{"id":524,"date":"2022-08-21T21:43:26","date_gmt":"2022-08-21T21:43:26","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=524"},"modified":"2022-08-21T21:43:26","modified_gmt":"2022-08-21T21:43:26","slug":"apt-moi-de-doa-kien-tri-nang-cao","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/apt-moi-de-doa-kien-tri-nang-cao\/","title":{"rendered":"APT (M\u1ed1i \u0111e d\u1ecda dai d\u1eb3ng n\u00e2ng cao)"},"content":{"rendered":"<p>T\u1ea5n c\u00f4ng APT l\u00e0 m\u1ed9t lo\u1ea1i t\u1ea5n c\u00f4ng m\u1ea1ng \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n b\u1edfi m\u1ed9t k\u1ebb t\u1ea5n c\u00f4ng c\u00f3 \u0111\u1ed9ng c\u01a1 v\u00e0 c\u00f3 nhi\u1ec1u ngu\u1ed3n l\u1ef1c, nh\u1eb1m m\u1ee5c \u0111\u00edch gi\u00e0nh quy\u1ec1n truy c\u1eadp l\u00e2u d\u00e0i v\u00e0o m\u1ea1ng c\u1ee7a m\u1ee5c ti\u00eau. Cu\u1ed9c t\u1ea5n c\u00f4ng \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n theo nhi\u1ec1u giai \u0111o\u1ea1n:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Thu th\u1eadp th\u00f4ng tin t\u00ecnh b\u00e1o: K\u1ebb t\u1ea5n c\u00f4ng APT thu th\u1eadp th\u00f4ng tin v\u1ec1 m\u1ea1ng m\u1ee5c ti\u00eau, th\u01b0\u1eddng th\u00f4ng qua email l\u1eeba \u0111\u1ea3o, t\u1ec7p \u0111\u00ednh k\u00e8m ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i v\u00e0 l\u1ed7 h\u1ed5ng ph\u1ea7n m\u1ec1m.<\/li>\n\n\n\n<li>\u0110i\u1ec3m x\u00e2m nh\u1eadp: K\u1ebb t\u1ea5n c\u00f4ng t\u00ecm c\u00e1ch x\u00e2m nh\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng \u0111\u1ec3 c\u00e0i \u0111\u1eb7t ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i b\u1eb1ng c\u00e1c k\u1ef9 thu\u1eadt nh\u01b0 email l\u1eeba \u0111\u1ea3o ho\u1eb7c khai th\u00e1c l\u1ed7 h\u1ed5ng ph\u1ea7n m\u1ec1m.<\/li>\n\n\n\n<li>M\u00e1y ch\u1ee7 ch\u1ec9 huy v\u00e0 \u0111i\u1ec1u khi\u1ec3n: K\u1ebb t\u1ea5n c\u00f4ng thi\u1ebft l\u1eadp k\u00eanh li\u00ean l\u1ea1c v\u1edbi ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i, th\u01b0\u1eddng th\u00f4ng qua \u0111\u1ecba ch\u1ec9 IP \u1edf m\u1ed9t qu\u1ed1c gia kh\u00e1c.<\/li>\n\n\n\n<li>Di chuy\u1ec3n ngang: K\u1ebb t\u1ea5n c\u00f4ng c\u00f3 th\u1ec3 truy c\u1eadp v\u00e0o nhi\u1ec1u m\u00e1y tr\u00ean m\u1ea1ng b\u1eb1ng c\u00e1ch khai th\u00e1c l\u1ed7 h\u1ed5ng ph\u1ea7n m\u1ec1m v\u00e0 s\u1eed d\u1ee5ng th\u00f4ng tin \u0111\u0103ng nh\u1eadp b\u1ecb \u0111\u00e1nh c\u1eafp.<\/li>\n\n\n\n<li>Truy\u1ec1n d\u1eef li\u1ec7u: K\u1ebb t\u1ea5n c\u00f4ng \u0111\u00e1nh c\u1eafp d\u1eef li\u1ec7u b\u1eb1ng c\u00e1ch tr\u00edch xu\u1ea5t d\u1eef li\u1ec7u, th\u01b0\u1eddng l\u00e0 n\u00e9n v\u00e0 m\u00e3 h\u00f3a d\u1eef li\u1ec7u \u0111\u1ec3 tr\u00e1nh b\u1ecb ph\u00e1t hi\u1ec7n.<\/li>\n\n\n\n<li>Che \u0111\u1eady: K\u1ebb t\u1ea5n c\u00f4ng che gi\u1ea5u d\u1ea5u v\u1ebft b\u1eb1ng c\u00e1ch x\u00f3a t\u1ec7p, t\u1eaft ch\u1ee9c n\u0103ng ghi nh\u1eadt k\u00fd ho\u1eb7c s\u1eed d\u1ee5ng c\u00e1c bi\u1ec7n ph\u00e1p kh\u00e1c \u0111\u1ec3 khi\u1ebfn cu\u1ed9c t\u1ea5n c\u00f4ng kh\u00f3 b\u1ecb ph\u00e1t hi\u1ec7n.<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"771\" height=\"540\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-APT-1.jpg\" alt=\"M\u1ed1i \u0111e d\u1ecda dai d\u1eb3ng n\u00e2ng cao (APT)\" class=\"wp-image-531\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-APT-1.jpg 771w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-APT-1-300x210.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-APT-1-768x538.jpg 768w\" sizes=\"auto, (max-width: 771px) 100vw, 771px\" \/><\/figure>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-execute-adequate-security-against-the-advanced-threats\"><strong>L\u00e0m th\u1ebf n\u00e0o \u0111\u1ec3 th\u1ef1c hi\u1ec7n b\u1ea3o m\u1eadt \u0111\u1ea7y \u0111\u1ee7 ch\u1ed1ng l\u1ea1i c\u00e1c m\u1ed1i \u0111e d\u1ecda ti\u00ean ti\u1ebfn<\/strong><\/h2>\n\n\n<p>Ch\u00fang ta \u0111\u00e3 \u0111\u1ebfn m\u1ed9t b\u01b0\u1edbc ngo\u1eb7t trong b\u1ea3o m\u1eadt khi c\u00e1c t\u1ed5 ch\u1ee9c ph\u1ea3i ch\u1ea5p nh\u1eadn r\u1eb1ng h\u1ecd s\u1ebd b\u1ecb t\u1ea5n c\u00f4ng. C\u0169ng c\u00f4ng b\u1eb1ng khi cho r\u1eb1ng b\u1ea5t k\u1ef3 h\u1ec7 th\u1ed1ng quan tr\u1ecdng n\u00e0o \u0111\u01b0\u1ee3c k\u1ebft n\u1ed1i v\u1edbi m\u1ea1ng v\u00e0 sau \u0111\u00f3 b\u1ecb l\u1ed9 tr\u00ean Internet \u0111\u1ec1u \u0111\u00e3 b\u1ecb x\u00e2m ph\u1ea1m.