0103m 1984 ban \u0111\u1ea7u kh\u00f4ng nh\u1eadn th\u1ea5y t\u00e1c \u0111\u1ed9ng chi\u1ebfn l\u01b0\u1ee3c, ch\u1ec9 \u0111\u1ecbnh nh\u00e0 nghi\u00ean c\u1ee9u: \u201cCh\u00fang t\u00f4i \u0111\u1ecbnh ngh\u0129a \u201cvirus\u201d m\u00e1y t\u00ednh l\u00e0 m\u1ed9t ch\u01b0\u01a1ng tr\u00ecnh c\u00f3 th\u1ec3 \u2018l\u00e2y nhi\u1ec5m\u2019 c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh kh\u00e1c b\u1eb1ng c\u00e1ch s\u1eeda \u0111\u1ed5i ch\u00fang \u0111\u1ec3 bao g\u1ed3m m\u1ed9t b\u1ea3n sao c\u00f3 th\u1ec3 \u0111\u00e3 ti\u1ebfn h\u00f3a c\u1ee7a ch\u00ednh n\u00f3.\u201d Nh\u1eefng \u0111\u00e1nh gi\u00e1 c\u1ee7a Cohen v\u00e0o th\u1eddi \u0111i\u1ec3m \u0111\u00f3 d\u01b0\u1eddng nh\u01b0 b\u1ecb gi\u1edbi h\u1ea1n trong m\u1ed9t \u0111\u1eb7c \u0111i\u1ec3m k\u1ef9 thu\u1eadt c\u1ee7a c\u00e1c v\u1ea5n \u0111\u1ec1 m\u00e1y t\u00ednh d\u00e2n s\u1ef1, nh\u01b0ng s\u1ef1 \u0111\u1ed3ng h\u00f3a l\u00fd thuy\u1ebft l\u00e0 \u0111i\u1ec1u d\u1eabn \u0111\u1ebfn s\u1ef1 b\u1eaft \u0111\u1ea7u c\u1ee7a cu\u1ed9c n\u00f3i chuy\u1ec7n v\u1ec1 \u201cm\u1ed1i \u0111e d\u1ecda m\u1ea1ng\u201d \u1edf c\u00e1c qu\u1ed1c gia kh\u00e1c nhau v\u00e0 \u0111i\u1ec1u n\u00e0y \u0111\u00e3 d\u1eabn \u0111\u1ebfn \u201cph\u00f2ng th\u1ee7 m\u1ea1ng\u201d v\u00e0 h\u1eadu qu\u1ea3 l\u00e0 \u201cAn ninh m\u1ea1ng\u201d.<\/p>\n\n\n\n<p><br>C\u1ea7n ph\u1ea3i th\u00eam v\u00e0o bi\u1ebfn s\u1ed1 k\u1ef9 thu\u1eadt \u0111\u00e3 \u0111\u01b0\u1ee3c tr\u00ecnh b\u00e0y, xu h\u01b0\u1edbng to\u00e0n c\u1ea7u, n\u01a1i d\u00e2n s\u1ed1 v\u00e0 c\u00e1c t\u1ed5 ch\u1ee9c c\u1ee7a n\u00f3 b\u1eaft \u0111\u1ea7u t\u01b0\u01a1ng t\u00e1c ch\u1eb7t ch\u1ebd v\u1edbi c\u00e1c h\u1ec7 th\u1ed1ng \u0111i\u1ec1u khi\u1ec3n h\u1ecdc, \u0111\u1ebfn m\u1ee9c Castells m\u00f4 t\u1ea3 m\u1ed1i quan h\u1ec7 n\u00e0y nh\u01b0: \u201cs\u1ef1 m\u1edf r\u1ed9ng v\u00e0 ph\u00e1t tri\u1ec3n c\u1ee7a c\u01a1 th\u1ec3 v\u00e0 t\u00e2m tr\u00ed c\u1ee7a c\u00e1c ch\u1ee7 th\u1ec3 con ng\u01b0\u1eddi trong c\u00e1c m\u1ea1ng t\u01b0\u01a1ng t\u00e1c \u0111\u01b0\u1ee3c cung c\u1ea5p b\u1edfi c\u00e1c c\u00f4ng ngh\u1ec7 truy\u1ec1n th\u00f4ng vi \u0111i\u1ec7n t\u1eed ho\u1ea1t \u0111\u1ed9ng b\u1eb1ng ph\u1ea7n m\u1ec1m\u201d. B\u1ee9c tranh to\u00e0n c\u1ea3nh n\u00e0y cho th\u1ea5y m\u1ed9t s\u1ef1 ph\u01a1i b\u00e0y c\u00f4ng ngh\u1ec7, c\u00f9ng v\u1edbi ti\u1ec1m n\u0103ng c\u1ee7a m\u1ed9t m\u1ed1i \u0111e d\u1ecda d\u1eabn \u0111\u1ebfn vi\u1ec7c thi\u1ebft l\u1eadp c\u00e1c s\u1eafc th\u00e1i m\u1edbi trong An ninh Th\u00f4ng tin, t\u1ea1o th\u00e0nh c\u00e1c ph\u00e2n khu c\u1ee5 th\u1ec3 h\u01a1n nh\u01b0 c\u00e1i g\u1ecdi l\u00e0 \u201cAn ninh m\u1ea1ng\u201d ho\u1eb7c \u201cPh\u00e1p y m\u00e1y t\u00ednh\u201d.<\/p>","protected":false},"excerpt":{"rendered":"<p>Ch\u00fang ta \u0111ang s\u1ed1ng trong th\u1eddi \u0111\u1ea1i th\u00f4ng tin, \u0111i\u1ec1u n\u00e0y ng\u1ee5 \u00fd nhi\u1ec1u thay \u0111\u1ed5i trong cu\u1ed9c s\u1ed1ng con ng\u01b0\u1eddi, c\u00e1c l\u0129nh v\u1ef1c x\u00e3 h\u1ed9i, ch\u00ednh ph\u1ee7 v\u00e0 nh\u00e0 n\u01b0\u1edbc kh\u00e1c nhau. M\u1ecdi th\u1ee9 ch\u00fang ta x\u00e2y d\u1ef1ng \u0111\u1ec1u ch\u1ecbu \u1ea3nh h\u01b0\u1edfng c\u1ee7a k\u1ef9 thu\u1eadt s\u1ed1\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/ban-ghi-lich-su-ve-an-ninh-mang\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">T\u00e0i kho\u1ea3n l\u1ecbch s\u1eed c\u1ee7a An ninh m\u1ea1ng<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1340,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-1336","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Historical Account of Cybersecurity | Security Briefing<\/title>\n<meta name=\"description\" content=\"Discover the evolution of cybersecurity, from its beginnings to the current state of the industry. Learn about the challenges in the history of cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/ban-ghi-lich-su-ve-an-ninh-mang\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Historical Account of Cybersecurity | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Discover the evolution of