{"id":37687,"date":"2025-04-24T17:29:37","date_gmt":"2025-04-24T10:29:37","guid":{"rendered":"https:\/\/bap-software.net\/?post_type=knowledge&#038;p=37687"},"modified":"2025-04-24T17:29:37","modified_gmt":"2025-04-24T10:29:37","slug":"latest-security-measures-in-cybersecurity","status":"publish","type":"knowledge","link":"https:\/\/bap-software.net\/kr\/knowledge\/latest-security-measures-in-cybersecurity\/","title":{"rendered":"2025\ub144\uc5d0 \uaf2d \uc54c\uc544\uc57c \ud560 \ubcf4\uc548 \uc804\ub7b5 6\uac00\uc9c0"},"content":{"rendered":"<p><\/p>\n<p class=\"\" data-start=\"426\" data-end=\"515\">\uc0ac\uc774\ubc84 \ubcf4\uc548\uc740 \ucef4\ud4e8\ud130 \uc2dc\uc2a4\ud15c, \ub124\ud2b8\uc6cc\ud06c \ubc0f \ub370\uc774\ud130\ub97c \uacf5\uaca9, \ubb34\ub2e8 \uc811\uadfc, \uc190\uc0c1 \ub610\ub294 \uc815\ubcf4 \ub3c4\ub09c\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\uae30 \uc704\ud574 \uc124\uacc4\ub41c \uc77c\ub828\uc758 \uc870\uce58, \uae30\uc220 \ubc0f \ud504\ub85c\uc138\uc2a4\uc785\ub2c8\ub2e4.<\/p>\n<h2 data-start=\"517\" data-end=\"707\"><strong data-start=\"517\" data-end=\"542\">1. \uc624\ub298\ub0a0 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc911\uc694\uc131 \uc18c\uac1c<\/strong><\/h2>\n<p class=\"\" data-start=\"517\" data-end=\"707\">\uc810\uc810 \ub354 \uc5f0\uacb0\ub41c \uc138\uc0c1\uc5d0\uc11c \uc0ac\uc774\ubc84 \ubcf4\uc548\uc740 \uc6b0\ub9ac\uc758 \ub514\uc9c0\ud138 \uc0dd\ud65c\uc758 \uae30\ubc18\uc774 \ub418\uc5c8\uc2b5\ub2c8\ub2e4. \uc2a4\ub9c8\ud2b8 \uae30\uae30\uc640 \uc0ac\ubb3c\uc778\ud130\ub137(IoT)\uc758 \uae09\uc18d\ud55c \ud655\uc0b0\uc73c\ub85c \uc778\ud574 \uc0ac\uc774\ubc84 \uc704\ud611\uc758 \uacf5\uaca9 \ud45c\uba74\uc774 \ud06c\uac8c \ud655\uc7a5\ub418\uc5c8\uc2b5\ub2c8\ub2e4. \uac1c\uc778 \uc815\ubcf4, \uae08\uc735 \ub370\uc774\ud130, \uc2ec\uc9c0\uc5b4 \uc8fc\uc694 \uc778\ud504\ub77c\uae4c\uc9c0\ub3c4 \uc545\uc758\uc801\uc778 \ud589\uc704\uc790\uc5d0 \uc758\ud574 \uce68\ud574\ub420 \uc704\ud5d8\uc5d0 \ucc98\ud574 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<div id=\"attachment_37695\" style=\"width: 1090px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-37695\" class=\"wp-image-37695 size-full\" src=\"https:\/\/cdn.bap-software.net\/2025\/04\/24235023\/p3.jpg\" alt=\"Introducing the importance of cybersecurity today\" width=\"1080\" height=\"675\" \/><p id=\"caption-attachment-37695\" class=\"wp-caption-text\">\ub514\uc9c0\ud138\ub85c \uc5f0\uacb0\ub41c \uc138\uc0c1\uc5d0\uc11c \uac1c\uc778 \ubc0f \uc870\uc9c1 \ub370\uc774\ud130\ub97c \ubcf4\ud638\ud558\uae30 (Knight Office Solutions)<\/p><\/div>\n<p class=\"\" data-start=\"593\" data-end=\"782\">\uac00\uc7a5 \ud754\ud55c \uc704\ud611 \uc911 \ud558\ub098\ub294 \ud53c\uc2f1\uc785\ub2c8\ub2e4. \uacf5\uaca9\uc790\ub294 \uc0ac\ub78c\ub4e4\uc744 \uc18d\uc5ec \ubbfc\uac10\ud55c \uc815\ubcf4\ub97c \uacf5\uac1c\ud558\ub3c4\ub85d \uc720\ub3c4\ud569\ub2c8\ub2e4. \ub370\uc774\ud130\ub97c \uc554\ud638\ud654\ud558\uace0 \uc774\ub97c \ud574\uc81c\ud558\ub294 \ub300\uac00\ub85c \ubab8\uac12\uc744 \uc694\uad6c\ud558\ub294 \ub79c\uc12c\uc6e8\uc5b4 \uacf5\uaca9\ub3c4 \uc99d\uac00\ud558\uace0 \uc788\uc73c\uba70, \uac1c\uc778\uc740 \ubb3c\ub860 \ub300\uaddc\ubaa8 \uc870\uc9c1\ub3c4 \ud45c\uc801\uc774 \ub418\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uacf5\uaca9\uc740 \uae08\uc804\uc801 \uc190\uc2e4, \ud3c9\ud310 \uc190\uc0c1, \uc2ec\uc9c0\uc5b4 \ubc95\uc801 \ubb38\uc81c\uae4c\uc9c0 \ucd08\ub798\ud560 \uc218 \uc788\uc5b4 \ub9e4\uc6b0 \ud30c\uad34\uc801\uc785\ub2c8\ub2e4.