{"id":1668,"date":"2023-04-07T14:07:26","date_gmt":"2023-04-07T14:07:26","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1668"},"modified":"2023-04-07T14:07:26","modified_gmt":"2023-04-07T14:07:26","slug":"an-ninh-mang-va-tac-dong-cua-no-hom-nay","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/an-ninh-mang-va-tac-dong-cua-no-hom-nay\/","title":{"rendered":"An ninh m\u1ea1ng v\u00e0 t\u00e1c \u0111\u1ed9ng c\u1ee7a n\u00f3 ng\u00e0y nay"},"content":{"rendered":"<p>Khi c\u00f4ng ngh\u1ec7 m\u00e1y t\u00ednh ph\u00e1t tri\u1ec3n, nhi\u1ec1u n\u1ed7 l\u1ef1c \u0111\u00e3 \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n \u0111\u1ec3 khai th\u00e1c c\u00e1c l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt v\u00e0 \u0111i\u1ec3m y\u1ebfu. V\u1edbi s\u1ef1 m\u1edf r\u1ed9ng c\u1ee7a internet v\u00e0 th\u1ebf gi\u1edbi ng\u00e0y c\u00e0ng k\u1ebft n\u1ed1i c\u1ee7a ch\u00fang ta, n\u01a1i h\u1ea7u h\u1ebft c\u00e1c c\u00e1 nh\u00e2n \u1edf c\u00e1c n\u01b0\u1edbc ph\u00e1t tri\u1ec3n s\u1edf h\u1eefu nhi\u1ec1u thi\u1ebft b\u1ecb c\u00f3 k\u1ebft n\u1ed1i internet, c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng \u0111\u00e3 gia t\u0103ng \u0111\u00e1ng k\u1ec3.<\/p>\n\n\n\n<p>M\u1ed9t v\u00ed d\u1ee5 \u0111i\u1ec3n h\u00ecnh l\u00e0 s\u1ef1 gia t\u0103ng c\u1ee7a c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng d\u1ef1a tr\u00ean web, t\u0103ng g\u1ea7n 6.000%, \u0111\u1ea1t h\u01a1n 1,4 t\u1ef7 tr\u01b0\u1eddng h\u1ee3p v\u00e0o n\u0103m 2022. Con s\u1ed1 n\u00e0y nh\u1ea5n m\u1ea1nh t\u1ea7m quan tr\u1ecdng c\u1ee7a vi\u1ec7c qu\u1ea3n l\u00fd an ninh m\u1ea1ng hi\u1ec7u qu\u1ea3 trong vi\u1ec7c gi\u1ea3i quy\u1ebft c\u00e1c h\u1eadu qu\u1ea3 ti\u1ec1m t\u00e0ng nghi\u00eam tr\u1ecdng, ch\u1eb3ng h\u1ea1n nh\u01b0 t\u1ed5n th\u1ea5t kinh t\u1ebf \u0111\u00e1ng k\u1ec3.<\/p>\n\n\n\n<p>H2 \u2013 C\u00f3 Th\u1ec3 \u0110\u1ea1t \u0110\u01b0\u1ee3c An Ninh M\u1ea1ng Ho\u00e0n To\u00e0n Kh\u00f4ng?<\/p>\n\n\n\n<p>An ninh tuy\u1ec7t \u0111\u1ed1i kh\u00f4ng t\u1ed3n t\u1ea1i trong c\u1ea3 th\u1ebf gi\u1edbi v\u1eadt l\u00fd v\u00e0 \u1ea3o. Tuy nhi\u00ean, c\u00f3 th\u1ec3 gi\u1ea3m thi\u1ec3u r\u1ee7i ro v\u00e0 kh\u1ea3 n\u0103ng m\u1ed9t m\u1ed1i \u0111e d\u1ecda m\u1ea1ng x\u1ea3y ra v\u00e0 g\u00e2y thi\u1ec7t h\u1ea1i cho h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh v\u00e0 th\u00f4ng tin qu\u00fd gi\u00e1 m\u00e0 ch\u00fang t\u1ea1o ra v\u00e0 l\u01b0u tr\u1eef.<\/p>\n\n\n\n<p>\u201cL\u1ed7 h\u1ed5ng\u201d \u0111\u1ec1 c\u1eadp \u0111\u1ebfn nh\u1eefng \u0111i\u1ec3m y\u1ebfu v\u00e0 kho\u1ea3ng tr\u1ed1ng trong b\u1ea3o v\u1ec7 cho ph\u00e9p m\u1ed9t m\u1ed1i \u0111e d\u1ecda m\u1ea1ng x\u1ea3y ra, d\u1eabn \u0111\u1ebfn c\u00e1c t\u00e1c \u0111\u1ed9ng ti\u00eau c\u1ef1c \u0111\u1ebfn h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh. V\u00ed d\u1ee5, b\u1ea3o v\u1ec7 ch\u1ed1ng ch\u00e1y kh\u00f4ng \u0111\u1ea7y \u0111\u1ee7 ho\u1eb7c h\u1ec7 th\u1ed1ng m\u1eadt kh\u1ea9u y\u1ebfu cho h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh c\u1ee7a m\u1ed9t t\u1ed5 ch\u1ee9c s\u1ebd c\u1ea5u th\u00e0nh c\u00e1c l\u1ed7 h\u1ed5ng. Kh\u1ea3 n\u0103ng nh\u1eefng l\u1ed7 h\u1ed5ng n\u00e0y b\u1ecb khai th\u00e1c \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 \u201cr\u1ee7i ro.