{"id":1504,"date":"2023-02-25T14:46:21","date_gmt":"2023-02-25T14:46:21","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1504"},"modified":"2023-02-25T14:46:21","modified_gmt":"2023-02-25T14:46:21","slug":"%ec%99%80%ec%9d%b4%ed%8c%8c%ec%9d%b4%eb%a5%bc-%ed%86%b5%ed%95%9c-%ec%82%ac%ec%9d%b4%eb%b2%84%eb%b2%94%ec%a3%84-%ec%95%8c%ec%95%84%ec%95%bc-%ed%95%a0-%ec%82%ac%ed%95%ad","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ko\/%ea%b8%b0%ec%88%a0-2\/%ec%99%80%ec%9d%b4%ed%8c%8c%ec%9d%b4%eb%a5%bc-%ed%86%b5%ed%95%9c-%ec%82%ac%ec%9d%b4%eb%b2%84%eb%b2%94%ec%a3%84-%ec%95%8c%ec%95%84%ec%95%bc-%ed%95%a0-%ec%82%ac%ed%95%ad\/","title":{"rendered":"WiFi\ub97c \ud1b5\ud55c \uc0ac\uc774\ubc84 \ubc94\uc8c4: \uc54c\uc544\uc57c \ud560 \uc0ac\ud56d"},"content":{"rendered":"<p>\uc0ac\uc774\ubc84 \ubcf4\uc548\uc740 \uae30\uc5c5\uacfc \ud68c\uc0ac\uc5d0 \uc758\ud574 \uc6b0\uc120\uc21c\uc704\ub85c \uac04\uc8fc\ub418\uba70, \uadf8\ub4e4\uc740 \uc2dc\uc2a4\ud15c\uc744 \ud6a8\uacfc\uc801\uc73c\ub85c \uc811\uadfc\ud560 \uc218 \uc5c6\ub3c4\ub85d \ud558\ub294 \ubc29\ud654\ubcbd\uc5d0 \uc0c1\ub2f9\ud55c \ud22c\uc790\ub97c \ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ub9ce\uc740 \ud68c\uc0ac\ub4e4\uc774 \uadf8\ub4e4\uc758 WIFI \ub124\ud2b8\uc6cc\ud06c\ub85c \uc778\ud574 \ubc1c\uc0dd\ud558\ub294 \uc0ac\uc774\ubc84 \ubc94\uc8c4 \ub178\ucd9c\uc5d0 \ub300\ud574 \uc778\uc2dd\ud558\uc9c0 \ubabb\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>Faulty WIFI, coupled with insufficient understanding of the obvious signs of cyberthreats, can inadvertently give cybercriminals access to sensitive insider business information. In addition, it can also expose employees to the disastrous risk of identity theft, phishing, and other cyber-scams. What many do not realize is that their WIFI can invalidate their attempts to protect assets. We must be aware that we are exposed to the attack of the \u201c<a href=\"https:\/\/www.techtarget.com\/iotagenda\/definition\/man-in-the-middle-attack-MitM\" target=\"_blank\" rel=\"noreferrer noopener\">man in the middle\u201d (MITM).<\/a> \uadf8\ub7ec\ub098 \uc801\uc808\ud55c \uc870\uc9c1 \uc9c0\uc2dd\uacfc \uac04\ub2e8\ud55c \uae30\uc220\ub85c \uc27d\uac8c \uc608\ubc29\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"cyber-attack-mode-through-wifi\">WIFI\ub97c \ud1b5\ud55c \uc0ac\uc774\ubc84 \uacf5\uaca9 \ubaa8\ub4dc<\/h2>\n\n\n<p>\uc0ac\uc774\ubc84 \ubc94\uc8c4\ub294 \uc26c\uc9c0 \uc54a\uc73c\uba70, \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790\ub4e4\uc740 \ub04a\uc784\uc5c6\uc774 \uc9c4\ud654\ud558\uc5ec \uc870\uc9c1\uc744 \ubaa9\ud45c\ub85c \ud558\uace0 \uac1c\uc778 \uc0ac\uc6a9\uc790\ub97c \uc9d1\uc911\uc801\uc73c\ub85c \ub178\ub9bd\ub2c8\ub2e4. \uc5f0\uacb0\uc131\uacfc \ubb34\uc120 \uc811\uadfc\uc774 \ud544\uc218\uc778 \ub514\uc9c0\ud138 \uc138\uacc4\uc5d0\uc11c, \uc628\ub77c\uc778 \uae30\ud68c\uc8fc\uc758\uc790\ub4e4\uc740 \uc774\ub97c \uc774\uc6a9\ud558\ub824\uace0 \ud569\ub2c8\ub2e4.