<\/p>\n\n\n\n<p>Kh\u00f4ng c\u00f3 g\u00ec \u0111\u1ea3m b\u1ea3o r\u1eb1ng b\u1ea5t k\u1ef3 t\u1ed5 ch\u1ee9c n\u00e0o c\u0169ng kh\u00f4ng b\u1ecb \u0111e d\u1ecda. M\u1ed9t t\u1ed5 ch\u1ee9c c\u00f3 th\u1ec3 hy v\u1ecdng r\u1eb1ng h\u1ecd s\u1ebd kh\u00f4ng b\u1ecb t\u1ea5n c\u00f4ng, nh\u01b0ng vi\u1ec7c c\u00f3 c\u00e1c bi\u1ec7n ph\u00e1p ph\u00f2ng ng\u1eeba ph\u00e1t hi\u1ec7n \u0111\u1ec3 ph\u00f2ng ng\u1eeba l\u00e0 \u0111i\u1ec1u h\u1ee3p l\u00fd. V\u00e0 khi x\u1ea3y ra vi ph\u1ea1m, c\u00f3 th\u1ec3 ph\u00e1t hi\u1ec7n ra c\u00e0ng s\u1edbm c\u00e0ng t\u1ed1t.<\/p>\n\n\n\n<p>\u0110i\u1ec1u quan tr\u1ecdng l\u00e0 ph\u1ea3i t\u00ecm ra v\u1ea5n \u0111\u1ec1 m\u1ed9t c\u00e1ch nhanh ch\u00f3ng \u0111\u1ec3 n\u00f3 kh\u00f4ng x\u1ea3y ra l\u1ea7n n\u1eefa.<\/p>\n\n\n\n<p>\u01afu ti\u00ean h\u00e0ng \u0111\u1ea7u c\u1ee7a ch\u00fang t\u00f4i l\u00e0 duy tr\u00ec ho\u1ea1t \u0111\u1ed9ng c\u1ee7a c\u00f4ng ty v\u00e0 c\u00e1ch t\u1ed1t nh\u1ea5t \u0111\u1ec3 th\u1ef1c hi\u1ec7n \u0111i\u1ec1u \u0111\u00f3 l\u00e0 ph\u00e1t hi\u1ec7n s\u1edbm c\u00e1c vi ph\u1ea1m d\u1eef li\u1ec7u v\u00e0 ph\u1ea3n \u1ee9ng nhanh ch\u00f3ng \u0111\u1ec3 gi\u1ea3m thi\u1ec3u thi\u1ec7t h\u1ea1i. Th\u1eadt kh\u00f4ng may, c\u00e1c s\u1ef1 ki\u1ec7n g\u1ea7n \u0111\u00e2y \u0111\u00e3 ch\u1ec9 ra r\u1eb1ng c\u00e1c c\u00f4ng ty c\u1ea7n ph\u1ea3i l\u00e0m nhi\u1ec1u h\u01a1n n\u1eefa \u0111\u1ec3 th\u1ea5y \u0111\u01b0\u1ee3c nh\u1eefng s\u1ef1 th\u1ecfa hi\u1ec7p n\u00e0y.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"understanding-the-risks\"><strong>Hi\u1ec3u \u0111\u01b0\u1ee3c nh\u1eefng r\u1ee7i ro<\/strong><\/h3>\n\n\n<p>C\u00e1c doanh nghi\u1ec7p n\u00ean duy tr\u00ec m\u1ee9c \u0111\u1ed9 th\u1eadn tr\u1ecdng t\u01b0\u01a1ng t\u1ef1 v\u1ec1 an ninh nh\u01b0 ch\u00fang ta v\u1eabn l\u00e0m trong cu\u1ed9c s\u1ed1ng h\u00e0ng ng\u00e0y. B\u1ea1n c\u00f3 \u0103n m\u1ed9t thanh k\u1eb9o tr\u00ean m\u1eb7t \u0111\u1ea5t m\u00e0 ng\u01b0\u1eddi kh\u00e1c \u0111\u00e3 c\u1eafn m\u1ed9t mi\u1ebfng kh\u00f4ng? T\u1ea5t nhi\u00ean l\u00e0 kh\u00f4ng! T\u01b0\u01a1ng t\u1ef1 nh\u01b0 v\u1eady, c\u00e1c doanh nghi\u1ec7p kh\u00f4ng n\u00ean ch\u1ea5p nh\u1eadn r\u1ee7i ro kh\u00f4ng c\u1ea7n thi\u1ebft khi h\u1ecd kh\u00f4ng bi\u1ebft \u0111i\u1ec1u g\u00ec c\u00f3 th\u1ec3 x\u1ea3y ra ho\u1eb7c m\u1ecdi th\u1ee9 c\u00f3 th\u1ec3 k\u1ebft th\u00fac nh\u01b0 th\u1ebf n\u00e0o.<\/p>\n\n\n\n<p>Th\u1eadt kh\u00f4ng may, khi n\u00f3i \u0111\u1ebfn an ninh m\u1ea1ng, nh\u1eefng kh\u00e1i ni\u1ec7m th\u00f4ng th\u01b0\u1eddng \u0111\u00f3 v\u1eabn ch\u01b0a \u0111\u01b0\u1ee3c th\u1ea5m nhu\u1ea7n. Vi\u1ec7c nh\u1eb7t v\u00e0 s\u1eed d\u1ee5ng m\u1ed9t \u1ed5 USB b\u1ecb r\u01a1i xu\u1ed1ng \u0111\u1ea5t c\u0169ng nguy hi\u1ec3m nh\u01b0 vi\u1ec7c \u0103n th\u1ee9c \u0103n tr\u00ean s\u00e0n nh\u00e0. Tuy nhi\u00ean, h\u1ea7u h\u1ebft m\u1ecdi ng\u01b0\u1eddi v\u1eabn ch\u01b0a \u0111\u01b0\u1ee3c d\u1ea1y kh\u00f4ng l\u00e0m \u0111i\u1ec1u sau t\u1eeb khi c\u00f2n nh\u1ecf. V\u00e0 \u0111i\u1ec1u c\u1ea7n thi\u1ebft l\u00e0 ph\u1ea3i gi\u00e1o d\u1ee5c m\u1ecdi ng\u01b0\u1eddi v\u1ec1 nh\u1eefng m\u1ed1i nguy hi\u1ec3m trong th\u1ebf gi\u1edbi k\u1ef9 thu\u1eadt s\u1ed1.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"focus-on-the-organizations-vulnerabilities\"><strong>T\u1eadp trung v\u00e0o c\u00e1c \u0111i\u1ec3m y\u1ebfu c\u1ee7a t\u1ed5 ch\u1ee9c<\/strong><\/h3>\n\n\n<p>Ch\u00fang t\u00f4i th\u01b0\u1eddng t\u1eadp trung v\u00e0o nh\u1eefng m\u1ed1i \u0111e d\u1ecda c\u00f3 kh\u1ea3 n\u0103ng b\u1ecb khai th\u00e1c v\u00e0 g\u00e2y ra t\u00e1c \u0111\u1ed9ng \u0111\u00e1ng k\u1ec3 nh\u1ea5t. M\u01b0\u1eddi l\u1ed7 h\u1ed5ng l\u1edbn d\u1ec5 s\u1eeda h\u01a1n 100 l\u1ed7 h\u1ed5ng nh\u1ecf. Thay v\u00ec c\u1ea3i thi\u1ec7n t\u1eebng l\u1ed7 h\u1ed5ng m\u1ed9t cho \u0111\u1ebfn khi n\u00f3 bi\u1ebfn m\u1ea5t, nhi\u1ec1u t\u1ed5 ch\u1ee9c m\u1eafc ph\u1ea3i l\u1ed7i n\u00e0y v\u00e0 t\u1eadp trung qu\u00e1 m\u1ee9c v\u00e0o vi\u1ec7c s\u1eeda m\u1ed9t l\u1ed7 h\u1ed5ng cho \u0111\u1ebfn khi n\u00f3 \u0111\u01b0\u1ee3c s\u1eeda thay v\u00ec gi\u1ea3m nhi\u1ec1u r\u1ee7i ro c\u00f9ng m\u1ed9t l\u00fac.