\u201d V\u1ec1 c\u01a1 b\u1ea3n, an ninh m\u1ea1ng t\u1eadp trung v\u00e0o vi\u1ec7c gi\u1ea3m thi\u1ec3u r\u1ee7i ro trong l\u0129nh v\u1ef1c k\u1ef9 thu\u1eadt s\u1ed1.<\/p>\n\n\n\n<p>\u0110\u1ea1i d\u1ecbch Covid-19 \u0111\u00e3 t\u1ea1o ra m\u1ed9t m\u00f4i tr\u01b0\u1eddng th\u00e1ch th\u1ee9c cho nhi\u1ec1u doanh nghi\u1ec7p, mang l\u1ea1i l\u1ee3i \u00edch cho m\u1ed9t s\u1ed1 ng\u00e0nh trong khi g\u00e2y b\u1ea5t l\u1ee3i cho c\u00e1c ng\u00e0nh kh\u00e1c. Theo b\u00e0i vi\u1ebft c\u1ee7a PriceWaterhouseCoopers (PwC), \u2019T\u01b0\u01a1ng Lai c\u1ee7a D\u1ecbch V\u1ee5 T\u00e0i Ch\u00ednh\u201c (2020), \u0111\u1ea1i d\u1ecbch \u0111\u00e3 th\u00fac \u0111\u1ea9y c\u00e1c xu h\u01b0\u1edbng h\u01b0\u1edbng t\u1edbi th\u01b0\u01a1ng m\u1ea1i \u0111i\u1ec7n t\u1eed trong d\u1ecbch v\u1ee5 t\u00e0i ch\u00ednh. S\u1ef1 ph\u00e1t tri\u1ec3n n\u00e0y \u0111\u00e3 t\u00edch c\u1ef1c cho ng\u00e0nh logistics v\u00e0 c\u00e1c ng\u00e0nh thanh to\u00e1n kh\u00f4ng ti\u1ebfp x\u00fac\/di \u0111\u1ed9ng nh\u01b0ng ti\u00eau c\u1ef1c cho doanh s\u1ed1 b\u00e1n l\u1ebb. Khi c\u00e1c giao d\u1ecbch internet t\u0103ng l\u00ean, t\u1ef7 l\u1ec7 t\u1ed9i ph\u1ea1m m\u1ea1ng v\u00e0 m\u1ed1i \u0111e d\u1ecda m\u1ea1ng c\u0169ng t\u0103ng theo.<\/p>\n\n\n\n<p>Kh\u1ea3o s\u00e1t \u2019T\u1ed9i Ph\u1ea1m Kinh T\u1ebf v\u00e0 Gian L\u1eadn To\u00e0n C\u1ea7u\u201c c\u1ee7a PriceWaterhouseCoopers (2020) cho th\u1ea5y gian l\u1eadn, l\u1eeba \u0111\u1ea3o kh\u00e1ch h\u00e0ng v\u00e0 t\u1ed9i ph\u1ea1m m\u1ea1ng \u0111\u00e3 tr\u1ea3i qua s\u1ef1 gia t\u0103ng \u0111\u00e1ng k\u1ec3 nh\u1ea5t, v\u1edbi t\u1ed9i ph\u1ea1m m\u1ea1ng chi\u1ebfm 34% t\u1ea7n su\u1ea5t t\u1ed5ng th\u1ec3. B\u00e1o c\u00e1o c\u0169ng ti\u1ebft l\u1ed9 r\u1eb1ng \u201dg\u1ea7n 47% s\u1ed1 ng\u01b0\u1eddi tham gia kh\u1ea3o s\u00e1t \u0111\u00e3 tr\u1ea3i qua m\u1ed9t s\u1ed1 h\u00ecnh th\u1ee9c gian l\u1eadn trong 24 th\u00e1ng qua, \u0111\u00e1nh d\u1ea5u m\u1ee9c \u0111\u1ed9 s\u1ef1 c\u1ed1 an ninh cao th\u1ee9 hai trong hai m\u01b0\u01a1i n\u0103m qua.\u201c<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"tools-for-the-analysis-and-detection-of-malware\"><strong>C\u00f4ng c\u1ee5 ph\u00e2n t\u00edch v\u00e0 ph\u00e1t hi\u1ec7n ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i<\/strong><\/h2>\n\n\n<p>\u201cPh\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i\u201d \u0111\u1ec1 c\u1eadp \u0111\u1ebfn b\u1ea5t k\u1ef3 ph\u1ea7n m\u1ec1m n\u00e0o g\u00e2y h\u1ea1i ho\u1eb7c thi\u1ec7t h\u1ea1i cho ng\u01b0\u1eddi d\u00f9ng, thi\u1ebft b\u1ecb ho\u1eb7c m\u1ea1ng, d\u01b0\u1edbi nhi\u1ec1u h\u00ecnh