{"id":611,"date":"2022-09-15T18:13:39","date_gmt":"2022-09-15T18:13:39","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=611"},"modified":"2022-09-15T18:13:39","modified_gmt":"2022-09-15T18:13:39","slug":"%ec%9b%90%ea%b2%a9-%ea%b3%b5%ea%b2%a9","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ko\/%ec%82%ac%ec%9d%b4%eb%b2%84-%ea%b3%b5%ea%b2%a9\/%ec%9b%90%ea%b2%a9-%ea%b3%b5%ea%b2%a9\/","title":{"rendered":"\uc6d0\uaca9 \uacf5\uaca9\uc774\ub780 \ubb34\uc5c7\uc778\uac00? \ub3c4\ub451\uc774 \ubb3c\uac74\uc744 \ud6d4\uce58\uae30 \uc704\ud574 \uc9d1\uc744 \ud138 \ub54c, \uadf8\ub4e4\uc740 \uccb4\ud3ec\ub85c \uc774\uc5b4\uc9c8 \uc218 \uc788\ub294 DNA \uc99d\uac70\ub098 \uc9c0\ubb38\uc744 \ub0a8\uae38 \uc704\ud5d8\uc774 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ud574\ucee4\ub294\u2026"},"content":{"rendered":"<h2 class=\"wp-block-heading\" id=\"what-is-a-remote-attack\"><strong>\uc6d0\uaca9 \uacf5\uaca9\uc774\ub780 \ubb34\uc5c7\uc778\uac00?<\/strong><\/h2>\n\n\n<p>When a thief robs a house for material items, they risk leaving DNA evidence or fingerprints that could lead to their arrest. However, hackers who commit cyber crimes can do so without ever being in the same vicinity as their victim and therefore are much less likely to be caught. In addition, experienced hackers can frame innocent people by planting false evidence online that points back to the innocents\u2019 digital devices or accounts.<\/p>\n\n\n\n<p>\uacbd\ud5d8 \ub9ce\uc740 \ud574\ucee4\ub4e4\uc740 \ud604\uc7ac \uc2dc\uc2a4\ud15c\uc758 \uc57d\uc810\uc744 \ucc3e\ub294 \ub370 \ub2a5\uc219\ud558\uae30 \ub54c\ubb38\uc5d0, \uc608\ubc29 \ub3c4\uad6c\ub098 \ubc29\ubc95\uc73c\ub85c \uadf8\ub4e4\uc744 \ub9c9\uc744 \uc218 \uc5c6\uc2b5\ub2c8\ub2e4. \ubd88\ud589\ud788\ub3c4, \uc0ac\ub78c\ub4e4\uacfc \uae30\uc5c5\uc744 \ud574\ud0b9\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\uae30 \uc704\ud55c \ubc95\uc801 \uc870\uce58\ub97c \uac1c\ubc1c\ud558\ub294 \ucc45\uc784\uc774 \uc788\ub294 \uc0ac\ub78c\ub4e4\uc740 \uadf8\uac83\uc5d0 \ub300\ud574 \uc9c4\uc815\uc73c\ub85c \uc798 \uc54c\uac70\ub098 \uad00\uc2ec\uc774 \uc788\ub294 \uac83\uc73c\ub85c \ubcf4\uc774\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"types-of-remote-attacks\"><strong>\uc6d0\uaca9 \uacf5\uaca9\uc758 \uc720\ud615<\/strong><\/h2>\n\n\n<p>\uacf5\uaca9\uc790\ub4e4\uc740 \ub2e4\uc591\ud55c \ubc29\ubc95\uc73c\ub85c \uc6d0\uaca9 \uc2dc\uc2a4\ud15c\uc744 \uc81c\uc5b4\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4:<\/p>\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"dns-poisoning\">DNS \uc2a4\ud478\ud551<\/h3>\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-619\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic.jpg\" alt=\"DNS \uc2a4\ud478\ud551 \uacf5\uaca9 \uc778\ud3ec\uadf8\ub798\ud53d \" width=\"823\" height=\"566\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic.jpg 800w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 823px) 100vw, 823px\" \/><\/figure>\n\n\n\n<p>\ubaa8\ub4e0 \uc7a5\uce58\uc640 \uc11c\ubc84\uc5d0\ub294 \ud1b5\uc2e0\uc5d0\uc11c \uc2dd\ubcc4\ud558\ub294 \ub370 \uc0ac\uc6a9\ub418\ub294 \uc778\ud130\ub137 \ud504\ub85c\ud1a0\ucf5c(IP) \uc8fc\uc18c\ub77c\ub294 \uc22b\uc790 \uc138\ud2b8\uac00 \uc788\uc2b5\ub2c8\ub2e4. \uac01 \uc6f9\uc0ac\uc774\ud2b8\uc5d0\ub294 \uc0ac\ub78c\ub4e4\uc774 \uc6d0\ud558\ub294 \uc6f9\uc0ac\uc774\ud2b8\ub97c \ucc3e\ub294 \ub370 \ub3c4\uc6c0\uc744 \uc8fc\uae30 \uc704\ud574 \ub3c4\uba54\uc778 \uc774\ub984\uc774 \uc788\uc2b5\ub2c8\ub2e4 (\uc608: www.domain.com). \ub3c4\uba54\uc778 \uc774\ub984 \uc2dc\uc2a4\ud15c(<a href=\"https:\/\/www.javatpoint.com\/computer-network-dns\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">\ub3c4\uba54\uc778 \uc774\ub984 \uc2dc\uc2a4\ud15c (DNS)<\/a>)\uc740 \uc0ac\uc6a9\uc790\uac00 \uc9c0\uc815\ud55c \ub3c4\uba54\uc778 \uc774\ub984\uc744 \uc62c\ubc14\ub978 IP \uc8fc\uc18c\ub85c \ubcc0\ud658\ud558\uc5ec DNS \uc11c\ubc84\ub97c \ud1b5\ud574 \ud2b8\ub798\ud53d\uc744 \uc801\uc808\ud788 \ub77c\uc6b0\ud305\ud569\ub2c8\ub2e4. \uc774 \ubaa8\ub4e0 \uac83\uc740 DNS \uc11c\ubc84\ub97c \ud1b5\ud574 \uad00\ub9ac\ub429\ub2c8\ub2e4.<\/p>\n\n\n\n<p>DNS poisoning is when an attacker reroutes traffic from the intended website to a fake site by changing DNS records. For example, if you try to log into your online banking account, but instead you get redirected to a page that looks identical to the bank\u2019s login page, the attacker has performed a DNS poisoning attack. If you enter sensitive information into this fake website, the attacker can steal your information for their benefit.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"port-scanning\">\ud3ec\ud2b8 \uc2a4\uce90\ub2dd<\/h3>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"820\" height=\"564\" class=\"wp-image-626\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic.jpg\" alt=\"TCP IP \ud558\uc774\uc7ac\ud0b9 \uc778\ud3ec\uadf8\ub798\ud53d\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic.jpg 820w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 820px) 100vw, 820px\" \/><\/figure>\n\n\n\n<p>\ud3ec\ud2b8 \uc2a4\uce90\ub2dd\uc740 \ub124\ud2b8\uc6cc\ud06c\uc758 \uc5b4\ub5a4 \ud3ec\ud2b8\uac00 \uc5f4\ub824 \uc788\ub294\uc9c0\ub97c \uc54c\uc544\ub0b4\ub294 \ubc29\ubc95\uc785\ub2c8\ub2e4. \uc774\ub294 \uac01 \ud3ec\ud2b8\ub97c \ud1b5\ud574 \ub370\uc774\ud130\ub97c \ubcf4\ub0b4\uace0 \ubc1b\uc73c\ub824\uace0 \uc2dc\ub3c4\ud568\uc73c\ub85c\uc368 \uc774\ub8e8\uc5b4\uc9c0\uba70, \uc774\ub294 \ub9c8\uce58 \ub204\uad70\uac00\uac00 \uc9d1\uc5d0 \uc788\ub294\uc9c0 \ud655\uc778\ud558\uae30 \uc704\ud574 \ubb38\uc744 \ub450\ub4dc\ub9ac\ub294 \uac83\uacfc \uac19\uc2b5\ub2c8\ub2e4. \ub204\uad70\uac00\uac00 \uc751\ub2f5\ud558\uba74 \ud3ec\ud2b8\uac00 \uc5f4\ub824 \uc788\uc74c\uc744 \uc54c \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\ub4e4\uc740 \ub124\ud2b8\uc6cc\ud06c\ub098 \uc11c\ubc84\uc5d0 \ub300\ud574 \ud3ec\ud2b8 \uc2a4\uce94\uc744 \uc2e4\ud589\ud558\uc5ec \uc5b4\ub5a4 \ud3ec\ud2b8\uac00 \uc5f4\ub824 \uc788\uace0 \uc815\ubcf4\ub97c \uc218\uc2e0\ud558\uace0 \uc788\ub294\uc9c0, \uc18c\uc2a4\uc640 \ub300\uc0c1 \uc0ac\uc774\uc5d0 \ubc29\ud654\ubcbd\uacfc \uac19\uc740 \ubcf4\uc548 \uc7a5\uce58\uac00 \uc788\ub294\uc9c0\ub97c \ubcf4\uc5ec\uc90d\ub2c8\ub2e4. \ud3ec\ud2b8 \uc2a4\uce90\ub2dd\uc740 \ub610\ud55c \uac1c\ubcc4 \ud3ec\ud2b8\uc758 \ud65c\ub3d9\uc744 \uc0b4\ud3b4\ubd04\uc73c\ub85c\uc368 \uc7a5\uce58\ub97c \uc9c0\ubb38 \uc778\uc2dd\ud558\ub294 \ub370 \uc0ac\uc6a9\ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc774 \ud504\ub85c\uadf8\ub7a8\uc740 \ubcf4\uc548 \uad00\ub9ac\uc790\uac00 \ub124\ud2b8\uc6cc\ud06c\uc758 \ucde8\uc57d\uc810\uc744 \ubaa8\ub2c8\ud130\ub9c1\ud558\uae30 \uc704\ud574 \uc0ac\uc6a9\ud558\ub294 \uac83\ubfd0\ub9cc \uc544\ub2c8\ub77c, \ud574\ucee4\ub4e4\uc774 \ucde8\uc57d\uc810\uc744 \ucc3e\uc544\ub0b4\uae30 \uc704\ud55c \uc815\ucc30\uc758 \uc77c\ud658\uc73c\ub85c \uc790\uc8fc \uc0ac\uc6a9\ub429\ub2c8\ub2e4.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"dos-attacks\">DoS \uacf5\uaca9<\/h3>\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-628\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic-.jpg\" alt=\"Dos \uacf5\uaca9 \uc778\ud3ec\uadf8\ub798\ud53d \" width=\"825\" height=\"568\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic-.jpg 820w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic--300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic--768x528.jpg 768w\" sizes=\"auto, (max-width: 825px) 100vw, 825px\" \/><\/figure>\n\n\n\n<p>The goal of a DoS attack is to stop people who are allowed to use a machine or network from using it. This is done by flooding the target with questions and data that cause the system to crash. Employees, members, and consumers cannot use the system because their legitimate requests are overwhelmed by the attacker\u2019s illicit activities.<\/p>\n\n\n\n<p><a href=\"https:\/\/securitybriefing.net\/ko\/%eb%94%94%eb%8f%84%ec%8a%a4\/ddos-%ea%b3%b5%ea%b2%a9%ec%9d%b4-%eb%ac%b4%ec%97%87%ec%9d%b8%ea%b0%80\/\">DDoS \uacf5\uaca9<\/a> \uc740 \ud53c\ud574\uc790\uc5d0\uac8c \ub9e4\uc6b0 \ube44\uc6a9\uc774 \ub9ce\uc774 \ub4e4 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uacf5\uaca9\uc740 \ub370\uc774\ud130\ub098 \uc790\uc0b0\uc758 \uc808\ub3c4\uc640 \uad00\ub828\uc774 \uc788\uc744 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc740\ud589, \uc0c1\uc810, \ubbf8\ub514\uc5b4 \ud68c\uc0ac, \uc815\ubd80 \uae30\uad00\uacfc \uac19\uc740 \uae30\uc5c5\ub4e4\uc740 \uc885\uc885 \uc774\ub7ec\ud55c \uacf5\uaca9\uc5d0\uc11c \uc6f9 \uc11c\ubc84\ub97c \ub300\uc0c1\uc73c\ub85c \ud569\ub2c8\ub2e4.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"tcp-ip-hijacking\">TCP\/IP \ud558\uc774\uc7ac\ud0b9<\/h3>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"850\" height=\"584\" class=\"wp-image-624\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic.jpg\" alt=\"TCP IP \ud558\uc774\uc7ac\ud0b9 \uc778\ud3ec\uadf8\ub798\ud53d\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic.jpg 850w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/figure>\n\n\n\n<p>\uc774 \uc720\ud615\uc758 \uacf5\uaca9\uc740 \ud574\ucee4\uac00 \uc774\ubbf8 \uc11c\ub85c \ud1b5\uc2e0\ud558\uace0 \uc788\ub294 \ub450 \uc7a5\uce58 \uac04\uc758 \uc138\uc158\uc744 \uc7a5\uc545\ud560 \ub54c \ubc1c\uc0dd\ud569\ub2c8\ub2e4. \uacf5\uaca9\uc790\ub294 \uc774 \uacf5\uaca9\uc744 \uc218\ud589\ud558\uae30 \uc704\ud574 \ud53c\ud574\uc790\uc640 \uac19\uc740 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uc788\uc5b4\uc57c \ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uacf5\uaca9\uc790\uac00 \uc138\uc158\uc744 \uc7a5\uc545\ud558\uba74 \ub300\ud654\ub97c \uc5ff\ub4e3\uace0 \uad50\ud658\ub418\ub294 \ub370\uc774\ud130\ub97c \uc218\uc815\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc774 \uacf5\uaca9\uc740 \uc885\uc885 \uc2dc\uc2a4\ud15c\uc5d0 \uc545\uc131 \ucf54\ub4dc\ub97c \uc8fc\uc785\ud558\uac70\ub098 \ubbfc\uac10\ud55c \uc815\ubcf4\ub97c \ud6d4\uce58\ub294 \ub370 \uc0ac\uc6a9\ub429\ub2c8\ub2e4.