<\/p>\n\n\n\n<p>T\u1ea7m nh\u00ecn h\u1ea1n h\u1eb9p n\u00e0y t\u1ea1o ra c\u1ea3m gi\u00e1c an to\u00e0n sai l\u1ea7m v\u00e0 khi\u1ebfn c\u00e1c CISO c\u00f3 \u1ea5n t\u01b0\u1ee3ng r\u1eb1ng h\u1ecd \u0111ang l\u00e0m t\u1ed1t c\u00f4ng vi\u1ec7c c\u1ee7a m\u00ecnh trong khi th\u1ef1c t\u1ebf, h\u1ecd ch\u1ec9 \u0111ang t\u1ea1o ra nh\u1eefng c\u1ea3i ti\u1ebfn kh\u00f4ng \u0111\u00e1ng k\u1ec3.<\/p>\n\n\n\n<p>Ngo\u00e0i ra, khi an ninh c\u1ee7a m\u1ed9t t\u1ed5 ch\u1ee9c b\u1ecb x\u00e2m ph\u1ea1m, kh\u00f4ng ch\u1ec9 c\u00f4ng vi\u1ec7c c\u1ee7a CISO b\u1ecb \u0111e d\u1ecda. Danh ti\u1ebfng c\u1ee7a to\u00e0n b\u1ed9 c\u00f4ng ty \u0111\u1ec1u b\u1ecb \u0111e d\u1ecda. V\u00ec v\u1eady, m\u1ecdi ng\u01b0\u1eddi trong t\u1ed5 ch\u1ee9c c\u1ea7n ph\u1ea3i c\u1eadp nh\u1eadt c\u00e1c m\u1ed1i \u0111e d\u1ecda an ninh m\u1edbi nh\u1ea5t.<\/p>\n\n\n\n<p>V\u00e0 cu\u1ed1i c\u00f9ng, ngay c\u1ea3 khi m\u1ed9t c\u00f4ng ty c\u00f3 b\u1ea3o hi\u1ec3m an ninh m\u1ea1ng, v\u1eabn c\u1ea7n nhi\u1ec1u h\u01a1n n\u1eefa. Chi ph\u00ed vi ph\u1ea1m d\u1eef li\u1ec7u trung b\u00ecnh l\u00e0 $3,86 tri\u1ec7u, v\u00e0 \u0111\u00f3 ch\u1ec9 l\u00e0 m\u1ee9c trung b\u00ecnh! T\u1ed5ng chi ph\u00ed c\u00f3 th\u1ec3 cao h\u01a1n nhi\u1ec1u t\u00f9y thu\u1ed9c v\u00e0o quy m\u00f4 c\u1ee7a c\u00f4ng ty v\u00e0 lo\u1ea1i d\u1eef li\u1ec7u b\u1ecb \u0111\u00e1nh c\u1eafp.<\/p>\n\n\n\n<p>B\u1ea3o hi\u1ec3m an ninh m\u1ea1ng ch\u1ec9 chi tr\u1ea3 m\u1ed9t ph\u1ea7n nh\u1ecf t\u1ed5ng chi ph\u00ed v\u00e0 kh\u00f4ng g\u00f3p ph\u1ea7n c\u1ea3i thi\u1ec7n t\u00ecnh h\u00ecnh an ninh c\u1ee7a c\u00f4ng ty. V\u00ec v\u1eady, ngay c\u1ea3 khi m\u1ed9t c\u00f4ng ty c\u00f3 b\u1ea3o hi\u1ec3m, th\u00ec vi\u1ec7c l\u00e0m m\u1ecdi th\u1ee9 c\u00f3 th\u1ec3 \u0111\u1ec3 ng\u0103n ch\u1eb7n vi ph\u1ea1m x\u1ea3y ra ngay t\u1eeb \u0111\u1ea7u v\u1eabn l\u00e0 v\u00ec l\u1ee3i \u00edch t\u1ed1t nh\u1ea5t c\u1ee7a c\u00f4ng ty.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"reduce-attack-surface\"><strong>Gi\u1ea3m b\u1ec1 m\u1eb7t t\u1ea5n c\u00f4ng<\/strong><\/h3>\n\n\n<p>M\u1ed9t trong nh\u1eefng l\u0129nh v\u1ef1c quan tr\u1ecdng \u0111\u1ec3 ng\u0103n ng\u1eeba c\u00e1c m\u1ed1i \u0111e d\u1ecda APT l\u00e0 gi\u1ea3m b\u1ec1 m\u1eb7t t\u1ea5n c\u00f4ng ho\u1eb7c lo\u1ea1i b\u1ecf c\u00e1c th\u00e0nh ph\u1ea7n kh\u00f4ng c\u1ea7n thi\u1ebft kh\u00f4ng \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng. C\u00e1c quy tr\u00ecnh t\u0103ng c\u01b0\u1eddng h\u1ee3p l\u00fd v\u00e0 qu\u1ea3n l\u00fd c\u1ea5u h\u00ecnh v\u1eefng ch\u1eafc l\u00e0 ch\u00eca kh\u00f3a th\u00e0nh c\u00f4ng.<\/p>\n\n\n\n<p>C\u00e1c c\u1ed5ng v\u00e0 t\u1eadp l\u1ec7nh m\u1edf c\u00f3 th\u1ec3 khi\u1ebfn m\u1ed9t t\u1ed5 ch\u1ee9c d\u1ec5 b\u1ecb vi ph\u1ea1m b\u1ea3o m\u1eadt. N\u1ebfu c\u00e1c d\u1ecbch v\u1ee5 n\u00e0y b\u1ecb t\u1ea5n c\u00f4ng, h\u1eadu qu\u1ea3 c\u00f3 th\u1ec3 r\u1ea5t th\u1ea3m kh\u1ed1c. Tuy nhi\u00ean, n\u1ebfu m\u1ed9t t\u1ed5 ch\u1ee9c s\u1eed d\u1ee5ng c\u00e1c d\u1ecbch v\u1ee5 kh\u00f4ng v\u00ec m\u1ee5c \u0111\u00edch h\u1ee3p ph\u00e1p v\u00e0 c\u00e1c d\u1ecbch v\u1ee5 \u0111\u00f3 b\u1ecb x\u00e2m ph\u1ea1m, b\u1ea1n c\u00f3 m\u1ecdi quy\u1ec1n lo ng\u1ea1i.<\/p>\n\n\n\n<p>Nhi\u1ec1u cu\u1ed9c t\u1ea5n c\u00f4ng APT th\u00e0nh c\u00f4ng \u0111\u00e3 t\u1eadn d\u1ee5ng c\u00e1c kh\u1ea3 n\u0103ng \u0111\u01b0\u1ee3c k\u00edch ho\u1ea1t nh\u01b0ng kh\u00f4ng \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng cho m\u1ee5c \u0111\u00edch th\u1ef1c t\u1ebf.<\/p>\n\n\n\n<p>C\u00e1c t\u1ed5 ch\u1ee9c c\u00f3 th\u1ec3 c\u1ea3i thi\u1ec7n b\u1ea3o m\u1eadt c\u1ee7a m\u00ecnh b\u1eb1ng c\u00e1ch gi\u1ea3m s\u1ed1 l\u01b0\u1ee3ng ph\u1ea7n m\u1ec1m, \u1ee9ng d\u1ee5ng v\u00e0 t\u00ednh n\u0103ng h\u1ec7 th\u1ed1ng. \u00cdt t\u00ednh n\u0103ng h\u01a1n c\u00f3 ngh\u0129a l\u00e0 \u00edt c\u01a1 h\u1ed9i h\u01a1n cho k\u1ebb t\u1ea5n c\u00f4ng t\u00ecm c\u00e1ch x\u00e2m nh\u1eadp.