{"id":430,"date":"2024-02-06T20:23:00","date_gmt":"2025-11-12T20:23:19","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=430"},"modified":"2025-12-26T21:01:23","modified_gmt":"2025-12-26T12:01:23","slug":"cybersecurity","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/","title":{"rendered":"\uc0ac\uc774\ubc84 \ubcf4\uc548(Cybersecurity)\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc815\uc758\uc640 \uc804\ub7b5 \uac00\uc774\ub4dc"},"content":{"rendered":"<h2>\uc0ac\uc774\ubc84 \ubcf4\uc548\uc740 \ub0b4\u00b7\uc678\ubd80 \ub514\uc9c0\ud138 \uc704\ud611\uc73c\ub85c\ubd80\ud130 \uc870\uc9c1\uc744 \ubc29\uc5b4\ud558\uace0, \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc5d0 \ub300\ube44\ud558\uc5ec \ub370\uc774\ud130\ubfd0\ub9cc \uc544\ub2c8\ub77c \ube44\uc988\ub2c8\uc2a4\uc640 \ud3c9\ud310\uc744 \ubcf4\ud638\ud558\ub294 \uc5ed\ud560\uc744 \ud569\ub2c8\ub2e4. \ud6a8\uacfc\uc801\uc778 \ubcf4\uc548 \uc870\uce58\ub294 \uc790\uc0b0, \uace0\uac1d \ubc0f \ube0c\ub79c\ub4dc\ub97c \ubcf4\ud638\ud558\uace0 \uc870\uc9c1\uc758 \ud0c4\ub825\uc131\uacfc \uc2e0\ub8b0\uc131\uc744 \uac15\ud654\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub2e4\uc74c \uae00\uc744 \ud1b5\ud574 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \ub300\ud574 \uc790\uc138\ud788 \uc54c\uc544\ubcf4\uc138\uc694.<\/h2>\n<p>\uc0ac\uc774\ubc84 \ubcf4\uc548\uc774\ub77c\ub294 \uc6a9\uc5b4\ub294 \uc5b4\ub450\uc6b4 \ubc29\uc5d0 \uc639\uae30\uc885\uae30 \ubaa8\uc5ec \uc788\ub294 \ud574\ucee4\ub4e4\uc774 \ubaa8\ub2c8\ud130\uc5d0 \uc2dc\uc120\uc744 \uace0\uc815\ud558\uace0 \ub514\uc9c0\ud138 \uc694\uc0c8\uc5d0 \uce68\uc785\ud558\uc5ec <a href=\"https:\/\/www.salesforce.com\/blog\/data-security-conversations\/\" target=\"_blank\" rel=\"noopener\">\ubbfc\uac10\ud55c \ub370\uc774\ud130\ub97c \ud6d4\uce58\ub294<\/a> \ubaa8\uc2b5\uc744 \ub5a0\uc62c\ub9ac\uac8c \ud569\ub2c8\ub2e4.<\/p>\n<p>\ud558\uc9c0\ub9cc \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \ud604\uc2e4\uc740 \uc774\ubcf4\ub2e4 \ud6e8\uc52c \ub354 \ubcf5\uc7a1\ud558\uace0 \ubbf8\ubb18\ud569\ub2c8\ub2e4. \ubcf4\uc548 \uc704\ud611\uc740 \uad50\ud65c\ud55c \uc0ac\uae30\uafbc\ub4e4\ub85c \uc778\ud574 \ube44\ub86f\ub420 \uc218\ub3c4 \uc788\uc9c0\ub9cc, \ubb34\uc2ec\ucf54 \ubc1c\uc0dd\ud558\ub294 \uc9c1\uc6d0\uc758 \uc2e4\uc218\uc5d0\uc11c\ub3c4 \ubc1c\uc0dd\ud569\ub2c8\ub2e4. \uc2e4\uc81c\ub85c, \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790\uac00 \uc870\uc9c1\uc5d0 \uc5d1\uc138\uc2a4 \ud558\ub294 <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/2023\/summary-of-findings\/\" target=\"_blank\" rel=\"noopener\">\uc138 \uac00\uc9c0 \uc8fc\uc694 \ubc29\ubc95<\/a>\uc740 \uc790\uaca9 \uc99d\uba85 \ub3c4\uc6a9, \ud53c\uc2f1, \uadf8\ub9ac\uace0 \ucde8\uc57d\uc810 \uc545\uc6a9\uc785\ub2c8\ub2e4.<\/p>\n<p>\uc774\uc81c \uc0ac\uc774\ubc84 \ubcf4\uc548\uc774 \ubb34\uc5c7\uc778\uc9c0, \uc5b4\ub5bb\uac8c \uc791\ub3d9\ud558\ub294\uc9c0 \uc815\uc758\ud55c \ub2e4\uc74c\uc5d0 \ud68c\uc0ac \ub0b4\uc5d0\uc11c \ub354\uc6b1 \uac15\ub825\ud55c \ub514\uc9c0\ud138 \ubcf4\uc548 \uc2dc\uc2a4\ud15c\uc744 \uad6c\ucd95\ud558\ub294 \ubc29\ubc95\uc5d0 \ub300\ud574 \ub2e4\ub904 \ubcf4\uaca0\uc2b5\ub2c8\ub2e4.<\/p>\n<ul>\n<li><a href=\"#whatis\">\uc0ac\uc774\ubc84 \ubcf4\uc548\uc774\ub780?<\/a><\/li>\n<li><a href=\"#howdoes\">\uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc791\ub3d9 \ubc29\uc2dd<\/a><\/li>\n<li><a href=\"#important\">\uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc911\uc694\uc131<\/a><\/li>\n<li><a href=\"#benefits\">\uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc774\uc810<\/a><\/li>\n<li><a href=\"#types\">\ub2e4\uc591\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc720\ud615<\/a><\/li>\n<li><a href=\"#threats\">\ub2e4\uc591\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc704\ud611<\/a><\/li>\n<li><a href=\"#AI\">\uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \uc778\uacf5\uc9c0\ub2a5\uc774 \uc0ac\uc6a9\ub418\ub294 \ubc29\ubc95<\/a><\/li>\n<li><a href=\"#future\">\ubbf8\ub798\ub97c \ub300\ube44\ud558\ub294 \ubc14\uc774\ud2b8 \ub2e8\uc704 \ubcf4\uc548<\/a><\/li>\n<\/ul>\n<h3>\uc0ac\uc774\ubc84 \ubcf4\uc548\uc774\ub780?