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"rogue-access-points\">\ubd88\ub7c9 \uc561\uc138\uc2a4 \ud3ec\uc778\ud2b8<\/h3>\n\n\n<p>Cybercriminals intercept data running through wireless access points and use that data for criminal gain. The procedure uses inexpensive technology that allows cybercriminals to set up \u201cfake\u201d access points or rogue networks that masquerade as legitimate WIFI access points with a familiar title. They then observe keystrokes and illegally take personal data, and in most cases confidential information, from anyone who joins the network. Since these rogue access points are not encrypted, all activity that runs through them is completely open and visible to anyone willing to look for it.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"interception-of-data\">\ub370\uc774\ud130 \uac00\ub85c\ucc44\uae30<\/h3>\n\n\n<p>\ube44\ubc00\ubc88\ud638\uc640 \uc0ac\uc6a9\uc790 \uc774\ub984\uacfc \uac19\uc740 \ub370\uc774\ud130\ub97c \uac00\ub85c\ucc44\uba74 \uc628\ub77c\uc778 \ubc45\ud0b9, \uc2e0\uc6a9\uce74\ub4dc \uc815\ubcf4, \uae30\uc5c5 \ud5c8\uac00\uc11c \ub4f1 \ubbfc\uac10\ud55c \uc815\ubcf4\uc5d0 \ubd88\ubc95\uc801\uc73c\ub85c \uc811\uadfc\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790\ub294 \uc989\uc2dc \uc815\ubcf4\ub97c \uc0ac\uc6a9\ud558\uc9c0 \uc54a\uc744 \uc218\ub3c4 \uc788\uc9c0\ub9cc, \uc5b8\uc81c\ub4e0\uc9c0 \uc774 \uacc4\uc815\uc744 \uce68\ud574\ud558\uace0 \uadf8 \uc548\uc5d0 \ud3ec\ud568\ub41c \uc815\ubcf4\ub97c \uce68\ud574\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"lateral-movement\">\uce21\uba74 \uc774\ub3d9<\/h3>\n\n\n<p>The concern for most users stems from the private and sometimes confidential documentation they keep on their devices, but cybercriminals are rarely interested in this type of documentation. They are more interested in the lateral movement of an unwitting victim\u2019s email account. For example, if a hacker has access to your email account, it gives them the ability to turn on password notifications from sites like PayPal and monitor keystrokes as you enable new login details.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"public-vs-corporate-wifi\">\uacf5\uacf5 vs. \uae30\uc5c5 WIFI<\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Public-vs.-corporate-WIFI-2-1.jpg\" alt=\"Public vs. corporate WIFI 2 1\" class=\"wp-image-1510\"\/><\/figure>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>\uc804 \uc138\uacc4\uc801\uc73c\ub85c WIFI \uc2a4\ud30c\uc774 \uc0ac\ub840\uac00 \uc99d\uac00\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790\ub4e4\uc740 \uc2a4\ud0c0\ubc85\uc2a4, \uc544\uba54\ub9ac\uce78 \ud56d\uacf5, \ud1a1\ud1a1\uacfc \uac19\uc740 \uac00\uc815\uc6a9 \ube0c\ub79c\ub4dc\uc758 \ubb34\uc120 \ub124\ud2b8\uc6cc\ud06c\ub97c \ud574\ud0b9\ud558\uc5ec \ub9ce\uc740 \uc720\uba85\ud55c \ud53c\ud574\uc790\ub4e4\uc744 \uc7a1\uc558\uc2b5\ub2c8\ub2e4. \uc774 \uc6c0\uc9c1\uc784\uc740 \uc2ec\uc9c0\uc5b4 <a href=\"https:\/\/routersecurity.org\/RouterNews.php\" target=\"_blank\" rel=\"noreferrer noopener\">FBI\uac00 \uc0ac\uc6a9\uc790\ub4e4\uc5d0\uac8c \uacbd\uace0\ud558\ub3c4\ub85d<\/a> \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uac00\uc785\ud558\uae30 \uc804\uc5d0 \ud658\uacbd\uc5d0 \uc811\uadfc\ud558\ub3c4\ub85d \ud588\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"false-sense-of-security\">\uc798\ubabb\ub41c \uc548\uc804\uac10<\/h3>\n\n\n<p>\uc774\uac83\uc740 \ub3c4\uccad\uc774 \uacf5\uacf5 WIFI\uc5d0\ub9cc \uad6d\ud55c\ub41c\ub2e4\ub294 \uc624\ud574\ub97c \uc99d\uac00\uc2dc\ucf1c \uc0ac\ubb34\uc2e4 \uae30\ubc18 \ub124\ud2b8\uc6cc\ud06c\uac00 \uacf5\uaca9\uc5d0 \uc800\ud56d\ud558\uc9c0 \uc54a\ub294\ub2e4\ub294 \uc798\ubabb\ub41c \uc548\uc804\uac10\uc744 \ub354\ud558\uace0 \uc788\uc73c\uba70, \uc774\ub294 \uc798\ubabb\ub41c \uac83\uc785\ub2c8\ub2e4. WIFI \ub124\ud2b8\uc6cc\ud06c\ub294 \uc1fc\ud551\ubab0, \ud638\ud154 \ub85c\ube44, \uc2ec\uc9c0\uc5b4 \uacf5\ud56d\uc5d0\uc11c\ub9cc\ud07c \uc0ac\ubb34\uc2e4 \ud658\uacbd\uc5d0\uc11c\ub3c4 \uc190\uc0c1\ub420 \uac00\ub2a5\uc131\uc774 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"cybercriminal-tactics\">\uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790 \uc804\uc220<\/h3>\n\n\n<p>A cybercriminal with the right technology could be sitting on the other side of the wall, in the parking lot outside the office, or even in the building next door. They certainly don\u2019t differentiate between a public or corporate WIFI network. Their goal is simply to lure unsuspecting users into their networks and rogue access points and launch their cyber attacks from there.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-can-we-protect-ourselves\">\uc6b0\ub9ac\ub294 \uc5b4\ub5bb\uac8c \uc790\uc2e0\uc744 \ubcf4\ud638\ud560 \uc218 \uc788\uc744\uae4c\uc694?<\/h2>\n\n\n<p>WIFI \uc0ac\uc774\ubc84 \uacf5\uaca9\uc758 \uc99d\uac00\uc5d0\ub3c4 \ubd88\uad6c\ud558\uace0, \uc18c\uc218\uc758 \ud68c\uc0ac\ub9cc\uc774 WIFI \ub3c4\uccad\uc758 \uc704\ud611\uc5d0 \ub300\ucc98\ud558\uae30 \uc704\ud55c \uc62c\ubc14\ub978 \uad50\uc721\uacfc \uc808\ucc28\ub97c \uad6c\ud604\ud588\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ub9ce\uc740 \uc0ac\ub78c\ub4e4\uc774 \ube44\ubc00\ubc88\ud638 \uc554\ud638\ud654\ub9cc\uc73c\ub85c \ucda9\ubd84\ud55c \ubc29\uc5b4\ub97c \uc81c\uacf5\ud55c\ub2e4\uace0 \ubbff\uc9c0\ub9cc, \ubd88\ud589\ud788\ub3c4 \uadf8\ub807\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4. \uc554\ud638\ud654\ub294 \uc0ac\uc6a9\uc790\uac00 \ud569\ubc95\uc801\uc778 \ub124\ud2b8\uc6cc\ud06c\ub97c \uc758\uc2dd\uc801\uc73c\ub85c \uc120\ud0dd\ud560 \ub54c\ub9cc \uc801\uc6a9\ub429\ub2c8\ub2e4. \ubd88\ub7c9 \uc561\uc138\uc2a4 \ud3ec\uc778\ud2b8\ub97c \uc120\ud0dd\ud558\uba74 \ub124\ud2b8\uc6cc\ud06c\ub97c \ubcf4\ud638\ud558\ub294 \ubb34\uc120 \ud0a4\uac00 \ucc98\uc74c\ubd80\ud130 \ud544\uc694\ud558\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc870\uc9c1\uc740 \ub124\ud2b8\uc6cc\ud06c\ub97c \ud1b5\ud574 \uc804\ub2ec\ub418\ub294 \ud2b8\ub798\ud53d\uacfc \uc815\ubcf4\uc5d0 \ub300\ud574 \ubc95\uc801\uc73c\ub85c \ucc45\uc784\uc774 \uc788\uc2b5\ub2c8\ub2e4. \uc9c1\uc6d0\ub4e4\uc740 \uc9c1\uc6d0\ub4e4\uc744 \ub3cc\ubcfc \uc758\ubb34\uac00 \uc788\uc73c\uba70, \ub124\ud2b8\uc6cc\ud06c\uac00 \uc548\uc804\ud558\ub3c4\ub85d \ubaa8\ub4e0 \ub178\ub825\uc744 \uae30\uc6b8\uc5ec\uc57c \ud569\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \uc7a5\uc560\ubb3c\uc744 \uace0\ub824\ud560 \ub54c, MITM \uacf5\uaca9\uc758 \uc704\ud5d8\uc744 \uc5b4\ub5bb\uac8c \uc904\uc77c \uc218 \uc788\uc744\uae4c\uc694? \uae30\uc220\uacfc \uad50\uc721\uc744 \uacb0\ud569\ud55c \ub2e4\uce35 \uae30\ubc95\uc774 \ud544\uc694\ud569\ub2c8\ub2e4.