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"be-aware-of-htmlembedded-email-content\"><strong>H\u00e3y c\u1ea9n th\u1eadn v\u1edbi n\u1ed9i dung email \u0111\u01b0\u1ee3c nh\u00fang HTML<\/strong><\/h3>\n\n\n<p>C\u00e1c t\u1ed5 ch\u1ee9c s\u1eed d\u1ee5ng n\u1ed9i dung nh\u00fang HTML trong email c\u1ee7a h\u1ecd d\u1ec5 b\u1ecb t\u1ea5n c\u00f4ng l\u1eeba \u0111\u1ea3o t\u1eeb APT h\u01a1n. Trong khi m\u1ed9t s\u1ed1 ng\u01b0\u1eddi s\u1eed d\u1ee5ng c\u00e1c t\u00ednh n\u0103ng HTML trong email \u0111\u1ec3 ch\u01a1i v\u1edbi m\u00e0u s\u1eafc v\u00e0 n\u1ec1n ho\u1eb7c nh\u00fang n\u1ed9i dung, h\u1ea7u h\u1ebft c\u00e1c doanh nghi\u1ec7p kh\u00f4ng y\u00eau c\u1ea7u HTML cho c\u00e1c ho\u1ea1t \u0111\u1ed9ng h\u00e0ng ng\u00e0y c\u1ee7a h\u1ecd.<\/p>\n\n\n\n<p>\u0110\u00f4i khi m\u1ecdi ng\u01b0\u1eddi g\u1eedi cho b\u1ea1n email c\u00f3 li\u00ean k\u1ebft trong \u0111\u00f3. M\u1ecdi ng\u01b0\u1eddi c\u00f3 th\u1ec3 nh\u1ea5p v\u00e0o li\u00ean k\u1ebft, ngh\u0129 r\u1eb1ng n\u00f3 s\u1ebd \u0111\u01b0a h\u1ecd \u0111\u1ebfn n\u01a1i h\u1ecd mu\u1ed1n. Nh\u01b0ng t\u1ed9i ph\u1ea1m m\u1ea1ng \u0111\u00e3 t\u00ecm ra c\u00e1ch \u0111\u1ec3 \u1ea9n \u0111\u00edch th\u1ef1c trong m\u00e3 c\u1ee7a email.&nbsp;<\/p>\n\n\n\n<p>N\u1ebfu c\u00e1c t\u1ed5 ch\u1ee9c t\u1eaft email HTML, h\u1ecd s\u1ebd ng\u0103n ch\u1eb7n \u0111\u01b0\u1ee3c nhi\u1ec1u cu\u1ed9c t\u1ea5n c\u00f4ng l\u1eeba \u0111\u1ea3o qua email.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"raise-awareness-of-users\"><strong>N\u00e2ng cao nh\u1eadn th\u1ee9c c\u1ee7a ng\u01b0\u1eddi d\u00f9ng<\/strong><\/h3>\n\n\n<p>Nhi\u1ec1u m\u1ed1i nguy hi\u1ec3m x\u00e2m nh\u1eadp v\u00e0o m\u1ea1ng b\u1eb1ng c\u00e1c ph\u01b0\u01a1ng ti\u1ec7n gian l\u1eadn, ch\u1eb3ng h\u1ea1n nh\u01b0 d\u1ee5 d\u1ed7 ng\u01b0\u1eddi d\u00f9ng m\u1edf t\u1ec7p \u0111\u00ednh k\u00e8m ho\u1eb7c nh\u1ea5p v\u00e0o li\u00ean k\u1ebft m\u00e0 h\u1ecd kh\u00f4ng n\u00ean m\u1edf. C\u00e1c phi\u00ean c\u00f3 th\u1ec3 gi\u00fap gi\u1ea3m \u0111\u00e1ng k\u1ec3 m\u1ee9c \u0111\u1ed9 ph\u01a1i nhi\u1ec5m t\u1ed5ng th\u1ec3 b\u1eb1ng c\u00e1ch h\u1ea1n ch\u1ebf c\u00e1c h\u00e0nh \u0111\u1ed9ng m\u00e0 ng\u01b0\u1eddi d\u00f9ng \u0111\u01b0\u1ee3c ph\u00e9p th\u1ef1c hi\u1ec7n v\u1edbi nh\u1eadn th\u1ee9c ph\u00f9 h\u1ee3p.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"conduct-behavior-ranking\"><strong>X\u1ebfp h\u1ea1ng h\u00e0nh vi ti\u1ebfn h\u00e0nh<\/strong><\/h3>\n\n\n<p>Th\u00f4ng th\u01b0\u1eddng, nh\u1eefng k\u1ebb t\u1ea5n c\u00f4ng tinh vi s\u1eed d\u1ee5ng c\u00e1c chi\u1ebfn thu\u1eadt ti\u00eau chu\u1ea9n \u0111\u1ec3 x\u00e1c \u0111\u1ecbnh xem m\u1ed9t c\u00e1i g\u00ec \u0111\u00f3 c\u00f3 an to\u00e0n hay kh\u00f4ng. M\u1eb7c d\u00f9 ph\u01b0\u01a1ng ph\u00e1p n\u00e0y kh\u00f4ng \u0111\u00e1ng tin c\u1eady l\u1eafm, nh\u01b0ng n\u00f3 v\u1eabn \u0111\u01b0\u1ee3c v\u00f4 s\u1ed1 k\u1ebb t\u1ea5n c\u00f4ng s\u1eed d\u1ee5ng r\u1ed9ng r\u00e3i.<\/p>\n\n\n\n<p>Nh\u1eefng k\u1ebb t\u1ea5n c\u00f4ng mu\u1ed1n kh\u00f4ng b\u1ecb ph\u00e1t hi\u1ec7n, v\u00ec v\u1eady b\u1ea1n ph\u1ea3i c\u1ea9n th\u1eadn v\u1ec1 h\u00e0nh \u0111\u1ed9ng c\u1ee7a ch\u00fang. Nhi\u1ec1u k\u1ebb t\u1ea5n c\u00f4ng c\u1ed1 g\u1eafng tr\u00f4ng gi\u1ed1ng nh\u01b0 l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp th\u00f4ng th\u01b0\u1eddng. Ch\u00fang l\u00e0m nh\u01b0 v\u1eady \u0111\u1ec3 c\u00f3 th\u1ec3 v\u01b0\u1ee3t qua an ninh m\u00e0 kh\u00f4ng b\u1ecb ph\u00e1t hi\u1ec7n. Nh\u01b0ng m\u1ed9t khi \u0111\u00e3 v\u00e0o b\u00ean trong, ch\u00fang s\u1ebd th\u1ec3 hi\u1ec7n \u00fd \u0111\u1ecbnh th\u1ef1c s\u1ef1 c\u1ee7a m\u00ecnh. V\u00ec v\u1eady, b\u1ea1n c\u1ea7n ph\u1ea3i ch\u00fa \u00fd \u0111\u1ebfn m\u1ed9t s\u1ed1 lo\u1ea1i h\u00e0nh vi nh\u1ea5t \u0111\u1ecbnh v\u00e0 t\u00ecm ra xem ch\u00fang tr\u00f4ng gi\u1ed1ng ng\u01b0\u1eddi d\u00f9ng th\u00f4ng th\u01b0\u1eddng hay ng\u01b0\u1eddi c\u00f3 \u0111\u1ed9ng c\u01a1 x\u1ea5u.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"create-a-sandboxing-environment\"><strong>T\u1ea1o m\u00f4i tr\u01b0\u1eddng h\u1ed9p c\u00e1t<\/strong><\/h3>\n\n\n<p>Sandbox l\u00e0 m\u00f4i tr\u01b0\u1eddng th\u1eed nghi\u1ec7m bi\u1ec7t l\u1eadp cho ph\u00e9p ng\u01b0\u1eddi d\u00f9ng ch\u1ea1y ch\u01b0\u01a1ng tr\u00ecnh ho\u1eb7c th\u1ef1c thi t\u1ec7p m\u00e0 kh\u00f4ng \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn ph\u1ea7n c\u00f2n l\u1ea1i c\u1ee7a h\u1ec7 th\u1ed1ng.