<\/h3>\n<p>\uc0ac\uc774\ubc84 \ubcf4\uc548(Cybersecurity)\uc740 \ub04a\uc784\uc5c6\uc774 \uc7a0\uc7ac\ud558\uace0 \uc788\ub294 \ub514\uc9c0\ud138 \uc704\ud611\uc5d0 \ub9de\uc11c \uc870\uc9c1\uc744 \ubc29\uc5b4\ud558\ub294 \uac83\uc785\ub2c8\ub2e4. \uc774\ub294 \ub0b4\u00b7\uc678\ubd80 \uc704\ud611\uc744 \ud3ec\ud568\ud558\uc5ec \uc628\ub77c\uc778 \ubc94\uc8c4\uc790, \uc870\uc791, \uc0ac\uae30\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\ub294 \uc5ed\ud560\uc744 \ud569\ub2c8\ub2e4.<\/p>\n<p>\uc0ac\uc774\ubc84 \ubcf4\uc548\uc740 \ub2e8\uc21c\ud788 <a href=\"https:\/\/www.salesforce.com\/blog\/ethical-data-privacy\/\" target=\"_blank\" rel=\"noopener\">\ub370\uc774\ud130\ub97c \uc548\uc804\ud558\uac8c \uc720\uc9c0<\/a>\ud558\ub294 \uac83 \uc774\uc0c1\uc744 \uc758\ubbf8\ud569\ub2c8\ub2e4. \uc774\ub294 \uc5ec\ub7ec\ubd84\uc758 \ube44\uc988\ub2c8\uc2a4\uc640 \ud3c9\ud310\uc744 \ubcf4\ud638\ud558\ub294 \uac83\uc785\ub2c8\ub2e4. \uc6b0\uc218\ud55c \ubcf4\uc548 \uc870\uce58\uc5d0 \ud22c\uc790\ud558\uba74 \uc870\uc9c1\uc758 \ud0c4\ub825\uc131\uacfc \uc2e0\ub8b0\uc131\uc744 \uc720\uc9c0\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\u00a0<\/p>\n<h2>\uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc791\ub3d9 \ubc29\uc2dd<\/h2>\n<p>\uc2e4\uc81c \uc0ac\ubb34\uc2e4\uc740 \uacf5\uac04\uc744 \ub098\ub20c \uc218 \uc788\uc9c0\ub9cc, \ub514\uc9c0\ud138 \uc138\uacc4\ub294 \uacbd\uacc4\uac00 \uc5c6\uc73c\uba70 \ud544\uc5f0\uc801\uc73c\ub85c \ubb34\ud55c\ud55c \uc704\ud611\uc774 \uc874\uc7ac\ud569\ub2c8\ub2e4. <a href=\"https:\/\/www.salesforce.com\/kr\/products\/platform\/solutions\/development-process\" target=\"_blank\" rel=\"noopener\">\ub9de\ucda4\ud615 \uc560\ud50c\ub9ac\ucf00\uc774\uc158<\/a>, \ud074\ub77c\uc6b0\ub4dc \uc11c\ube44\uc2a4, \uace0\uac1d \uacc4\uc815, \ub3c5\uc810 \uae30\uc220 \ubc0f \uc6d0\uaca9 \uc791\uc5c5 \ub85c\uadf8\uc778\uc73c\ub85c \uc778\ud574 \uc704\ud5d8\uc740 \ubc30\uac00 \ub429\ub2c8\ub2e4.<\/p>\n<p>\uc774\ub7ec\ud55c \uc774\uc720\ub85c \uac15\ub825\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc804\ub7b5\uc744 \uad6c\ucd95\ud558\ub294 \uac83\uc774 \uc911\uc694\ud569\ub2c8\ub2e4. \uae30\uc220\uacfc \uc778\uac04\uc758 \uacbd\uacc4\ub97c \uacb0\ud569\ud568\uc73c\ub85c\uc368 \ube44\uc988\ub2c8\uc2a4\uc758 \ud575\uc2ec \uc601\uc5ed\uacfc <a href=\"https:\/\/www.salesforce.com\/kr\/products\/platform\/solutions\/data-security\/\" target=\"_blank\" rel=\"noopener\">\ub370\uc774\ud130\ub97c \ubcf4\ud638<\/a>\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\uac15\ub825\ud55c \ud504\ub85c\ud1a0\ucf5c\uc740 \ub2e4\uc74c\uacfc \uac19\uc740 \uae30\uc220\uc774 \ud3ec\ud568\ub429\ub2c8\ub2e4.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.salesforce.com\/products\/platform\/features\/data-mask\/\" target=\"_blank\" rel=\"noopener\">\ubbfc\uac10\ud55c \ub370\uc774\ud130<\/a>\ub97c \uc554\ud638\ud654, \ub9c8\uc2a4\ud0b9 \ub610\ub294 \uc775\uba85\ud654\ud569\ub2c8\ub2e4.<\/li>\n<li>\ubbfc\uac10\ud55c \ub370\uc774\ud130\uc5d0 \ub300\ud55c <a href=\"https:\/\/www.salesforce.com\/products\/platform\/products\/shield\/\" target=\"_blank\" rel=\"noopener\">\uc561\uc138\uc2a4\ub97c \uc81c\uc5b4<\/a>\ud569\ub2c8\ub2e4.<\/li>\n<li>\uc0ac\uac74\uc744 \uc2e0\uc18d\ud558\uac8c \uac10\uc9c0\ud558\uace0 \ub300\uc751\ud569\ub2c8\ub2e4.<\/li>\n<li>\uc0ac\uc774\ubc84 \ubcf4\uc548 \uaddc\uce59\uc744 \uc9c0\uc18d\uc801\uc73c\ub85c \uac10\uc0ac\ud569\ub2c8\ub2e4.<\/li>\n<li>\ubaa8\ub4e0 \uce68\ud574\ub85c\ubd80\ud130 <a href=\"https:\/\/www.salesforce.com\/products\/platform\/solutions\/salesforce-backup\/\" target=\"_blank\" rel=\"noopener\">\uc2e0\uc18d\ud55c \ub370\uc774\ud130 \ubcf5\uad6c<\/a>\ub97c \uac00\ub2a5\ud558\uac8c \ud569\ub2c8\ub2e4.