{"id":1668,"date":"2023-04-07T14:07:26","date_gmt":"2023-04-07T14:07:26","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1668"},"modified":"2023-04-07T14:07:26","modified_gmt":"2023-04-07T14:07:26","slug":"%ec%82%ac%ec%9d%b4%eb%b2%84%eb%b3%b4%ec%95%88-%eb%b0%8f-%ec%98%a4%eb%8a%98%eb%82%a0%ec%9d%98-%ec%98%81%ed%96%a5","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ko\/%ec%82%ac%ec%9d%b4%eb%b2%84-%eb%b3%b4%ec%95%88\/%ec%82%ac%ec%9d%b4%eb%b2%84%eb%b3%b4%ec%95%88-%eb%b0%8f-%ec%98%a4%eb%8a%98%eb%82%a0%ec%9d%98-%ec%98%81%ed%96%a5\/","title":{"rendered":"\uc0ac\uc774\ubc84 \ubcf4\uc548\uacfc \uc624\ub298\ub0a0\uc758 \uc601\ud5a5"},"content":{"rendered":"<p>\ucef4\ud4e8\ud305 \uae30\uc220\uc774 \ubc1c\uc804\ud568\uc5d0 \ub530\ub77c \ubcf4\uc548 \uacb0\ud568\uacfc \ucde8\uc57d\uc810\uc744 \uc545\uc6a9\ud558\ub824\ub294 \ub2e4\uc591\ud55c \uc2dc\ub3c4\uac00 \uc774\ub8e8\uc5b4\uc84c\uc2b5\ub2c8\ub2e4. \uc778\ud130\ub137\uc758 \ud655\uc7a5\uacfc \ub300\ubd80\ubd84\uc758 \uc120\uc9c4\uad6d \uac1c\uc778\ub4e4\uc774 \uc5ec\ub7ec \uc778\ud130\ub137 \uc5f0\uacb0 \uc7a5\uce58\ub97c \uc18c\uc720\ud558\uace0 \uc788\ub294 \uc810\uc810 \ub354 \uc5f0\uacb0\ub41c \uc138\uacc4\uc5d0\uc11c \uc0ac\uc774\ubc84 \uacf5\uaca9\uc740 \ud06c\uac8c \uc99d\uac00\ud588\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc8fc\uc694 \uc608\ub85c\ub294 \uc6f9 \uae30\ubc18 \uc0ac\uc774\ubc84 \uacf5\uaca9\uc758 \uc99d\uac00\uac00 \uc788\uc73c\uba70, \uc774\ub294 \uac70\uc758 6,000% \uc99d\uac00\ud558\uc5ec 2022\ub144\uc5d0 14\uc5b5 \uac74 \uc774\uc0c1\uc5d0 \ub2ec\ud588\uc2b5\ub2c8\ub2e4. \uc774 \uc218\uce58\ub294 \uc0c1\ub2f9\ud55c \uacbd\uc81c\uc801 \uc190\uc2e4\uacfc \uac19\uc740 \uc7a0\uc7ac\uc801\uc73c\ub85c \uc2ec\uac01\ud55c \uacb0\uacfc\ub97c \ud574\uacb0\ud558\uae30 \uc704\ud55c \ud6a8\uacfc\uc801\uc778 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uad00\ub9ac\uc758 \uc911\uc694\uc131\uc744 \uac15\uc870\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>H2 \u2013 Is Complete Cybersecurity Possible?<\/p>\n\n\n\n<p>\uc808\ub300\uc801\uc778 \ubcf4\uc548\uc740 \ubb3c\ub9ac\uc801 \uc138\uacc4\ub098 \uac00\uc0c1 \uc138\uacc4 \uc5b4\ub514\uc5d0\ub3c4 \uc874\uc7ac\ud558\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \uc0ac\uc774\ubc84 \uc704\ud611\uc774 \uc2e4\ud604\ub418\uc5b4 \ucef4\ud4e8\ud130 \uc2dc\uc2a4\ud15c\uacfc \uadf8\ub4e4\uc774 \uc0dd\uc131\ud558\uace0 \uc800\uc7a5\ud558\ub294 \uadc0\uc911\ud55c \uc815\ubcf4\uc5d0 \ud53c\ud574\ub97c \uc8fc\ub294 \uc704\ud5d8\uacfc \uac00\ub2a5\uc131\uc744 \ucd5c\uc18c\ud654\ud558\ub294 \uac83\uc740 \uac00\ub2a5\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\u201cVulnerability\u201d refers to the weaknesses and gaps in protection that enable a cyber threat to materialize, resulting in negative impacts on a computer system. For example, inadequate fire protection or a weak password system for an organization\u2019s computer system would constitute vulnerabilities. The likelihood of these vulnerabilities being exploited is known as \u201crisk.\u201d In essence, cybersecurity focuses on reducing risks in the digital realm.