{"id":3941,"date":"2019-04-09T21:22:55","date_gmt":"2019-04-09T14:22:55","guid":{"rendered":"https:\/\/www.camcert.gov.kh\/?p=3941"},"modified":"2019-04-09T21:23:49","modified_gmt":"2019-04-09T14:23:49","slug":"aware-cybersecurity-fundamentals-niptict","status":"publish","type":"post","link":"https:\/\/www.camcert.gov.kh\/en\/aware-cybersecurity-fundamentals-niptict\/","title":{"rendered":"\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u17a2\u17c6\u1796\u17b8\u1798\u17bc\u179b\u178a\u17d2\u178b\u17b6\u1793\u1782\u17d2\u179a\u17b9\u17c7\u1793\u17c3\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793 \u200b (Cyber Security Fundamentals)"},"content":{"rendered":"<p>\u179a\u17b6\u1787\u1792\u17b6\u1793\u17b8\u1797\u17d2\u1793\u17c6\u1796\u17c1\u1789\u17d6 \u1780\u17b6\u179b\u1796\u17b8\u1790\u17d2\u1784\u17c3\u1791\u17b8\u17e0\u17e8 \u1781\u17c2\u1798\u17c1\u179f\u17b6 \u1786\u17d2\u1793\u17b6\u17c6\u17e2\u17e0\u17e1\u17e9 \u179b\u17c4\u1780 \u1782\u17b9\u1798 \u17a2\u17b6\u1793 \u1794\u17d2\u179a\u1792\u17b6\u1793\u1780\u17b6\u179a\u17b7\u1799\u17b6\u179b\u17d0\u1799\u1786\u17d2\u179b\u17be\u1799\u178f\u1794\u1794\u1789\u17d2\u17a0\u17b6\u1794\u1793\u17d2\u1791\u17b6\u1793\u17cb\u1793\u17c3\u1780\u17bb\u17c6\u1796\u17d2\u1799\u17bc\u1791\u17d0\u179a\u200b (CamCERT) \u1793\u17c3\u1793\u17b6\u1799\u1780\u178a\u17d2\u178b\u17b6\u1793\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u200b \u1793\u17c3\u17a2\u1782\u17d2\u1782\u1793\u17b6\u1799\u1780\u178a\u17d2\u178b\u17b6\u1793\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793 \u1793\u17c3\u1780\u17d2\u179a\u179f\u17bd\u1784\u1794\u17d2\u179a\u17c3\u179f\u178e\u17b8\u1799\u17cd \u1793\u17b7\u1784\u1791\u17bc\u179a\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u178f\u17d2\u179a\u17bc\u179c\u1794\u17b6\u1793\u17a2\u1789\u17d2\u1787\u17be\u1789\u17b2\u17d2\u1799\u1785\u17bc\u179b\u179a\u17bd\u1798\u1787\u17b6\u179c\u17b6\u1782\u17d2\u1798\u17b7\u1793 \u178a\u17be\u1798\u17d2\u1794\u17b8\u1792\u17d2\u179c\u17be\u1794\u1791\u1794\u1784\u17d2\u17a0\u17b6\u1789\u17a2\u17c6\u1796\u17b8 \u1798\u17bc\u179b\u178a\u17d2\u178b\u17b6\u1793\u1782\u17d2\u179a\u17b9\u17c7\u1793\u17c3\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793 (Cyber Security Fundamentals) \u1793\u17c5\u179c\u17b7\u1791\u17d2\u1799\u17b6\u179f\u17d2\u1790\u17b6\u1793\u1787\u17b6\u178f\u17b7\u1794\u17d2\u179a\u17c3\u179f\u178e\u17b8\u1799\u17cd \u1791\u17bc\u179a\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793 (NIPTICT) \u1787\u17bc\u1793\u178a\u179b\u17cb\u17a2\u17d2\u1793\u1780\u1785\u17bc\u179b\u179a\u17bd\u1798\u1794\u17d2\u179a\u1798\u17b6\u178e\u1787\u17b6 \u17e4\u17e0\u179a\u17bc\u1794\u1798\u1780\u1796\u17b8\u1780\u17d2\u179a\u179f\u17bd\u1784-\u179f\u17d2\u1790\u17b6\u1794\u17d0\u1793\u1795\u17d2\u179f\u17c1\u1784\u17d7\u17d4<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3943\" src=\"https:\/\/www.camcert.gov.kh\/wp-content\/uploads\/2019\/04\/photo_2019-04-08_20-29-39.jpg\" alt=\"\" width=\"1280\" height=\"960\" srcset=\"https:\/\/www.camcert.gov.kh\/wp-content\/uploads\/2019\/04\/photo_2019-04-08_20-29-39.jpg 1280w, https:\/\/www.camcert.gov.kh\/wp-content\/uploads\/2019\/04\/photo_2019-04-08_20-29-39-300x225.jpg 300w, https:\/\/www.camcert.gov.kh\/wp-content\/uploads\/2019\/04\/photo_2019-04-08_20-29-39-768x576.jpg 768w, https:\/\/www.camcert.gov.kh\/wp-content\/uploads\/2019\/04\/photo_2019-04-08_20-29-39-1024x768.jpg 