th\u1ee9c kh\u00e1c nhau nh\u01b0 Trojan, virus, s\u00e2u, rootkit ho\u1eb7c ph\u1ea7n m\u1ec1m gi\u00e1n \u0111i\u1ec7p. Do \u0111\u00f3, c\u00e1c c\u00f4ng c\u1ee5 ph\u00e2n t\u00edch ph\u1ea3i \u0111\u1ee7 linh ho\u1ea1t \u0111\u1ec3 ph\u00e1t hi\u1ec7n ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i, \u0111\u00e1nh gi\u00e1 thi\u1ec7t h\u1ea1i g\u00e2y ra v\u00e0 x\u00e1c \u0111\u1ecbnh b\u1ea5t k\u1ef3 t\u1ec7p n\u00e0o kh\u00e1c b\u1ecb \u1ea3nh h\u01b0\u1edfng.<\/p>\n\n\n\n<p>Khi ph\u00e1t hi\u1ec7n v\u00e0 x\u00e1c \u0111\u1ecbnh m\u1ed9t t\u1ec7p \u0111\u1ed9c h\u1ea1i, n\u00f3 \u0111\u01b0\u1ee3c th\u00eam v\u00e0o c\u01a1 s\u1edf d\u1eef li\u1ec7u ch\u1eef k\u00fd ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i \u0111\u1ec3 ng\u0103n ch\u1eb7n s\u1ef1 x\u00e2m nh\u1eadp trong t\u01b0\u01a1ng lai v\u00e0o m\u1ea1ng ho\u1eb7c thi\u1ebft b\u1ecb. C\u00f3 hai ph\u01b0\u01a1ng ph\u00e1p ch\u00ednh \u0111\u1ec3 th\u1ef1c hi\u1ec7n ph\u00e2n t\u00edch ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i: t\u0129nh v\u00e0 \u0111\u1ed9ng. Ch\u00fang t\u00f4i s\u1ebd cung c\u1ea5p chi ti\u1ebft v\u1ec1 c\u1ea3 hai ph\u01b0\u01a1ng ph\u00e1p.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"static-analysis\"><strong>Ph\u00e2n T\u00edch T\u0129nh<\/strong><\/h2>\n\n\n<p>Ph\u00e2n t\u00edch t\u0129nh l\u00e0 qu\u00e1 tr\u00ecnh ki\u1ec3m tra m\u1ed9t t\u1ec7p \u0111\u1ec3 thu th\u1eadp th\u00f4ng tin v\u1ec1 c\u1ea5u tr\u00fac v\u00e0 ch\u1ee9c n\u0103ng c\u1ee7a n\u00f3 m\u00e0 kh\u00f4ng th\u1ef1c thi n\u00f3. Ph\u01b0\u01a1ng ph\u00e1p n\u00e0y c\u01a1 b\u1ea3n v\u00e0 an to\u00e0n h\u01a1n, v\u00ec n\u00f3 tr\u00e1nh ch\u1ea1y b\u1ea5t k\u1ef3 m\u00e3 c\u00f3 th\u1ec3 g\u00e2y h\u1ea1i n\u00e0o. Tuy nhi\u00ean, n\u00f3 k\u00e9m hi\u1ec7u qu\u1ea3 h\u01a1n trong vi\u1ec7c x\u1eed l\u00fd c\u00e1c t\u1ec7p ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i b\u1ecb che gi\u1ea5u. K\u1ef9 thu\u1eadt ph\u1ed5 bi\u1ebfn \u0111\u1ec3 ph\u00e1t hi\u1ec7n ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i l\u00e0 s\u1eed d\u1ee5ng ch\u1eef k\u00fd. Khi m\u1ed9t t\u1ec7p \u0111\u00e1ng ng\u1edd x\u00e2m nh\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng, h\u00e0m b\u0103m c\u1ee7a n\u00f3 \u0111\u01b0\u1ee3c t\u1ea1o ra v\u00e0 \u0111\u1ed1i chi\u1ebfu v\u1edbi c\u01a1 s\u1edf d\u1eef li\u1ec7u ch\u1eef k\u00fd ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i \u0111\u00e3 bi\u1ebft. Nh\u01b0\u1ee3c \u0111i\u1ec3m c\u1ee7a ph\u01b0\u01a1ng ph\u00e1p n\u00e0y l\u00e0 nh\u1eefng ng\u01b0\u1eddi t\u1ea1o ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i c\u00f3 th\u1ec3 d\u1ec5 d\u00e0ng s\u1eeda \u0111\u1ed5i m\u00e3 c\u1ee7a h\u1ecd, cho ph\u00e9p h\u1ecd v\u01b0\u1ee3t qua h\u00ecnh th\u1ee9c ph\u00e2n t\u00edch n\u00e0y.