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"points-to-consider\">\uace0\ub824\ud574\uc57c \ud560 \uc810<\/h3>\n\n\n<p>\uc0ac\uc6a9\uc790\uac00 \uc704\ud5d8\uc744 \uc774\ud574\ud558\uace0 \ube44\uc815\uc0c1\uc801\uc778 \ud589\ub3d9\uc744 \uc778\uc2dd\ud560 \uc218 \uc788\ub3c4\ub85d \ubcf4\uc7a5\ud558\ub294 \ub370 \ub354 \ub9ce\uc740 \uac15\uc870\uac00 \ud544\uc694\ud569\ub2c8\ub2e4. \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790\ub4e4\uc774 \uc810\uc810 \ub354 \uc815\uad50\ud574\uc9c0\uace0 \uc788\uc9c0\ub9cc, \uadf8\ub4e4\uc758 \ubc29\ubc95\uc740 \uc885\uc885 \uc775\uc219\ud55c \ud328\ud134\uc744 \ub530\ub974\uba70, \uc0ac\ub78c\ub4e4\uc774 \uacbd\uacc4\ud558\uba74 \uacbd\uace0\ub97c \uc6b8\ub9b4 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uace0\ub824\ud574\uc57c \ud560 \uba87 \uac00\uc9c0 \uc0ac\ud56d\uc740 \ub2e4\uc74c\uacfc \uac19\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Know your company\u2019s WIFI<\/strong>: Joining a strange hotspot often requires unconventional behavior. Cybercriminals will usually reroute you to a malicious and unsafe website that imitates a legitimate login page. All these pages are not encrypted, so if you log in, all your transactions and data become visible. So get familiar with your company\u2019s WIFI SOPs; know what is going on and stop immediately if something seems strange. If you\u2019re being redirected to a portal, particularly in a work environment, that\u2019s usually a red flag.<\/li>\n\n\n\n<li><strong>\uc790\ubb3c\uc1e0\ub97c \ucc3e\uc544\ub77c<\/strong>: \uc6d0\uaca9\uc73c\ub85c \uc791\uc5c5\ud558\uace0 \uacf5\uacf5 WIFI\uc5d0 \uc5f0\uacb0\ud560 \ub54c \ud3ec\ud138\ub85c \ub9ac\ub514\ub809\uc158\ub418\ub294 \uac83\uc740 \ub4dc\ubb38 \uc77c\uc774 \uc544\ub2c8\uba70, \ub300\ubd80\ubd84\uc740 \uc545\uc758\uc801\uc774\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4. \uc8fc\uc18c \ud45c\uc2dc\uc904\uc5d0\uc11c \uc790\ubb3c\uc1e0 \uc544\uc774\ucf58\uc744 \ucc3e\uc744 \uc218 \uc788\uc73c\uba70, \uc774\ub294 \uc77c\ubc18\uc801\uc73c\ub85c \ud569\ubc95\uc801\uc778 \uc0ac\uc774\ud2b8\uc758 \ud45c\uc2dc\uc785\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ub124\ud2b8\uc6cc\ud06c\ub97c \uc54c\uc544\ub77c<\/strong>: \uc7a5\uce58\ub294 \uc774\uc804\uc5d0 \uc5f0\uacb0\ub41c \uc778\uc2dd \uac00\ub2a5\ud55c WIFI \ub124\ud2b8\uc6cc\ud06c\ub97c \uc9c0\uc18d\uc801\uc73c\ub85c \uac80\uc0c9\ud569\ub2c8\ub2e4. \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790\ub4e4\uc740 \uc774\ub97c \ubaa8\ubc29\ud558\uc5ec <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/wireless-mobility\/wlan-security\/68139-rogue-detection.html\" target=\"_blank\" rel=\"noreferrer noopener\">\ubd88\ub7c9 \uc561\uc138\uc2a4 \ud3ec\uc778\ud2b8\ub97c \uc124\uc815\ud569\ub2c8\ub2e4.<\/a> with the same title, in the hope that you\u2019ll connect automatically, so be vigilant. If you are browsing the web at McDonald\u2019s and are asked to join their corporate WIFI, it is most likely a scam.