<\/p>\n<p class=\"\" data-start=\"784\" data-end=\"987\">\uc774\ub7ec\ud55c \uc704\ud5d8\uc744 \uc644\ud654\ud558\ub824\uba74 \uac15\ub825\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uad00\ud589\uc744 \ucc44\ud0dd\ud558\ub294 \uac83\uc774 \ud544\uc218\uc801\uc785\ub2c8\ub2e4. \ubcf4\uc548 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud558\uae30 \uc704\ud574 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub97c \uc815\uae30\uc801\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8\ud558\uace0, \uac15\ub825\ud558\uace0 \uace0\uc720\ud55c \ube44\ubc00\ubc88\ud638\ub97c \uc0ac\uc6a9\ud558\uba70, \ub2e4\uc911 \uc778\uc99d(MFA)\uc744 \ud65c\uc131\ud654\ud558\ub294 \uac83\uc774 \ud3ec\ud568\ub429\ub2c8\ub2e4. \uc870\uc9c1\uc740 \uc9c1\uc6d0\ub4e4\uc5d0\uac8c \ud3ec\uad04\uc801\uc778 \ubcf4\uc548 \uad50\uc721\uc744 \uc81c\uacf5\ud558\uace0, \uce68\uc785 \ud0d0\uc9c0 \uc2dc\uc2a4\ud15c\uc774\ub098 \ub370\uc774\ud130 \uc554\ud638\ud654\uc640 \uac19\uc740 \uace0\uae09 \ubcf4\uc548 \uc194\ub8e8\uc158\uc744 \ub3c4\uc785\ud574\uc57c \ud569\ub2c8\ub2e4.<\/p>\n<p class=\"\" data-start=\"989\" data-end=\"1128\">\uc694\uc57d\ud558\uc790\uba74, \uc0ac\uc774\ubc84 \ubcf4\uc548\uc740 \ub2e8\uc21c\ud55c \uae30\uc220 \ubb38\uc81c\uac00 \uc544\ub2c8\ub77c \uac1c\uc778 \ubc0f \uc870\uc9c1\uc758 \uc548\uc804\uc744 \uc704\ud55c \uc911\uc694\ud55c \uc694\uc18c\uc785\ub2c8\ub2e4. \uc815\ubcf4\ub97c \ud56d\uc0c1 \ucd5c\uc2e0 \uc0c1\ud0dc\ub85c \uc720\uc9c0\ud558\uace0 \uacbd\uacc4\ub97c \uac8c\uc744\ub9ac\ud558\uc9c0 \uc54a\uc73c\uba74 \uc0ac\uc774\ubc84 \uc704\ud611\uc758 \uc704\ud5d8\uc744 \ud06c\uac8c \uc904\uc774\uace0 \ubaa8\ub450\uc5d0\uac8c \ub354 \uc548\uc804\ud55c \ub514\uc9c0\ud138 \ud658\uacbd\uc744 \ubcf4\uc7a5\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<h2 data-start=\"660\" data-end=\"682\"><strong data-start=\"660\" data-end=\"680\">2. \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc8fc\uc694 \ubaa9\ud45c<\/strong><\/h2>\n<ul data-start=\"683\" data-end=\"852\">\n<li class=\"\" data-start=\"683\" data-end=\"740\">\n<p class=\"\" data-start=\"685\" data-end=\"740\"><strong data-start=\"685\" data-end=\"710\">\uae30\ubc00\uc131 (Confidentiality)<\/strong>: \ud5c8\uac00\ub41c \uc0ac\ub78c\ub9cc \ub370\uc774\ud130\uc5d0 \uc811\uadfc\ud560 \uc218 \uc788\ub3c4\ub85d \ubcf4\uc7a5.<\/p>\n<\/li>\n<li class=\"\" data-start=\"741\" data-end=\"789\">\n<p class=\"\" data-start=\"743\" data-end=\"789\"><strong data-start=\"743\" data-end=\"762\">\ubb34\uacb0\uc131 (Integrity)<\/strong>: \ub370\uc774\ud130\uac00 \ud5c8\uac00 \uc5c6\uc774 \ubcc0\uacbd\ub418\uc9c0 \uc54a\ub3c4\ub85d \ubcf4\uc7a5.<\/p>\n<\/li>\n<li class=\"\" data-start=\"790\" data-end=\"852\">\n<p class=\"\" data-start=\"792\" data-end=\"852\"><strong data-start=\"792\" data-end=\"814\">\uac00\uc6a9\uc131 (Availability)<\/strong>: \uc2dc\uc2a4\ud15c\uc774 \uc548\uc815\uc801\uc73c\ub85c \uc791\ub3d9\ud558\uba70 \uacf5\uaca9\uc73c\ub85c \uc778\ud574 \uc911\ub2e8\ub418\uc9c0 \uc54a\ub3c4\ub85d \ubcf4\uc7a5.<\/p>\n<\/li>\n<\/ul>\n<h2 data-start=\"854\" data-end=\"877\"><strong data-start=\"854\" data-end=\"875\">3. \uc77c\ubc18\uc801\uc778 \uc0ac\uc774\ubc84 \uacf5\uaca9 \uc720\ud615<\/strong><\/h2>\n<ul data-start=\"878\" data-end=\"1092\">\n<li class=\"\" data-start=\"878\" data-end=\"934\">\n<p class=\"\" data-start=\"880\" data-end=\"934\"><strong data-start=\"880\" data-end=\"898\">\uc545\uc131\ucf54\ub4dc (Malware)<\/strong>: \ubc14\uc774\ub7ec\uc2a4, \ud2b8\ub85c\uc774 \ubaa9\ub9c8, \ub79c\uc12c\uc6e8\uc5b4 \ub4f1 \uc545\uc758\uc801\uc778 \uc18c\ud504\ud2b8\uc6e8\uc5b4.