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"dynamic-analysis\"><strong>Ph\u00e2n T\u00edch \u0110\u1ed9ng<\/strong><\/h2>\n\n\n<p>Ph\u00e2n t\u00edch n\u00e0y cho ph\u00e9p quan s\u00e1t h\u00e0nh vi c\u1ee7a ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i trong qu\u00e1 tr\u00ecnh th\u1ef1c thi h\u1ec7 th\u1ed1ng v\u00e0 ph\u00e1t hi\u1ec7n v\u00e0 v\u1eadn h\u00e0nh ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i. Ph\u00e2n t\u00edch ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i \u0111\u1ed9ng y\u00eau c\u1ea7u m\u1ed9t m\u00f4i tr\u01b0\u1eddng an to\u00e0n, n\u01a1i c\u00e1c t\u1ec7p \u0111\u1ed9c h\u1ea1i c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c th\u1ef1c thi m\u1ed9t c\u00e1ch an to\u00e0n m\u00e0 kh\u00f4ng g\u00e2y thi\u1ec7t h\u1ea1i cho thi\u1ebft b\u1ecb ho\u1eb7c m\u1ea1ng. Do \u0111\u00f3, c\u00e1c ph\u00e2n t\u00edch n\u00e0y th\u01b0\u1eddng \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n trong c\u00e1c m\u00e1y \u1ea3o \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 sandbox, n\u01a1i c\u00f3 ph\u1ea7n m\u1ec1m c\u00e0i \u0111\u1eb7t s\u1eb5n \u0111\u1ec3 ki\u1ec3m tra ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i v\u00e0 t\u1ea1o ra c\u00e1c m\u1ea1ng \u1ea3o \u0111\u1ec3 quan s\u00e1t c\u00e1c t\u01b0\u01a1ng t\u00e1c c\u1ee7a ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i.<\/p>\n\n\n\n<p>C\u00f4ng c\u1ee5 ph\u00e2n t\u00edch ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i n\u0103m 2023:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Yara<\/strong>: M\u1ed9t \u1ee9ng d\u1ee5ng \u0111a n\u1ec1n t\u1ea3ng cho c\u00e1c h\u1ec7 th\u1ed1ng Windows, Linux v\u00e0 macOS, Yara gi\u00fap x\u00e1c \u0111\u1ecbnh v\u00e0 ph\u00e2n lo\u1ea1i c\u00e1c h\u1ecd ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i ti\u1ec1m n\u0103ng. <a href=\"https:\/\/www.varonis.com\/blog\/yara-rules\" target=\"_blank\" rel=\"noreferrer noopener\">N\u00f3 ho\u1ea1t \u0111\u1ed9ng v\u1edbi t\u1ec7p nh\u1ecb ph\u00e2n ho\u1eb7c v\u0103n b\u1ea3n<\/a> th\u00f4ng tin \u0111\u01b0\u1ee3c l\u01b0u tr\u1eef trong c\u00e1c quy t\u1eafc, x\u00e1c \u0111\u1ecbnh xem m\u1ed9t t\u1ec7p c\u00f3 thu\u1ed9c v\u1ec1 m\u1ed9t l\u1edbp c\u1ee5 th\u1ec3 hay kh\u00f4ng. M\u1ed7i quy t\u1eafc c\u00f3 hai t\u1eeb kh\u00f3a: \u201c<strong>chu\u1ed7i<\/strong>\u201d (c\u00e1c chu\u1ed7i \u0111\u00e3 thi\u1ebft l\u1eadp m\u00e0 YARA t\u00ecm ki\u1ebfm trong nh\u1ecb ph\u00e2n) v\u00e0 \u201c<strong>\u0111i\u1ec1u ki\u1ec7n<\/strong>\u201d (c\u00e1c ti\u00eau ch\u00ed \u0111\u01b0\u1ee3c ch\u1ec9 \u0111\u1ecbnh \u0111\u1ec3 ph\u00e1t hi\u1ec7n).<\/li>\n\n\n\n<li><strong>Metascan<\/strong>: M\u1ed9t c\u00f4ng c\u1ee5 ph\u00e2n t\u00edch ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i tr\u1ef1c tuy\u1ebfn mi\u1ec5n ph\u00ed, Metascan qu\u00e9t c\u00e1c t\u1ec7p b\u1eb1ng nhi\u1ec1u \u0111\u1ed9ng c\u01a1 ph\u00e2n t\u00edch v\u00e0 cung c\u1ea5p m\u1ed9t API Java. M\u1ed9t m\u1eadt kh\u1ea9u, \u0111\u01b0\u1ee3c l\u1ea5y sau khi \u0111\u0103ng k\u00fd tr\u00ean <a href=\"https:\/\/portal.opswat.