<\/p>\n\n\n\n<p>The Covid-19 pandemic has created a challenging environment for many businesses, benefiting some sectors while disadvantaging others. According to PriceWaterhouseCoopers\u2019 (PwC) article, \u201cThe Future of Financial Services\u201d (2020), the pandemic has accelerated trends toward e-commerce in financial services. This development has been positive for the logistics sector and contactless\/mobile payment industries but negative for retail sales. As internet transactions increase, so do cybercrime and cyber threat rates.<\/p>\n\n\n\n<p>PriceWaterhouseCoopers\u2019 \u201cGlobal Economic Crime and Fraud Survey\u201d (2020) demonstrates that fraud, customer scams, and cybercrime have experienced the most significant increases, with cybercrime representing 34% of the overall frequency. The report also reveals that \u201cnearly 47% of survey respondents have experienced some form of fraud in the past 24 months, marking the second-highest level of security incidents in the last twenty years.\u201d<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"tools-for-the-analysis-and-detection-of-malware\"><strong>\uc545\uc131\ucf54\ub4dc \ubd84\uc11d \ubc0f \ud0d0\uc9c0 \ub3c4\uad6c<\/strong><\/h2>\n\n\n<p>\u201cMalware\u201d refers to any software that inflicts harm or damage upon a user, device, or network, taking various forms such as Trojans, viruses, worms, rootkits, or spyware. Consequently, analysis tools must be versatile enough to detect malware, assess the damage inflicted, and identify any other affected files.<\/p>\n\n\n\n<p>\uc545\uc131 \ud30c\uc77c\uc744 \ucc3e\uace0 \uc2dd\ubcc4\ud558\uba74, \ub124\ud2b8\uc6cc\ud06c\ub098 \uc7a5\uce58\uc5d0 \ub300\ud55c \ubbf8\ub798\uc758 \uce68\ud22c\ub97c \ubc29\uc9c0\ud558\uae30 \uc704\ud574 \uc545\uc131\ucf54\ub4dc \uc11c\uba85 \ub370\uc774\ud130\ubca0\uc774\uc2a4\uc5d0 \ucd94\uac00\ub429\ub2c8\ub2e4. \uc545\uc131\ucf54\ub4dc \ubd84\uc11d\uc744 \uc218\ud589\ud558\ub294 \ub450 \uac00\uc9c0 \uc8fc\uc694 \ubc29\ubc95\uc740 \uc815\uc801 \ubd84\uc11d\uacfc \ub3d9\uc801 \ubd84\uc11d\uc785\ub2c8\ub2e4. \uc6b0\ub9ac\ub294 \ub450 \uac00\uc9c0 \uc811\uadfc \ubc29\uc2dd\uc5d0 \ub300\ud55c \uc138\ubd80 \uc815\ubcf4\ub97c \uc81c\uacf5\ud569\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"static-analysis\"><strong>\uc815\uc801 \ubd84\uc11d<\/strong><\/h2>\n\n\n<p>\uc815\uc801 \ubd84\uc11d\uc740 \ud30c\uc77c\uc744 \uc2e4\ud589\ud558\uc9c0 \uc54a\uace0 \uadf8 \uad6c\uc870\uc640 \uae30\ub2a5\uc5d0 \ub300\ud55c \uc815\ubcf4\ub97c \uc5bb\uae30 \uc704\ud574 \ud30c\uc77c\uc744 \uac80\uc0ac\ud558\ub294 \uacfc\uc815\uc785\ub2c8\ub2e4. \uc774 \uc811\uadfc \ubc29\uc2dd\uc740 \uc7a0\uc7ac\uc801\uc73c\ub85c \ud574\ub85c\uc6b4 \ucf54\ub4dc\ub97c \uc2e4\ud589\ud558\uc9c0 \uc54a\uc73c\ubbc0\ub85c \ub354 \uae30\ubcf8\uc801\uc774\uace0 \uc548\uc804\ud569\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ub09c\ub3c5\ud654\ub41c \uc545\uc131\ucf54\ub4dc \ud30c\uc77c\uc744 \ucc98\ub9ac\ud558\ub294 \ub370\ub294 \ub35c \ud6a8\uc728\uc801\uc785\ub2c8\ub2e4. \uc545\uc131\ucf54\ub4dc\ub97c \ud0d0\uc9c0\ud558\ub294 \uc77c\ubc18\uc801\uc778 \uae30\uc220\uc740 \uc11c\uba85\uc744 \uc0ac\uc6a9\ud558\ub294 \uac83\uc785\ub2c8\ub2e4. \uc758\uc2ec\uc2a4\ub7ec\uc6b4 \ud30c\uc77c\uc774 \uc2dc\uc2a4\ud15c\uc5d0 \ub4e4\uc5b4\uc624\uba74 \ud574\uc2dc\uac00 \uc0dd\uc131\ub418\uace0 \uc54c\ub824\uc9c4 \uc545\uc131\ucf54\ub4dc \uc11c\uba85 \ub370\uc774\ud130\ubca0\uc774\uc2a4\uc640 \uad50\ucc28 \ucc38\uc870\ub429\ub2c8\ub2e4. \uc774 \uc811\uadfc \ubc29\uc2dd\uc758 \ub2e8\uc810\uc740 \uc545\uc131\ucf54\ub4dc \uc81c\uc791\uc790\uac00 \ucf54\ub4dc\ub97c \uc27d\uac8c \uc218\uc815\ud558\uc5ec \uc774\ub7ec\ud55c \ud615\ud0dc\uc758 \ubd84\uc11d\uc744 \uc6b0\ud68c\ud560 \uc218 \uc788\ub2e4\ub294 \uac83\uc785\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"dynamic-analysis\"><strong>\ub3d9\uc801 \ubd84\uc11d<\/strong><\/h2>\n\n\n<p>\uc774 \ubd84\uc11d\uc740 \uc2dc\uc2a4\ud15c \uc2e4\ud589 \uc911 \uc545\uc131\ucf54\ub4dc\uc758 \ud589\ub3d9\uc744 \uad00\ucc30\ud558\uace0 \uc545\uc131\ucf54\ub4dc\ub97c \ud0d0\uc9c0\ud558\uace0 \uc791\ub3d9\ud558\ub294 \uac83\uc744 \uac00\ub2a5\ud558\uac8c \ud569\ub2c8\ub2e4. \ub3d9\uc801 \uc545\uc131\ucf54\ub4dc \ubd84\uc11d\uc740 \uc545\uc131 \ud30c\uc77c\uc774 \uc7a5\uce58\ub098 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \ud53c\ud574\ub97c \uc8fc\uc9c0 \uc54a\uace0 \uc548\uc804\ud558\uac8c \uc2e4\ud589\ub420 \uc218 \uc788\ub294 \uc548\uc804\ud55c \ud658\uacbd\uc774 \ud544\uc694\ud569\ub2c8\ub2e4. \uacb0\uacfc\uc801\uc73c\ub85c \uc774\ub7ec\ud55c \ubd84\uc11d\uc740 \uc77c\ubc18\uc801\uc73c\ub85c \uc0cc\ub4dc\ubc15\uc2a4\ub77c\uace0 \ubd88\ub9ac\ub294 \uac00\uc0c1 \uba38\uc2e0\uc5d0\uc11c \uc218\ud589\ub418\uba70, \uc545\uc131\ucf54\ub4dc \uac80\uc0ac\ub97c \uc704\ud55c \uc18c\ud504\ud2b8\uc6e8\uc5b4\uac00 \uc0ac\uc804 \uc124\uce58\ub418\uc5b4 \uc788\uace0 \uc545\uc131\ucf54\ub4dc \uc0c1\ud638\uc791\uc6a9\uc744 \uad00\ucc30\ud558\uae30 \uc704\ud55c \uac00\uc0c1 \ub124\ud2b8\uc6cc\ud06c\ub97c \uc0dd\uc131\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>2023\ub144\uc758 \uc545\uc131\ucf54\ub4dc \ubd84\uc11d \ub3c4\uad6c:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>\uc57c\ub77c<\/strong>: Windows, Linux, macOS \uc2dc\uc2a4\ud15c\uc744 \uc704\ud55c \ud06c\ub85c\uc2a4 \ud50c\ub7ab\ud3fc \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc778 Yara\ub294 \uc7a0\uc7ac\uc801\uc778 \uc545\uc131\ucf54\ub4dc \ud328\ubc00\ub9ac\ub97c \uc2dd\ubcc4\ud558\uace0 \ubd84\ub958\ud558\ub294 \ub370 \ub3c4\uc6c0\uc744 \uc90d\ub2c8\ub2e4. <a href=\"https:\/\/www.varonis.com\/blog\/yara-rules\" target=\"_blank\" rel=\"noreferrer noopener\">\uc774\uc9c4 \ub610\ub294 \ud14d\uc2a4\ud2b8 \ud30c\uc77c<\/a> information stored in rules, determining whether a file belongs to a specific class. Each rule has two keywords: \u201c<strong>\ubb38\uc790\uc5f4<\/strong>\u201d (the established sequences YARA searches for in the binary) and \u201c<strong>\uc870\uac74<\/strong>\u201d (the specified criteria for detection).<\/li>\n\n\n\n<li><strong>\uba54\ud0c0\uc2a4\uce94<\/strong>: \ubb34\ub8cc \uc628\ub77c\uc778 \uc545\uc131\ucf54\ub4dc \ubd84\uc11d \ub3c4\uad6c\uc778 Metascan\uc740 \uc5ec\ub7ec \ubd84\uc11d \uc5d4\uc9c4\uc744 \uc0ac\uc6a9\ud558\uc5ec \ud30c\uc77c\uc744 \uc2a4\uce94\ud558\uace0 Java API\ub97c \uc81c\uacf5\ud569\ub2c8\ub2e4. <a href=\"https:\/\/portal.opswat.