<\/p>\n<\/li>\n<li class=\"\" data-start=\"935\" data-end=\"989\">\n<p class=\"\" data-start=\"937\" data-end=\"989\"><strong data-start=\"937\" data-end=\"954\">\ud53c\uc2f1 (Phishing)<\/strong>: \ubbfc\uac10\ud55c \uc815\ubcf4\ub97c \ud0c8\ucde8\ud558\uae30 \uc704\ud55c \uc774\uba54\uc77c \ub610\ub294 \uac00\uc9dc \uc6f9\uc0ac\uc774\ud2b8.<\/p>\n<\/li>\n<li class=\"\" data-start=\"990\" data-end=\"1040\">\n<p class=\"\" data-start=\"992\" data-end=\"1040\"><strong data-start=\"992\" data-end=\"1012\">DDoS (\ubd84\uc0b0 \uc11c\ube44\uc2a4 \uac70\ubd80)<\/strong>: \uacfc\ub3c4\ud55c \ud2b8\ub798\ud53d\uc73c\ub85c \uc11c\ube44\uc2a4\ub97c \ub9c8\ube44\uc2dc\ud0a4\ub294 \uacf5\uaca9.<\/p>\n<\/li>\n<li class=\"\" data-start=\"1041\" data-end=\"1092\">\n<p class=\"\" data-start=\"1043\" data-end=\"1092\"><strong data-start=\"1043\" data-end=\"1069\">\uc18c\ud504\ud2b8\uc6e8\uc5b4 \ucde8\uc57d\uc810 \uc545\uc6a9 (Exploit)<\/strong>: \uc18c\ud504\ud2b8\uc6e8\uc5b4\uc758 \ubcf4\uc548 \uacb0\ud568\uc744 \uc774\uc6a9\ud55c \uacf5\uaca9.<\/p>\n<\/li>\n<\/ul>\n<h2 data-start=\"1094\" data-end=\"1185\"><strong data-start=\"1094\" data-end=\"1113\">4. \ucd5c\uc2e0 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc870\uce58<\/strong><\/h2>\n<div id=\"attachment_37696\" style=\"width: 970px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-37696\" class=\"wp-image-37696 size-full\" src=\"https:\/\/cdn.bap-software.net\/2025\/04\/24235024\/p3a.png\" alt=\"Uses a variety of advanced prevention measures to reduce cyber risk\" width=\"960\" height=\"540\" \/><p id=\"caption-attachment-37696\" class=\"wp-caption-text\">\uc0ac\uc774\ubc84 \uc704\ud5d8\uc744 \uc904\uc774\uae30 \uc704\ud574 \ub2e4\uc591\ud55c \uace0\uae09 \uc608\ubc29 \uc870\uce58\ub97c \ud65c\uc6a9\ud568 (Collidu)<\/p><\/div>\n<ul>\n<li data-start=\"659\" data-end=\"833\"><strong data-start=\"659\" data-end=\"673\">\uc18c\ud504\ud2b8\uc6e8\uc5b4 \uc5c5\ub370\uc774\ud2b8<\/strong><\/li>\n<\/ul>\n<p class=\"\" data-start=\"659\" data-end=\"833\">\ucd5c\uc2e0 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uc2dc\uc2a4\ud15c\uc740 \uc624\ub798\ub41c \ubc84\uc804\ubcf4\ub2e4 \ucde8\uc57d\uc810\uc5d0 \uac15\ud569\ub2c8\ub2e4. \uc5c5\ub370\uc774\ud2b8\ub294 \uc624\ub798\ub41c \ubc84\uc804\uc758 \uc624\ub958\uc640 \ucde8\uc57d\uc810\uc744 \uc218\uc815\ud558\ub294 \uacbd\uc6b0\uac00 \ub9ce\uae30 \ub54c\ubb38\uc5d0, \uc0c8\ub85c\uc6b4 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8\ud558\ub294 \uac83\uc774 \uac00\uc7a5 \uc88b\uc2b5\ub2c8\ub2e4. \ub610\ud55c, \ud328\uce58 \uad00\ub9ac \uc2dc\uc2a4\ud15c\uc5d0 \ud22c\uc790\ud558\uc5ec \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uc2dc\uc2a4\ud15c\uc744 \ucd5c\uc2e0 \uc0c1\ud0dc\ub85c \uc720\uc9c0\ud558\ub294 \uac83\uc744 \uace0\ub824\ud574\uc57c \ud569\ub2c8\ub2e4.<\/p>\n<ul>\n<li data-start=\"835\" data-end=\"1013\"><strong data-start=\"835\" data-end=\"849\">\ub2e4\uc911 \uc778\uc99d(MFA)<\/strong><\/li>\n<\/ul>\n<p class=\"\" data-start=\"835\" data-end=\"1013\">\ucd5c\uc885 \uc0ac\uc6a9\uc790\ub294 \uadf8\ub4e4\uc758 \uc7a5\uce58\uc640 \uc0ac\ud68c \uacf5\ud559 \uacf5\uaca9\uc744 \ud1b5\ud574 \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790\ub4e4\uc758 \uc8fc\uc694 \ud45c\uc801\uc774 \ub429\ub2c8\ub2e4. \ubaa8\ub4e0 \ucd5c\uc885 \uc0ac\uc6a9\uc790 \uc7a5\uce58\uc5d0\ub294 \uc5d4\ub4dc\ud3ec\uc778\ud2b8 \ubcf4\uc548 \uc18c\ud504\ud2b8\uc6e8\uc5b4\uac00 \ubc30\ud3ec\ub418\uc5b4\uc57c \ud569\ub2c8\ub2e4. \uc774\ub294 \ub354 \ub113\uc740 \ubcf4\uc548 \uc815\ubcf4 \ubc0f \uc774\ubca4\ud2b8 \uad00\ub9ac(SIEM) \ub3c4\uad6c\uc640 \ud1b5\ud569\ub418\uc5b4 \uc870\uc9c1 \uc804\uccb4\uc5d0\uc11c \uc704\ud611 \ubaa8\ub2c8\ud130\ub9c1\uacfc \ubd84\uc11d\uc744 \uac00\ub2a5\ud558\uac8c \ud569\ub2c8\ub2e4.