<\/li>\n<li><a href=\"https:\/\/www.salesforce.com\/products\/platform\/products\/privacy-center\/\" target=\"_blank\" rel=\"noopener\">\ud45c\uc900 \uaddc\uc815<\/a>\uc744 \uc900\uc218\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n<p>\uae30\uc220\uc740 \ubc29\uc5b4\uc758 \uae30\ubc18\uc774 \ub418\uc9c0\ub9cc, \uc9c4\uc815 \uc911\uc694\ud55c \ubd80\ubd84\uc740 \uc0ac\ub78c\uc785\ub2c8\ub2e4. \uc5ec\ub7ec\ubd84\uc758 \uc5c5\ubb34 \uc778\ub825\uc740 \uc774 \ub514\uc9c0\ud138 \uc804\ud22c\uc5d0\uc11c \uc911\uc694\ud55c \uc5ed\ud560\uc744 \ud569\ub2c8\ub2e4. \ubb3c\ub860 \uadf8\ub4e4\uc774 \uc62c\ubc14\ub978 \uae30\uc220\uacfc \ub3c4\uad6c\ub97c \uac16\ucd94\uace0 \uad50\uc721\uc744 \ubc1b\uc740 \uacbd\uc6b0\uc5d0 \uadf8\ub807\uc2b5\ub2c8\ub2e4. \uc0ac\uc774\ubc84 \ubcf4\uc548 <a href=\"https:\/\/security.salesforce.com\/blog\/filling-the-cybersecurity-skills-gap?_ga=2.51763561.1116733520.1706575046-239753925.1690439890\" target=\"_blank\" rel=\"noopener\">\uae30\uc220 \uac04\uadf9<\/a>\uc744 \ud574\uc18c\ud568\uc73c\ub85c\uc368 \uc5ec\ub7ec\ubd84\uc758 \uc870\uc9c1 \uad6c\uc131\uc6d0\ub4e4\uc774 \uc870\uc9c1\uc744 \ubcf4\ud638\ud558\ub294 \ub2a5\ub825\uc744 \ud615\uc131\ud560 \uc218 \uc788\ub3c4\ub85d \uc5ed\ub7c9\uc744 \uac15\ud654\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\uc774\ub807\uac8c \uc0dd\uac01\ud574 \ubcf4\uc138\uc694: \uc5ec\ub7ec\ubd84\uc758 \ud300\uc774 \uac8c\uc784\uc5d0 \ub300\ud574 \uc798 \uc54c\uace0 \uc788\ub2e4\uba74 \ud300\uc740 \uacb0\ucf54 \uc18d\uc784\uc218\uc5d0 \uc18d\uc9c0 \uc54a\uc744 \uac83\uc774\uba70 \uaddc\uce59 \uc704\ubc18\uc73c\ub85c \uc774\uc5b4\uc9c8 \uc218 \uc788\ub294 \uc0ac\uc18c\ud55c \uc2e4\uc218\ub4e4\uc744 \ubc94\ud558\uc9c0 \uc54a\uc744 \uac83\uc785\ub2c8\ub2e4. \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc704\ud611\uc740 \uc9c0\uc18d\uc801\uc73c\ub85c \uc9c4\ud654\ud558\uace0 \uc788\uae30 \ub54c\ubb38\uc5d0 \ud300\uc774 \uacbd\uacc4\uc2ec\uc744 \uc720\uc9c0\ud558\uace0 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uc5c5\ub370\uc774\ud2b8\uc640 \uac19\uc740 \uc77c\uc0c1\uc801\uc778 \uc791\uc5c5\uc774 \uc911\uc694\ud55c \ubcf4\ud638\uc7a5\uce58\ub85c \uc791\uc6a9\ud558\ub3c4\ub85d \ud558\ub294 \uac83\uc774 \uc911\uc694\ud569\ub2c8\ub2e4.<\/p>\n<p>\u00a0<\/p>\n<h2>\uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc911\uc694\uc131<\/h2>\n<p>\uc624\ud504\ub77c\uc778 \uc0ac\ubb34\uc2e4\uc744 \uce68\uc785\uc790\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\ub294 \uac83\uacfc \ub9c8\ucc2c\uac00\uc9c0\ub85c, \ub514\uc9c0\ud138 \uc790\uc0b0\uc5d0 \ub300\ud574\uc11c\ub3c4 \ub3d9\uc77c\ud55c \ubcf4\ud638\uac00 \ud544\uc694\ud569\ub2c8\ub2e4. \uc0ac\uc774\ubc84 \uacf5\uaca9\uc740 \ub9ce\uc740 \uacbd\uace0\ub97c \ubcf4\ub0b4\uace0 \uc788\uc73c\uba70, <a href=\"https:\/\/www.esentire.com\/resources\/library\/2022-official-cybercrime-report#:~:text=According%20to%20Cybersecurity%20Ventures%2C%20the%20global%20annual%20cost,is%20expected%20to%20reach%20%2410.5%20trillion%20by%202025.\" target=\"_blank\" rel=\"noopener\">2025\ub144\uc5d0\ub294 \uc608\uc0c1 \ud53c\ud574 \uaddc\ubaa8\uac00 10.5\uc870 \ub2ec\ub7ec<\/a>\uc5d0 \uc774\ub97c \uac83\uc73c\ub85c \uc608\uce21\ub429\ub2c8\ub2e4. \uc774\uac83\uc740 \ub2e8\uc21c\ud55c \uc22b\uc790\uac00 \uc544\ub2c8\ub77c, \uacbd\uace0\uc785\ub2c8\ub2e4.<\/p>\n<p>\uc774\ub807\uac8c \uc5c4\uccad\ub09c \uc704\ud611 \uc99d\uac00\uc758 \ubc30\uacbd\uc5d0\ub294 \uba87 \uac00\uc9c0 \uc8fc\uc694 \uc694\uc778\uc774 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<ul>\n<li>\ubcf4\uc548\ub418\uc9c0 \uc54a\uc740 Wi-Fi \ub124\ud2b8\uc6cc\ud06c\ub098 \ud074\ub77c\uc6b0\ub4dc \uc800\uc7a5 \uc194\ub8e8\uc158\uc5d0\uc11c \uac1c\uc778 \uc7a5\uce58\ub97c \uc0ac\uc6a9\ud558\uc5ec \uc791\uc5c5\ud558\ub294 \uc6d0\uaca9 \ubc0f \ud558\uc774\ube0c\ub9ac\ub4dc \uc9c1\uc6d0<\/li>\n<li>\ud574\ucee4\uac00 \uc545\uc6a9\ud560 \uc218 \uc788\ub294 \uc0c8\ub85c\uc6b4 \ubca1\ud130\ub97c \uac1c\ubc29\ud558\ub294 \ud655\uc7a5\ub41c \ub514\uc9c0\ud138 \ubc1c\uc790\uad6d(footprint)<\/li>\n<li>\uc870\uc9c1\uc5d0 \uc54c\ub824\uc9c0\uc9c0 \uc54a\uc740 \uc704\ud5d8\uc744 \ucd08\ub798\ud558\ub294 \ucda9\ubd84\ud788 \uac80\uc99d\ub418\uc9c0 \uc54a\uc740 \uc81c3\uc790 \uacf5\uae09\uc5c5\uccb4 \ubc0f \uacf5\uae09\uc5c5\uccb4\uc758 \uc0ac\uc774\ubc84 \ubcf4\uc548<\/li>\n<li>\uc2e0\uaddc \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc194\ub8e8\uc158\uc5d0 \ub300\uc751\ud558\uc5ec \uc790\uc2e0\ub4e4\uc758 \uc791\uc5c5 \ubc29\uc2dd\uc744 \uc9c4\ud654\uc2dc\ud0a4\ub294 \uc219\ub828\ub41c \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790<\/li>\n<\/ul>\n<p>\uc0ac\uc774\ubc84 \ubcf4\uc548\uc740 \uc0ac\uce58\uac00 \uc544\ub2cc \ube44\uc988\ub2c8\uc2a4\uc758 \uc0dd\uba85\uc785\ub2c8\ub2e4. \ub514\uc9c0\ud138 \uc138\uacc4\uac00 \ubcf4\ubb3c \ucc3d\uace0\uc640 \uc9c0\ub8b0\ubc2d\uc774 \ub3d9\uc2dc\uc5d0 \ub420 \uc218 \uc788\ub294 \ub9cc\ud07c, \uc0ac\uc774\ubc84 \ubcf4\uc548\uc740 \uc870\uc9c1\uc758 \uc815\ubcf4\uc640 \ud3c9\ud310\uc744 \ubcf4\ud638\ud558\ub294 \ub370 \uc810\uc810 \ub354 \uc911\uc694\ud574\uc9c0\uace0 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\u00a0<\/p>\n<h2>\uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc774\uc810<\/h2>\n<p>\uac04\ub2e8\ud558\uac8c \ub9d0\ud558\uc790\uba74, \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc774\uc810\uc740 <a href=\"https:\/\/www.salesforce.com\/blog\/public-sector-government-security-digital-transformation\/\" target=\"_blank\" rel=\"noopener\">\uc5ec\ub7ec\ubd84\uc758 \ub370\uc774\ud130\ub97c \uc548\uc804<\/a>\ud558\uac8c \ubcf4\ud638\ud558\ub294 \ub370 \uc788\uc2b5\ub2c8\ub2e4. \ud3ec\uad04\uc801\uc778 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc804\ub7b5\uc740 \uc870\uc9c1\uc758 \uc18c\uc911\ud55c \ub370\uc774\ud130\ub97c \ub3c4\ub09c\uacfc \uc870\uc791\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\uba70, \uc5ec\uae30\uc5d0\ub294 \uc5ec\ub7ec\ubd84\uc758 \uc9c0\uc801 \uc7ac\uc0b0 \ubc0f \uace0\uac1d\uc758 \uac1c\uc778 \ubc0f \uae08\uc735 \uc815\ubcf4\uac00 \ud3ec\ud568\ub429\ub2c8\ub2e4.<\/p>\n<p>\uac15\ub825\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc218\uce59\uc744 \uac16\ucd94\uace0 \uc788\uc73c\uba74 \ub2e4\uc74c\uacfc \uac19\uc740 \uc774\uc810\uc744 \uc5bb\uc744 \uc218 \uc788\uc2b5\ub2c8\ub2e4:<\/p>\n<ul>\n<li>\uc678\ubd80 \uacf5\uaca9 \ubc0f \ub0b4\ubd80 \uc778\uc801 \uc624\ub958\ub97c \uc2e0\uc18d\ud558\uac8c \ubcf5\uad6c\ud558\uc5ec \ube44\uc988\ub2c8\uc2a4 \uc5f0\uc18d\uc131\uc744 \uc720\uc9c0\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li>\uc2dc\uc7a5\uc5d0\uc11c \ube0c\ub79c\ub4dc \ud3c9\ud310\uacfc \uace0\uac1d \uc2e0\ub8b0\ub97c \uc720\uc9c0\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li>\uae30\ubc00 \uc815\ubcf4 \ubcf4\ud638\ub97c \uc704\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uaddc\uce59 \ubc0f \uad00\ub828 \uaddc\uc81c \uc694\uad6c\uc0ac\ud56d\uc744 \uc900\uc218\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<\/ul>\n<p>\uacb0\ub860\uc801\uc73c\ub85c \ud6a8\uacfc\uc801\uc778 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc218\uce59\uc740 \uc0ac\uc774\ubc84 \ubc94\uc8c4\ub97c \ubc29\uc9c0\ud558\uace0 \ud68c\uc0ac\uc758 \uc790\uc0b0, \uace0\uac1d \ubc0f \ube0c\ub79c\ub4dc\ub97c \ubcf4\ud638\ud569\ub2c8\ub2e4.<\/p>\n<h2>\ub2e4\uc591\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc720\ud615<\/h2>\n<p>\uc0ac\ubb34\uc2e4\uc758 \uc2dc\uac74 \uc7a5\uce58\uac00 \ud68c\uc0ac\uc758 \uc2e4\ubb3c \uc790\uc0b0\uc744 \ubcf4\ud638\ud558\ub294 \uac83\uacfc \ub9c8\ucc2c\uac00\uc9c0\ub85c, \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \ubaa9\ud45c\ub294 \ub370\uc774\ud130\ub97c \ubcf4\ud638\ud558\ub294 \uac83\uc785\ub2c8\ub2e4. \ubaa8\ubc94\uc801\uc778 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc218\uce59\uc740 \ub2e4\uc74c\uacfc \uac19\uc2b5\ub2c8\ub2e4.<\/p>\n<p><b>1. \ubc29\ud654\ubcbd \ubc0f \ub124\ud2b8\uc6cc\ud06c \uc138\ubd84\ud654<\/b><\/p>\n<p>\ubc29\ud654\ubcbd\uc740 \uad8c\ud55c\uc774 \uc5c6\ub294 \uc0ac\uc6a9\uc790\uc758 \ub124\ud2b8\uc6cc\ud06c \ubc0f \ub370\uc774\ud130 \uc561\uc138\uc2a4\ub97c \ubc29\uc9c0\ud558\uae30 \uc704\ud55c \ub514\uc9c0\ud138 \uc7a5\ubcbd\uc744 \ub9cc\ub4ed\ub2c8\ub2e4.