cybersecurity, from its beginnings to the current state of the industry. Learn about the challenges in the history of cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/ban-ghi-lich-su-ve-an-ninh-mang\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-03T21:23:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Historical account of Cybersecurity\",\"datePublished\":\"2023-02-03T21:23:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\"},\"wordCount\":1347,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\",\"name\":\"Historical Account of Cybersecurity | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\",\"datePublished\":\"2023-02-03T21:23:33+00:00\",\"description\":\"Discover the evolution of cybersecurity, from its beginnings to the current state of the industry. Learn about the challenges in the history of cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Historical account of Cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Historical account of Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"T\u01b0\u1eddng thu\u1eadt L\u1ecbch s\u1eed v\u1ec1 An ninh m\u1ea1ng | T\u00f3m t\u1eaft An ninh","description":"Kh\u00e1m ph\u00e1 s\u1ef1 ph\u00e1t tri\u1ec3n c\u1ee7a an ninh m\u1ea1ng, t\u1eeb nh\u1eefng ng\u00e0y \u0111\u1ea7u \u0111\u1ebfn tr\u1ea1ng th\u00e1i hi\u1ec7n t\u1ea1i c\u1ee7a ng\u00e0nh. T\u00ecm hi\u1ec3u v\u1ec1 nh\u1eefng th\u00e1ch th\u1ee9c trong l\u1ecbch s\u1eed an ninh m\u1ea1ng.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/ban-ghi-lich-su-ve-an-ninh-mang\/","og_locale":"vi_VN","og_type":"article","og_title":"Historical Account of Cybersecurity | Security Briefing","og_description":"Discover the evolution of cybersecurity, from its beginnings to the current state of the industry. Learn about the challenges in the history of cybersecurity.","og_url":"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/ban-ghi-lich-su-ve-an-ninh-mang\/","og_site_name":"Security Briefing","article_published_time":"2023-02-03T21:23:33+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"security","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"7 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Historical account of Cybersecurity","datePublished":"2023-02-03T21:23:33+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/"},"wordCount":1347,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","articleSection":["cybersecurity"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/","name":"T\u01b0\u1eddng thu\u1eadt L\u1ecbch s\u1eed v\u1ec1 An ninh m\u1ea1ng | T\u00f3m t\u1eaft An ninh","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","datePublished":"2023-02-03T21:23:33+00:00","description":"Kh\u00e1m ph\u00e1 s\u1ef1 ph\u00e1t tri\u1ec3n c\u1ee7a an ninh m\u1ea1ng, t\u1eeb nh\u1eefng ng\u00e0y \u0111\u1ea7u \u0111\u1ebfn tr\u1ea1ng th\u00e1i hi\u1ec7n t\u1ea1i c\u1ee7a ng\u00e0nh. T\u00ecm hi\u1ec3u v\u1ec1 nh\u1eefng th\u00e1ch th\u1ee9c trong l\u1ecbch s\u1eed an ninh m\u1ea1ng.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","width":662,"height":327,"caption":"Historical account of Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Historical account of Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"b\u1ea3o v\u1ec7","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin l\u00e0 m\u1ed9t bi\u00ean t\u1eadp vi\u00ean c\u1ea5p cao c\u1ee7a Government Technology. Tr\u01b0\u1edbc \u0111\u00e2y c\u00f4 \u0111\u00e3 vi\u1ebft cho PYMNTS v\u00e0 The Bay State Banner, v\u00e0 c\u00f3 b\u1eb1ng C\u1eed nh\u00e2n Ngh\u1ec7 thu\u1eadt s\u00e1ng t\u00e1c c\u1ee7a tr\u01b0\u1eddng Carnegie Mellon. C\u00f4 s\u1ed1ng \u1edf ngo\u1ea1i \u00f4 Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/vi\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=1336"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1336\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/1340"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=1336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=1336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=1336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}