<\/p>\n<ul>\n<li data-start=\"1015\" data-end=\"1179\"><strong data-start=\"1015\" data-end=\"1031\">\ub370\uc774\ud130 \ubc0f \ud1b5\uc2e0 \uc554\ud638\ud654<\/strong><\/li>\n<\/ul>\n<p class=\"\" data-start=\"1015\" data-end=\"1179\">\ub370\uc774\ud130 \uc554\ud638\ud654\ub294 \uc0ac\uc774\ubc84 \uacf5\uaca9\uc744 \ubc29\uc9c0\ud558\ub294 \uc77c\ubc18\uc801\uc778 \ubc29\ubc95\uc774\uba70, \ubcf5\ud638\ud654 \ud0a4\ub97c \uac00\uc9c4 \uc0ac\ub78c\ub9cc \ub370\uc774\ud130\uc5d0 \uc811\uadfc\ud560 \uc218 \uc788\ub3c4\ub85d \ubcf4\uc7a5\ud569\ub2c8\ub2e4. \uc554\ud638\ud654\ub41c \ub370\uc774\ud130\ub97c \uacf5\uaca9\ud558\ub824\uba74 \uacf5\uaca9\uc790\ub294 \uc77c\ubc18\uc801\uc73c\ub85c \uc5ec\ub7ec \ud0a4\ub97c \uc2dc\ub3c4\ud558\uc5ec \uc815\ud655\ud55c \ud0a4\ub97c \ucd94\uce21\ud574\uc57c \ud558\ubbc0\ub85c \uc554\ud638\ub97c \ud574\ub3c5\ud558\ub294 \uac83\uc774 \ub9e4\uc6b0 \uc5b4\ub824\uc6cc\uc9d1\ub2c8\ub2e4.<\/p>\n<div id=\"attachment_37697\" style=\"width: 1018px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-37697\" class=\"wp-image-37697 \" src=\"https:\/\/cdn.bap-software.net\/2025\/04\/24235026\/p3b.jpg\" alt=\"Apply strong cybersecurity to build a secure digital environment\" width=\"1008\" height=\"651\" \/><p id=\"caption-attachment-37697\" class=\"wp-caption-text\">\uac15\ub825\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548\uc744 \uc801\uc6a9\ud558\uc5ec \uc548\uc804\ud55c \ub514\uc9c0\ud138 \ud658\uacbd\uc744 \uad6c\ucd95\ud558\ub2e4 (Design Solutions)<\/p><\/div>\n<ul>\n<li data-start=\"957\" data-end=\"1153\"><strong data-start=\"957\" data-end=\"983\">\uc0ac\uc6a9\uc790 \ud589\ub3d9 \ubaa8\ub2c8\ud130\ub9c1 \ubc0f \ubd84\uc11d (UBA)<\/strong><\/li>\n<\/ul>\n<p class=\"\" data-start=\"957\" data-end=\"1153\">\uc0ac\uc6a9\uc790 \ubc0f \uc5d4\ud2f0\ud2f0 \ud589\ub3d9 \ubd84\uc11d(UBA)\uc744 \ud65c\uc6a9\ud558\uc5ec \ub124\ud2b8\uc6cc\ud06c \uc804\ubc18\uc758 \uc815\uc0c1\uc801\uc778 \ud65c\ub3d9 \uae30\uc900\uc744 \uc124\uc815\ud569\ub2c8\ub2e4. \uadf8\ub7f0 \ub2e4\uc74c \uad00\ub9ac\uc790 \uacc4\uc815\uacfc \uc11c\ube44\uc2a4\uac00 \uc5b4\ub5bb\uac8c \uc0ac\uc6a9\ub418\uace0 \uc788\ub294\uc9c0, \uc5b4\ub5a4 \uc0ac\uc6a9\uc790\uac00 \ubd80\uc801\uc808\ud55c \uc790\uaca9 \uc99d\uba85\uc744 \uacf5\uc720\ud558\uace0 \uc788\ub294\uc9c0, \uacf5\uaca9\uc790\uac00 \ucd08\uae30 \ub124\ud2b8\uc6cc\ud06c \uce68\ud574\uc5d0\uc11c \ub2e4\ub978 \uc2dc\uc2a4\ud15c\uc73c\ub85c \uc774\ub3d9\ud558\uc5ec \uce68\ud22c\ud558\uace0 \uc788\ub294\uc9c0 \ubaa8\ub2c8\ud130\ub9c1\ud569\ub2c8\ub2e4.<\/p>\n<ul>\n<li data-start=\"1155\" data-end=\"1402\"><strong data-start=\"1155\" data-end=\"1184\">\uc9c1\uc6d0\ub4e4\uc744 \uc704\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uad50\uc721 \ubc0f \uc778\uc2dd \ud5a5\uc0c1<\/strong><\/li>\n<\/ul>\n<p class=\"\" data-start=\"1155\" data-end=\"1402\">\ud53c\uc2f1\uc774 \ud574\ub85c\uc6b4 \uc774\uc720\ub97c \uc9c1\uc6d0\ub4e4\uc5d0\uac8c \uad50\uc721\ud558\uace0 \uadf8\ub4e4\uc774 \ubd80\uc815\ud589\uc704\ub97c \uac10\uc9c0\ud558\uace0 \ubcf4\uace0\ud560 \uc218 \uc788\ub3c4\ub85d \ud569\ub2c8\ub2e4. \uc774 \uc720\ud615\uc758 \uad50\uc721\uc740 \uc9c1\uc6d0\ub4e4\uc5d0\uac8c \uc2dc\ubbac\ub808\uc774\uc158\ub41c \ud53c\uc2f1 \ucea0\ud398\uc778\uc744 \uc774\uba54\uc77c\ub85c \ubcf4\ub0b4\uace0, \uacb0\uacfc\ub97c \ucd94\uc801\ud558\uba70, \uad50\uc721\uc744 \uac15\ud654\ud558\uace0, \uc2dc\ubbac\ub808\uc774\uc158 \uacb0\uacfc\ub97c \uac1c\uc120\ud558\ub294 \ubc29\uc2dd\uc73c\ub85c \uc9c4\ud589\ub429\ub2c8\ub2e4. \ub610\ud55c \uc9c1\uc6d0\ub4e4\uc774 \ucd5c\uc2e0 \uc758\uc2ec\uc2a4\ub7ec\uc6b4 \uc774\uba54\uc77c, \uba54\uc2dc\uc9c0 \ub610\ub294 \uc6f9\uc0ac\uc774\ud2b8\ub97c \uc2dd\ubcc4\ud560 \uc218 \uc788\ub3c4\ub85d \uc9c0\uc18d\uc801\uc778 \ubcf4\uc548 \uc778\uc2dd \uad50\uc721\uc744 \uc81c\uacf5\ud558\ub294 \uac83\uc774 \uc911\uc694\ud569\ub2c8\ub2e4.