<\/p>\n<p>\ub124\ud2b8\uc6cc\ud06c \uc138\ubd84\ud654\ub294 \ub124\ud2b8\uc6cc\ud06c\uc758 \uc77c\ubd80\ub97c \uc548\uc804\ud55c \uac00\uc0c1 \uae08\uace0 \ub4a4\uc5d0 \uc228\uae30\ub294 \uac83\uc744 \uc758\ubbf8\ud569\ub2c8\ub2e4. \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790\uac00 \ub124\ud2b8\uc6cc\ud06c \uc77c\ubd80\uc5d0 \uce68\ud22c\ud574\ub3c4 \ub2e4\ub978 \ubd80\ubd84\uc5d0 \uc561\uc138\uc2a4\ud560 \uc218 \uc5c6\uc2b5\ub2c8\ub2e4. \uc774\ub294 \ub514\uc9c0\ud138 \ub370\uc774\ud130\uc758 \uae08\uace0\uc640 \uac19\uc2b5\ub2c8\ub2e4.<\/p>\n<p><b>2. \uc554\ud638\ud654 \ubc0f \ub370\uc774\ud130 \ub9c8\uc2a4\ud0b9<\/b><\/p>\n<p>\uc554\ud638\ud654\ub294 \uc911\uc694\ud55c \ub370\uc774\ud130\ub97c \uc77d\uc744 \uc218 \uc5c6\ub294 \ud14d\uc2a4\ud2b8\ub85c \uc554\ud638\ud654\ud569\ub2c8\ub2e4. \ube44\ubc00 \ucf54\ub4dc\uc640 \ub9c8\ucc2c\uac00\uc9c0\ub85c \uc554\ud638\ud654\ub41c \ub370\uc774\ud130\ub294 \ud574\ub3c5 \ubc29\ubc95\uc744 \uc544\ub294 \uc0ac\ub78c\ub9cc\uc774 \uc77d\uc744 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc554\ud638\ud654\ub294 \uac1c\uc778 \uc2dd\ubcc4 \uac00\ub2a5 \uc815\ubcf4 \ubc0f \ubbfc\uac10 \ub370\uc774\ud130\uc640 \uae30\ubc00 \ub370\uc774\ud130 \ub610\ub294 \ub3c5\uc810\uc801\uc778 \ub370\uc774\ud130\uc5d0 <a href=\"https:\/\/www.salesforce.com\/products\/platform\/products\/shield\/\" target=\"_blank\" rel=\"noopener\">\ubcf4\uc548\uc744 \uc81c\uacf5<\/a>\ud569\ub2c8\ub2e4.<\/p>\n<p><a href=\"https:\/\/www.salesforce.com\/blog\/what-is-data-masking\/\" target=\"_blank\" rel=\"noopener\">\ub370\uc774\ud130 \ub9c8\uc2a4\ud0b9<\/a> \ub610\ub294 \ub370\uc774\ud130 \ub09c\ub3c5\ud654\ub294 \uc6d0\ubcf8 \ub370\uc774\ud130\ub97c \uc218\uc815\ub41c \ucf58\ud150\uce20\ub85c \ub300\uccb4\ud569\ub2c8\ub2e4. \uc608\ub97c \ub4e4\uc5b4, \ubbfc\uac10\ud55c \ub370\uc774\ud130\ub97c \ub354\ubbf8 \ub370\uc774\ud130\ub85c \ub300\uccb4\ud558\uc5ec <a href=\"https:\/\/www.salesforce.com\/products\/platform\/features\/data-mask\/\" target=\"_blank\" rel=\"noopener\">\ud14c\uc2a4\ud2b8 \ud658\uacbd\uc744 \ubcf4\ud638<\/a>\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p><b>3. VPN(\uac00\uc0c1 \uc0ac\uc124\ub9dd)<\/b><\/p>\n<p>\uc6d0\uaca9 \uadfc\ubb34 \uc9c1\uc6d0\uc774 VPN(\uac00\uc0c1 \uc0ac\uc124\ub9dd)\uc744 \uc0ac\uc6a9\ud558\uba74 \ub178\ud2b8\ubd81 \ubc0f \uae30\ud0c0 \uc7a5\uce58\uc5d0 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \ub300\ud55c \ubcf4\uc548 \uc561\uc138\uc2a4 \uae30\ub2a5\uc744 \ubd80\uc5ec\ud558\uc5ec \ubcf4\uc548 \ucde8\uc57d\uc131\uc744 \uc904\uc785\ub2c8\ub2e4.<\/p>\n<p><b>4. \uba40\uc6e8\uc5b4 \ubc29\uc9c0 \uc18c\ud504\ud2b8\uc6e8\uc5b4<\/b><\/p>\n<p>\uba40\uc6e8\uc5b4 \ubc29\uc9c0 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub294 \uc2dc\uc2a4\ud15c\uc5d0\uc11c \ucef4\ud4e8\ud130 \ubc14\uc774\ub7ec\uc2a4 \ub610\ub294 \uc6dc\uacfc \uac19\uc740 \uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub97c \ucc28\ub2e8, \uc2dd\ubcc4 \ubc0f \uc81c\uac70\ud558\ub294 \ub370 \uc0ac\uc6a9\ub429\ub2c8\ub2e4.<\/p>\n<p><b>5. \ubcf4\uc548 \uc815\ubcf4 \ubc0f \uc774\ubca4\ud2b8 \uad00\ub9ac<\/b><\/p>\n<p>\ubcf4\uc548 \uc815\ubcf4 \ubc0f \uc774\ubca4\ud2b8 \uad00\ub9ac(SIEM)\ub294 \ud68c\uc0ac\uc758 \ube44\uc988\ub2c8\uc2a4 \uc6b4\uc601\uc774 \ubc29\ud574\ubc1b\uae30 \uc804\uc5d0 \uc7a0\uc7ac\uc801\uc778 \ubcf4\uc548 \uc704\ud611 \ubc0f \ucde8\uc57d\uc131\uc744 \uc2dd\ubcc4\ud558\uace0 \ud574\uacb0\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub429\ub2c8\ub2e4. \uc774 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub294 \uc0ac\uc774\ubc84 \uacf5\uaca9\uc758 \uacbd\uace0 \uc9d5\ud6c4\ub97c \uc2dc\uc2a4\ud15c\uc5d0\uc11c \uc9c0\uc18d\uc801\uc73c\ub85c \uac80\uc0ac\ud558\uace0 \uc7a0\uc7ac\uc801\uc778 \uc704\ud611\uc744 \uc2e0\uc18d\ud788 \uc54c\ub824\uc90d\ub2c8\ub2e4.