<\/p>\n\n\n\n<p>M\u1ed9t m\u00f4i tr\u01b0\u1eddng kinh doanh \u0111i\u1ec3n h\u00ecnh c\u00f3 nhi\u1ec1u ng\u01b0\u1eddi d\u00f9ng c\u1ea7n truy c\u1eadp v\u00e0o c\u00e1c \u1ee9ng d\u1ee5ng v\u00e0 d\u1eef li\u1ec7u kh\u00e1c nhau. Tuy nhi\u00ean, kh\u00f4ng ph\u1ea3i t\u1ea5t c\u1ea3 ng\u01b0\u1eddi d\u00f9ng \u0111\u1ec1u c\u1ea7n truy c\u1eadp v\u00e0o t\u1ea5t c\u1ea3 c\u00e1c \u1ee9ng d\u1ee5ng v\u00e0 d\u1eef li\u1ec7u. H\u1ea7u h\u1ebft ng\u01b0\u1eddi d\u00f9ng ch\u1ec9 c\u1ea7n truy c\u1eadp v\u00e0o m\u1ed9t t\u1eadp h\u1ee3p con nh\u1ecf c\u00e1c \u1ee9ng d\u1ee5ng v\u00e0 d\u1eef li\u1ec7u.<\/p>\n\n\n\n<p>B\u1eb1ng c\u00e1ch t\u1ea1o ra m\u00f4i tr\u01b0\u1eddng sandbox, c\u00e1c doanh nghi\u1ec7p c\u00f3 th\u1ec3 h\u1ea1n ch\u1ebf l\u01b0\u1ee3ng d\u1eef li\u1ec7u v\u00e0 \u1ee9ng d\u1ee5ng m\u00e0 ng\u01b0\u1eddi d\u00f9ng c\u00f3 th\u1ec3 truy c\u1eadp. Sandbox s\u1ebd gi\u1ea3m thi\u1ec3u kh\u1ea3 n\u0103ng vi ph\u1ea1m d\u1eef li\u1ec7u v\u00e0 gi\u1ea3m t\u00e1c \u0111\u1ed9ng n\u1ebfu vi ph\u1ea1m x\u1ea3y ra.<\/p>\n\n\n\n<p>Ngo\u00e0i ra, sandbox c\u0169ng c\u00f3 th\u1ec3 gi\u00fap ng\u0103n ch\u1eb7n ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i l\u00e2y lan. N\u1ebfu ng\u01b0\u1eddi d\u00f9ng m\u1edf t\u1ec7p c\u00f3 ch\u1ee9a ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i, ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i s\u1ebd b\u1ecb c\u00f4 l\u1eadp trong sandbox v\u00e0 kh\u00f4ng th\u1ec3 l\u00e2y nhi\u1ec5m ph\u1ea7n c\u00f2n l\u1ea1i c\u1ee7a h\u1ec7 th\u1ed1ng.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"implement-least-privilege\"><strong>Th\u1ef1c hi\u1ec7n quy\u1ec1n h\u1ea1n t\u1ed1i thi\u1ec3u<\/strong><\/h3>\n\n\n<p>Quy\u1ec1n t\u1ed1i thi\u1ec3u l\u00e0 nguy\u00ean t\u1eafc b\u1ea3o m\u1eadt n\u00eau r\u1eb1ng ng\u01b0\u1eddi d\u00f9ng ch\u1ec9 \u0111\u01b0\u1ee3c c\u1ea5p m\u1ee9c quy\u1ec1n truy c\u1eadp t\u1ed1i thi\u1ec3u c\u1ea7n thi\u1ebft \u0111\u1ec3 th\u1ef1c hi\u1ec7n c\u00f4ng vi\u1ec7c c\u1ee7a h\u1ecd.<\/p>\n\n\n\n<p>V\u00ed d\u1ee5, ng\u01b0\u1eddi d\u00f9ng ch\u1ec9 n\u00ean \u0111\u01b0\u1ee3c c\u1ea5p quy\u1ec1n ch\u1ec9nh s\u1eeda n\u1ebfu h\u1ecd \u0111\u1ecdc d\u1eef li\u1ec7u t\u1eeb c\u01a1 s\u1edf d\u1eef li\u1ec7u. B\u1eb1ng c\u00e1ch h\u1ea1n ch\u1ebf ng\u01b0\u1eddi d\u00f9ng \u1edf m\u1ee9c truy c\u1eadp t\u1ed1i thi\u1ec3u c\u1ea7n thi\u1ebft, doanh nghi\u1ec7p c\u00f3 th\u1ec3 gi\u1ea3m kh\u1ea3 n\u0103ng vi ph\u1ea1m d\u1eef li\u1ec7u.<\/p>\n\n\n\n<p>Ngo\u00e0i ra, c\u00e1c doanh nghi\u1ec7p c\u0169ng n\u00ean c\u00e2n nh\u1eafc tri\u1ec3n khai \u0111\u1eb7c quy\u1ec1n t\u1ed1i thi\u1ec3u cho c\u00e1c \u1ee9ng d\u1ee5ng. N\u1ebfu m\u1ed9t \u1ee9ng d\u1ee5ng ch\u1ec9 c\u1ea7n \u0111\u1ecdc d\u1eef li\u1ec7u t\u1eeb c\u01a1 s\u1edf d\u1eef li\u1ec7u, b\u1ea1n kh\u00f4ng n\u00ean c\u1ea5p cho n\u00f3 quy\u1ec1n ghi. B\u1eb1ng c\u00e1ch h\u1ea1n ch\u1ebf c\u00e1c \u1ee9ng d\u1ee5ng \u1edf m\u1ee9c truy c\u1eadp t\u1ed1i thi\u1ec3u c\u1ea7n thi\u1ebft, c\u00e1c doanh nghi\u1ec7p c\u00f3 th\u1ec3 gi\u1ea3m th\u00eam kh\u1ea3 n\u0103ng vi ph\u1ea1m d\u1eef li\u1ec7u.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"secure-the-networks-outbound-traffic\"><strong>B\u1ea3o m\u1eadt l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp ra c\u1ee7a m\u1ea1ng<\/strong><\/h3>\n\n\n<p>V\u00ec l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp ra c\u00f3 nhi\u1ec1u kh\u1ea3 n\u0103ng ch\u1ee9a d\u1eef li\u1ec7u b\u1ecb \u0111\u00e1nh c\u1eafp t\u1eeb m\u1ea1ng, n\u00ean vi\u1ec7c gi\u00e1m s\u00e1t l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp ra th\u1eadm ch\u00ed c\u00f2n quan tr\u1ecdng h\u01a1n. B\u1eb1ng c\u00e1ch xem l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp ra, b\u1ea1n c\u00f3 th\u1ec3 x\u00e1c \u0111\u1ecbnh b\u1ea5t k\u1ef3 ho\u1ea1t \u0111\u1ed9ng b\u1ea5t th\u01b0\u1eddng n\u00e0o v\u00e0 th\u1ef1c hi\u1ec7n c\u00e1c b\u01b0\u1edbc \u0111\u1ec3 ng\u0103n c\u00f4ng ty c\u1ee7a b\u1ea1n b\u1ecb t\u1ed5n h\u1ea1i.