<\/p>\n<ul>\n<li data-start=\"1404\" data-end=\"1641\"><strong data-start=\"1404\" data-end=\"1420\">\uc0ac\uc774\ubc84 \uae30\ub9cc \uae30\uc220 \uad6c\ud604<\/strong><\/li>\n<\/ul>\n<p class=\"\" data-start=\"1404\" data-end=\"1641\">\uc0ac\uae30 \uae30\uc220\uc740 &#8220;\uac00\uc9dc&#8221; \uc560\ud50c\ub9ac\ucf00\uc774\uc158, \ub370\uc774\ud130\ubca0\uc774\uc2a4 \ubc0f IT \uc2dc\uc2a4\ud15c\uc744 \uc628\ub77c\uc778\uc5d0\uc11c \ubc30\ud3ec\ud569\ub2c8\ub2e4. \uc678\ubd80 \ubc29\ud654\ubcbd\uc744 \ub6ab\uace0 \ub4e4\uc5b4\uc628 \uc0ac\uc774\ubc84 \uacf5\uaca9\uc790\ub294 \ub0b4\ubd80 \uc2dc\uc2a4\ud15c\uc5d0 \uc811\uadfc\ud588\ub2e4\uace0 \ucc29\uac01\ud558\uac8c \ub429\ub2c8\ub2e4. \uc2e4\uc81c\ub85c, \ubaa8\uc758 \uc2dc\uc2a4\ud15c\uc740 \ubcf4\uc548 \ud300\uc774 \uacf5\uaca9\uc790\uc758 \ud65c\ub3d9\uc744 \ubaa8\ub2c8\ud130\ub9c1\ud558\uace0 \ub370\uc774\ud130\ub97c \uc218\uc9d1\ud560 \uc218 \uc788\uac8c \ud574\uc8fc\ub294 \ud5c8\ub2c8\ucef4(honeycomb)\uc73c\ub85c \uac04\uc8fc\ub429\ub2c8\ub2e4. \uc774\ub807\uac8c \ud558\uba74 \uc2e4\uc81c \uc2dc\uc2a4\ud15c\uc744 \ub178\ucd9c\uc2dc\ud0a4\uc9c0 \uc54a\uace0 \uacf5\uaca9\uc790 \ud65c\ub3d9\uc744 \ucd94\uc801\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<h2 data-start=\"1643\" data-end=\"1869\"><strong data-start=\"1643\" data-end=\"1649\">\uacb0\ub860<\/strong><\/h2>\n<p class=\"\" data-start=\"1643\" data-end=\"1869\">\uac04\ub2e8\ud788 \ub9d0\ud574\uc11c, \uc0ac\uc774\ubc84 \ubcf4\uc548\uc740 \ub514\uc9c0\ud138 \uc2dc\ub300\uc5d0 \ud544\uc218\uc801\uc778 \uae30\ubc18\uc774\uba70, \uc810\uc810 \ub354 \uc815\uad50\ud574\uc9c0\ub294 \uc704\ud611\uc73c\ub85c\ubd80\ud130 \uac1c\uc778 \ubc0f \uc870\uc9c1\uc758 \ub370\uc774\ud130\ub97c \ubcf4\ud638\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub429\ub2c8\ub2e4. \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uc5c5\ub370\uc774\ud2b8, \ub2e4\uc911 \uc778\uc99d \uc0ac\uc6a9, \uc9c1\uc6d0 \uc778\uc2dd \uad50\uc721\uacfc \uac19\uc740 \ubcf4\uc548 \uc870\uce58\ub97c \ucc44\ud0dd\ud568\uc73c\ub85c\uc368 \ub9ac\uc2a4\ud06c\ub97c \ucd5c\uc18c\ud654\ud560 \uc218 \uc788\uc744 \ubfd0\ub9cc \uc544\ub2c8\ub77c \uacf5\uaca9\uc5d0 \ub300\ud55c \ub300\uc751 \ub2a5\ub825\uc744 \ud5a5\uc0c1\uc2dc\ud0ac \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc774\uac83\uc774 \uc548\uc804\ud558\uace0 \uc9c0\uc18d \uac00\ub2a5\ud55c \ub514\uc9c0\ud138 \ud658\uacbd\uc744 \uad6c\ucd95\ud558\ub294 \ud575\uc2ec\uc785\ub2c8\ub2e4.<\/p>\n<p><\/p>","protected":false},"author":25,"featured_media":37695,"template":"","meta":{"_acf_changed":false},"tags":[],"blog-cat":[2058],"class_list":["post-37687","knowledge","type-knowledge","status-publish","has-post-thumbnail","hentry","blog-cat-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.1 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>2025\ub144\uc5d0 \uaf2d \uc54c\uc544\uc57c \ud560 \ubcf4\uc548 \uc804\ub7b5 6\uac00\uc9c0 - BAP SOFTWARE<\/title>\n<meta name=\"description\" content=\"\uc0ac\uc774\ubc84 \ubcf4\uc548\uc740 \ucef4\ud4e8\ud130 \uc2dc\uc2a4\ud15c, \ub124\ud2b8\uc6cc\ud06c \ubc0f \ub370\uc774\ud130\ub97c \uacf5\uaca9, \ubb34\ub2e8 \uc811\uadfc, \uc190\uc0c1 \ub610\ub294 \uc815\ubcf4 \ub3c4\ub09c\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\uae30 \uc704\ud574 \uc124\uacc4\ub41c \uc77c\ub828\uc758 \uc870\uce58, \uae30\uc220 \ubc0f \ud504\ub85c\uc138\uc2a4\uc785\ub2c8\ub2e4. \uc2a4\ub9c8\ud2b8 \uae30\uae30\uc640 \uc0ac\ubb3c\uc778\ud130\ub137(IoT)\uc758 \uae09\uc18d\ud55c \ud655\uc0b0\uc73c\ub85c \uc778\ud574 \uc0ac\uc774\ubc84 \uc704\ud611\uc758 \uacf5\uaca9 \ud45c\uba74\uc774 \ud06c\uac8c \ud655\uc7a5\ub418\uc5c8\uc2b5\ub2c8\ub2e4.