<\/p>\n<p><b>6. \ub370\uc774\ud130 \ubc31\uc5c5, \ubcf5\uc6d0 \ubc0f \uc0ad\uc81c<\/b><\/p>\n<p>\ub370\uc774\ud130\ub97c \uc815\uae30\uc801\uc73c\ub85c \ubc31\uc5c5\ud558\uace0 \ubcf5\uc6d0\ud558\ub294 \uae30\ub2a5\uc740 \ub79c\uc12c\uc6e8\uc5b4 \uacf5\uaca9 \ubc0f \uae30\ud0c0 \uc704\ud611\uc5d0 \ub300\ud55c \ud6a8\uacfc\uc801\uc778 \ubc29\uc5b4 \uc218\ub2e8\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4. \uc815\uae30\uc801\uc778 \ub370\uc774\ud130 \ubc31\uc5c5\uc744 \ud1b5\ud574 \ub370\uc774\ud130 \uc190\uc2e4 \ubc0f \ud6fc\uc190\uc73c\ub85c\ubd80\ud130 <a href=\"https:\/\/www.salesforce.com\/products\/platform\/solutions\/salesforce-backup\/\" target=\"_blank\" rel=\"noopener\">\uae30\uc5c5\uc744 \ubcf4\ud638<\/a>\ud558\uace0, \uc9c0\uc18d\uc801\uc778 \uc6b4\uc601\uacfc \uc548\uc2ec\uc744 \ubcf4\uc7a5\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\ub370\uc774\ud130\ub97c \ucd5c\uc18c\ud654\ud558\uac70\ub098 \uc800\uc7a5\ub41c \ub370\uc774\ud130\ub97c \uc81c\uac70\ud558\ub294 \uac83\uc740 <a href=\"https:\/\/www.salesforce.com\/products\/platform\/products\/privacy-center\/\" target=\"_blank\" rel=\"noopener\">\ub370\uc774\ud130 \uce68\ud574\uc640 \uad00\ub828\ub41c \uc704\ud5d8\uc744 \uc904\uc774\ub294\ub370<\/a> \ub3c4\uc6c0\uc774 \ub429\ub2c8\ub2e4. \uc874\uc7ac\ud558\uc9c0 \uc54a\ub294 \ub370\uc774\ud130\ub97c \ud574\ud0b9\ud558\ub294 \uac83\uc740 \ubd88\uac00\ub2a5\ud558\uae30 \ub54c\ubb38\uc785\ub2c8\ub2e4.<\/p>\n<p><b>7. \uc2e0\uc6d0 \ubc0f \uc561\uc138\uc2a4 \uad00\ub9ac<\/b><\/p>\n<p>\uc2e0\uc6d0 \ubc0f \uc561\uc138\uc2a4 \uad00\ub9ac(IAM) \ub3c4\uad6c\ub294 \ub300\uaddc\ubaa8 \uae30\uc5c5\uc758 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \ud544\uc218\uc801\uc778 \uad6c\uc131 \uc694\uc18c\uc785\ub2c8\ub2e4. \uc774\ub7ec\ud55c \ub3c4\uad6c\ub294 \uc0ac\uc6a9\uc790 \uc2e0\uc6d0\uc744 \ud6a8\uacfc\uc801\uc73c\ub85c \uad00\ub9ac \ubc0f \ubcf4\ud638\ud558\uace0 \uc911\uc694\ud55c \uc790\uc6d0\uc5d0 \ub300\ud55c \uc561\uc138\uc2a4\ub97c \ud1b5\uc81c\ud558\uba70 \ubbfc\uac10\ud55c \ub370\uc774\ud130\uc758 \uae30\ubc00\uc131, \ubb34\uacb0\uc131 \ubc0f \uac00\uc6a9\uc131\uc744 \ubcf4\uc7a5\ud558\ub294 \uacac\uace0\ud55c \ud504\ub808\uc784\uc6cc\ud06c\ub97c \uc81c\uacf5\ud569\ub2c8\ub2e4.<\/p>\n<p>IAM\uc758 \uc8fc\uc694 \uae30\ub2a5\uc5d0\ub294 \uc0ac\uc6a9\uc790 \uc778\uc99d, \uad8c\ud55c \ubd80\uc5ec \ubc0f \uc5ed\ud560 \uae30\ubc18 \uc561\uc138\uc2a4 \uc81c\uc5b4\uac00 \ud3ec\ud568\ub429\ub2c8\ub2e4. \uc774\ub294 \uc870\uc9c1\uc774 \uac15\ub825\ud55c \uc554\ud638 \uc815\ucc45\uc744 \uc2dc\ud589\ud558\uace0, \ub2e4\uc911 \uc778\uc99d\uc744 \uad6c\ud604\ud558\uba70, \uc0ac\uc6a9\uc790 \ud504\ub85c\ube44\uc800\ub2dd \ubc0f \ud504\ub85c\ube44\uc800\ub2dd \ud574\uc81c \ud504\ub85c\uc138\uc2a4\ub97c \uac04\uc18c\ud654\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub429\ub2c8\ub2e4. <a href=\"https:\/\/www.salesforce.com\/products\/platform\/products\/identity\/\" target=\"_blank\" rel=\"noopener\">IAM \uc194\ub8e8\uc158<\/a>\uc740 \ubb34\ub2e8 \uc561\uc138\uc2a4 \ubc0f \ub0b4\ubd80 \uc704\ud611\uc758 \uc704\ud5d8\uc744 \uac10\uc18c\uc2dc\ucf1c \ubcf4\uc548\uc744 \ud5a5\uc0c1\uc2dc\ud0a4\uba70, \uad81\uadf9\uc801\uc73c\ub85c \uae30\uc5c5\uc758 \ub514\uc9c0\ud138 \uc790\uc0b0\uc744 \ubcf4\ud638\ud558\uace0 \uaddc\uc815 \uc900\uc218\ub97c \ud655\ubcf4\ud569\ub2c8\ub2e4.<\/p>\n<p>\uc774\ub7ec\ud55c \ubaa8\ub4e0 \uc8fc\uc694 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc870\uce58\ub294 \uac15\ub825\ud55c \ubc29\uc5b4\ub97c \uad6c\ucd95\ud558\ub294 \ub370 \ud544\uc218\uc801\uc785\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \uc774\ub7ec\ud55c \uc194\ub8e8\uc158\uc744 \ub3c4\uc785\ud558\ub294 \uac83\uc740 \uc77c\ud68c\uc131 \ub178\ub825\uc5d0 \uadf8\uce58\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4. \ucd5c\uc2e0 <a href=\"https:\/\/www.salesforce.com\/products\/platform\/products\/shield\/\" target=\"_blank\" rel=\"noopener\">\ub370\uc774\ud130 \ubcf4\uc548<\/a> \uc704\ud5d8\uc5d0 \ub300\ube44\ud558\uae30 \uc704\ud574\uc11c\ub294 \uc815\uae30\uc801\uc778 \uc5c5\ub370\uc774\ud2b8\uc640 \ud328\uce58\uac00 \ud544\uc218\uc785\ub2c8\ub2e4.<\/p>\n<p>\uadf8\ub9ac\uace0 \uac15\ub825\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \ud504\ub85c\ud1a0\ucf5c\uc740 \uc9c0\uc18d\uc801\uc778 \uc778\ub825 \uad50\uc721\uc5d0 \uc758\uc874\ud558\ubbc0\ub85c, \uc704\ud611\uc774 \ubc1c\uc804\ud568\uc5d0 \ub530\ub77c \uc9c1\uc6d0\ub4e4\uc774 \uc870\uc9c1\uc744 \ubcf4\ud638\ud558\ub294 \ubc29\ubc95\uc744 \uc219\uc9c0\ud574\uc57c \ud569\ub2c8\ub2e4.