1024w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/p>\n<p>\u1782\u17c4\u179b\u1794\u17c6\u178e\u1784\u1793\u17c3\u1794\u1791\u1794\u1784\u17d2\u17a0\u17b6\u1789\u1782\u17ba\u178a\u17be\u1798\u17d2\u1794\u17b8\u1785\u17c2\u1780\u179a\u17c6\u179b\u17c2\u1780\u1785\u17c6\u178e\u17c1\u17c7\u178a\u17b9\u1784 \u1793\u17b7\u1784\u1794\u1791\u1796\u17b7\u179f\u17c4\u1792\u1793\u17cd\u1780\u17b6\u179a\u1784\u17b6\u179a\u179a\u1794\u179f\u17cb\u1780\u17b6\u179a\u17b7\u1799\u17b6\u179b\u17d0\u1799 CamCERT \u1793\u17b7\u1784\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u17a2\u17c6\u1796\u17b8\u17d6<br \/>\n\u2013 \u1798\u17bc\u179b\u178a\u17d2\u178b\u17b6\u1793\u1782\u17d2\u179a\u17b9\u17c7\u1793\u17c3\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793 (Cyber Security Fundamentals)<br \/>\n\u2013 \u1780\u17b6\u179a\u1782\u17c6\u179a\u17b6\u1798\u1780\u17c6\u17a0\u17c2\u1784 \u1797\u17b6\u1796\u1784\u17b6\u1799\u179a\u1784\u1782\u17d2\u179a\u17c4\u17c7 \u1793\u17b7\u1784\u17a0\u17b6\u1793\u17b7\u1797\u17d0\u1799\u178a\u17c2\u179b\u17a2\u17b6\u1785\u1780\u17be\u178f\u1798\u17b6\u1793\u1780\u17d2\u1793\u17bb\u1784\u17a2\u17ca\u17b7\u1793\u1792\u17ba\u178e\u17b7\u178f\u200b (Threat, Vulnerability and Risks)<br \/>\n\u2013 \u1782\u17c4\u179b\u1794\u17c6\u178e\u1784 \u1793\u17b7\u1784\u178f\u1798\u17d2\u179a\u17bc\u179c\u1780\u17b6\u179a\u1793\u17c3\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793 (Objective and The needed of Information Security)<br \/>\n\u2013 \u1782\u17c4\u179b\u1780\u17b6\u179a\u178e\u17cd\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796 \u1793\u17b7\u1784\u1780\u17b6\u179a\u1782\u17d2\u179a\u1794\u17cb\u1782\u17d2\u179a\u1784\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796 (Security Principle and Security Control)<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3942\" src=\"https:\/\/www.camcert.gov.kh\/wp-content\/uploads\/2019\/04\/photo_2019-04-09_21-17-18.jpg\" alt=\"\" width=\"1280\" height=\"960\" srcset=\"https:\/\/www.camcert.gov.kh\/wp-content\/uploads\/2019\/04\/photo_2019-04-09_21-17-18.jpg 1280w, https:\/\/www.camcert.gov.kh\/wp-content\/uploads\/2019\/04\/photo_2019-04-09_21-17-18-300x225.jpg 300w, https:\/\/www.camcert.gov.kh\/wp-content\/uploads\/2019\/04\/photo_2019-04-09_21-17-18-768x576.jpg 768w, https:\/\/www.camcert.gov.kh\/wp-content\/uploads\/2019\/04\/photo_2019-04-09_21-17-18-1024x768.jpg 1024w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/p>\n"},"excerpt":{"rendered":"<p>\u179a\u17b6\u1787\u1792\u17b6\u1793\u17b8\u1797\u17d2\u1793\u17c6\u1796\u17c1\u1789\u17d6 \u1780\u17b6\u179b\u1796\u17b8\u1790\u17d2\u1784\u17c3\u1791\u17b8\u17e0\u17e8 \u1781\u17c2\u1798\u17c1\u179f\u17b6 \u1786\u17d2\u1793\u17b6\u17c6\u17e2\u17e0\u17e1\u17e9 \u179b\u17c4\u1780 \u1782\u17b9\u1798 \u17a2\u17b6\u1793 \u1794\u17d2\u179a\u1792\u17b6\u1793\u1780\u17b6\u179a\u17b7\u1799\u17b6\u179b\u17d0\u1799\u1786\u17d2\u179b\u17be\u1799\u178f\u1794\u1794\u1789\u17d2\u17a0\u17b6\u1794\u1793\u17d2\u1791\u17b6\u1793\u17cb\u1793\u17c3\u1780\u17bb\u17c6\u1796\u17d2\u1799\u17bc\u1791\u17d0\u179a\u200b (CamCERT) \u1793\u17c3\u1793\u17b6\u1799\u1780\u178a\u17d2\u178b\u17b6\u1793\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u200b \u1793\u17c3\u17a2\u1782\u17d2\u1782\u1793\u17b6\u1799\u1780\u178a\u17d2\u178b\u17b6\u1793\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793 \u1793\u17c3\u1780\u17d2\u179a\u179f\u17bd\u1784\u1794\u17d2\u179a\u17c3\u179f\u178e\u17b8\u1799\u17cd \u1793\u17b7\u1784\u1791\u17bc\u179a\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u178f\u17d2\u179a\u17bc\u179c\u1794\u17b6\u1793\u17a2\u1789\u17d2\u1787\u17be\u1789\u17b2\u17d2\u1799\u1785\u17bc\u179b\u179a\u17bd\u1798\u1787\u17b6\u179c\u17b6\u1782\u17d2\u1798\u17b7\u1793 \u178a\u17be\u1798\u17d2\u1794\u17b8\u1792\u17d2\u179c\u17be\u1794\u1791\u1794\u1784\u17d2\u17a0\u17b6\u1789\u17a2\u17c6\u1796\u17b8 \u1798\u17bc\u179b\u178a\u17d2\u178b\u17b6\u1793\u1782\u17d2\u179a\u17b9\u17c7\u1793\u17c3\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793 (Cyber Security Fundamentals) \u1793\u17c5\u179c\u17b7\u1791\u17d2\u1799\u17b6\u179f\u17d2\u1790\u17b6\u1793\u1787\u17b6\u178f\u17b7\u1794\u17d2\u179a\u17c3\u179f\u178e\u17b8\u1799\u17cd \u1791\u17bc\u179a\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793 (NIPTICT) \u1787\u17bc\u1793\u178a\u179b\u17cb\u17a2\u17d2\u1793\u1780\u1785\u17bc\u179b\u179a\u17bd\u1798\u1794\u17d2\u179a\u1798\u17b6\u178e\u1787\u17b6 \u17e4\u17e0\u179a\u17bc\u1794\u1798\u1780\u1796\u17b8\u1780\u17d2\u179a\u179f\u17bd\u1784-\u179f\u17d2\u1790\u17b6\u1794\u17d0\u1793\u1795\u17d2\u179f\u17c1\u1784\u17d7\u17d4 \u1782\u17c4\u179b\u1794\u17c6\u178e\u1784\u1793\u17c3\u1794\u1791\u1794\u1784\u17d2\u17a0\u17b6\u1789\u1782\u17ba\u178a\u17be\u1798\u17d2\u1794\u17b8\u1785\u17c2\u1780\u179a\u17c6\u179b\u17c2\u1780\u1785\u17c6\u178e\u17c1\u17c7\u178a\u17b9\u1784 \u1793\u17b7\u1784\u1794\u1791\u1796\u17b7\u179f\u17c4\u1792\u1793\u17cd\u1780\u17b6\u179a\u1784\u17b6\u179a\u179a\u1794\u179f\u17cb\u1780\u17b6\u179a\u17b7\u1799\u17b6\u179b\u17d0\u1799 CamCERT \u1793\u17b7\u1784\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u17a2\u17c6\u1796\u17b8\u17d6 \u2013 \u1798\u17bc\u179b\u178a\u17d2\u178b\u17b6\u1793\u1782\u17d2\u179a\u17b9\u17c7\u1793\u17c3\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\u1782\u1798\u1793\u17b6\u1782\u1798\u1793\u17cd \u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793 (Cyber Security Fundamentals) \u2013 \u1780\u17b6\u179a\u1782\u17c6\u179a\u17b6\u1798\u1780\u17c6\u17a0\u17c2\u1784 \u1797\u17b6\u1796\u1784\u17b6\u1799\u179a\u1784\u1782\u17d2\u179a\u17c4\u17c7 \u1793\u17b7\u1784\u17a0\u17b6\u1793\u17b7\u1797\u17d0\u1799\u178a\u17c2\u179b\u17a2\u17b6\u1785\u1780\u17be\u178f\u1798\u17b6\u1793\u1780\u17d2\u1793\u17bb\u1784\u17a2\u17ca\u17b7\u1793\u1792\u17ba\u178e\u17b7\u178f\u200b (Threat, Vulnerability and Risks) \u2013 \u1782\u17c4\u179b\u1794\u17c6\u178e\u1784 \u1793\u17b7\u1784\u178f\u1798\u17d2\u179a\u17bc\u179c\u1780\u17b6\u179a\u1793\u17c3\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793 (Objective and The needed of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3944,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4],"tags":[82],"class_list":["post-3941","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-activities","category-awareness","tag-awareness"],"_links":{"self":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/3941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/comments?post=3941"}],"version-history":[{"count":1,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/3941\/revisions"}],"predecessor-version":[{"id":3945,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/3941\/revisions\/3945"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/media\/3944"}],"wp:attachment":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/media?parent=3941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/categories?post=3941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/tags?post=3941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}