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bap-software.net\/kr\/knowledge\/latest-security-measures-in-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2025\ub144\uc5d0 \uaf2d \uc54c\uc544\uc57c \ud560 \ubcf4\uc548 \uc804\ub7b5 6\uac00\uc9c0\" \/>\n<meta property=\"og:description\" content=\"\uc0ac\uc774\ubc84 \ubcf4\uc548\uc740 \ucef4\ud4e8\ud130 \uc2dc\uc2a4\ud15c, \ub124\ud2b8\uc6cc\ud06c \ubc0f \ub370\uc774\ud130\ub97c \uacf5\uaca9, \ubb34\ub2e8 \uc811\uadfc, \uc190\uc0c1 \ub610\ub294 \uc815\ubcf4 \ub3c4\ub09c\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\uae30 \uc704\ud574 \uc124\uacc4\ub41c \uc77c\ub828\uc758 \uc870\uce58, \uae30\uc220 \ubc0f \ud504\ub85c\uc138\uc2a4\uc785\ub2c8\ub2e4. \uc2a4\ub9c8\ud2b8 \uae30\uae30\uc640 \uc0ac\ubb3c\uc778\ud130\ub137(IoT)\uc758 \uae09\uc18d\ud55c \ud655\uc0b0\uc73c\ub85c \uc778\ud574 \uc0ac\uc774\ubc84 \uc704\ud611\uc758 \uacf5\uaca9 \ud45c\uba74\uc774 \ud06c\uac8c \ud655\uc7a5\ub418\uc5c8\uc2b5\ub2c8\ub2e4.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bap-software.net\/kr\/knowledge\/latest-security-measures-in-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"(\u65e5\u672c\u8a9e) \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u958b\u767a-\u30aa\u30d5\u30b7\u30e7\u30a2\u30b5\u30fc\u30d3\u30b9\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/bap32\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.bap-software.net\/2025\/04\/24235023\/p3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@bapsoftware\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/knowledge\\\/latest-security-measures-in-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/knowledge\\\/latest-security-measures-in-cybersecurity\\\/\",\"name\":\"2025\ub144\uc5d0 \uaf2d \uc54c\uc544\uc57c \ud560 \ubcf4\uc548 \uc804\ub7b5 6\uac00\uc9c0 - BAP SOFTWARE\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/knowledge\\\/latest-security-measures-in-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/knowledge\\\/latest-security-measures-in-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn.bap-software.net\\\/2025\\\/04\\\/24235023\\\/p3.jpg\",\"datePublished\":\"2025-04-24T10:29:37+00:00\",\"description\":\"\uc0ac\uc774\ubc84 \ubcf4\uc548\uc740 \ucef4\ud4e8\ud130 \uc2dc\uc2a4\ud15c, \ub124\ud2b8\uc6cc\ud06c \ubc0f \ub370\uc774\ud130\ub97c \uacf5\uaca9, \ubb34\ub2e8 \uc811\uadfc, \uc190\uc0c1 \ub610\ub294 \uc815\ubcf4 \ub3c4\ub09c\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\uae30 \uc704\ud574 \uc124\uacc4\ub41c \uc77c\ub828\uc758 \uc870\uce58, \uae30\uc220 \ubc0f \ud504\ub85c\uc138\uc2a4\uc785\ub2c8\ub2e4. \uc2a4\ub9c8\ud2b8 \uae30\uae30\uc640 \uc0ac\ubb3c\uc778\ud130\ub137(IoT)\uc758 \uae09\uc18d\ud55c \ud655\uc0b0\uc73c\ub85c \uc778\ud574 \uc0ac\uc774\ubc84 \uc704\ud611\uc758 \uacf5\uaca9 \ud45c\uba74\uc774 \ud06c\uac8c \ud655\uc7a5\ub418\uc5c8\uc2b5\ub2c8\ub2e4.