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">c\u1ed5ng OPSWAT<\/a>, l\u00e0 c\u1ea7n thi\u1ebft. N\u00f3 cho ph\u00e9p 1500 y\u00eau c\u1ea7u t\u00ecm ki\u1ebfm h\u00e0m b\u0103m v\u00e0 25 y\u00eau c\u1ea7u ph\u00e2n t\u00edch t\u1ec7p m\u1ed7i gi\u1edd.<\/li>\n\n\n\n<li><strong>Cuckoo<\/strong>: M\u1ed9t \u1ee9ng d\u1ee5ng m\u00e3 ngu\u1ed3n m\u1edf mi\u1ec5n ph\u00ed t\u1ef1 \u0111\u1ed9ng h\u00f3a ph\u00e2n t\u00edch ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i \u0111\u1ed9ng,<a href=\"https:\/\/cuckoosandbox.org\/\" target=\"_blank\" rel=\"noreferrer noopener\"> Cuckoo ho\u1ea1t \u0111\u1ed9ng nh\u01b0 m\u1ed9t sandbox<\/a> ch\u1ea1y v\u00e0 ph\u00e2n t\u00edch c\u00e1c t\u1ec7p trong th\u1eddi gian th\u1ef1c. N\u00f3 bao g\u1ed3m ph\u1ea7n m\u1ec1m trung t\u00e2m qu\u1ea3n l\u00fd vi\u1ec7c th\u1ef1c thi v\u00e0 ph\u00e2n t\u00edch t\u1ec7p trong c\u00e1c m\u00e1y \u1ea3o c\u00f4 l\u1eadp, v\u1edbi m\u1ed9t m\u00e1y ch\u1ee7 v\u00e0 nhi\u1ec1u m\u00e1y kh\u00e1ch ch\u1ea1y c\u00e1c t\u1ec7p. M\u00e1y ch\u1ee7 qu\u1ea3n l\u00fd to\u00e0n b\u1ed9 qu\u00e1 tr\u00ecnh ph\u00e2n t\u00edch trong khi an to\u00e0n \u1ee7y quy\u1ec1n vi\u1ec7c th\u1ef1c thi t\u1ec7p cho t\u1eebng m\u00e1y kh\u00e1ch.<\/li>\n\n\n\n<li><strong>B\u0103m M\u1edd<\/strong>: C\u00e1c thu\u1eadt to\u00e1n b\u0103m x\u00e1c \u0111\u1ecbnh duy nh\u1ea5t c\u00e1c t\u1ec7p, nh\u01b0ng nh\u1eefng ng\u01b0\u1eddi t\u1ea1o ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i c\u00f3 th\u1ec3 d\u1ec5 d\u00e0ng s\u1eeda \u0111\u1ed5i m\u00e3 ngu\u1ed3n \u0111\u1ec3 tr\u00e1nh b\u1ecb ph\u00e1t hi\u1ec7n. B\u0103m m\u1edd t\u1eadp trung v\u00e0o vi\u1ec7c so s\u00e1nh s\u1ef1 t\u01b0\u01a1ng \u0111\u1ed3ng gi\u1eefa hai t\u1ec7p, cho ph\u00e9p ph\u00e1t hi\u1ec7n ph\u1ea7n m\u1ec1m c\u00f3 th\u1ec3 l\u00e0 m\u1ed9t s\u1eeda \u0111\u1ed5i c\u1ee7a ph\u1ea7n m\u1ec1m kh\u00e1c b\u1eb1ng c\u00e1ch so s\u00e1nh c\u00e1c b\u0103m m\u1edd c\u1ee7a ch\u00fang.<\/li>\n<\/ol>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>K\u1ebft lu\u1eadn<\/strong><\/h2>\n\n\n<p>Kh\u00e1i ni\u1ec7m an ninh m\u1ea1ng \u0111\u00e3 tr\u1edf n\u00ean n\u1ed5i b\u1eadt trong x\u00e3 h\u1ed9i \u0111\u01b0\u01a1ng \u0111\u1ea1i c\u00f9ng v\u1edbi c\u00e1c thu\u1eadt ng\u1eef li\u00ean quan nh\u01b0 t\u1ed9i ph\u1ea1m m\u1ea1ng, kh\u1ee7ng b\u1ed1 m\u1ea1ng v\u00e0 ph\u00f2ng th\u1ee7 m\u1ea1ng. N\u00f3i chung, an ninh m\u1ea1ng li\u00ean quan \u0111\u1ebfn vi\u1ec7c b\u1ea3o v\u1ec7 t\u00ednh kh\u1ea3 d\u1ee5ng, kh\u1ea3 n\u0103ng truy c\u1eadp, t\u00ednh x\u00e1c th\u1ef1c, t\u00ednh to\u00e0n v\u1eb9n v\u00e0 t\u00ednh b\u1ea3o m\u1eadt c\u1ee7a d\u1eef li\u1ec7u \u0111\u01b0\u1ee3c l\u01b0u tr\u1eef ho\u1eb7c truy\u1ec1n qua c\u00e1c h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh ho\u1eb7c d\u1ecbch v\u1ee5 k\u1ef9 thu\u1eadt s\u1ed1 d\u1ef1a tr\u00ean web kh\u1ecfi c\u00e1c h\u00ecnh th\u1ee9c t\u1ea5n c\u00f4ng kh\u00e1c nhau.