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"smb-relay-attack\">SMB \ub9b4\ub808\uc774 \uacf5\uaca9<\/h3>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"850\" height=\"584\" class=\"wp-image-620\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic.jpg\" alt=\"SMB \ub9b4\ub808\uc774 \uacf5\uaca9 \uc778\ud3ec\uadf8\ub798\ud53d\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic.jpg 850w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/figure>\n\n\n\n<p>\uc11c\ubc84 \uba54\uc2dc\uc9c0 \ube14\ub85d(SMB) \ub9b4\ub808\uc774 \uacf5\uaca9\uc740 \uc5ec\uc804\ud788 NTLM \ubc84\uc804 2 \uc778\uc99d\uc744 \uc0ac\uc6a9\ud558\ub294 \uae30\uc5c5\uc5d0\uc11c \ubd88\ud589\ud788\ub3c4 \ud754\ud788 \ubc1c\uc0dd\ud569\ub2c8\ub2e4. \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790\ub4e4\uc740 \ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d\uc744 \ube44\ubc00\ub9ac\uc5d0 \uc5ff\ub4e4\uc5b4 \ubbfc\uac10\ud55c \ub370\uc774\ud130\ub97c \ub2e4\ub978 \uc11c\ubc84\ub85c \ube44\ubc00\ub9ac\uc5d0 \uc804\ub2ec\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>Think about this problem from the perspective of an exemplary user and an evil hacker. The ideal scenario is when the actual person is trying to log in and authenticate themselves. When, instead of a valid user, a hacker tries to use stolen credentials by monitoring network traffic for them to gain access \u2013 there is no need for a password.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"recent-advancements-in-hacking-technology\"><strong>\ud574\ud0b9 \uae30\uc220\uc758 \ucd5c\uadfc \ubc1c\uc804<\/strong><\/h2>\n\n\n<p>\ud574\ucee4\ub4e4\uc740 \uc81c\ud55c\ub41c \uc815\ubcf4\uc5d0 \uc811\uadfc\ud558\ub294 \uc0c8\ub85c\uc6b4 \ubc29\ubc95\uc744 \ub04a\uc784\uc5c6\uc774 \ucc3e\uace0 \uc788\uc73c\uba70, \uc774\ub294 \ucef4\ud4e8\ud130 \uc0ac\uae30 \ubc0f \ub0a8\uc6a9 \ubc29\uc9c0\ubc95\uc774 \uc5c5\ub370\uc774\ud2b8\ub418\uc5b4\uc57c \ud568\uc744 \ubd84\uba85\ud788 \ubcf4\uc5ec\uc90d\ub2c8\ub2e4. \uc774 \ubc95\uc740 1980\ub144\ub300\uc5d0 \ub9cc\ub4e4\uc5b4\uc84c\uc9c0\ub9cc 2011\ub144 \uc774\ud6c4\ub85c \ubcc0\uacbd\ub418\uc9c0 \uc54a\uc558\uc73c\uba70, \uc774\ub294 \ucd5c\uadfc\uc758 \uae30\uc220 \ubc1c\uc804\uc5d0 \ub300\uc751\ud558\uc9c0 \ubabb\ud558\uace0 \uc788\uc74c\uc744 \uc758\ubbf8\ud569\ub2c8\ub2e4. CFAA\ub294 \uc815\uae30\uc801\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8\ub418\uc5b4 \ud574\ucee4\ubcf4\ub2e4 \uc55e\uc11c \ub098\uac00\uc57c \ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>Lying on a dating profile may not seem important, but if the website\u2019s terms of use are violated, you could be charged with hacking under the <a href=\"https:\/\/www.nacdl.org\/Landing\/ComputerFraudandAbuseAct\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">\ucef4\ud4e8\ud130 \uc0ac\uae30 \ubc0f \ub0a8\uc6a9\ubc95 (CFAA)<\/a>. \uc774 \uacbd\ubbf8\ud55c \ubc94\uc8c4\ub294 1\ub144\uc758 \uc9d5\uc5ed\ud615\uc774\ub098 $100,000\uc758 \ubc8c\uae08\ud615\uc744 \ub3d9\ubc18\ud569\ub2c8\ub2e4.