{"id":1771,"date":"2016-01-25T10:03:19","date_gmt":"2016-01-25T10:03:19","guid":{"rendered":"http:\/\/www.camcert.gov.kh\/?p=1771"},"modified":"2018-12-12T02:33:08","modified_gmt":"2018-12-12T02:33:08","slug":"basic-cybersecurity-india","status":"publish","type":"post","link":"https:\/\/www.camcert.gov.kh\/en\/basic-cybersecurity-india\/","title":{"rendered":"\u179c\u1782\u17d2\u1782\u1794\u178e\u17d2\u178f\u17bb\u17c7\u1794\u178e\u17d2\u178f\u17b6\u179b\u1798\u17bc\u179b\u178a\u17d2\u178b\u17b6\u1793\u179f\u17d2\u178f\u17b8\u17a2\u17c6\u1796\u17b8 CyberSecurity"},"content":{"rendered":"<p>\u178f\u1794\u178f\u17b6\u1798\u17a2\u1789\u17d2\u1787\u17be\u1789\u179a\u1794\u179f\u17cb Asia Pacific Telecommunity (APT) <strong>\u179b\u17c4\u1780 \u178f\u17b6\u1793\u17cb \u179f\u17bb\u1797\u17d0\u1780\u17d2\u179a<\/strong>\u00a0\u1794\u17d2\u179a\u1792\u17b6\u1793\u1780\u17b6\u179a\u17b7\u1799\u17b6\u179b\u17d0\u1799\u1786\u17d2\u179b\u17be\u1799\u178f\u1794\u1794\u1789\u17d2\u17a0\u17b6\u1794\u1793\u17d2\u1791\u17b6\u1793\u17cb\u1793\u17c3\u1780\u17bb\u17c6\u1796\u17d2\u1799\u17bc\u1791\u17d0\u179a (CamCERT) \u1793\u17c3\u1793\u17b6\u1799\u1780\u178a\u17d2\u178b\u17b6\u1793\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793 \u1793\u17c3\u17a2\u1782\u17d2\u1782\u1793\u17b6\u1799\u1780\u178a\u17d2\u178b\u17b6\u1793\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6 \u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793 \u178f\u17d2\u179a\u17bc\u179c\u1794\u17b6\u1793\u1785\u17b6\u178f\u17cb\u178f\u17b6\u17c6\u1784\u17b2\u17d2\u1799\u1785\u17bc\u179b\u179a\u17bd\u1798\u179c\u1782\u17d2\u1782\u1794\u178e\u17d2\u178f\u17bb\u17c7\u1794\u178e\u17d2\u178f\u17b6\u179b <strong>\u179f\u17d2\u178f\u17b8\u17a2\u17c6\u1796\u17b8\u1785\u17c6\u178e\u17c1\u17c7\u178a\u17b9\u1784\u1798\u17bc\u179b\u178a\u17d2\u178b\u17b6\u1793\u179f\u17d2\u178f\u17b8\u1796\u17b8\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u00a0\u00a0(Cyber Security Fundamential)<\/strong>\u00a0\u1785\u17b6\u1794\u17cb\u1796\u17b8\u1790\u17d2\u1784\u17c3\u1791\u17b8\u17e1\u17e7\u00a0\u178a\u179b\u17cb\u1790\u17d2\u1784\u17c3\u1791\u17b8\u17e2\u17e1 \u1781\u17c2\u179f\u17b8\u17a0\u17b6 \u1786\u17d2\u1793\u17b6\u17c6\u17e2\u17e0\u17e1\u17e5 \u1793\u17c5\u1791\u17b8\u1780\u17d2\u179a\u17bb\u1784 Hyderabad \u1794\u17d2\u179a\u1791\u17c1\u179f\u17a5\u178e\u17d2\u178c\u17b6\u00a0\u178a\u17c4\u1799\u1798\u17b6\u1793\u1780\u17b6\u179a\u1785\u17bc\u179b\u179a\u17bd\u1798\u1798\u1780\u1796\u17b8\u1794\u178e\u17d2\u178f\u17b6\u179a\u178a\u17d2\u178b\u1787\u17b6\u179f\u1798\u17b6\u1787\u17b7\u1780\u1798\u1780\u1796\u17b8 \u17e0\u17e9\u1794\u17d2\u179a\u1791\u17c1\u179f: \u1780\u1798\u17d2\u1796\u17bb\u1787\u17b6, \u1790\u17c3, \u179c\u17c0\u178f\u178e\u17b6\u1798, \u17a1\u17b6\u179c, \u1798\u17b8\u1799\u17c9\u17b6\u1793\u17cb\u1798\u17c9\u17b6, \u1798\u17c9\u17bb\u1784\u17a0\u17d2\u1782\u17c4\u179b\u17b8, \u1794\u17ca\u17bc\u178f\u17b6\u1793, \u1794\u1784\u17cb\u1780\u17d2\u179b\u17b6\u178a\u17c2\u179f \u1793\u17b7\u1784\u17a2\u17b6\u17a0\u17d2\u1782\u17b6\u1793\u17b8\u179f\u17d2\u1790\u17b6\u1793 \u1780\u17d2\u179a\u17c4\u1798\u1780\u17b6\u179a\u179a\u17c0\u1794\u1785\u17c6\u179a\u1794\u179f\u17cb\u1791\u17bc\u179a\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd\u17a2\u17b6\u179f\u17ca\u17b8\u1794\u17c9\u17b6\u179f\u17ca\u17b8\u17a0\u17d2\u179c\u17b7\u1780 \u17d4<\/p>\n<p>\u1782\u17c4\u179b\u1794\u17c6\u178e\u1784\u179f\u17c6\u1781\u17b6\u1793\u17cb\u1793\u17c3\u179c\u1782\u17d2\u1782\u1794\u178e\u17d2\u178f\u17bb\u17c7\u1794\u178e\u17d2\u178f\u17b6\u179b\u1793\u17c1\u17c7\u178f\u17d2\u179a\u17bc\u179c\u1794\u17b6\u1793\u1795\u17d2\u178f\u17c4\u178f\u1785\u17c6\u178e\u1784\u1791\u17c5\u179b\u17be\u1794\u17d2\u179a\u1792\u17b6\u1793\u1794\u1791\u1792\u17c6\u17d7\u1785\u17c6\u1793\u17bd\u1793 \u17e0\u17e4 \u178a\u17bc\u1785\u1781\u17b6\u1784\u1780\u17d2\u179a\u17c4\u1798\u17d6<\/p>\n<p>\u17e1. \u179f\u1780\u1798\u17d2\u1798\u1797\u17b6\u1796 \u1793\u17b7\u1784\u1794\u17d2\u179a\u1797\u17c1\u1791\u1793\u17c3\u1780\u17b6\u179a\u179c\u17b6\u1799\u1794\u17d2\u179a\u17a0\u17b6\u179a \u1793\u17c5\u179b\u17be\u179c\u17b7\u179f\u17d0\u1799\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793<br \/>\n\u17e2. \u178a\u17c6\u178e\u17be\u179a\u1780\u17b6\u179a\u1782\u17d2\u179a\u1794\u17cb\u1782\u17d2\u179a\u1784\u1793\u17c3\u1780\u17b6\u179a\u1786\u17d2\u179b\u17be\u1799\u178f\u1794\u1794\u1789\u17d2\u17a0\u17b6\u1794\u1793\u17d2\u1791\u17b6\u1793\u17cb<br \/>\n\u17e3. \u1799\u179b\u17cb\u178a\u17b9\u1784\u17a2\u17c6\u1796\u17b8 Cryptography \u1793\u17b7\u1784 Steganography \u1780\u17d2\u1793\u17bb\u1784\u1780\u17b6\u179a\u1794\u17c6\u179b\u17c2\u1784\u1791\u17b7\u1793\u17d2\u1793\u1793\u17d0\u1799\u178a\u17be\u1798\u17d2\u1794\u17b8\u1780\u17b6\u179a\u1796\u17b6\u179a\u1791\u17b7\u1793\u17d2\u1793\u1793\u17d0\u1799\u178a\u17c2\u179b\u1794\u17b6\u1793 \u1794\u1789\u17d2\u1787\u17bc\u1793 \u17ac\u1780\u17cf\u179a\u1780\u17d2\u179f\u17b6\u1791\u17bb\u1780\u1793\u17c5\u179b\u17be\u1794\u17d2\u179a\u1796\u17d0\u1793\u17d2\u1792\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793<br \/>\n\u17e4. \u00a0\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u17a2\u17c6\u1796\u17b8 Cyber Laws \u1793\u17c3\u1794\u17d2\u179a\u1791\u17c1\u179f\u17a5\u178e\u17d2\u178c\u17b6 \u17d4<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2151 aligncenter\" src=\"http:\/\/ict.mptc.gov.kh\/wp-content\/uploads\/2015\/12\/APT-India-GroupPhoto.png\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" srcset=\"http:\/\/ict.mptc.gov.kh\/wp-content\/uploads\/2015\/12\/APT-India-GroupPhoto-300x201.png 