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/knowledge\\\/latest-security-measures-in-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"kr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[[\"https:\\\/\\\/bap-software.net\\\/kr\\\/knowledge\\\/latest-security-measures-in-cybersecurity\\\/\"]]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"kr\",\"@id\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/knowledge\\\/latest-security-measures-in-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cdn.bap-software.net\\\/2025\\\/04\\\/24235023\\\/p3.jpg\",\"contentUrl\":\"https:\\\/\\\/cdn.bap-software.net\\\/2025\\\/04\\\/24235023\\\/p3.jpg\",\"width\":1080,\"height\":675,\"caption\":\"Introducing the importance of cybersecurity today\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/knowledge\\\/latest-security-measures-in-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Knowledge\",\"item\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/knowledge\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"2025\ub144\uc5d0 \uaf2d \uc54c\uc544\uc57c \ud560 \ubcf4\uc548 \uc804\ub7b5 6\uac00\uc9c0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/#website\",\"url\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/\",\"name\":\"(\u65e5\u672c\u8a9e) \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u958b\u767a-\u30aa\u30d5\u30b7\u30e7\u30a2\u30b5\u30fc\u30d3\u30b9\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"kr\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"2025\ub144\uc5d0 \uaf2d \uc54c\uc544\uc57c \ud560 \ubcf4\uc548 \uc804\ub7b5 6\uac00\uc9c0 - BAP SOFTWARE","description":"\uc0ac\uc774\ubc84 \ubcf4\uc548\uc740 \ucef4\ud4e8\ud130 \uc2dc\uc2a4\ud15c, \ub124\ud2b8\uc6cc\ud06c \ubc0f \ub370\uc774\ud130\ub97c \uacf5\uaca9, \ubb34\ub2e8 \uc811\uadfc, \uc190\uc0c1 \ub610\ub294 \uc815\ubcf4 \ub3c4\ub09c\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\uae30 \uc704\ud574 \uc124\uacc4\ub41c \uc77c\ub828\uc758 \uc870\uce58, \uae30\uc220 \ubc0f \ud504\ub85c\uc138\uc2a4\uc785\ub2c8\ub2e4. \uc2a4\ub9c8\ud2b8 \uae30\uae30\uc640 \uc0ac\ubb3c\uc778\ud130\ub137(IoT)\uc758 \uae09\uc18d\ud55c \ud655\uc0b0\uc73c\ub85c \uc778\ud574 \uc0ac\uc774\ubc84 \uc704\ud611\uc758 \uacf5\uaca9 \ud45c\uba74\uc774 \ud06c\uac8c \ud655\uc7a5\ub418\uc5c8\uc2b5\ub2c8\ub2e4.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bap-software.net\/kr\/knowledge\/latest-security-measures-in-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"2025\ub144\uc5d0 \uaf2d \uc54c\uc544\uc57c \ud560 \ubcf4\uc548 \uc804\ub7b5 6\uac00\uc9c0","og_description":"\uc0ac\uc774\ubc84 \ubcf4\uc548\uc740 \ucef4\ud4e8\ud130 \uc2dc\uc2a4\ud15c, \ub124\ud2b8\uc6cc\ud06c \ubc0f \ub370\uc774\ud130\ub97c \uacf5\uaca9, \ubb34\ub2e8 \uc811\uadfc, \uc190\uc0c1 \ub610\ub294 \uc815\ubcf4 \ub3c4\ub09c\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\uae30 \uc704\ud574 \uc124\uacc4\ub41c \uc77c\ub828\uc758 \uc870\uce58, \uae30\uc220 \ubc0f \ud504\ub85c\uc138\uc2a4\uc785\ub2c8\ub2e4. \uc2a4\ub9c8\ud2b8 \uae30\uae30\uc640 \uc0ac\ubb3c\uc778\ud130\ub137(IoT)\uc758 \uae09\uc18d\ud55c \ud655\uc0b0\uc73c\ub85c \uc778\ud574 \uc0ac\uc774\ubc84 \uc704\ud611\uc758 \uacf5\uaca9 \ud45c\uba74\uc774 \ud06c\uac8c \ud655\uc7a5\ub418\uc5c8\uc2b5\ub2c8\ub2e4.","og_url":"https:\/\/bap-software.net\/kr\/knowledge\/latest-security-measures-in-cybersecurity\/","og_site_name":"(\u65e5\u672c\u8a9e) \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u958b\u767a-\u30aa\u30d5\u30b7\u30e7\u30a2\u30b5\u30fc\u30d3\u30b9","article_publisher":"https:\/\/www.facebook.com\/bap32","og_image":[{"width":1080,"height":675,"url":"https:\/\/cdn.bap-software.net\/2025\/04\/24235023\/p3.