{"id":55135,"date":"2025-04-03T17:00:00","date_gmt":"2025-04-04T01:00:00","guid":{"rendered":"https:\/\/www.sumologic.com\/blog\/iot-%eb%b3%b4%ec%95%88%ec%9d%b4%eb%9e%80-%eb%ac%b4%ec%97%87%ec%9d%b8%ea%b0%80"},"modified":"2025-10-20T14:10:18","modified_gmt":"2025-10-20T22:10:18","slug":"iot-security","status":"publish","type":"blog","link":"https:\/\/www.sumologic.com\/ko\/blog\/iot-security","title":{"rendered":"IoT \ubcf4\uc548\uc774\ub780 \ubb34\uc5c7\uc778\uac00?"},"content":{"rendered":"\n<section class=\"e-stn e-stn-0d652506f82b000a392973813b918ee25d5b4211 e-stn--glossary-inner-content e-stn--table-of-content\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-1f7b3997080fc292474d26ff00c905d99d3520fa e-col--content-wrapper  col-sm-12 col-lg-12 col-xl-12\">\n<div class=\"e-div e-div-a1b32f66e1749758df41d5aea14f647cd10e362c e-div--card-btn-link\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1400\" height=\"400\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/IoT-security_Blog_header_700x200.jpg\" alt=\"\" class=\"wp-image-15054\" title=\"\"><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>\ubb38\uc81c\ub294 \uc0c8\ub85c\uc6b4 \uae30\uc220\uc774 \uc2dc\uc7a5\uc5d0 \ub4f1\uc7a5\ud558\ub294 \uc18d\ub3c4\uc5d0 \ube44\ud574 \ubcf4\uc548 \ub300\ucc45\uc774 \uadf8 \uc18d\ub3c4\ub97c \ub530\ub77c\uac00\uc9c0 \ubabb\ud558\uace0 \uc788\ub2e4\ub294 \uc810\uc785\ub2c8\ub2e4. \uc6f9\ucea0, \uc2a4\ub9c8\ud2b8 \uc628\ub3c4\uc870\uc808\uae30, \uc6e8\uc5b4\ub7ec\ube14 \ud5ec\uc2a4 \ud2b8\ub798\ucee4 \ub4f1 \ub2e4\uc591\ud55c \uc2a4\ub9c8\ud2b8 \uae30\uae30\ub97c \ud3ec\ud568\ud558\ub294 <a href=\"https:\/\/www.oracle.com\/internet-of-things\/#:~:text=What%20is%20IoT%3F,and%20systems%20over%20the%20internet.\" target=\"_blank\" rel=\"noreferrer noopener\">\uc0ac\ubb3c\uc778\ud130\ub137(IoT)<\/a>\uc740 \ud604\uc7ac \uac00\uc7a5 \ube60\ub974\uac8c \uc131\uc7a5\ud558\ub294 \uae30\uc220 \ubd84\uc57c \uc911 \ud558\ub098\ub85c, \uc5c5\uacc4 \uc804\ubc18\uc758 \uc8fc\ubaa9\uc744 \ubc1b\uace0 \uc788\uc2b5\ub2c8\ub2e4. 2030\ub144\uae4c\uc9c0 <a href=\"https:\/\/iot-analytics.com\/number-connected-iot-devices\/\" target=\"_blank\" rel=\"noreferrer noopener\">\uc5f0\uacb0\ub418\ub294 IoT \uae30\uae30\uc758 \uc218\ub294 \uc57d 400\uc5b5 \uac1c\uc5d0 \uc774\ub97c \uac83\uc73c\ub85c \uc608\uc0c1\ub429\ub2c8\ub2e4.<\/a><\/p>\n\n\n\n<p>\ub178\ud2b8\ubd81, \uc11c\ubc84\uc640 \uac19\uc774 \uc804\ud1b5\uc801\uc778 \uc778\ud130\ub137 \uc5f0\uacb0 \uae30\uae30\uc640 \ub2ec\ub9ac, IoT \uae30\uae30\ub294 \ucd5c\uc18c\ud55c\uc758 \uc18c\ud504\ud2b8\uc6e8\uc5b4\uc640 \ub9ac\uc18c\uc2a4\ub85c \uc791\ub3d9\ud569\ub2c8\ub2e4. \ub610\ud55c \ub9ce\uc740 IoT \uae30\uae30\uac00 \uc5c5\ub370\uc774\ud2b8\ud558\uae30\uac00 \uc5b4\ub835\uac70\ub098 \uc0ac\uc2e4\uc0c1 \ubd88\uac00\ub2a5\ud55c \ub124\ud2b8\uc6cc\ud06c \ud658\uacbd\uc5d0 \ubc30\uce58\ub418\uc5b4 \uc788\uc5b4 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc704\ud611\uc5d0 \ucde8\uc57d\ud55c \uad6c\uc870\ub85c \ub418\uc5b4 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ub530\ub77c\uc11c IoT \ubcf4\uc548\uc740 \uc774\ub7ec\ud55c \uc704\ud5d8\uc744 \uc774\ud574\ud558\uace0 \uc644\ud654\ud558\uae30 \uc704\ud55c \ud575\uc2ec \uc694\uc18c\uc785\ub2c8\ub2e4. IoT \ubcf4\uc548\uc744 \ub3c4\uc785\ud568\uc73c\ub85c\uc368 IoT \ub124\ud2b8\uc6cc\ud06c\uc640 \uc804\uccb4 \ub370\uc774\ud130\uc758 \uc548\uc804\uc744 \ubcf4\uc7a5\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc774\uc81c IoT \ubcf4\uc548\uc758 \uc8fc\uc694 \uacfc\uc81c\uc640 \uc774\ub97c \ubcf4\ud638\ud558\uae30 \uc704\ud55c \ubaa8\ubc94 \uc0ac\ub840\ub97c \uc0b4\ud3b4\ubcf4\uaca0\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-are-the-challenges-of-iot-security\">IoT \ubcf4\uc548\uc758 \uc8fc\uc694 \uacfc\uc81c<\/h2>\n\n\n\n<p>IoT \uae30\uae30\ub294 \ub2e4\ub978 \uc2dc\uc2a4\ud15c\uacfc \uc720\uc0ac\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \ubb38\uc81c\ub97c \uacaa\uae30\ub3c4 \ud558\uc9c0\ub9cc, IoT\ub9cc\uc758 \uace0\uc720\ud55c \ubcf4\uc548 \uacfc\uc81c\ub3c4 \uc874\uc7ac\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\ube44\ubc00\ubc88\ud638 \ub0b4\uc7a5: \ub9ce\uc740 IoT \uae30\uae30\uc5d0\ub294 \uc6d0\uaca9 \uae30\uc220 \uc9c0\uc6d0 \ub2f4\ub2f9\uc790\uac00 \ubb38\uc81c\ub97c \ud574\uacb0\ud558\uac70\ub098 \ub300\uaddc\ubaa8 IoT \ubc30\ud3ec\ub97c \uc6a9\uc774\ud558\uac8c \ud558\uae30 \uc704\ud574 \ube44\ubc00\ubc88\ud638\uac00 \ub0b4\uc7a5\ub418\uc5b4 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \uc774\ub807\uac8c \ub0b4\uc7a5\ub41c \ube44\ubc00\ubc88\ud638\ub294 \uacf5\uaca9\uc790\uac00 \ubb34\ub2e8 \uc811\uadfc\uc744 \uc2dc\ub3c4\ud558\uae30 \uc27d\uac8c \ub9cc\ub4e4\uc5b4, IoT \ubcf4\uc548 \uce68\ud574\ub85c \uc774\uc5b4\uc9c8 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uac15\ub825\ud55c \uc778\uc99d \uc808\ucc28\uac00 \uc5c6\ub2e4\uba74, \uc2ec\uac01\ud55c \ubcf4\uc548 \uc704\ud5d8\uc774 \ucd08\ub798\ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n\n\n\n<li>\uae30\uae30 \uc778\uc99d \ubd80\uc871: <a href=\"https:\/\/www.sumologic.com\/glossary\/authentication-factor\">\uc801\uc808\ud55c \uc778\uc99d \uc808\ucc28<\/a> \uc5c6\uc774 IoT \uae30\uae30\uac00 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uc811\uadfc\ud558\ub3c4\ub85d \ud5c8\uc6a9\ud558\uba74, \uc778\uc99d\uc744 \uac70\uce58\uc9c0 \uc54a\uc740 \ube44\uc778\uac00 \uae30\uae30\uc5d0 IoT \uc0dd\ud0dc\uacc4\uac00 \ub178\ucd9c\ub418\ub294 \uac83\uc785\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uae30\uae30\ub294 \uacf5\uaca9\uc758 \uc9c4\uc785\uc810\uc774 \ub418\uac70\ub098 \uacf5\uaca9\uc758 \uadfc\uc6d0\uc774 \ub418\uc5b4, \ubbfc\uac10\ud55c \ub370\uc774\ud130\uac00 \uc190\uc0c1\ub420 \uc704\ud5d8\uc774 \ucee4\uc9d1\ub2c8\ub2e4.<\/li>\n\n\n\n<li>\ubcf4\uc548 \ud328\uce58 \ubc0f \uc5c5\uadf8\ub808\uc774\ub4dc: \uc77c\ubd80 IoT \uae30\uae30\uc5d0\ub294 \ubcf4\uc548 \ud328\uce58 \uc801\uc6a9\uc774\ub098 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uc5c5\uadf8\ub808\uc774\ub4dc \uac19\uc740 \uac04\ub2e8\ud55c \ubc29\ubc95\uc870\ucc28 \uc81c\uacf5\ub418\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4. \uc5c5\ub370\uc774\ud2b8\ub418\uc9c0 \uc54a\uc740 IoT \uc2dc\uc2a4\ud15c\uc740 \ucde8\uc57d\uc810\uc744 \uadf8\ub300\ub85c \ub178\ucd9c\ud558\uac8c \ub418\uba70, \uacf5\uaca9\uc790\uc640 \ubcf4\uc548 \uc704\ud611\uc758 \uc26c\uc6b4 \ud45c\uc801\uc774 \ub429\ub2c8\ub2e4. <\/li>\n\n\n\n<li>\ubb3c\ub9ac\uc801 \ubcf4\uc548 \uac15\ud654 \ubd80\uc871: \ud074\ub77c\uc6b0\ub4dc \uae30\ubc18 \uc778\ud504\ub77c\uc640 \ub2ec\ub9ac, IoT \uae30\uae30\ub294 \uacf5\uaca9\uc790\uac00 \ubb3c\ub9ac\uc801\uc73c\ub85c \uc811\uadfc\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc801\uc808\ud55c \ubcf4\uc548 \uc790\ub3d9\ud654\uc640 \ubb3c\ub9ac\uc801 \ubcf4\ud638 \uae30\uae30\uac00 \uc5c6\uc744 \uacbd\uc6b0, \uacf5\uaca9\uc790\ub294 \uae30\uae30\uc758 \ud558\ub4dc\uc6e8\uc5b4\ub97c \uc870\uc791\ud558\uc5ec \ub0b4\uc7a5\ub41c \ube44\ubc00\ubc88\ud638\ub098 \uc554\ud638 \ud0a4 \uac19\uc740 \ubbfc\uac10\ud55c \uc815\ubcf4\ub97c \ucd94\ucd9c\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n\n\n\n<li>\uc5c5\ub370\uc774\ud2b8\ub418\uc9c0 \uc54a\uc740 \uad6c\uc131 \uc694\uc18c: IoT \uae30\uae30\uc758 \ud558\ub4dc\uc6e8\uc5b4 \ub610\ub294 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uad6c\uc131 \uc694\uc18c\uc5d0\uc11c \ucde8\uc57d\uc810\uc774 \ubc1c\uacac\ub420 \uacbd\uc6b0, \uc81c\uc870\uc5c5\uccb4\ub098 \uc0ac\uc6a9\uc790\uac00 \uc774\ub97c \uc5c5\ub370\uc774\ud2b8\ud558\uac70\ub098 \uad50\uccb4\ud558\ub294 \uac83\uc740 \uc5b4\ub835\uace0 \ube44\uc6a9\uc774 \ub9ce\uc774 \ub4e4 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ubcf4\uc548 \ud328\uce58\uc640 \ub9c8\ucc2c\uac00\uc9c0\ub85c \uc5c5\ub370\uc774\ud2b8\ub418\uc9c0 \uc54a\uc740 IoT \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc740 \uacf5\uaca9\uc5d0 \ucde8\uc57d\ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li>\uae30\uae30 \ubaa8\ub2c8\ud130\ub9c1 \ubc0f \uad00\ub9ac: IoT \uae30\uae30\uc5d0\ub294 \uc790\uc0b0 \ucd94\uc801, \ubaa8\ub2c8\ud130\ub9c1 \ubc0f \uad00\ub9ac\uc5d0 \ud544\uc694\ud55c \uace0\uc720 \uc2dd\ubcc4\uc790\uac00 \ud56d\uc0c1 \uc788\ub294 \uac83\uc774 \uc544\ub2d9\ub2c8\ub2e4.  IT \ub2f4\ub2f9\uc790 \ub610\ud55c IoT \uae30\uae30\ub97c \uc790\uc2e0\uc774 \uad00\ub9ac\u00b7\uac10\uc2dc\ud574\uc57c \ud560 \ud638\uc2a4\ud2b8 \ubaa9\ub85d\uc5d0 \ud3ec\ud568\uc2dc\ud0a4\uc9c0 \uc54a\ub294 \uacbd\uc6b0\uac00 \ub9ce\uc2b5\ub2c8\ub2e4. \uc790\uc0b0 \ucd94\uc801 \uc2dc\uc2a4\ud15c\uc5d0\uc11c\ub3c4 IoT \uae30\uae30\uac00 \uc81c\uc678\ub418\uc5b4, \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uc5f0\uacb0\ub418\uc5b4 \uc788\uc73c\uba74\uc11c\ub3c4 \uad00\ub9ac\ub098 \ubaa8\ub2c8\ud130\ub9c1\uc774 \uc804\ud600 \uc774\ub8e8\uc5b4\uc9c0\uc9c0 \uc54a\ub294 \uacbd\uc6b0\ub3c4 \ubc1c\uc0dd\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<p>\uc774\ub7ec\ud55c \ubb38\uc81c\uc758 \ub300\ubd80\ubd84\uc740 IoT \uae30\uae30\uc758 \uc124\uacc4 \ubc0f \uc81c\uc870 \uacfc\uc815\uc5d0\uc11c \ubcf4\uc548\uc774 \uc0ac\ud6c4\uc801\uc73c\ub85c \uace0\ub824\ub418\ub294 \uad6c\uc870\uc5d0\uc11c \ube44\ub86f\ub429\ub2c8\ub2e4. \uac1c\ubc1c\uc790\uac00 \uc124\uacc4 \ub2e8\uacc4\uc5d0\uc11c IoT \ubcf4\uc548 \uc694\uac74\uc744 \uace0\ub824\ud558\ub354\ub77c\ub3c4, \ucc98\ub9ac \uc18d\ub3c4, \uba54\ubaa8\ub9ac, \ub370\uc774\ud130 \uc804\uc1a1 \uc18d\ub3c4 \ub4f1\uc758 \uc81c\uc57d\uc73c\ub85c \uc778\ud574 \uc774\ub97c \uc2e4\uc81c\ub85c \uad6c\ud604\ud558\uae30\ub294 \uc27d\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4. \uae30\uae30\uc5d0 \ud0d1\uc7ac\ub41c \ubcf4\uc548 \uae30\ub2a5\uc774 \ub2f9\uc2dc\ub85c\uc11c\ub294 \ucd5c\uc120\uc758 \uc218\uc900\uc774\uc5c8\ub2e4 \ud558\ub354\ub77c\ub3c4, \uc81c\uc870 \ubc0f \uc124\uce58 \uc774\ud6c4 \uc0c8\ub85c\uc6b4 \ucde8\uc57d\uc810\uc774 \ubc1c\uacac\ub418\uc5b4 \uc2e0\uaddc \ubcf4\uc548 \uc704\ud611\uc5d0 \ub178\ucd9c\ub420 \uac00\ub2a5\uc131\uc774 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ubcf4\uc548 \ud1b5\uc81c\ub97c \uad6c\ud604\ud558\ub294 \uccab \ubc88\uc9f8 \ub2e8\uacc4\ub294 \ud1b5\uc81c\uac00 \ud544\uc694\ud55c \uc601\uc5ed\uc744 \uc2dd\ubcc4\ud558\ub294 \uac83\uc774\uc9c0\ub9cc, \uc774\ub294 IoT \ubcf4\uc548\uc744 \uac15\ud654\ud558\ub294 \ub370 \ub610 \ub2e4\ub978 \ub3c4\uc804 \uacfc\uc81c\uac00 \ub429\ub2c8\ub2e4. IoT \uae30\uae30\uac00 \ub124\ud2b8\uc6cc\ud06c \uae30\uae30\ub85c \uc778\uc2dd\ub418\uc9c0 \uc54a\ub294 \uacbd\uc6b0\uac00 \ub9ce\uae30 \ub54c\ubb38\uc5d0, \uc790\uc0b0 \uc778\ubca4\ud1a0\ub9ac\ub098 \ub124\ud2b8\uc6cc\ud06c \ub9f5 \uc791\uc131 \uacfc\uc815\uc5d0\uc11c \ub204\ub77d\ub418\uae30 \uc27d\uc2b5\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uae30\uae30\uc758 \uc874\uc7ac \uc790\uccb4\ub97c \uc778\uc2dd\ud558\uc9c0 \ubabb\ud558\uba74 \ubcf4\ud638 \ub610\ud55c \ubd88\uac00\ub2a5\ud55c \uac83\uc785\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ub2e4\ud589\ud788 \ucd5c\uadfc\uc5d0\ub294 IoT \uc81c\uc870\uc5c5\uccb4\ub4e4\uc774 \uc774\ub7ec\ud55c \ubb38\uc81c\ub97c \uc810\ucc28 \uc778\uc2dd\ud558\uace0 \ub300\uc751\ud558\uae30 \uc2dc\uc791\ud588\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 IoT\ub97c \uc774\ubbf8 \uc0ac\uc6a9 \uc911\uc774\uac70\ub098 \ub3c4\uc785\uc744 \uacc4\ud68d \uc911\uc778 \uc870\uc9c1\uc774\ub77c\uba74 \uadf8\ub54c\uae4c\uc9c0 \uae30\ub2e4\ub9b4 \uc5ec\uc720\ub294 \uc5c6\uc2b5\ub2c8\ub2e4. \uc870\uc9c1 \ucc28\uc6d0\uc5d0\uc11c \uac15\ub825\ud55c \ube44\ubc00\ubc88\ud638 \uc815\ucc45, <a href=\"https:\/\/www.sumologic.com\/briefs\/threat-detection-guide\">\uc704\ud611 \ubc29\uc9c0 \uc2dc\uc2a4\ud15c<\/a>, \uadf8\ub9ac\uace0 \uae30\ud0c0 IoT \ubcf4\uc548 \ubaa8\ubc94 \uc0ac\ub840\ub97c \uc989\uc2dc \uc801\uc6a9\ud574\uc57c \ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"solutions-to-mitigate-iot-security-challenges\">IoT \ubcf4\uc548 \uacfc\uc81c \uc644\ud654\ub97c \uc704\ud55c \uc194\ub8e8\uc158<\/h2>\n\n\n\n<p>\uc81c\uc870\uc5c5\uccb4 \ubc0f \uad6c\ucd95 \ub2f4\ub2f9\uc790\ub294 \ubcf4\uc548 \uc704\ud5d8\uc744 \uc644\ud654\ud558\uae30 \uc704\ud574 \ubc18\ub4dc\uc2dc IoT \ubcf4\uc548 \ubaa8\ubc94 \uc0ac\ub840\ub97c \uc774\ud589\ud574\uc57c \ud569\ub2c8\ub2e4. IoT \uae30\uae30\ub97c \ubcf4\ud638\ud558\uae30 \uc704\ud55c \ud575\uc2ec \uc808\ucc28\ub294 \ub2e4\uc74c\uacfc \uac19\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>\ubcf4\uc548 \uacfc\uc81c<\/strong><\/td><td><strong>\ubcf4\uc548 \uc194\ub8e8\uc158<\/strong><\/td><\/tr><tr><td>\ube44\ubc00\ubc88\ud638 \ub0b4\uc7a5<\/td><td>\uc815\uc801 \ube44\ubc00\ubc88\ud638\ub098 \ub0b4\uc7a5 \ube44\ubc00\ubc88\ud638 \uc0ac\uc6a9\uc744 \uc911\ub2e8\ud569\ub2c8\ub2e4. \uc81c\uc870\uc5c5\uccb4\ub294 \uc0ac\uc6a9\uc790\uac00 \uae30\uae30\ub97c \uc124\uc815\ud560 \ub54c \ubc18\ub4dc\uc2dc \uac15\ub825\ud55c \ube44\ubc00\ubc88\ud638\ub97c \uc0dd\uc131\ud558\ub3c4\ub85d \uc694\uad6c\ud574\uc57c \ud569\ub2c8\ub2e4.<\/td><\/tr><tr><td>\uae30\uae30 \uc778\uc99d \ubd80\uc871<\/td><td>\uc81c\uc870\uc5c5\uccb4\ub294 LDAP \ub610\ub294 SAML\uacfc \uac19\uc740 \ub514\ub809\ud130\ub9ac \ud1b5\ud569 \uae30\ub2a5\uc744 \uae30\uc5c5\uc6a9 \ube44\ubc00\ubc88\ud638 \uad00\ub9ac\uc790\uc640 \uc5f0\ub3d9\ud558\uc5ec, \uc790\uaca9 \uc99d\uba85\uc774 \uc790\ub3d9 \uc8fc\uc785\ub418\ub3c4\ub85d \ud558\uace0 \uc774\ub97c \uc8fc\uae30\uc801\uc73c\ub85c \uac31\uc2e0\ud574\uc57c \ud569\ub2c8\ub2e4.<\/td><\/tr><tr><td>\ubcf4\uc548 \ud328\uce58 \ubc0f \uc5c5\uadf8\ub808\uc774\ub4dc<\/td><td>\uc81c\uc870\uc5c5\uccb4\ub294 \uae30\uae30 \uc5c5\uadf8\ub808\uc774\ub4dc \ubc0f \ubcf4\uc548 \ud328\uce58 \uc801\uc6a9\uc744 \uc27d\uac8c \ud560 \uc218 \uc788\ub3c4\ub85d \ud574\uc57c \ud569\ub2c8\ub2e4. \uc774\uc0c1\uc801\uc778 \ubc29\uc2dd\uc740 \uc790\ub3d9 \uc5c5\ub370\uc774\ud2b8 \ub610\ub294 \uc6d0\ud074\ub9ad(one-click) \uc5c5\ub370\uc774\ud2b8\uc785\ub2c8\ub2e4.