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">OPSWAT \ud3ec\ud138<\/a>, \uc5d0 \ub4f1\ub85d\ud558\uc5ec \uc5bb\uc740 \ube44\ubc00\ubc88\ud638\uac00 \ud544\uc694\ud569\ub2c8\ub2e4. \uc2dc\uac04\ub2f9 1500\uac1c\uc758 \ud574\uc2dc \uac80\uc0c9 \uc694\uccad\uacfc 25\uac1c\uc758 \ud30c\uc77c \ubd84\uc11d \uc694\uccad\uc744 \ud5c8\uc6a9\ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ucfe0\ucfe0<\/strong>: \ub3d9\uc801 \uc545\uc131\ucf54\ub4dc \ubd84\uc11d\uc744 \uc790\ub3d9\ud654\ud558\ub294 \ubb34\ub8cc \uc624\ud508 \uc18c\uc2a4 \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc778,<a href=\"https:\/\/cuckoosandbox.org\/\" target=\"_blank\" rel=\"noreferrer noopener\"> Cuckoo\ub294 \uc0cc\ub4dc\ubc15\uc2a4\ub85c \uc791\ub3d9\ud558\uc5ec<\/a> \ud30c\uc77c\uc744 \uc2e4\uc2dc\uac04\uc73c\ub85c \uc2e4\ud589\ud558\uace0 \ubd84\uc11d\ud569\ub2c8\ub2e4. \uc911\uc559 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub294 \ud30c\uc77c \uc2e4\ud589 \ubc0f \ubd84\uc11d\uc744 \uaca9\ub9ac\ub41c \uac00\uc0c1 \uba38\uc2e0 \ub0b4\uc5d0\uc11c \uad00\ub9ac\ud558\uba70, \ud638\uc2a4\ud2b8 \uba38\uc2e0\uacfc \uc5ec\ub7ec \uac8c\uc2a4\ud2b8 \uba38\uc2e0\uc774 \ud30c\uc77c\uc744 \uc2e4\ud589\ud569\ub2c8\ub2e4. \ud638\uc2a4\ud2b8\ub294 \uc804\uccb4 \ubd84\uc11d \uacfc\uc815\uc744 \uad00\ub9ac\ud558\uba74\uc11c \uac01 \uac8c\uc2a4\ud2b8\uc5d0\uac8c \ud30c\uc77c \uc2e4\ud589\uc744 \uc548\uc804\ud558\uac8c \uc704\uc784\ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ud37c\uc9c0 \ud574\uc2dc<\/strong>: \ud574\uc2f1 \uc54c\uace0\ub9ac\uc998\uc740 \ud30c\uc77c\uc744 \uace0\uc720\ud558\uac8c \uc2dd\ubcc4\ud558\uc9c0\ub9cc, \uc545\uc131\ucf54\ub4dc \uc81c\uc791\uc790\ub294 \uc18c\uc2a4 \ucf54\ub4dc\ub97c \uc27d\uac8c \uc218\uc815\ud558\uc5ec \ud0d0\uc9c0\ub97c \ud53c\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ud37c\uc9c0 \ud574\uc2f1\uc740 \ub450 \ud30c\uc77c \uac04\uc758 \uc720\uc0ac\uc131\uc744 \ube44\uad50\ud558\ub294 \ub370 \uc911\uc810\uc744 \ub450\uc5b4 \ud37c\uc9c0 \ud574\uc2dc\ub97c \ube44\uad50\ud558\uc5ec \ub2e4\ub978 \ud30c\uc77c\uc758 \uc218\uc815\uc77c \uc218 \uc788\ub294 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub97c \ud0d0\uc9c0\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<\/ol>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>\uacb0\ub860\uc801\uc73c\ub85c<\/strong><\/h2>\n\n\n<p>\uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uac1c\ub150\uc740 \uc0ac\uc774\ubc84 \ubc94\uc8c4, \uc0ac\uc774\ubc84 \ud14c\ub7ec\ub9ac\uc998, \uc0ac\uc774\ubc84 \ubc29\uc5b4\uc640 \uac19\uc740 \uad00\ub828 \uc6a9\uc5b4\uc640 \ud568\uaed8 \ud604\ub300 \uc0ac\ud68c\uc5d0\uc11c \uc911\uc694\uc131\uc744 \uc5bb\uace0 \uc788\uc2b5\ub2c8\ub2e4. \ub113\uac8c \ubcf4\uba74, \uc0ac\uc774\ubc84 \ubcf4\uc548\uc740 \ucef4\ud4e8\ud130 \uc2dc\uc2a4\ud15c\uc774\ub098 \uc6f9 \uae30\ubc18 \ub514\uc9c0\ud138 \uc11c\ube44\uc2a4\ub97c \ud1b5\ud574 \uc800\uc7a5\ub418\uac70\ub098 \uc804\uc1a1\ub418\ub294 \ub370\uc774\ud130\uc758 \uac00\uc6a9\uc131, \uc811\uadfc\uc131, \uc9c4\uc704\uc131, \ubb34\uacb0\uc131 \ubc0f \uae30\ubc00\uc131\uc744 \ub2e4\uc591\ud55c \ud615\ud0dc\uc758 \uacf5\uaca9\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\ub294 \uac83\uc744 \ud3ec\ud568\ud569\ub2c8\ub2e4.