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"understand-how-the-offence-operates\"><strong>Hi\u1ec3u c\u00e1ch th\u1ee9c ho\u1ea1t \u0111\u1ed9ng c\u1ee7a t\u1ed9i ph\u1ea1m<\/strong><\/h3>\n\n\n<p>\u0110\u1ec3 b\u1ea3o v\u1ec7 t\u1ed5 ch\u1ee9c c\u1ee7a b\u1ea1n kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng APT, b\u1ea1n ph\u1ea3i hi\u1ec3u c\u00e1ch th\u1ee9c ho\u1ea1t \u0111\u1ed9ng c\u1ee7a c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng. B\u1ea1n c\u0169ng ph\u1ea3i c\u1eadp nh\u1eadt c\u00e1c ph\u01b0\u01a1ng ph\u00e1p t\u1ea5n c\u00f4ng m\u1edbi nh\u1ea5t \u0111\u1ec3 chu\u1ea9n b\u1ecb ph\u00f2ng th\u1ee7.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"control-the-endpoint\"><strong>Ki\u1ec3m so\u00e1t \u0111i\u1ec3m cu\u1ed1i<\/strong><\/h3>\n\n\n<p>K\u1ebb t\u1ea5n c\u00f4ng c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng \u0111i\u1ec3m cu\u1ed1i \u0111\u1ec3 x\u00e2m nh\u1eadp v\u00e0o m\u1ea1ng, nh\u01b0ng m\u1ee5c ti\u00eau ch\u00ednh c\u1ee7a ch\u00fang th\u01b0\u1eddng l\u00e0 \u0111\u00e1nh c\u1eafp d\u1eef li\u1ec7u. N\u1ebfu b\u1ea1n mu\u1ed1n b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u c\u1ee7a m\u00ecnh v\u00e0 gi\u1ea3m thi\u1ec3u t\u00e1c \u0111\u1ed9ng c\u1ee7a m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng, <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/feature\/Endpoint-security-strategy-Focus-on-endpoints-apps-or-both\" target=\"_blank\" rel=\"noreferrer noopener\">t\u1eadp trung v\u00e0o vi\u1ec7c b\u1ea3o m\u1eadt v\u00e0 gi\u00e1m s\u00e1t \u0111i\u1ec3m cu\u1ed1i.<\/a><\/p>\n\n\n\n<p>C\u00e1c t\u1ed5 ch\u1ee9c c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng nhi\u1ec1u k\u1ef9 thu\u1eadt kh\u00e1c nhau \u0111\u1ec3 ki\u1ec3m so\u00e1t \u0111i\u1ec3m cu\u1ed1i. M\u1ed9t ph\u01b0\u01a1ng ph\u00e1p ti\u00eau chu\u1ea9n l\u00e0 y\u00eau c\u1ea7u x\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1 (TFA) cho t\u1ea5t c\u1ea3 ng\u01b0\u1eddi d\u00f9ng. TFA \u0111\u1ea3m b\u1ea3o r\u1eb1ng ch\u1ec9 nh\u1eefng ng\u01b0\u1eddi d\u00f9ng \u0111\u01b0\u1ee3c \u1ee7y quy\u1ec1n m\u1edbi c\u00f3 th\u1ec3 truy c\u1eadp d\u1eef li\u1ec7u.<\/p>\n\n\n\n<p>M\u1ed9t ph\u01b0\u01a1ng ph\u00e1p kh\u00e1c l\u00e0 s\u1eed d\u1ee5ng danh s\u00e1ch tr\u1eafng \u1ee9ng d\u1ee5ng. K\u1ef9 thu\u1eadt n\u00e0y ch\u1ec9 cho ph\u00e9p c\u00e1c \u1ee9ng d\u1ee5ng \u0111\u01b0\u1ee3c ch\u1ea5p thu\u1eadn ch\u1ea1y tr\u00ean \u0111i\u1ec3m cu\u1ed1i. B\u1eb1ng c\u00e1ch ki\u1ec3m so\u00e1t nh\u1eefng \u1ee9ng d\u1ee5ng n\u00e0o \u0111\u01b0\u1ee3c ph\u00e9p ch\u1ea1y, b\u1ea1n c\u00f3 th\u1ec3 gi\u1ea3m nguy c\u01a1 b\u1ecb t\u1ea5n c\u00f4ng.<\/p>\n\n\n\n<p>B\u1ea1n c\u0169ng c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng c\u00e1c c\u00f4ng c\u1ee5 gi\u00e1m s\u00e1t \u0111\u1ec3 ki\u1ec3m so\u00e1t \u0111i\u1ec3m cu\u1ed1i. C\u00e1c c\u00f4ng c\u1ee5 n\u00e0y c\u00f3 th\u1ec3 gi\u00fap b\u1ea1n ph\u00e1t hi\u1ec7n v\u00e0 ph\u1ea3n h\u1ed3i ho\u1ea1t \u0111\u1ed9ng \u0111\u00e1ng ng\u1edd.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"implement-a-data-classification-system\"><strong>Tri\u1ec3n khai h\u1ec7 th\u1ed1ng ph\u00e2n lo\u1ea1i d\u1eef li\u1ec7u<\/strong><\/h3>\n\n\n<p>B\u1ea1n ph\u1ea3i c\u00f3 m\u1ed9t quy tr\u00ecnh ph\u00e2n lo\u1ea1i d\u1eef li\u1ec7u ph\u00f9 h\u1ee3p \u0111\u1ec3 b\u1ea3o v\u1ec7 c\u00f4ng ty c\u1ee7a b\u1ea1n kh\u1ecfi APT. M\u1ed9t d\u1eef li\u1ec7u <a href=\"https:\/\/www.sciencelearn.org.nz\/resources\/1438-classification-system\" target=\"_blank\" rel=\"noreferrer noopener\">h\u1ec7 th\u1ed1ng ph\u00e2n lo\u1ea1i<\/a> c\u00f3 ngh\u0129a l\u00e0 bi\u1ebft th\u00f4ng tin n\u00e0o \u0111\u1ee7 nh\u1ea1y c\u1ea3m \u0111\u1ec3 c\u1ea7n \u0111\u01b0\u1ee3c b\u1ea3o v\u1ec7. M\u1ed9t trong nh\u1eefng v\u1ea5n \u0111\u1ec1 v\u1edbi APT l\u00e0 ch\u00fang li\u00ean t\u1ee5c c\u1ed1 g\u1eafng \u0111\u00e1nh c\u1eafp d\u1eef li\u1ec7u t\u1eeb t\u1ed5 ch\u1ee9c c\u1ee7a b\u1ea1n. B\u1ea1n ch\u1ec9 c\u00f3 th\u1ec3 ng\u0103n m\u1ed9t s\u1ed1 th\u1ee9 r\u1eddi kh\u1ecfi c\u00f4ng ty c\u1ee7a m\u00ecnh, nh\u01b0ng c\u00f3 m\u1ed9t quy tr\u00ecnh ph\u00e2n lo\u1ea1i d\u1eef li\u1ec7u ph\u00f9 h\u1ee3p s\u1ebd gi\u00fap b\u1ea1n t\u1ef1 b\u1ea3o v\u1ec7 m\u00ecnh kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng n\u00e0y.