300w, http:\/\/ict.mptc.gov.kh\/wp-content\/uploads\/2015\/12\/APT-India-GroupPhoto.png 1000w\" alt=\"APT-India-GroupPhoto\" width=\"1000\" height=\"671\" \/><\/p>\n"},"excerpt":{"rendered":"<p>\u178f\u1794\u178f\u17b6\u1798\u17a2\u1789\u17d2\u1787\u17be\u1789\u179a\u1794\u179f\u17cb Asia Pacific Telecommunity (APT) \u179b\u17c4\u1780 \u178f\u17b6\u1793\u17cb \u179f\u17bb\u1797\u17d0\u1780\u17d2\u179a\u00a0\u1794\u17d2\u179a\u1792\u17b6\u1793\u1780\u17b6\u179a\u17b7\u1799\u17b6\u179b\u17d0\u1799\u1786\u17d2\u179b\u17be\u1799\u178f\u1794\u1794\u1789\u17d2\u17a0\u17b6\u1794\u1793\u17d2\u1791\u17b6\u1793\u17cb\u1793\u17c3\u1780\u17bb\u17c6\u1796\u17d2\u1799\u17bc\u1791\u17d0\u179a (CamCERT) \u1793\u17c3\u1793\u17b6\u1799\u1780\u178a\u17d2\u178b\u17b6\u1793\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793 \u1793\u17c3\u17a2\u1782\u17d2\u1782\u1793\u17b6\u1799\u1780\u178a\u17d2\u178b\u17b6\u1793\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6 \u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793 \u178f\u17d2\u179a\u17bc\u179c\u1794\u17b6\u1793\u1785\u17b6\u178f\u17cb\u178f\u17b6\u17c6\u1784\u17b2\u17d2\u1799\u1785\u17bc\u179b\u179a\u17bd\u1798\u179c\u1782\u17d2\u1782\u1794\u178e\u17d2\u178f\u17bb\u17c7\u1794\u178e\u17d2\u178f\u17b6\u179b \u179f\u17d2\u178f\u17b8\u17a2\u17c6\u1796\u17b8\u1785\u17c6\u178e\u17c1\u17c7\u178a\u17b9\u1784\u1798\u17bc\u179b\u178a\u17d2\u178b\u17b6\u1793\u179f\u17d2\u178f\u17b8\u1796\u17b8\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u00a0\u00a0(Cyber Security Fundamential)\u00a0\u1785\u17b6\u1794\u17cb\u1796\u17b8\u1790\u17d2\u1784\u17c3\u1791\u17b8\u17e1\u17e7\u00a0\u178a\u179b\u17cb\u1790\u17d2\u1784\u17c3\u1791\u17b8\u17e2\u17e1 \u1781\u17c2\u179f\u17b8\u17a0\u17b6 \u1786\u17d2\u1793\u17b6\u17c6\u17e2\u17e0\u17e1\u17e5 \u1793\u17c5\u1791\u17b8\u1780\u17d2\u179a\u17bb\u1784 Hyderabad \u1794\u17d2\u179a\u1791\u17c1\u179f\u17a5\u178e\u17d2\u178c\u17b6\u00a0\u178a\u17c4\u1799\u1798\u17b6\u1793\u1780\u17b6\u179a\u1785\u17bc\u179b\u179a\u17bd\u1798\u1798\u1780\u1796\u17b8\u1794\u178e\u17d2\u178f\u17b6\u179a\u178a\u17d2\u178b\u1787\u17b6\u179f\u1798\u17b6\u1787\u17b7\u1780\u1798\u1780\u1796\u17b8 \u17e0\u17e9\u1794\u17d2\u179a\u1791\u17c1\u179f: \u1780\u1798\u17d2\u1796\u17bb\u1787\u17b6, \u1790\u17c3, \u179c\u17c0\u178f\u178e\u17b6\u1798, \u17a1\u17b6\u179c, \u1798\u17b8\u1799\u17c9\u17b6\u1793\u17cb\u1798\u17c9\u17b6, \u1798\u17c9\u17bb\u1784\u17a0\u17d2\u1782\u17c4\u179b\u17b8, \u1794\u17ca\u17bc\u178f\u17b6\u1793, \u1794\u1784\u17cb\u1780\u17d2\u179b\u17b6\u178a\u17c2\u179f \u1793\u17b7\u1784\u17a2\u17b6\u17a0\u17d2\u1782\u17b6\u1793\u17b8\u179f\u17d2\u1790\u17b6\u1793 \u1780\u17d2\u179a\u17c4\u1798\u1780\u17b6\u179a\u179a\u17c0\u1794\u1785\u17c6\u179a\u1794\u179f\u17cb\u1791\u17bc\u179a\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd\u17a2\u17b6\u179f\u17ca\u17b8\u1794\u17c9\u17b6\u179f\u17ca\u17b8\u17a0\u17d2\u179c\u17b7\u1780 \u17d4 \u1782\u17c4\u179b\u1794\u17c6\u178e\u1784\u179f\u17c6\u1781\u17b6\u1793\u17cb\u1793\u17c3\u179c\u1782\u17d2\u1782\u1794\u178e\u17d2\u178f\u17bb\u17c7\u1794\u178e\u17d2\u178f\u17b6\u179b\u1793\u17c1\u17c7\u178f\u17d2\u179a\u17bc\u179c\u1794\u17b6\u1793\u1795\u17d2\u178f\u17c4\u178f\u1785\u17c6\u178e\u1784\u1791\u17c5\u179b\u17be\u1794\u17d2\u179a\u1792\u17b6\u1793\u1794\u1791\u1792\u17c6\u17d7\u1785\u17c6\u1793\u17bd\u1793 \u17e0\u17e4 \u178a\u17bc\u1785\u1781\u17b6\u1784\u1780\u17d2\u179a\u17c4\u1798\u17d6 \u17e1. \u179f\u1780\u1798\u17d2\u1798\u1797\u17b6\u1796 \u1793\u17b7\u1784\u1794\u17d2\u179a\u1797\u17c1\u1791\u1793\u17c3\u1780\u17b6\u179a\u179c\u17b6\u1799\u1794\u17d2\u179a\u17a0\u17b6\u179a \u1793\u17c5\u179b\u17be\u179c\u17b7\u179f\u17d0\u1799\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793 \u17e2. \u178a\u17c6\u178e\u17be\u179a\u1780\u17b6\u179a\u1782\u17d2\u179a\u1794\u17cb\u1782\u17d2\u179a\u1784\u1793\u17c3\u1780\u17b6\u179a\u1786\u17d2\u179b\u17be\u1799\u178f\u1794\u1794\u1789\u17d2\u17a0\u17b6\u1794\u1793\u17d2\u1791\u17b6\u1793\u17cb \u17e3. \u1799\u179b\u17cb\u178a\u17b9\u1784\u17a2\u17c6\u1796\u17b8 Cryptography \u1793\u17b7\u1784 Steganography \u1780\u17d2\u1793\u17bb\u1784\u1780\u17b6\u179a\u1794\u17c6\u179b\u17c2\u1784\u1791\u17b7\u1793\u17d2\u1793\u1793\u17d0\u1799\u178a\u17be\u1798\u17d2\u1794\u17b8\u1780\u17b6\u179a\u1796\u17b6\u179a\u1791\u17b7\u1793\u17d2\u1793\u1793\u17d0\u1799\u178a\u17c2\u179b\u1794\u17b6\u1793 \u1794\u1789\u17d2\u1787\u17bc\u1793 \u17ac\u1780\u17cf\u179a\u1780\u17d2\u179f\u17b6\u1791\u17bb\u1780\u1793\u17c5\u179b\u17be\u1794\u17d2\u179a\u1796\u17d0\u1793\u17d2\u1792\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1769,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,12],"tags":[94,91],"class_list":["post-1771","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-activities","category-trainingseminar","tag-fea","tag-home"],"_links":{"self":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/1771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/comments?post=1771"}],"version-history":[{"count":1,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/1771\/revisions"}],"predecessor-version":[{"id":1773,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/1771\/revisions\/1773"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/media\/1769"}],"wp:attachment":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/media?parent=1771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/categories?post=1771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/tags?post=1771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}