<\/li>\n<\/ol>\n\n\n<h3 class=\"wp-block-heading\" id=\"increasing-cybersecurity-in-the-wifi-network\">WIFI \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uac15\ud654<\/h3>\n\n\n<p>\uae30\uc220\uc740 MITM \uacf5\uaca9\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ub97c \uc81c\uacf5\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ubd88\ub7c9 \uc561\uc138\uc2a4 \ud3ec\uc778\ud2b8 \ud0d0\uc9c0 \ub3c4\uad6c\ub294 \ubd88\ub7c9 \uc561\uc138\uc2a4 \ud3ec\uc778\ud2b8\ub97c \uc778\uc2dd\ud558\uace0, \uacbd\uacc4\ud558\uace0, \uc81c\uac70\ud558\ub294 \ub370 \ub3c4\uc6c0\uc744 \uc904 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ud569\ubc95\uc801\uc778 \uc561\uc138\uc2a4 \ud3ec\uc778\ud2b8\uc5d0\uc11c \uc2e4\ud589\ub418\ub294 \uc774\ub7ec\ud55c \uc194\ub8e8\uc158\uc740 WIFI \ub124\ud2b8\uc6cc\ud06c\ub97c \ud1b5\ud574 \uc774\ub3d9\ud558\ub294 \ud65c\ub3d9\uc744 \uae30\ub85d\ud558\uace0 \uac80\uc0ac\ud558\uba70, \uac00\uc2dc\uc131\uacfc \ubcf4\uc548\uc744 \uc81c\uacf5\ud558\uba74\uc11c \uc758\uc2ec\uc2a4\ub7ec\uc6b4 \ud589\ub3d9\uc744 \ud50c\ub798\uadf8\ub85c \ud45c\uc2dc\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ub610\ud55c, \uc77c\ubd80 \ud68c\uc0ac\ub294 \uace0\uac1d \uc7a5\uce58\uc640 \uae30\uacc4\uac00 \ud2b9\uc815 WIFI \ub610\ub294 \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \ub124\ud2b8\uc6cc\ud06c\uc5d0\ub9cc \uc5f0\uacb0\ud560 \uc218 \uc788\ub3c4\ub85d \uc815\ucc45\uc744 \ub3c4\uc785\ud558\uc5ec \ubb34\ub2e8 WIFI\uc758 \uc704\ud5d8\uc744 \uc81c\uac70\ud588\uc2b5\ub2c8\ub2e4. \uac00\uc7a5 \uc801\uadf9\uc801\uc778 \ud68c\uc0ac\ub4e4\uc740 \ub610\ud55c <a href=\"https:\/\/www.globalsign.com\/en\/blog\/the-differences-between-certificate-based-and-pre-shared-key-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">\uc778\uc99d\uc11c \uae30\ubc18 \uc778\uc99d\uc73c\ub85c \uc804\ud658\ud588\uc2b5\ub2c8\ub2e4.<\/a> to ensure users that their security is constantly protected. Good examples of this can be seen on your local high street, where retailers assure customers that they are \u2018WiFi Friendly\u2019 certified. It is an example that corporate organizations should follow.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"best-practices-to-protect-yourself\">\uc790\uc2e0\uc744 \ubcf4\ud638\ud558\uae30 \uc704\ud55c \ubaa8\ubc94 \uc0ac\ub840<\/h3>\n\n\n<p>\uc774\ub3d9\uc131\uacfc \uc5f0\uacb0\uc131\uc774 \uae00\ub85c\ubc8c \ucee4\ubba4\ub2c8\ucf00\uc774\uc158\uc5d0 \ud544\uc218\uc801\uc778 \uc138\uacc4\uc5d0\uc11c WIFI\ub294 \ub514\uc9c0\ud138 \uc791\uc5c5\uc7a5\uc758 \uc911\uc694\ud55c \uad6c\uc131 \uc694\uc18c\uc774\uba70, \uc0ac\uc6a9\uc790\ub294 \uc774\uc81c \uc774\ub97c \uae30\ub300\ud569\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \uadf8\ub4e4\uc740 \ub610\ud55c \uc0ac\uc774\ubc84 \uacf5\uaca9\uc758 \uc704\ud611\uc73c\ub85c\ubd80\ud130 \uc628\ub77c\uc778 \ucee4\ubba4\ub2c8\ucf00\uc774\uc158\uacfc \ub370\uc774\ud130\uac00 \uc548\uc804\ud558\uae30\ub97c \uae30\ub300\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>WIFI \uc0ac\uc774\ubc84 \ubc94\uc8c4\ub85c\ubd80\ud130 \uc790\uc2e0\uc744 \ubcf4\ud638\ud558\uae30 \uc704\ud55c \uba87 \uac00\uc9c0 \ubaa8\ubc94 \uc0ac\ub840\ub294 \ub2e4\uc74c\uacfc \uac19\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\uc758\uc2ec\uc2a4\ub7ec\uc6b4 \uc6f9\uc0ac\uc774\ud2b8\uc640 \uba54\uc2dc\uc9c0\ub97c \ud53c\ud558\uc138\uc694.<\/li>\n\n\n\n<li>\uae38\uace0 \ubcf5\uc7a1\ud558\uba70 \uace0\uc720\ud55c \uac15\ub825\ud55c \ube44\ubc00\ubc88\ud638\ub97c \ub9cc\ub4dc\uc138\uc694.<\/li>\n\n\n\n<li>\uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \uc81c\uacf5\uc790\uc758 \ube44\ubc00\ubc88\ud638 \uad00\ub9ac\uc790\ub97c \uc0ac\uc6a9\ud558\uc138\uc694.