<\/p>","protected":false},"excerpt":{"rendered":"<p>\ucef4\ud4e8\ud305 \uae30\uc220\uc774 \ubc1c\uc804\ud568\uc5d0 \ub530\ub77c \ubcf4\uc548 \uacb0\ud568 \ubc0f \ucde8\uc57d\uc810\uc744 \uc545\uc6a9\ud558\ub824\ub294 \ub2e4\uc591\ud55c \uc2dc\ub3c4\uac00 \uc774\ub8e8\uc5b4\uc9c0\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc778\ud130\ub137\uc758 \ud655\uc7a5\uacfc \uc810\uc810 \ub354 \uc5f0\uacb0\ub418\ub294 \uc138\uc0c1\uc73c\ub85c \uc778\ud574 \ub300\ubd80\ubd84\uc758 \uac1c\uc778\uc774 ... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%ec%82%ac%ec%9d%b4%eb%b2%84-%eb%b3%b4%ec%95%88\/%ec%82%ac%ec%9d%b4%eb%b2%84%eb%b3%b4%ec%95%88-%eb%b0%8f-%ec%98%a4%eb%8a%98%eb%82%a0%ec%9d%98-%ec%98%81%ed%96%a5\/\"><span class=\"screen-reader-text\">\uc0ac\uc774\ubc84 \ubcf4\uc548\uacfc \uc624\ub298\ub0a0\uc758 \uc601\ud5a5<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":1,"featured_media":1671,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-1668","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity and its impact today | Security Briefing<\/title>\n<meta name=\"description\" content=\"Discover the impacts of cybersecurity on businesses, individuals &amp; governments. Stay informed with Security Briefing&#039;s in-depth analysis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\ubcf4\uc548\/\uc0ac\uc774\ubc84\ubcf4\uc548-\ubc0f-\uc624\ub298\ub0a0\uc758-\uc601\ud5a5\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity and its impact today | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Discover the impacts of cybersecurity on businesses, individuals &amp; governments. Stay informed with Security Briefing&#039;s in-depth analysis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\ubcf4\uc548\/\uc0ac\uc774\ubc84\ubcf4\uc548-\ubc0f-\uc624\ub298\ub0a0\uc758-\uc601\ud5a5\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-07T14:07:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"696\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Cybersecurity and its impact today\",\"datePublished\":\"2023-04-07T14:07:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/\"},\"wordCount\":852,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/\",\"name\":\"Cybersecurity and its impact today | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg\",\"datePublished\":\"2023-04-07T14:07:26+00:00\",\"description\":\"Discover the impacts of cybersecurity on businesses, individuals & governments. Stay informed with Security Briefing's in-depth analysis.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg\",\"width\":696,\"height\":300,\"caption\":\"Cybersecurity and its impact today\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity and its impact today\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ko\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\uc0ac\uc774\ubc84 \ubcf4\uc548\uacfc \uc624\ub298\ub0a0\uc758 \uc601\ud5a5 | \ubcf4\uc548 \ube0c\ub9ac\ud551","description":"\uc0ac\uc774\ubc84 \ubcf4\uc548\uc774 \uae30\uc5c5, \uac1c\uc778 \ubc0f \uc815\ubd80\uc5d0 \ubbf8\uce58\ub294 \uc601\ud5a5\uc744 \ubc1c\uacac\ud558\uc138\uc694. Security Briefing\uc758 \uc2ec\uce35 \ubd84\uc11d\uc73c\ub85c \uc815\ubcf4\ub97c \uc720\uc9c0\ud558\uc138\uc694.