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"bypassing-captcha-test\">CAPTCHA \ud14c\uc2a4\ud2b8 \uc6b0\ud68c<\/h3>\n\n\n<p>CAPTCHA \ud14c\uc2a4\ud2b8\ub294 \uc0ac\uc6a9\uc790\uac00 \uc778\uac04\uc778\uc9c0 \ub85c\ubd07\uc778\uc9c0\ub97c \uacb0\uc815\ud569\ub2c8\ub2e4. \uc774\ub294 \uc740\ud589 \uacc4\uc815\uc5d0 \ub85c\uadf8\uc778\ud558\ub294 \uac83\uacfc \uac19\uc740 \ubcf4\uc548 \ubaa9\uc801\uc73c\ub85c \uc77c\ubc18\uc801\uc73c\ub85c \uc0ac\uc6a9\ub429\ub2c8\ub2e4. CAPTCHA\ub97c \uc6b0\ud68c\ud558\ub824\ub2e4 \uc801\ubc1c\ub418\uba74 \ud574\ud0b9 \ud610\uc758\ub85c \uae30\uc18c\ub418\uc5b4 \ucd5c\ub300 8\ub144\uc758 \uc9d5\uc5ed\ud615\uc5d0 \ucc98\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p><a href=\"http:\/\/www.captcha.net\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">\uc790\ub3d9\ud654\ub41c \uacf5\uacf5 \ud29c\ub9c1 \ud14c\uc2a4\ud2b8\ub97c \ud1b5\ud55c \ucef4\ud4e8\ud130\uc640 \uc778\uac04\uc758 \uad6c\ubd84 (CAPTCHA) <\/a>is a website\u2019s security measure to prevent bots from accessing them. It displays a picture that is difficult to decipher and to gain access, you must enter the letters and numbers displayed in a box below the image. However, hackers became so clever at hacking it that CAPTCHA had to become more complex, resulting in them being solved more frequently than humans. To combat this, <strong><a href=\"https:\/\/cloud.google.com\/recaptcha-enterprise\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">\uc7ac\ucea1\ucc28 <\/a><\/strong>\ub294 \uc791\uc740 \uc0ac\uac01\ud615\uc744 \ubcf4\uace0 \uc18c\ud654\uc804, \ubc84\uc2a4, \ud6a1\ub2e8\ubcf4\ub3c4\uc640 \ud568\uaed8 \ud45c\uc2dc\ud558\ub294 \uac83\uc744 \ud3ec\ud568\ud558\uc5ec \uac1c\ubc1c\ub418\uc5c8\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ud604\uc7ac\ub85c\uc11c\ub294, <strong>\uc7ac\ucea1\ucc28<\/strong> \uc5ec\uc804\ud788 \ud65c\uc131 \uc0c1\ud0dc\uc785\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \uc790\ub3d9\ud654\ub41c \uae30\uacc4 \ud559\uc2b5 \uae30\uc220\uc774 \uc774\ub97c \uc6b0\ud68c\ud560 \uc218 \uc788\ub294 \ubc29\ubc95\uc744 \ubc1c\uacac\ud558\ub294 \ub370 \uc624\ub79c \uc2dc\uac04\uc774 \uac78\ub9ac\uc9c0 \uc54a\uc744 \uac83\uc785\ub2c8\ub2e4.<\/p>\n\n\n\n<p>reCAPTCHA\uc640 CAPTCHA\ub294 \ubaa8\ub450 \uc628\ub77c\uc778\uc5d0\uc11c \uc778\uac04\uacfc \ucef4\ud4e8\ud130\ub97c \uc800\ub834\ud558\uace0 \uc0ac\uc6a9\uc790 \uce5c\ud654\uc801\uc774\uba70 \ube60\ub974\uac8c \uc2dd\ubcc4\ud560 \uc218 \uc788\ub2e4\ub294 \uc544\uc774\ub514\uc5b4\uc5d0\uc11c \ud30c\uc0dd\ub418\uc5c8\uc2b5\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uc9c8\ubb38\ub4e4\uc740 \uc6b0\ub9ac\uc5d0\uac8c \uc778\uac04\uc744 \ub9cc\ub4dc\ub294 \uac83\uc774 \ubb34\uc5c7\uc778\uc9c0, \uadf8\ub9ac\uace0 \uae30\uacc4\uac00 \uadf8 \uce21\uba74\uc744 \ubcf5\uc81c\ud560 \uc218 \uc788\ub294\uc9c0\ub97c \uace0\ub824\ud558\uac8c \ub9cc\ub4ed\ub2c8\ub2e4. \ubd84\uba85\ud55c \ub300\ub2f5\uc740 \uc6b0\ub9ac\uac00 \ucca0\ud559\uc801 \uc5f0\ubabb\uc758 \uae4a\uc740 \ub05d\uc73c\ub85c \ub6f0\uc5b4\ub4e4\uc5c8\uae30 \ub54c\ubb38\uc5d0 \uc54c \uc218 \uc5c6\ub2e4\ub294 \uac83\uc785\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"so-how-do-you-stay-ahead-of-the-curve-and-ensure-your-business-or-website-is-not-hacked\"><strong>\uadf8\ub807\ub2e4\uba74 \uc5b4\ub5bb\uac8c \uc55e\uc11c \ub098\uac00\uace0 \uadc0\ud558\uc758 \ube44\uc988\ub2c8\uc2a4\ub098 \uc6f9\uc0ac\uc774\ud2b8\uac00 \ud574\ud0b9\ub418\uc9c0 \uc54a\ub3c4\ub85d \ud560 \uc218 \uc788\uc2b5\ub2c8\uae4c?<\/strong><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"keep-your-software-up-to-date\">\uc18c\ud504\ud2b8\uc6e8\uc5b4\ub97c \ucd5c\uc2e0 \uc0c1\ud0dc\ub85c \uc720\uc9c0\ud558\uc2ed\uc2dc\uc624<\/h3>\n\n\n<p>\uac00\uc7a5 \uc911\uc694\ud55c \uac83\uc740 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub97c \ucd5c\uc2e0 \uc0c1\ud0dc\ub85c \uc720\uc9c0\ud558\ub294 \uac83\uc785\ub2c8\ub2e4. \uc5ec\uae30\uc5d0\ub294 \uc6b4\uc601 \uccb4\uc81c, \ubaa8\ub4e0 \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \ubc0f \ud50c\ub7ec\uadf8\uc778\uc774 \ud3ec\ud568\ub429\ub2c8\ub2e4. \uc624\ub798\ub41c \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub294 \ud574\ucee4\uac00 \uc2dc\uc2a4\ud15c\uc5d0 \uc811\uadfc\ud558\ub294 \uac00\uc7a5 \uc77c\ubc18\uc801\uc778 \ubc29\ubc95 \uc911 \ud558\ub098\uc785\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc790\uc2e0\uc744 \ubcf4\ud638\ud558\ub294 \ub610 \ub2e4\ub978 \ubc29\ubc95\uc740 \ubaa8\ub4e0 \uc7a5\uce58\ub098 \uacc4\uc815\uc758 \uae30\ubcf8 \uc0ac\uc6a9\uc790 \uc774\ub984\uacfc \ube44\ubc00\ubc88\ud638\ub97c \ubcc0\uacbd\ud558\ub294 \uac83\uc785\ub2c8\ub2e4. \ub9ce\uc740 \uc0ac\ub78c\ub4e4\uc774 \uae30\ubcf8 \uc0ac\uc6a9\uc790 \uc774\ub984\uacfc \ube44\ubc00\ubc88\ud638\uac00 \uc628\ub77c\uc778\uc5d0\uc11c \uc27d\uac8c \ucc3e\uc744 \uc218 \uc788\ub2e4\ub294 \uac83\uc744 \uae68\ub2eb\uc9c0 \ubabb\ud569\ub2c8\ub2e4. \ud574\ucee4\ub4e4\uc740 \uc774\ub97c \uc54c\uace0 \uc788\uc73c\uba70, \ub354 \ubcf5\uc7a1\ud55c \ubc29\ubc95\uc73c\ub85c \ub118\uc5b4\uac00\uae30 \uc804\uc5d0 \uc774\ub7ec\ud55c \uc790\uaca9 \uc99d\uba85\uc744 \uc2dc\ub3c4\ud569\ub2c8\ub2e4.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"use-twofactor-authentication\">\uc774\uc911 \uc778\uc99d \uc0ac\uc6a9<\/h3>\n\n\n<p>\uc774\uc911 \uc778\uc99d(2FA)\uc744 \uc0ac\uc6a9\ud558\ub294 \uac83\uc740 \uacc4\uc815\uc774 \ud574\ud0b9\ub418\ub294 \uac83\uc744 \ubc29\uc9c0\ud558\ub294 \uac00\uc7a5 \uc88b\uc740 \ubc29\ubc95 \uc911 \ud558\ub098\uc785\ub2c8\ub2e4. 2FA\ub294 \ube44\ubc00\ubc88\ud638\uc640 \ud568\uaed8 \uc804\ud654\ub85c \uc804\uc1a1\ub41c \ucf54\ub4dc\ub97c \uc785\ub825\ud558\ub3c4\ub85d \uc694\uad6c\ud558\uc5ec \ucd94\uac00 \ubcf4\uc548 \uacc4\uce35\uc744 \ucd94\uac00\ud569\ub2c8\ub2e4. \uc774\ub294 \ud574\ucee4\uac00 \ube44\ubc00\ubc88\ud638\ub97c \uac00\uc9c0\uace0 \uc788\ub354\ub77c\ub3c4 \uacc4\uc815\uc5d0 \uc811\uadfc\ud558\uae30 \ud6e8\uc52c \uc5b4\ub835\uac8c \ub9cc\ub4ed\ub2c8\ub2e4.