<\/td><\/tr><tr><td>\ubb3c\ub9ac\uc801 \ubcf4\uc548 \uac15\ud654<\/td><td>IoT \uae30\uae30\ub294 \ubcc0\uc870\ud560 \uc218 \uc5c6\ub3c4\ub85d \uc81c\uc791\ub418\uc5b4\uc57c \ud569\ub2c8\ub2e4. \ub610\ud55c \uae30\uae30\uac00 \ube44\uc815\uc0c1\uc801\uc73c\ub85c \uc624\ud504\ub77c\uc778 \uc0c1\ud0dc\ub85c \uc804\ud658\ub418\uac70\ub098 \uc5f0\uacb0\uc774 \ub04a\uae38 \uacbd\uc6b0, \uc774\ub97c \uac10\uc9c0\ud560 \uc218 \uc788\ub3c4\ub85d \ubaa8\ub2c8\ud130\ub9c1 \uccb4\uacc4\ub97c \uad6c\ucd95\ud574\uc57c \ud569\ub2c8\ub2e4.<\/td><\/tr><tr><td>\uc624\ub798\ub41c \uad6c\uc131 \uc694\uc18c<\/td><td>\ucde8\uc57d\ud55c \uae30\uae30\ub294 \uc5c5\ub370\uc774\ud2b8\ud558\uac70\ub098 \uad50\uccb4\ud574\uc57c \ud569\ub2c8\ub2e4. \ud2b9\ud788 \uc6d0\uaca9\uc9c0\uc5d0 \ub2e4\uc218\uc758 IoT \uae30\uae30\uac00 \ubd84\uc0b0\ub41c \ud658\uacbd\uc5d0\uc11c\ub294 \ub300\uc751\uc774 \uc5b4\ub835\uae30 \ub54c\ubb38\uc5d0, \ubcf4\uc548 \ud1b5\uc81c\ub97c \uac15\ud654\ud558\uace0 \ub354 \uc5c4\uaca9\ud55c \ubaa8\ub2c8\ud130\ub9c1 \uccb4\uacc4\ub97c \uad6c\ucd95\ud574\uc57c \ud569\ub2c8\ub2e4.<\/td><\/tr><tr><td>\uae30\uae30 \ubaa8\ub2c8\ud130\ub9c1 \ubc0f \uad00\ub9ac<\/td><td>\ubaa8\ub4e0 IoT \uae30\uae30\uac00 \ubc18\ub4dc\uc2dc \uc790\uc0b0 \ucd94\uc801, \ubaa8\ub2c8\ud130\ub9c1, \uad00\ub9ac \uc2dc\uc2a4\ud15c\uc5d0 \ud3ec\ud568\ub418\ub3c4\ub85d \ud574\uc57c \ud569\ub2c8\ub2e4. \uc81c\uc870\uc5c5\uccb4\ub294 \uac01 \uae30\uae30\uc5d0 \uace0\uc720 \uc2dd\ubcc4\uc790\ub97c \uc81c\uacf5\ud574\uc57c \ud569\ub2c8\ub2e4.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>\uc774\ub7ec\ud55c IoT \ubcf4\uc548 \ubb38\uc81c \uc911 \ub2e4\uc218\ub294 \uc81c\uc870\uc5c5\uccb4\uc758 \uc124\uacc4 \ubc0f \uc720\uc9c0\ubcf4\uc218 \ub2e8\uacc4\uc5d0\uc11c\ub9cc \ud574\uacb0\uc774 \uac00\ub2a5\ud569\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ubcf4\uc548\ud300, IT\ud300, OT\ud300\uc774 \ubc18\ub4dc\uc2dc \uc9c1\uc811 \uad00\ub9ac\ud574\uc57c \ud558\ub294 \ud575\uc2ec \uc601\uc5ed\uc774 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uadf8\uac83\uc740 \ubc14\ub85c \uae30\uae30 \uad00\ub9ac\uc785\ub2c8\ub2e4.  IoT \uad6c\ucd95\uc744 \uacc4\ud68d\ud558\uac70\ub098 \uad00\ub9ac\ud558\ub294 \ub2f4\ub2f9\uc790\ub77c\uba74, IoT \uae30\uae30\ub97c \ubc18\ub4dc\uc2dc \uc790\uc0b0 \uad00\ub9ac, \uc2dc\uc2a4\ud15c \ubaa8\ub2c8\ud130\ub9c1, \ubcf4\uc548 \ubaa8\ub2c8\ud130\ub9c1, \ud328\uce58 \uad00\ub9ac, \uc0ac\uace0 \ub300\uc751 \uc2dc\uc2a4\ud15c\uc5d0 \ud3ec\ud568\ud574\uc57c \ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"examples-of-iot-security-breaches-and-hacks\">IoT \ubcf4\uc548 \uce68\ud574 \ubc0f \ud574\ud0b9 \uc0ac\ub840<\/h2>\n\n\n\n<p>IoT \uae30\uae30\ub97c \ub300\uc0c1\uc73c\ub85c \ud55c \uacf5\uaca9\uc740 \ud06c\uac8c \ub450 \uac00\uc9c0 \ubc94\uc8fc\ub85c \ub098\ub20c \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uccab \ubc88\uc9f8\ub294 IoT \uae30\uae30 \uc790\uccb4\uac00 \uacf5\uaca9\uc758 \ucd5c\uc885 \ubaa9\ud45c\uc778 \uacbd\uc6b0\uc774\uba70, \ub450 \ubc88\uc9f8\ub294 IoT \uae30\uae30\ub97c \uc774\uc6a9\ud574 \ub2e4\ub978 \ub300\uc0c1\uc744 \uacf5\uaca9\ud558\ub294 \uacbd\uc6b0\uc785\ub2c8\ub2e4. \ub2e4\uc74c\uc740 \uc2e4\uc81c \uc0ac\uac74\uacfc \ubcf4\uc548 \uc5f0\uad6c \uc0ac\ub840\ub97c \ud1b5\ud574 \uac01\uac01\uc758 \uc720\ud615\uc744 \ubcf4\uc5ec\uc8fc\ub294 \uc608\uc2dc\uc785\ub2c8\ub2e4.