<\/li>\n\n\n\n<li>\uac00\ub2a5\ud55c \uacbd\uc6b0 \uc774\uc911 \uc778\uc99d\uc744 \ud65c\uc131\ud654\ud558\uc138\uc694.<\/li>\n\n\n\n<li>\ube44\ubc00\ubc88\ud638\ub97c \ud558\ub098\uc758 \uacc4\uc815\uc774\ub098 \uc11c\ube44\uc2a4\uc5d0\ub9cc \uc7ac\uc0ac\uc6a9\ud558\uc9c0 \ub9c8\uc138\uc694. \uacf5\uaca9\uc5d0\uc11c \ube44\ubc00\ubc88\ud638\uac00 \ub3c4\ub09c\ub2f9\ud558\uba74 \uc5ec\ub7ec \uacc4\uc815\uc5d0 \uc811\uadfc\ud560 \uc218 \uc788\uc5b4 \ud53c\ud574\uac00 \ubc30\uac00\ub429\ub2c8\ub2e4.<\/li>\n\n\n\n<li>\uc740\ud589 \ubc0f \uc2e0\uc6a9 \uacc4\uc815\uc744 \uc815\uae30\uc801\uc73c\ub85c \ubaa8\ub2c8\ud130\ub9c1\ud558\uc5ec \uc758\uc2ec\uc2a4\ub7ec\uc6b4 \ud65c\ub3d9\uc744 \ud655\uc778\ud558\uc138\uc694. \uc774\ub294 \uc7ac\uc815\uc774\ub098 \ud3c9\ud310\uc5d0 \ud070 \ud53c\ud574\ub97c \uc785\ud788\uae30 \uc804\uc5d0 \uacf5\uaca9\uc744 \ubc1c\uacac\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub610\ud55c, \uac70\ub798\uc5d0 \ub300\ud55c \ud55c\ub3c4\ub97c \uc124\uc815\ud558\uc5ec \ub3c8\uc758 \uc624\uc6a9\uc744 \ubc29\uc9c0\ud558\uc138\uc694.<\/li>\n\n\n\n<li>\uae30\ubc00 \uc815\ubcf4\ub97c \uc8fc\uc758\ud558\uc138\uc694. \ubbfc\uac10\ud55c \uac1c\uc778 \uc815\ubcf4\ub97c \ud3ec\ud568\ud55c \ubb38\uc11c\ub97c \ud3d0\uae30\ud558\ub824\uba74 \uc548\uc804\ud55c \ubc29\ubc95\uc73c\ub85c \ud30c\uae30\ud558\uc5ec \ubcf5\uad6c\ud560 \uc218 \uc5c6\ub3c4\ub85d \ud558\uc138\uc694. \uc7a5\uce58\uc5d0\ub3c4 \ub3d9\uc77c\ud55c \uc0c1\uc2dd\uc744 \uc801\uc6a9\ud558\uc138\uc694: \uc7a5\uce58\ub97c \ud3d0\uae30\ud558\uac70\ub098 \ud310\ub9e4\ud560 \ub54c \ubbfc\uac10\ud55c \uc815\ubcf4\uc758 \ud754\uc801\uc744 \ub0a8\uae30\uc9c0 \uc54a\ub3c4\ub85d \ud558\uc138\uc694.<\/li>\n\n\n\n<li>Don\u2019t share too much. Avoid posting details about your personal life, which could be misused by criminals to act on your behalf.<\/li>\n<\/ul>\n\n\n\n<p>It\u2019s also important to stay up-to-date with the latest cyber threats and trends. Cybercriminals are always evolving, and so should your knowledge of how to protect yourself and your organization. Participating in <a href=\"https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/nice\/resources\/cybersecurity-workforce-development\" target=\"_blank\" rel=\"noreferrer noopener\">\uc0ac\uc774\ubc84 \ubcf4\uc548 \uad50\uc721 \ud504\ub85c\uadf8\ub7a8<\/a> \ubc0f \ucd5c\uc2e0 \uc804\uc220\uacfc \uae30\uc220\uc5d0 \ub300\ud55c \uc815\ubcf4\ub97c \uc720\uc9c0\ud558\ub294 \uac83\uc740 \uacf5\uaca9\uc744 \uc608\ubc29\ud558\ub294 \ub370 \ud070 \ub3c4\uc6c0\uc774 \ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p><strong>\uacb0\ub860\uc801\uc73c\ub85c<\/strong>, WIFI networks are a convenient and essential part of modern life, but they also pose significant risks for cybercrime. It\u2019s crucial to be aware of these risks and take steps to protect yourself and your organization. By implementing the right security measures, being vigilant, and educating yourself and others, you can reduce the likelihood of becoming a victim of WIFI cybercrime.