<\/p>\n<p>\u00a0<\/p>\n<h2>\ub2e4\uc591\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc704\ud611<\/h2>\n<p>\ub514\uc9c0\ud138 \ub3c4\ub451, \uc0ac\uae30\uafbc, \ud574\ucee4\ub294 \ubaa8\ub450 \ud604\ub300\uc758 \ub9c8\uc220\uc0ac\uc640 \uac19\uc740 \ubaa9\ud45c\ub97c \uac00\uc9c0\uace0 \uc788\uc2b5\ub2c8\ub2e4. \ud558\uc9c0\ub9cc \uadf8\ub4e4\uc740 \ubaa8\uc790\uc5d0\uc11c \ud1a0\ub07c\ub97c \uaebc\ub0b4\ub294 \ub300\uc2e0 \ub514\uc9c0\ud138 \uc790\uc0b0\uc744 \ud6d4\uce58\uae30 \uc704\ud55c \uc18d\uc784\uc218\ub97c \uc0ac\uc6a9\ud569\ub2c8\ub2e4.<\/p>\n<p>\uadf8\ub9ac\uace0 \ud2b9\uc815 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc704\ud611\uacfc \uad00\ub828\ud558\uc5ec IT \ub9ac\ub354\ub4e4\uc740 \ud53c\uc2f1, \ub79c\uc12c\uc6e8\uc5b4, \uc11c\ube44\uc2a4 \uac70\ubd80(DoS) \ubc0f \ubd84\uc0b0 \uc11c\ube44\uc2a4 \uac70\ubd80(DDoS) \uacf5\uaca9\uc774\ub77c\ub294 <a href=\"https:\/\/www.salesforce.com\/content\/dam\/web\/en_us\/www\/documents\/platform\/top-data-security-trends.pdf\" target=\"_blank\" rel=\"noopener\">\uc138 \uac00\uc9c0 \uc8fc\uc694 \uad00\uc2ec\uc0ac<\/a>\ub97c \uac00\uc7a5 \uba3c\uc800 \uc5fc\ub450\uc5d0 \ub450\uace0 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p><b>1. \ud53c\uc2f1<\/b><\/p>\n<p>\ud53c\uc2f1\uc740 \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790\uac00 \ubb34\uc2ec\ucf54 \uc545\uc131 \uc774\uba54\uc77c\uc744 \uc5f4\uac70\ub098 \uc720\ud574 \ub9c1\ud06c\ub97c \ud074\ub9ad\ud558\uace0 \uba40\uc6e8\uc5b4(\uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4)\ub97c \ub2e4\uc6b4\ub85c\ub4dc\ud558\ub294 \ud53c\ud574\uc790\ub97c \ud3ec\ucc29\ud558\ub824\ub294 \ud589\uc704\uc785\ub2c8\ub2e4.<\/p>\n<p>\uc2a4\ud53c\uc5b4\ud53c\uc2f1\uc758 \uacbd\uc6b0, \uadf8\ub4e4\uc758 \ub178\ub825\uc740 \ub354\uc6b1 \ud45c\uc801\ud654\ub418\uc5b4 \uc788\uc73c\uba70 \ud2b9\uc815 \uac1c\uc778\uc5d0\uac8c \uc774\uba54\uc77c\uc774\ub098 \ub2e4\ub978 \uc811\ucd09\uc744 \uc870\uc791\ud558\uc5ec \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \ub3d9\ub8cc\ub098 \uc5f0\ub77d\ucc98\ub85c \uac00\uc7a5\ud569\ub2c8\ub2e4.<\/p>\n<p><b>2. \ub79c\uc12c\uc6e8\uc5b4<\/b><\/p>\n<p>\ub79c\uc12c\uc6e8\uc5b4\ub294 \ucef4\ud4e8\ud130 \uc2dc\uc2a4\ud15c\uc5d0 \uc561\uc138\uc2a4\ub97c \ubc29\ud574\ud558\uae30 \uc704\ud574 \ud574\ub2f9 \uc2dc\uc2a4\ud15c\uc744 \uc554\ud638\ud654\ud558\ub294 \uc545\uc131 \ucf54\ub4dc\uc758 \uc77c\uc885\uc785\ub2c8\ub2e4. \uacf5\uaca9\uc790\ub294 \ud53c\ud574\uc790\uc5d0\uac8c \uc790\uc2e0\uc758 \uc815\ubcf4\ub97c \uc7a0\uae08 \ud574\uc81c\ud558\uae30 \uc704\ud574 \ube44\uc2fc \uae08\uc804\uc744 \uc9c0\ubd88\ud558\ub3c4\ub85d \uc694\uad6c\ud569\ub2c8\ub2e4.<\/p>\n<p><b>3. DoS \ubc0f DDoS \uacf5\uaca9<\/b><\/p>\n<p>DoS(\uc11c\ube44\uc2a4 \uac70\ubd80) \ubc0f DDoS(\ubd84\uc0b0 \uc11c\ube44\uc2a4 \uac70\ubd80) \uacf5\uaca9\uc5d0\ub294 \uacfc\ub3c4\ud55c \uc694\uccad\uc744 \uc804\uc1a1\ud558\uc5ec \ub124\ud2b8\uc6cc\ud06c\ub97c \uc911\ub2e8\uc2dc\ud0a4\ub294 \uc791\uc5c5\uc774 \ud3ec\ud568\ub429\ub2c8\ub2e4. \uacb0\uacfc\uc801\uc73c\ub85c \ud569\ubc95\uc801\uc778 \uc0ac\uc6a9\uc790\uac00 \uc561\uc138\uc2a4\ud558\ub294 \uac83\uc774 \uc5b4\ub835\uac70\ub098 \uac70\uc758 \ubd88\uac00\ub2a5\ud569\ub2c8\ub2e4.<\/p>\n<p><b>4. \ub0b4\ubd80\uc790 \uc704\ud611<\/b><\/p>\n<p>\ub0b4\ubd80\uc790 \uc704\ud611\uc740 \uc9c1\uc6d0\uc774\ub098 \uc2dc\uc2a4\ud15c\uc5d0 \uc811\uadfc \uad8c\ud55c\uc774 \uc788\ub294 \uac1c\uc778\uc774 \uc2dc\uc2a4\ud15c\uc744 \uacf5\uaca9\uc5d0 \ub178\ucd9c\uc2dc\ud0ac \ub54c \uc6b0\ubc1c\uc801\uc73c\ub85c \ub610\ub294 \uc758\ub3c4\uc801\uc73c\ub85c \ubc1c\uc0dd\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\uc608\ub97c \ub4e4\uc5b4, \uc6b0\ubc1c\uc801 \uce68\ud574\ub294 \uc9c1\uc6d0\uc758 \ub178\ud2b8\ubd81\uc774 \ub3c4\ub09c\ub2f9\ud558\uc5ec \ub3c4\ub09c\uc790\uac00 \uc791\uc5c5 \uc815\ubcf4\uc5d0 \uc811\uadfc\ud560 \uc218 \uc788\ub294 \uacbd\uc6b0\uc5d0 \ubc1c\uc0dd\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\uc758\ub3c4\uc801 \uce68\ud574\ub294 \uc870\uc9c1 \ub0b4\uc5d0\uc11c \uc545\uc758\uc801\uc778 \uc9c1\uc6d0\uc774 \ub124\ud2b8\uc6cc\ud06c\ub97c \uace0\uc758\ub85c \uac10\uc5fc\uc2dc\ud0a4\uac70\ub098 \ub2e4\ub978 \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790\ub4e4\uc5d0\uac8c \uc5d1\uc138\uc2a4\ub97c \ud5c8\uc6a9\ud558\uac70\ub098 \ub3c5\uc810 \uc815\ubcf4\ub97c \uacf5\uc720\ud560 \ub54c \ubc1c\uc0dd\ud569\ub2c8\ub2e4.