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.sumologic.com\/ko\/blog\/akira-ransomeware-detecting-iot-threats\">\uc544\ud0a4\ub77c(Akira) \ub79c\uc12c\uc6e8\uc5b4 \uc545\uc6a9 \uc0ac\ub840<\/a>: Akira \ub79c\uc12c\uc6e8\uc5b4 \uadf8\ub8f9\uc740 \ubcf4\uc548 \uc124\uc815\uc774 \ub418\uc5b4 \uc788\uc9c0 \uc54a\uc740 \ub9ac\ub205\uc2a4 \uae30\ubc18 \uc6f9\ucea0\uc744 \uc774\uc6a9\ud574 \ud55c \uae30\uc5c5\uc758 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uce68\uc785\ud588\uc2b5\ub2c8\ub2e4. \uacf5\uaca9\uc790\ub294 \uae30\ubcf8 \ube44\ubc00\ubc88\ud638\ub098 \uc57d\ud55c \uc778\uc99d \uc815\ubcf4\ub97c \uc545\uc6a9\ud574 \uae30\uae30\uc5d0 \ucd08\uae30 \uc811\uadfc \uad8c\ud55c\uc744 \uc5bb\uc740 \ub4a4, \ub124\ud2b8\uc6cc\ud06c \uacf5\uc720 \ud30c\uc77c\uc744 \uc554\ud638\ud654\ud558\uc5ec \uad11\ubc94\uc704\ud55c \ud53c\ud574\ub97c \ucd08\ub798\ud588\uc2b5\ub2c8\ub2e4. \ub300\ubd80\ubd84\uc758 IoT \uae30\uae30\uc5d0\ub294 \ub85c\uadf8 \uae30\ub85d \ubc0f \ubaa8\ub2c8\ud130\ub9c1 \uae30\ub2a5\uc774 \ucda9\ubd84\ud788 \uac16\ucdb0\uc838 \uc788\uc9c0 \uc54a\uae30 \ub54c\ubb38\uc5d0, \uacf5\uaca9\uc790\ub4e4\uc740 \ub79c\uc12c\uc6e8\uc5b4 \uc2e4\ud589\uc744 \ud0d0\uc9c0\u00b7\ucc28\ub2e8\ud558\uae30 \uc704\ud55c \uc5d4\ub4dc\ud3ec\uc778\ud2b8 \ubcf4\uc548 \uc2dc\uc2a4\ud15c\uc744 \uc6b0\ud68c\ud560 \uc218 \uc788\uc5c8\uc2b5\ub2c8\ub2e4.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.forbes.com\/sites\/davelewis\/2017\/10\/23\/the-ddos-attack-against-dyn-one-year-later\/#3a47f1581ae9\" target=\"_blank\" rel=\"noreferrer noopener\">\ub518(Dyn)\uc5d0 \ub300\ud55c DDoS \uacf5\uaca9<\/a>: 2016\ub144 10\uc6d4, DNS \uc11c\ube44\uc2a4\ub97c \uc81c\uacf5\ud558\ub294 \uae30\uc5c5\uc778 Dyn\uc774 \ubd84\uc0b0 \uc11c\ube44\uc2a4 \uac70\ubd80 \uacf5\uaca9(DDoS)\uc744 \ubc1b\uc73c\uba74\uc11c \uc778\ud130\ub137\uc758 \uc0c1\ub2f9 \ubd80\ubd84\uc774 \ub9c8\ube44\ub418\uc5c8\uc2b5\ub2c8\ub2e4. \uc774\ub85c \uc778\ud574 X(\uad6c Twitter), Spotify, GitHub, Netflix, The New York Times, PayPal \ub4f1 \uc8fc\uc694 \uc6f9\uc0ac\uc774\ud2b8\uac00 \uc218 \uc2dc\uac04 \ub3d9\uc548 \uc811\uc18d \ubd88\uac00 \uc0c1\ud0dc\uac00 \ub418\uc5c8\uc2b5\ub2c8\ub2e4. \uc774 \uacf5\uaca9\uc740 Mirai IoT \ubd07\ub137\uc744 \ud1b5\ud574 \uc218\ud589\ub418\uc5c8\uc73c\uba70, 60\ub9cc \uac1c \uc774\uc0c1\uc758 IoT \uae30\uae30\uac00 \uac10\uc5fc\ub418\uc5b4 Dyn \uc11c\ubc84\uc5d0 \ub300\ub7c9\uc758 \ud2b8\ub798\ud53d\uc744 \ubc1c\uc0dd\uc2dc\ucf30\uc2b5\ub2c8\ub2e4. \uacf5\uaca9\uc5d0 \uc0ac\uc6a9\ub41c \uae30\uae30\uc758 \ub300\ubd80\ubd84\uc740 \ub77c\uc6b0\ud130\uc640 IP \uce74\uba54\ub77c\uc600\uc2b5\ub2c8\ub2e4. \ud2b9\ud788 IP \uce74\uba54\ub77c\ub294 IoT \uacf5\uaca9\uc5d0\uc11c \uac00\uc7a5 \ube48\ubc88\ud788 \ud45c\uc801\uc774 \ub418\ub294 \uae30\uae30 \uc911 \ud558\ub098\uc785\ub2c8\ub2e4.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway\/\" target=\"_blank\" rel=\"noreferrer noopener\">\uc9c0\ud504 \uccb4\ub85c\ud0a4(Jeep Cherokee) \uc0ac\uc774\ubc84 \uacf5\uaca9 \uc2dc\uc5f0<\/a>: \uc774\ubc88 \uc0ac\ub840\ub294 IoT \uae30\uae30 \uc790\uccb4\uac00 \uacf5\uaca9 \ub300\uc0c1\uc774 \ub41c \uacbd\uc6b0\ub85c, \uadf8 \ub300\uc0c1\uc774 \ub41c \u2018\uae30\uae30\u2019\ub294 \uc790\ub3d9\ucc28\uc600\uc2b5\ub2c8\ub2e4. \ub2e4\ud589\ud788\ub3c4 \uc774\ub294 \uc2e4\uc81c \uacf5\uaca9\uc774 \uc544\ub2cc, \ubcf4\uc548 \uc5f0\uad6c\uc6d0 \ucc30\ub9ac \ubc00\ub7ec(Charlie Miller)\uc640 \ud06c\ub9ac\uc2a4 \ubc1c\ub77c\uc139(Chris Valasek)\uc774 \ud1b5\uc81c\ub41c \uc0c1\ud0dc\uc5d0\uc11c \uacf5\uaca9\uc744 \uc2dc\uc5f0\ud55c \uac83\uc774\uc5c8\uc2b5\ub2c8\ub2e4. \uc774\ub4e4\uc740 \u2018Wired\u2019\uc9c0 \uae30\uc790 \uc564\ub514 \uadf8\ub9b0\ubc84\uadf8(Andy Greenberg)\uac00 \uc6b4\uc804 \uc911\uc774\ub358 \uc9c0\ud504 \uccb4\ub85c\ud0a4 \ucc28\ub7c9\uc744 \uc6d0\uaca9\uc73c\ub85c \uc870\uc791\ud588\uc2b5\ub2c8\ub2e4. \ub450 \uc5f0\uad6c\uc6d0\uc740 \uc218 \ub9c8\uc77c \ub5a8\uc5b4\uc9c4 \uacf3\uc5d0\uc11c \uc140\ub8f0\ub7ec \uc778\ud130\ub137 \uc5f0\uacb0\uc744 \ud1b5\ud574 \uc790\ub3d9\ucc28\uc758 \uc5d0\uc5b4\ucee8(A\/C), \ub77c\ub514\uc624, \uc640\uc774\ud37c \ub4f1\uc744 \uc6d0\uaca9\uc73c\ub85c \uc791\ub3d9\uc2dc\ucf30\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \uc774\ub294 \uc2dc\uc791\uc77c \ubfd0\uc774\uc5c8\uc2b5\ub2c8\ub2e4. \uadf8\ub4e4\uc740 \ub2e4\uc74c\uc73c\ub85c \ucc28\ub7c9\uc758 \uac00\uc18d \ud398\ub2ec \uae30\ub2a5\uc744 \ubb34\ub825\ud654\ud558\uc5ec \uc9c0\ud504 \ucc28\ub7c9\uc774 \uac15\uc81c\ub85c \uc18d\ub3c4\ub97c \uc904\uc774\ub3c4\ub85d \ub9cc\ub4e4\uc5c8\uc2b5\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-secure-your-iot-systems-and-devices\">IoT \uc2dc\uc2a4\ud15c\uacfc \uae30\uae30\ub97c \ubcf4\ud638\ud558\ub294 \ubc29\ubc95<\/h2>\n\n\n\n<p>IoT \uacf5\uaca9\uc740 \uc2ec\uac01\ud55c \uacb0\uacfc\ub97c \ucd08\ub798\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub530\ub77c\uc11c IoT \uc2dc\uc2a4\ud15c \ubc0f \uae30\uae30\uc758 \ubcf4\uc548\uc740 \uc81c\uc870\uc5c5\uccb4\ubfd0 \uc544\ub2c8\ub77c \ud574\ub2f9 \uae30\uae30\ub97c \uc0ac\uc6a9\ud558\ub294 \uc870\uc9c1 \ubaa8\ub450\uc758 \ucc45\uc784\uc785\ub2c8\ub2e4. IoT \uc0dd\ud0dc\uacc4\ub97c \uc548\uc804\ud558\uac8c \uc720\uc9c0\ud558\uae30 \uc704\ud55c \ud575\uc2ec\uc740 \uc5b4\ub5a4 \uae30\uae30\uac00 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uc5f0\uacb0\ub418\uc5b4 \uc788\uc73c\uba70, \ub124\ud2b8\uc6cc\ud06c \uad6c\uc870 \ub0b4 \uc5b4\ub514\uc5d0 \uc704\uce58\ud558\ub294\uc9c0\ub97c \uba85\ud655\ud788 \uc544\ub294 \uac83\uc785\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uac00\uc2dc\uc131\uc774 \ud655\ubcf4\ub418\uc9c0 \uc54a\uc73c\uba74, \ubcf4\ud638\ud574\uc57c \ud560 \ub300\uc0c1\uc744 \uc778\uc2dd\ud558\uc9c0 \ubabb\ud574 \ubcf4\uc548\uc758 \uc0ac\uac01\uc9c0\ub300\uac00 \ubc1c\uc0dd\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ub124\ud2b8\uc6cc\ud06c \ub0b4 IoT \uae30\uae30\ub97c \uc2dd\ubcc4\ud558\ub294 \ud55c \uac00\uc9c0 \ubc29\ubc95\uc740 \ubaa8\ub4e0 \ud638\uc2a4\ud2b8\uc640 \uae30\uae30\uac00 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uc811\uc18d\ud560 \ub54c \uc778\uc99d\uc744 \uc694\uad6c\ud558\ub294 \uac83\uc785\ub2c8\ub2e4. \uc778\uc99d\uc5d0 \uc2e4\ud328\ud55c \uae30\uae30\ub294 \ud50c\ub798\uadf8(Flag)\ub85c \ud45c\uc2dc\ud558\uc5ec \uc870\uc0ac\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uadf8 \uae30\uae30\uac00 IoT \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uc18d\ud55c\ub2e4\uba74 \ud574\ub2f9 \uae30\uae30\uc5d0 \ub300\ud574 \uc778\uc99d \uc124\uc815\uc744 \uad6c\uc131\ud558\uace0, \uadf8\ub807\uc9c0 \uc54a\ub2e4\uba74 \ube44\uc778\uac00 \uae30\uae30(rogue device)\ub85c \uc2dd\ubcc4\ud558\uc5ec \ucc28\ub2e8\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>IoT \uae30\uae30\ub97c \ubcf4\ud638\ud558\ub294 \ub610 \ub2e4\ub978 \ubc29\ubc95\uc740 \ub124\ud2b8\uc6cc\ud06c \uc138\ubd84\ud654\ub97c \uc801\uc6a9\ud558\ub294 \uac83\uc785\ub2c8\ub2e4. IoT \uae30\uae30\ub9cc\uc744 \uc704\ud55c \ubcc4\ub3c4\uc758 \ub124\ud2b8\uc6cc\ud06c \uc138\uadf8\uba3c\ud2b8\ub97c \uad6c\ucd95\ud558\uba74 \ubc29\ud654\ubcbd \uaddc\uce59\uacfc IoT \uc804\uc6a9 \ubcf4\uc548 \uc815\ucc45\uc744 \uc801\uc6a9\ud574 \uc678\ubd80 \ub178\ucd9c \ubc94\uc704\ub97c \ud6a8\uacfc\uc801\uc73c\ub85c \uc81c\ud55c\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. IoT \ubcf4\uc548 \uce68\ud574 \uc0ac\uace0\uac00 \ubc1c\uc0dd\ud558\ub354\ub77c\ub3c4 \uc190\uc0c1\ub41c \uae30\uae30\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ud2b8\ub798\ud53d\uc744 \uc2e0\uc18d\ud788 \ucc28\ub2e8\ud558\uc5ec \uacf5\uaca9\uc758 \ud655\uc0b0\uc744 \ucd5c\uc18c\ud654\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p> IoT \uae30\uae30\uac00 \uc778\uc99d\uc744 \ub9c8\uce5c \ud6c4\uc5d0\ub294 <a href=\"https:\/\/www.sumologic.com\/ko\/solutions\/logs-for-security\">Sumo Logic\uacfc \uac19\uc740 \ud074\ub77c\uc6b0\ub4dc \ub124\uc774\ud2f0\ube0c \ubcf4\uc548 \ubaa8\ub2c8\ud130\ub9c1 \ubc0f \ubd84\uc11d \ud50c\ub7ab\ud3fc<\/a>\uc744 \ud65c\uc6a9\ud574 \uae30\uae30 \ud65c\ub3d9\uc744 \uc2dc\uac01\uc801\uc73c\ub85c \ud30c\uc545\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uc194\ub8e8\uc158\uc740 \ub370\uc774\ud130 \uae30\ubc18 \uc758\uc0ac\uacb0\uc815\uc744 \uc9c0\uc6d0\ud558\uba70 \uc0ac\uace0 \ub300\uc751 \uc2dc\uac04\uc744 \ub2e8\ucd95\ud574 \ubcf4\uc548\ud300\uc774 \ub354 \uc911\uc694\ud55c \uc5c5\ubb34\uc5d0 \uc9d1\uc911\ud560 \uc218 \uc788\ub3c4\ub85d \ub3d5\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ub610\ud55c \ubcf4\uc548 \uc774\ubca4\ud2b8\uc5d0 \ub300\ud55c \uac00\uc2dc\uc131\uc744 \ud55c\uce35 \ub192\uc774\uae30 \uc704\ud574 Sumo Logic\uc740 \ucd5c\uc2e0 \uce68\ud574 \uc9c0\ud45c(Indicators of Compromise, IOC) \ub370\uc774\ud130\ub97c \ud3ec\ud568\ud55c \ub0b4\uc7a5\ud615 \uc704\ud611 \uc778\ud154\ub9ac\uc804\uc2a4 \ud53c\ub4dc\ub97c \uc81c\uacf5\ud569\ub2c8\ub2e4. \uc774\ub97c \ud1b5\ud574 \uc2e4\uc2dc\uac04\uc73c\ub85c \uc218\uc9d1\ub41c \uc704\ud611 \uc815\ubcf4\ub97c \uad50\ucc28 \uc0c1\uad00 \ubd84\uc11d(cross-correlation)\ud558\uc5ec \ud658\uacbd \ub0b4\uc758 \uc7a0\uc7ac\uc801 \ubcf4\uc548 \uc704\ud611\uc744 \uc2e0\uc18d\ud558\uac8c \uc2dd\ubcc4\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc9c1\uc811 \uacbd\ud5d8\ud574 \ubcf4\uc2dc\uae30 \ubc14\ub78d\ub2c8\ub2e4.<a href=\"https:\/\/www.sumologic.com\/sign-up\/\">30\uc77c \ubb34\ub8cc \uccb4\ud5d8\uc744 \uc2e0\uccad\ud558\uc138\uc694.<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":334,"featured_media":45453,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"< 1","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"blog-category":[320],"blog-tag":[],"translation_priority":[]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"62715,62740,62708","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"blog-category":[320],"blog-tag":[],"class_list":["post-55135","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog-category-secops-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/blog\/55135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/users\/334"}],"version-history":[{"count":1,"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/blog\/55135\/revisions"}],"predecessor-version":[{"id":55141,"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/blog\/55135\/revisions\/55141"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/media\/45453"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/media?parent=55135"}],"wp:term":[{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/blog-category?post=55135"},{"taxonomy":"blog-tag","embeddable":true,"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/blog-tag?post=55135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}