<\/p>","protected":false},"excerpt":{"rendered":"<p>Khi c\u00f4ng ngh\u1ec7 m\u00e1y t\u00ednh ti\u1ebfn b\u1ed9, nhi\u1ec1u n\u1ed7 l\u1ef1c \u0111\u00e3 \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n \u0111\u1ec3 khai th\u00e1c c\u00e1c l\u1ed7 h\u1ed5ng v\u00e0 l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt. V\u1edbi s\u1ef1 m\u1edf r\u1ed9ng c\u1ee7a internet v\u00e0 th\u1ebf gi\u1edbi ng\u00e0y c\u00e0ng k\u1ebft n\u1ed1i c\u1ee7a ch\u00fang ta, n\u01a1i h\u1ea7u h\u1ebft c\u00e1c c\u00e1 nh\u00e2n trong\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/an-ninh-mang-va-tac-dong-cua-no-hom-nay\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">An ninh m\u1ea1ng v\u00e0 t\u00e1c \u0111\u1ed9ng c\u1ee7a n\u00f3 ng\u00e0y nay<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1671,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-1668","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity and its impact today | Security Briefing<\/title>\n<meta name=\"description\" content=\"Discover the impacts of cybersecurity on businesses, individuals &amp; governments. Stay informed with Security Briefing&#039;s in-depth analysis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/an-ninh-mang-va-tac-dong-cua-no-hom-nay\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity and its impact today | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Discover the impacts of cybersecurity on businesses, individuals &amp; governments. Stay informed with Security Briefing&#039;s in-depth analysis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/an-ninh-mang-va-tac-dong-cua-no-hom-nay\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-07T14:07:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"696\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/3028d22c692af329bb87883b4b4a8170\"},\"headline\":\"Cybersecurity and its impact today\",\"datePublished\":\"2023-04-07T14:07:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/\"},\"wordCount\":852,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/\",\"name\":\"Cybersecurity and its impact today | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg\",\"datePublished\":\"2023-04-07T14:07:26+00:00\",\"description\":\"Discover the impacts of cybersecurity on businesses, individuals & governments. Stay informed with Security Briefing's in-depth analysis.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg\",\"width\":696,\"height\":300,\"caption\":\"Cybersecurity and its impact today\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity and its impact today\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/3028d22c692af329bb87883b4b4a8170\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"An ninh m\u1ea1ng v\u00e0 t\u00e1c \u0111\u1ed9ng c\u1ee7a n\u00f3 ng\u00e0y nay | Security Briefing","description":"Kh\u00e1m ph\u00e1 t\u00e1c \u0111\u1ed9ng c\u1ee7a an ninh m\u1ea1ng \u0111\u1ed1i v\u1edbi doanh nghi\u1ec7p, c\u00e1 