<\/p>\n\n\n\n<p>C\u00e1ch t\u1ed1t nh\u1ea5t \u0111\u1ec3 l\u01b0u tr\u1eef d\u1eef li\u1ec7u c\u1ee7a b\u1ea1n l\u00e0 tr\u00ean m\u1ea1ng l\u01b0u tr\u1eef d\u1ef1a tr\u00ean Internet. M\u1ea1ng l\u01b0u tr\u1eef n\u00e0y r\u1ea5t an to\u00e0n v\u00e0 s\u1ebd gi\u00fap gi\u1eef an to\u00e0n cho d\u1eef li\u1ec7u c\u1ee7a b\u1ea1n. \u0110i\u1ec1u quan tr\u1ecdng n\u1eefa l\u00e0 ch\u1ec9 cho ph\u00e9p th\u00f4ng tin c\u1ea7n thi\u1ebft r\u1eddi kh\u1ecfi c\u00f4ng ty \u0111\u1ec3 d\u1eef li\u1ec7u nh\u1ea1y c\u1ea3m \u0111\u01b0\u1ee3c gi\u1eef nguy\u00ean v\u1eb9n.<\/p>\n\n\n\n<p>N\u1ebfu b\u1ea1n c\u00f3 hai t\u1ec7p, m\u1ed9t t\u1ec7p c\u00f4ng khai v\u00e0 t\u1ec7p c\u00f2n l\u1ea1i l\u00e0 t\u1ec7p b\u00ed m\u1eadt, th\u00ec t\u1ec7p b\u00ed m\u1eadt c\u00f3 nguy c\u01a1 cao h\u01a1n v\u00ec m\u1ecdi ng\u01b0\u1eddi c\u00f3 th\u1ec3 kh\u00f4ng bi\u1ebft \u0111\u00f3 l\u00e0 t\u1ec7p b\u00ed m\u1eadt. M\u1ed9t t\u1ed5 ch\u1ee9c hi\u1ec7n c\u00f3 th\u1ec3 \u0111i\u1ec1u ch\u1ec9nh v\u00e0 qu\u1ea3n l\u00fd lu\u1ed3ng th\u00f4ng tin b\u1eb1ng gi\u1ea3i ph\u00e1p ng\u0103n ng\u1eeba m\u1ea5t d\u1eef li\u1ec7u (DLP) c\u00f3 li\u00ean k\u1ebft ch\u1eb7t ch\u1ebd v\u1edbi qu\u1ea3n l\u00fd quy\u1ec1n k\u1ef9 thu\u1eadt s\u1ed1 (DRM).<\/p>\n\n\n\n<p>C\u00f3 m\u1ed9t s\u1ed1 b\u01b0\u1edbc trong quy tr\u00ecnh ph\u00e2n lo\u1ea1i d\u1eef li\u1ec7u ph\u00f9 h\u1ee3p:<\/p>\n\n\n\n<p>1. X\u00e1c \u0111\u1ecbnh ng\u01b0\u1eddi qu\u1ea3n l\u00fd<\/p>\n\n\n\n<p>2. Ch\u1ec9 \u0111\u1ecbnh c\u00e1c lo\u1ea1i d\u1eef li\u1ec7u<\/p>\n\n\n\n<p>3. Ph\u00e2n lo\u1ea1i d\u1eef li\u1ec7u<\/p>\n\n\n\n<p>4. Thi\u1ebft l\u1eadp ki\u1ec3m so\u00e1t b\u1ea3o m\u1eadt<\/p>\n\n\n\n<p>5. \u0110\u00e0o t\u1ea1o nh\u00e2n vi\u00ean v\u1ec1 quy tr\u00ecnh<\/p>\n\n\n\n<p>6. Theo d\u00f5i v\u00e0 xem x\u00e9t quy tr\u00ecnh<\/p>\n\n\n\n<p>3. X\u00e1c \u0111\u1ecbnh gi\u00e1 tr\u1ecb c\u1ee7a d\u1eef li\u1ec7u<\/p>\n\n\n\n<p>4. Ph\u00e2n lo\u1ea1i d\u1eef li\u1ec7u<\/p>\n\n\n\n<p>5. T\u1ea1o ch\u00ednh s\u00e1ch<\/p>\n\n\n\n<p>6. \u0110\u00e0o t\u1ea1o nh\u00e2n vi\u00ean<\/p>\n\n\n\n<p>7. Th\u1ef1c thi ch\u00ednh s\u00e1ch<\/p>\n\n\n\n<p>8. Gi\u00e1m s\u00e1t s\u1ef1 tu\u00e2n th\u1ee7<\/p>\n\n\n\n<p>Quy tr\u00ecnh ph\u00e2n lo\u1ea1i d\u1eef li\u1ec7u l\u00e0 m\u1ed9t ph\u1ea7n thi\u1ebft y\u1ebfu c\u1ee7a b\u1ea5t k\u1ef3 k\u1ebf ho\u1ea1ch b\u1ea3o m\u1eadt n\u00e0o. B\u1eb1ng c\u00e1ch tri\u1ec3n khai quy tr\u00ecnh ph\u00e2n lo\u1ea1i, b\u1ea1n c\u00f3 th\u1ec3 gi\u00fap b\u1ea3o v\u1ec7 c\u00f4ng ty c\u1ee7a m\u00ecnh kh\u1ecfi APT.<\/p>\n\n\n\n<p>An ninh m\u1ea1ng r\u1ea5t quan tr\u1ecdng. C\u00e1c t\u1ed5 ch\u1ee9c s\u1ebd ti\u1ebfp t\u1ee5c b\u1ecb t\u1ea5n c\u00f4ng, nh\u01b0ng ch\u00fang ta v\u1eabn chi\u1ebfn \u0111\u1ea5u.&nbsp;<\/p>\n\n\n\n<p>Ch\u00fang ta kh\u00f4ng th\u1ec3 lu\u00f4n ng\u0103n ch\u1eb7n m\u1ecdi cu\u1ed9c t\u1ea5n c\u00f4ng, nh\u01b0ng b\u1eb1ng c\u00e1ch chu\u1ea9n b\u1ecb v\u00e0 si\u00eang n\u0103ng, ch\u00fang ta c\u00f3 th\u1ec3 h\u1ea1n ch\u1ebf thi\u1ec7t h\u1ea1i m\u00e0 tin t\u1eb7c g\u00e2y ra.<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>T\u1ea5n c\u00f4ng APT l\u00e0 m\u1ed9t lo\u1ea1i t\u1ea5n c\u00f4ng m\u1ea1ng \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n b\u1edfi k\u1ebb t\u1ea5n c\u00f4ng c\u00f3 \u0111\u1ed9ng c\u01a1 v\u00e0 ngu\u1ed3n l\u1ef1c t\u1ed1t, nh\u1eb1m m\u1ee5c \u0111\u00edch gi\u00e0nh quy\u1ec1n truy c\u1eadp l\u00e2u d\u00e0i v\u00e0o m\u1ea1ng c\u1ee7a m\u1ee5c ti\u00eau. Cu\u1ed9c t\u1ea5n c\u00f4ng \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/apt-moi-de-doa-kien-tri-nang-cao\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">APT (M\u1ed1i \u0111e d\u1ecda dai d\u1eb3ng n\u00e2ng cao)<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":635,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":["post-524","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-threats","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>APT (Advanced Persistent Threat) | Security Briefing<\/title>\n<meta name=\"description\" content=\"An overview of APTs, what they are and how they work. Learn why companies continue to be vulnerable to them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/apt-moi-de-doa-kien-tri-nang-cao\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"APT (Advanced Persistent Threat) | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"An overview of APTs, what they are and how they work. Learn