<\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is considered a priority by corporations and companies, and they are making significant investments in firewalls that allow their systems to be effectively inaccessible. However, many of these companies\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%ea%b8%b0%ec%88%a0-2\/%ec%99%80%ec%9d%b4%ed%8c%8c%ec%9d%b4%eb%a5%bc-%ed%86%b5%ed%95%9c-%ec%82%ac%ec%9d%b4%eb%b2%84%eb%b2%94%ec%a3%84-%ec%95%8c%ec%95%84%ec%95%bc-%ed%95%a0-%ec%82%ac%ed%95%ad\/\"><span class=\"screen-reader-text\">WiFi\ub97c \ud1b5\ud55c \uc0ac\uc774\ubc84 \ubc94\uc8c4: \uc54c\uc544\uc57c \ud560 \uc0ac\ud56d<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":3,"featured_media":1514,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[31],"tags":[],"class_list":["post-1504","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting Yourself from Cybercrime through WIFI<\/title>\n<meta name=\"description\" content=\"Protect yourself and your organization from WIFI cybercrime. Learn how to stay safe from MITM attacks with our expert tips.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\uae30\uc220-2\/\uc640\uc774\ud30c\uc774\ub97c-\ud1b5\ud55c-\uc0ac\uc774\ubc84\ubc94\uc8c4-\uc54c\uc544\uc57c-\ud560-\uc0ac\ud56d\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Yourself from Cybercrime through WIFI\" \/>\n<meta property=\"og:description\" content=\"Protect yourself and your organization from WIFI cybercrime. Learn how to stay safe from MITM attacks with our expert tips.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\uae30\uc220-2\/\uc640\uc774\ud30c\uc774\ub97c-\ud1b5\ud55c-\uc0ac\uc774\ubc84\ubc94\uc8c4-\uc54c\uc544\uc57c-\ud560-\uc0ac\ud56d\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-25T14:46:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"760\" \/>\n\t<meta property=\"og:image:height\" content=\"388\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"7\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Cybercrime Through WiFi: What You Need to Know\",\"datePublished\":\"2023-02-25T14:46:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/\"},\"wordCount\":1468,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/\",\"url\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/\",\"name\":\"Protecting Yourself from Cybercrime through WIFI\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg\",\"datePublished\":\"2023-02-25T14:46:21+00:00\",\"description\":\"Protect yourself and your organization from WIFI cybercrime. Learn how to stay safe from MITM attacks with our expert tips.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg\",\"width\":760,\"height\":388,\"caption\":\"Cybercrime Through WiFi What You Need To Know\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrime Through WiFi: What You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WIFI\ub97c \ud1b5\ud55c \uc0ac\uc774\ubc84 \ubc94\uc8c4\ub85c\ubd80\ud130 \uc790\uc2e0\uc744 \ubcf4\ud638\ud558\uae30","description":"WIFI \uc0ac\uc774\ubc84 \ubc94\uc8c4\ub85c\ubd80\ud130 \uc790\uc2e0\uacfc \uc870\uc9c1\uc744 \ubcf4\ud638\ud558\uc138\uc694. \uc804\ubb38\uac00 \ud301\uc73c\ub85c MITM \uacf5\uaca9\uc73c\ub85c\ubd80\ud130 \uc548\uc804\ud558\uac8c \uc9c0\ub0b4\ub294 \ubc29\ubc95\uc744 \ubc30\uc6b0\uc138\uc694.