nh\u00e2n v\u00e0 ch\u00ednh ph\u1ee7. H\u00e3y c\u1eadp nh\u1eadt th\u00f4ng tin v\u1edbi ph\u00e2n t\u00edch chuy\u00ean s\u00e2u c\u1ee7a Security Briefing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/an-ninh-mang-va-tac-dong-cua-no-hom-nay\/","og_locale":"vi_VN","og_type":"article","og_title":"Cybersecurity and its impact today | Security Briefing","og_description":"Discover the impacts of cybersecurity on businesses, individuals & governments. Stay informed with Security Briefing's in-depth analysis.","og_url":"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/an-ninh-mang-va-tac-dong-cua-no-hom-nay\/","og_site_name":"Security Briefing","article_published_time":"2023-04-07T14:07:26+00:00","og_image":[{"width":696,"height":300,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"security","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"4 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/3028d22c692af329bb87883b4b4a8170"},"headline":"Cybersecurity and its impact today","datePublished":"2023-04-07T14:07:26+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/"},"wordCount":852,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg","articleSection":["cybersecurity"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/","name":"An ninh m\u1ea1ng v\u00e0 t\u00e1c \u0111\u1ed9ng c\u1ee7a n\u00f3 ng\u00e0y nay | Security Briefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg","datePublished":"2023-04-07T14:07:26+00:00","description":"Kh\u00e1m ph\u00e1 t\u00e1c \u0111\u1ed9ng c\u1ee7a an ninh m\u1ea1ng \u0111\u1ed1i v\u1edbi doanh nghi\u1ec7p, c\u00e1 nh\u00e2n v\u00e0 ch\u00ednh ph\u1ee7. H\u00e3y c\u1eadp nh\u1eadt th\u00f4ng tin v\u1edbi ph\u00e2n t\u00edch chuy\u00ean s\u00e2u c\u1ee7a Security Briefing.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg","width":696,"height":300,"caption":"Cybersecurity and its impact today"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity and its impact today"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/3028d22c692af329bb87883b4b4a8170","name":"b\u1ea3o v\u1ec7","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin l\u00e0 m\u1ed9t bi\u00ean t\u1eadp vi\u00ean c\u1ea5p cao c\u1ee7a Government Technology. Tr\u01b0\u1edbc \u0111\u00e2y c\u00f4 \u0111\u00e3 vi\u1ebft cho PYMNTS v\u00e0 The Bay State Banner, v\u00e0 c\u00f3 b\u1eb1ng C\u1eed nh\u00e2n Ngh\u1ec7 thu\u1eadt s\u00e1ng t\u00e1c c\u1ee7a tr\u01b0\u1eddng Carnegie Mellon. C\u00f4 s\u1ed1ng \u1edf ngo\u1ea1i \u00f4 Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/vi\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=1668"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1668\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/1671"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=1668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=1668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=1668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}