why companies continue to be vulnerable to them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/apt-moi-de-doa-kien-tri-nang-cao\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-21T21:43:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"558\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"APT (Advanced Persistent Threat)\",\"datePublished\":\"2022-08-21T21:43:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/\"},\"wordCount\":1827,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg\",\"articleSection\":[\"Cyber Threats\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/\",\"name\":\"APT (Advanced Persistent Threat) | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg\",\"datePublished\":\"2022-08-21T21:43:26+00:00\",\"description\":\"An overview of APTs, what they are and how they work. Learn why companies continue to be vulnerable to them.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg\",\"width\":558,\"height\":500,\"caption\":\"APT banner\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"APT (Advanced Persistent Threat)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"M\u1ed1i \u0111e d\u1ecda dai d\u1eb3ng n\u00e2ng cao (APT) | T\u00f3m t\u1eaft An ninh","description":"T\u1ed5ng quan v\u1ec1 APT, ch\u00fang l\u00e0 g\u00ec v\u00e0 ch\u00fang ho\u1ea1t \u0111\u1ed9ng nh\u01b0 th\u1ebf n\u00e0o. T\u00ecm hi\u1ec3u l\u00fd do t\u1ea1i sao c\u00e1c c\u00f4ng ty v\u1eabn d\u1ec5 b\u1ecb t\u1ea5n c\u00f4ng.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/apt-moi-de-doa-kien-tri-nang-cao\/","og_locale":"vi_VN","og_type":"article","og_title":"APT (Advanced Persistent Threat) | Security Briefing","og_description":"An overview of APTs, what they are and how they work. Learn why companies continue to be vulnerable to them.","og_url":"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/apt-moi-de-doa-kien-tri-nang-cao\/","og_site_name":"Security Briefing","article_published_time":"2022-08-21T21:43:26+00:00","og_image":[{"width":558,"height":500,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"C\u00e9sar Daniel Barreto","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"9 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"APT (Advanced Persistent Threat)","datePublished":"2022-08-21T21:43:26+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/"},"wordCount":1827,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg","articleSection":["Cyber Threats"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/","url":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/","name":"M\u1ed1i \u0111e d\u1ecda dai d\u1eb3ng n\u00e2ng cao (APT) | T\u00f3m t\u1eaft An ninh","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg","datePublished":"2022-08-21T21:43:26+00:00","description":"T\u1ed5ng quan v\u1ec1 APT, ch\u00fang l\u00e0 g\u00ec v\u00e0 ch\u00fang ho\u1ea1t \u0111\u1ed9ng nh\u01b0 th\u1ebf n\u00e0o. T\u00ecm hi\u1ec3u l\u00fd do t\u1ea1i sao c\u00e1c c\u00f4ng ty v\u1eabn d\u1ec5 b\u1ecb t\u1ea5n c\u00f4ng.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg","width":558,"height":500,"caption":"APT banner"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"APT (Advanced Persistent Threat)"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto l\u00e0 m\u1ed9t nh\u00e0 v\u0103n v\u00e0 chuy\u00ean gia an ninh m\u1ea1ng \u0111\u01b0\u1ee3c k\u00ednh tr\u1ecdng, n\u1ed5i ti\u1ebfng v\u1edbi ki\u1ebfn th\u1ee9c s\u00e2u r\u1ed9ng v\u00e0 kh\u1ea3 n\u0103ng \u0111\u01a1n gi\u1ea3n h\u00f3a c\u00e1c ch\u1ee7 \u0111\u1ec1 an ninh m\u1ea1ng ph\u1ee9c t\u1ea1p. V\u1edbi kinh nghi\u1ec7m s\u00e2u r\u1ed9ng v\u1ec1 b\u1ea3o m\u1eadt m\u1ea1ng v\u00e0 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u, \u00f4ng th\u01b0\u1eddng xuy\u00ean \u0111\u00f3ng g\u00f3p c\u00e1c b\u00e0i vi\u1ebft v\u00e0 ph\u00e2n t\u00edch s\u00e2u s\u1eafc v\u1ec1 c\u00e1c xu h\u01b0\u1edbng an ninh m\u1ea1ng m\u1edbi nh\u1ea5t, gi\u00e1o d\u1ee5c c\u1ea3 chuy\u00ean gia v\u00e0 c\u00f4ng ch\u00fang.","url":"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=524"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/524\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/635"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}