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"disable-anonymous-system-access\">\uc775\uba85 \uc2dc\uc2a4\ud15c \uc811\uadfc \ube44\ud65c\uc131\ud654<\/h3>\n\n\n<p>\uc6d0\uaca9 \uc811\uadfc \uacf5\uaca9\uc774 \uc99d\uac00\ud558\uace0 \uc788\uc73c\uba70, \uc790\uc2e0\uc744 \ubcf4\ud638\ud558\uae30 \uc704\ud55c \uc870\uce58\ub97c \ucde8\ud558\ub294 \uac83\uc774 \ud544\uc218\uc801\uc785\ub2c8\ub2e4. \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790\ub4e4\uc740 \uc810\uc810 \ub354 \uc815\uad50\ud574\uc9c0\uace0 \uc788\uc73c\ubbc0\ub85c \uc55e\uc11c \ub098\uac00\ub294 \uac83\uc774 \uc911\uc694\ud569\ub2c8\ub2e4. \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub97c \ucd5c\uc2e0 \uc0c1\ud0dc\ub85c \uc720\uc9c0\ud558\uace0, \uc774\uc911 \uc778\uc99d\uc744 \uc0ac\uc6a9\ud558\uace0, \uc775\uba85 \uc811\uadfc\uc744 \ube44\ud65c\uc131\ud654\ud558\ub294 \uac83\uc740 \ubaa8\ub450 \uc790\uc2e0\uc744 \ubcf4\ud638\ud558\ub294 \ud6a8\uacfc\uc801\uc778 \ubc29\ubc95\uc785\ub2c8\ub2e4. \uae30\uc220\uc774 \ubc1c\uc804\ud568\uc5d0 \ub530\ub77c \uc6b0\ub9ac\ub294 \uc774 \uace0\uc591\uc774\uc640 \uc950\uc758 \uac8c\uc784\uc5d0\uc11c \ud574\ucee4\ubcf4\ub2e4 \uc55e\uc11c \ub098\uac00\uae30 \uc704\ud55c \uc0c8\ub85c\uc6b4 \ubc29\ubc95\uc744 \uac1c\ubc1c\ud574\uc57c \ud560 \uac83\uc785\ub2c8\ub2e4.<\/p>","protected":false},"excerpt":{"rendered":"<p>\uc0ac\uc774\ubc84 \uacf5\uaca9 \uc544\uce74\uc774\ube0c | \ubcf4\uc548 \ube0c\ub9ac\ud551 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%ec%82%ac%ec%9d%b4%eb%b2%84-%ea%b3%b5%ea%b2%a9\/%ec%9b%90%ea%b2%a9-%ea%b3%b5%ea%b2%a9\/\"><span class=\"screen-reader-text\">\uc6d0\uaca9 \uacf5\uaca9\uc774\ub780 \ubb34\uc5c7\uc778\uac00? \ub3c4\ub451\uc774 \ubb3c\uac74\uc744 \ud6d4\uce58\uae30 \uc704\ud574 \uc9d1\uc744 \ud138 \ub54c, \uadf8\ub4e4\uc740 \uccb4\ud3ec\ub85c \uc774\uc5b4\uc9c8 \uc218 \uc788\ub294 DNA \uc99d\uac70\ub098 \uc9c0\ubb38\uc744 \ub0a8\uae38 \uc704\ud5d8\uc774 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ud574\ucee4\ub294\u2026<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":1,"featured_media":650,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-611","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Remote Attack | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\uacf5\uaca9\/\uc6d0\uaca9-\uacf5\uaca9\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Remote Attack | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"What is a Remote Attack? When a thief robs a house for material items, they risk leaving DNA evidence or fingerprints that could lead to their arrest. However, hackers who&hellip; Remote Attack \uacc4\uc18d \uc77d\uae30\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\uacf5\uaca9\/\uc6d0\uaca9-\uacf5\uaca9\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-15T18:13:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"558\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"6\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Remote Attack\",\"datePublished\":\"2022-09-15T18:13:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\"},\"wordCount\":1260,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"articleSection\":[\"Cyber Attacks\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\",\"name\":\"Remote Attack | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"datePublished\":\"2022-09-15T18:13:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"width\":558,\"height\":500,\"caption\":\"What is a Remote Attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Remote Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Your Gateway to Cyber Safety\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ko\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\uc6d0\uaca9 \uacf5\uaca9 | \ubcf4\uc548 \ube0c\ub9ac\ud551","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\uacf5\uaca9\/\uc6d0\uaca9-\uacf5\uaca9\/","og_locale":"ko_KR","og_type":"article","og_title":"Remote Attack | Security Briefing","og_description":"What is a Remote Attack? When a thief robs a house for material items, they risk leaving DNA evidence or fingerprints that could lead to their arrest. However, hackers who&hellip; Remote Attack \uacc4\uc18d \uc77d\uae30","og_url":"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\uacf5\uaca9\/\uc6d0\uaca9-\uacf5\uaca9\/","og_site_name":"Security Briefing","article_published_time":"2022-09-15T18:13:39+00:00","og_image":[{"width":558,"height":500,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","type":"image\/png"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"security","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"6\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Remote Attack","datePublished":"2022-09-15T18:13:39+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/"},"wordCount":1260,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","articleSection":["Cyber Attacks"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/","name":"\uc6d0\uaca9 \uacf5\uaca9 | \ubcf4\uc548 \ube0c\ub9ac\ud551","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","datePublished":"2022-09-15T18:13:39+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","width":558,"height":500,"caption":"What is a Remote Attack"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Remote Attack"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"\uc0ac\uc774\ubc84 \uc548\uc804\uc73c\ub85c \uac00\ub294 \uad00\ubb38","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"\ubcf4\uc548","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin\uc740 \uc815\ubd80 \uae30\uc220\uc758 \uc120\uc784 \uc2a4\ud0dc\ud504 \uc791\uac00\uc785\ub2c8\ub2e4. \uc774\uc804\uc5d0\ub294 PYMNTS\uc640 \ubca0\uc774 \uc2a4\ud14c\uc774\ud2b8 \ubc30\ub108\uc5d0 \uae00\uc744 \uc37c\uc73c\uba70 \uce74\ub124\uae30 \uba5c\ub860\uc5d0\uc11c \ubb38\uc608\ucc3d\uc791 \ud559\uc0ac \ud559\uc704\ub97c \ubc1b\uc558\uc2b5\ub2c8\ub2e4. \ud604\uc7ac \ubcf4\uc2a4\ud134 \uc678\uacfd\uc5d0 \uac70\uc8fc\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ko\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=611"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/611\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media\/650"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=611"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/categories?post=611"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/tags?post=611"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}