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\uae30\uc220-2\/\uc640\uc774\ud30c\uc774\ub97c-\ud1b5\ud55c-\uc0ac\uc774\ubc84\ubc94\uc8c4-\uc54c\uc544\uc57c-\ud560-\uc0ac\ud56d\/","og_locale":"ko_KR","og_type":"article","og_title":"Protecting Yourself from Cybercrime through WIFI","og_description":"Protect yourself and your organization from WIFI cybercrime. Learn how to stay safe from MITM attacks with our expert tips.","og_url":"https:\/\/securitybriefing.net\/ko\/\uae30\uc220-2\/\uc640\uc774\ud30c\uc774\ub97c-\ud1b5\ud55c-\uc0ac\uc774\ubc84\ubc94\uc8c4-\uc54c\uc544\uc57c-\ud560-\uc0ac\ud56d\/","og_site_name":"Security Briefing","article_published_time":"2023-02-25T14:46:21+00:00","og_image":[{"width":760,"height":388,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"C\u00e9sar Daniel Barreto","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"7\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Cybercrime Through WiFi: What You Need to Know","datePublished":"2023-02-25T14:46:21+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/"},"wordCount":1468,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg","articleSection":["Technology"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/","url":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/","name":"WIFI\ub97c \ud1b5\ud55c \uc0ac\uc774\ubc84 \ubc94\uc8c4\ub85c\ubd80\ud130 \uc790\uc2e0\uc744 \ubcf4\ud638\ud558\uae30","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg","datePublished":"2023-02-25T14:46:21+00:00","description":"WIFI \uc0ac\uc774\ubc84 \ubc94\uc8c4\ub85c\ubd80\ud130 \uc790\uc2e0\uacfc \uc870\uc9c1\uc744 \ubcf4\ud638\ud558\uc138\uc694. \uc804\ubb38\uac00 \ud301\uc73c\ub85c MITM \uacf5\uaca9\uc73c\ub85c\ubd80\ud130 \uc548\uc804\ud558\uac8c \uc9c0\ub0b4\ub294 \ubc29\ubc95\uc744 \ubc30\uc6b0\uc138\uc694.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg","width":760,"height":388,"caption":"Cybercrime Through WiFi What You Need To Know"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Cybercrime Through WiFi: What You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0\ub294 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \ub300\ud55c \uae4a\uc774 \uc788\ub294 \uc9c0\uc2dd\uacfc \ubcf5\uc7a1\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc8fc\uc81c\ub97c \ub2e8\uc21c\ud654\ud558\ub294 \ub2a5\ub825\uc73c\ub85c \uc720\uba85\ud55c \uc800\uba85\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc791\uac00\uc774\uc790 \uc804\ubb38\uac00\uc785\ub2c8\ub2e4. \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \ubc0f \ub370\uc774\ud130 \ubcf4\ud638 \ubd84\uc57c\uc5d0\uc11c \ud3ed\ub113\uc740 \uacbd\ud5d8\uc744 \uc313\uc740 \uadf8\ub294 \uc815\uae30\uc801\uc73c\ub85c \ucd5c\uc2e0 \uc0ac\uc774\ubc84 \ubcf4\uc548 \ud2b8\ub80c\ub4dc\uc5d0 \ub300\ud55c \ud1b5\ucc30\ub825 \uc788\ub294 \uae30\uace0\uc640 \ubd84\uc11d\uc744 \ud1b5\ud574 \uc804\ubb38\uac00\uc640 \uc77c\ubc18\uc778 \ubaa8\ub450\ub97c \uad50\uc721\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","url":"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/1504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=1504"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/1504\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media\/1514"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=1504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/categories?post=1504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/tags?post=1504"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}