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@bapsoftware","twitter_misc":{"Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bap-software.net\/kr\/knowledge\/latest-security-measures-in-cybersecurity\/","url":"https:\/\/bap-software.net\/kr\/knowledge\/latest-security-measures-in-cybersecurity\/","name":"2025\ub144\uc5d0 \uaf2d \uc54c\uc544\uc57c \ud560 \ubcf4\uc548 \uc804\ub7b5 6\uac00\uc9c0 - BAP SOFTWARE","isPartOf":{"@id":"https:\/\/bap-software.net\/kr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bap-software.net\/kr\/knowledge\/latest-security-measures-in-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/bap-software.net\/kr\/knowledge\/latest-security-measures-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.bap-software.net\/2025\/04\/24235023\/p3.jpg","datePublished":"2025-04-24T10:29:37+00:00","description":"\uc0ac\uc774\ubc84 \ubcf4\uc548\uc740 \ucef4\ud4e8\ud130 \uc2dc\uc2a4\ud15c, \ub124\ud2b8\uc6cc\ud06c \ubc0f \ub370\uc774\ud130\ub97c \uacf5\uaca9, \ubb34\ub2e8 \uc811\uadfc, \uc190\uc0c1 \ub610\ub294 \uc815\ubcf4 \ub3c4\ub09c\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\uae30 \uc704\ud574 \uc124\uacc4\ub41c \uc77c\ub828\uc758 \uc870\uce58, \uae30\uc220 \ubc0f \ud504\ub85c\uc138\uc2a4\uc785\ub2c8\ub2e4. \uc2a4\ub9c8\ud2b8 \uae30\uae30\uc640 \uc0ac\ubb3c\uc778\ud130\ub137(IoT)\uc758 \uae09\uc18d\ud55c \ud655\uc0b0\uc73c\ub85c \uc778\ud574 \uc0ac\uc774\ubc84 \uc704\ud611\uc758 \uacf5\uaca9 \ud45c\uba74\uc774 \ud06c\uac8c \ud655\uc7a5\ub418\uc5c8\uc2b5\ub2c8\ub2e4.","breadcrumb":{"@id":"https:\/\/bap-software.net\/kr\/knowledge\/latest-security-measures-in-cybersecurity\/#breadcrumb"},"inLanguage":"kr","potentialAction":[{"@type":"ReadAction","target":[["https:\/\/bap-software.net\/kr\/knowledge\/latest-security-measures-in-cybersecurity\/"]]}]},{"@type":"ImageObject","inLanguage":"kr","@id":"https:\/\/bap-software.net\/kr\/knowledge\/latest-security-measures-in-cybersecurity\/#primaryimage","url":"https:\/\/cdn.bap-software.net\/2025\/04\/24235023\/p3.jpg","contentUrl":"https:\/\/cdn.bap-software.net\/2025\/04\/24235023\/p3.jpg","width":1080,"height":675,"caption":"Introducing the importance of cybersecurity today"},{"@type":"BreadcrumbList","@id":"https:\/\/bap-software.net\/kr\/knowledge\/latest-security-measures-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/bap-software.net\/kr\/"},{"@type":"ListItem","position":2,"name":"Knowledge","item":"https:\/\/bap-software.net\/kr\/knowledge\/"},{"@type":"ListItem","position":3,"name":"2025\ub144\uc5d0 \uaf2d \uc54c\uc544\uc57c \ud560 \ubcf4\uc548 \uc804\ub7b5 6\uac00\uc9c0"}]},{"@type":"WebSite","@id":"https:\/\/bap-software.net\/kr\/#website","url":"https:\/\/bap-software.net\/kr\/","name":"(\u65e5\u672c\u8a9e) \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u958b\u767a-\u30aa\u30d5\u30b7\u30e7\u30a2\u30b5\u30fc\u30d3\u30b9","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bap-software.net\/kr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"kr"}]}},"_links":{"self":[{"href":"https:\/\/bap-software.net\/kr\/wp-json\/wp\/v2\/knowledge\/37687","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bap-software.net\/kr\/wp-json\/wp\/v2\/knowledge"}],"about":[{"href":"https:\/\/bap-software.net\/kr\/wp-json\/wp\/v2\/types\/knowledge"}],"author":[{"embeddable":true,"href":"https:\/\/bap-software.net\/kr\/wp-json\/wp\/v2\/users\/25"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bap-software.net\/kr\/wp-json\/wp\/v2\/media\/37695"}],"wp:attachment":[{"href":"https:\/\/bap-software.net\/kr\/wp-json\/wp\/v2\/media?parent=37687"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bap-software.net\/kr\/wp-json\/wp\/v2\/tags?post=37687"},{"taxonomy":"blog-cat","embeddable":true,"href":"https:\/\/bap-software.net\/kr\/wp-json\/wp\/v2\/blog-cat?post=37687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}