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\ubcf4\uc548\/\uc0ac\uc774\ubc84\ubcf4\uc548-\ubc0f-\uc624\ub298\ub0a0\uc758-\uc601\ud5a5\/","og_locale":"ko_KR","og_type":"article","og_title":"Cybersecurity and its impact today | Security Briefing","og_description":"Discover the impacts of cybersecurity on businesses, individuals & governments. Stay informed with Security Briefing's in-depth analysis.","og_url":"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\ubcf4\uc548\/\uc0ac\uc774\ubc84\ubcf4\uc548-\ubc0f-\uc624\ub298\ub0a0\uc758-\uc601\ud5a5\/","og_site_name":"Security Briefing","article_published_time":"2023-04-07T14:07:26+00:00","og_image":[{"width":696,"height":300,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"security","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"4\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Cybersecurity and its impact today","datePublished":"2023-04-07T14:07:26+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/"},"wordCount":852,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg","articleSection":["cybersecurity"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/","name":"\uc0ac\uc774\ubc84 \ubcf4\uc548\uacfc \uc624\ub298\ub0a0\uc758 \uc601\ud5a5 | \ubcf4\uc548 \ube0c\ub9ac\ud551","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg","datePublished":"2023-04-07T14:07:26+00:00","description":"\uc0ac\uc774\ubc84 \ubcf4\uc548\uc774 \uae30\uc5c5, \uac1c\uc778 \ubc0f \uc815\ubd80\uc5d0 \ubbf8\uce58\ub294 \uc601\ud5a5\uc744 \ubc1c\uacac\ud558\uc138\uc694. Security Briefing\uc758 \uc2ec\uce35 \ubd84\uc11d\uc73c\ub85c \uc815\ubcf4\ub97c \uc720\uc9c0\ud558\uc138\uc694.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg","width":696,"height":300,"caption":"Cybersecurity and its impact today"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity and its impact today"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"\ubcf4\uc548","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin\uc740 \uc815\ubd80 \uae30\uc220\uc758 \uc120\uc784 \uc2a4\ud0dc\ud504 \uc791\uac00\uc785\ub2c8\ub2e4. \uc774\uc804\uc5d0\ub294 PYMNTS\uc640 \ubca0\uc774 \uc2a4\ud14c\uc774\ud2b8 \ubc30\ub108\uc5d0 \uae00\uc744 \uc37c\uc73c\uba70 \uce74\ub124\uae30 \uba5c\ub860\uc5d0\uc11c \ubb38\uc608\ucc3d\uc791 \ud559\uc0ac \ud559\uc704\ub97c \ubc1b\uc558\uc2b5\ub2c8\ub2e4. \ud604\uc7ac \ubcf4\uc2a4\ud134 \uc678\uacfd\uc5d0 \uac70\uc8fc\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ko\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/1668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=1668"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/1668\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media\/1671"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=1668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/categories?post=1668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/tags?post=1668"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}