<\/p>\n<p><b>5. \uacf5\uae09\ub9dd \uacf5\uaca9<\/b><\/p>\n<p>\uc5ec\ub7ec\ubd84\uc740 <a href=\"https:\/\/www.salesforce.com\/products\/platform\/solutions\/data-management\/\" target=\"_blank\" rel=\"noopener\">\ub370\uc774\ud130 \uad00\ub9ac \ubcf4\uc548<\/a>\uc744 \ucca0\uc800\ud788 \uad00\ub9ac\ud560 \uc218 \uc788\uc9c0\ub9cc \uc81c3\uc790 \uacf5\uae09\uc5c5\uccb4 \uc5ed\uc2dc \uc5ec\ub7ec\ubd84\uacfc \uac19\uc744\uae4c\uc694? \uacf5\uae09\ub9dd \uacf5\uaca9\uc740 \ud574\ucee4\uac00 \uacf5\uae09\uc5c5\uccb4\uc758 \ubcf4\uc548 \uaddc\uc815\uc5d0\uc11c \ucde8\uc57d\uc810\uc744 \ubc1c\uacac\ud558\uace0, \uadf8 \ud2c8\uc0c8\ub85c \uc5ec\ub7ec\ubd84\uc758 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uce68\ud22c\ud558\uc5ec \ud53c\ud574\ub97c \uc785\ud788\ub294 \uacbd\uc6b0\uc5d0 \ubc1c\uc0dd\ud569\ub2c8\ub2e4.<\/p>\n<p>\u00a0<\/p>\n<h2>\uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \uc778\uacf5\uc9c0\ub2a5\uc774 \uc0ac\uc6a9\ub418\ub294 \ubc29\ubc95<\/h2>\n<p>\ub354\uc6b1 \ub9ce\uc740 \uae30\uc5c5\uc774 AI \ub3c4\uad6c\ub97c \ub3c4\uc785\ud558\uac8c \ub418\uba74\uc11c, \uc778\uacf5\uc9c0\ub2a5 \uae30\uc220\uc774 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \uc0c8\ub85c\uc6b4 \uc704\ud5d8\uacfc \ub3c4\uc804\uc744 \uc81c\uacf5\ud55c\ub2e4\ub294 \uc810\uc744 \uc778\uc2dd\ud558\ub294 \uac83\uc774 \uc911\uc694\ud569\ub2c8\ub2e4. \uc5ec\ub7ec\ubd84\uc740 \ub04a\uc784\uc5c6\uc774 \uc9c4\ud654\ud558\ub294 \ub514\uc9c0\ud138 \ud658\uacbd\uc5d0 \ub300\uc751\ud560 \uc218 \uc788\ub294 <a href=\"https:\/\/developer.salesforce.com\/blogs\/2023\/06\/5-steps-to-trusted-generative-ai-for-salesforce-developers?_ga=2.14472823.1116733520.1706575046-239753925.1690439890\" target=\"_blank\" rel=\"noopener\">\uac15\ub825\ud55c \ub370\uc774\ud130 \ubcf4\ud638 \uc870\uce58\ub97c \uad6c\ud604<\/a>\ud574\uc57c \ud569\ub2c8\ub2e4.<\/p>\n<p>\ub2e4\ub978 \ud55c\ud3b8\uc73c\ub85c\ub294 AI\uac00 \uc0ac\uc774\ubc84 \uacf5\uaca9 \uac10\uc9c0 \ubc0f \ub300\uc751 \ub178\ub825\uc744 \uc790\ub3d9\ud654\ud558\ub294 \ub370 <a href=\"https:\/\/www.salesforce.com\/blog\/build-a-customer-company-with-it\/\" target=\"_blank\" rel=\"noopener\">\uc911\ucd94\uc801\uc778 \uc5ed\ud560<\/a>\uc744 \ud569\ub2c8\ub2e4. \uc704\ud611\uc758 \uc218\uac00 \uacc4\uc18d \uc99d\uac00\ud568\uc5d0 \ub530\ub77c <a href=\"https:\/\/www.salesforce.com\/news\/stories\/what-is-generative-ai\/\" target=\"_blank\" rel=\"noopener\">AI \ub3c4\uad6c<\/a>\ub294 \uc9c0\uc18d\uc801\uc73c\ub85c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc704\ud611\uc744 \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c \uc2a4\uce94\ud558\uace0 \uc194\ub8e8\uc158\uc744 \uac1c\ubc1c\ud558\uba70, \ubbfc\uac10\ud55c \ub370\uc774\ud130\uac00 \uc190\uc0c1\ub418\uae30 \uc804\uc5d0 \uc2e0\uc18d\ud558\uac8c \ub300\uc751\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc774 \uc704\ud5d8\ud55c \uac8c\uc784\uc5d0\uc11c \uc9c0\uc2dd\uc740 \uc808\ub300\uc801\uc778 \ud798\uc785\ub2c8\ub2e4.<\/p>\n<p>AI\ub97c \ud1b5\ud574 \uc704\ud611\uc744 \uac10\uc9c0\ud558\uace0 \ud3c9\uac00\ud558\ub294 <a href=\"https:\/\/www.salesforce.com\/kr\/products\/platform\/workflow-automation\/\" target=\"_blank\" rel=\"noopener\">\uc5c5\ubb34 \uc790\ub3d9\ud654 \ub3c4\uad6c<\/a>\ub294 \uc804\uc138\uacc4\uc801\uc73c\ub85c <a href=\"https:\/\/www.prnewswire.com\/news-releases\/isc-research-reveals-the-cybersecurity-profession-needs-to-grow-by-3-4-million-people-to-close-global-workforce-gap-301654730.html\" target=\"_blank\" rel=\"noopener\">3-4\ubc31\ub9cc \uba85\uc774\ub098 \ubd80\uc871<\/a>\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc804\ubb38\uac00\ub85c \uc778\ud574 \ubc1c\uc0dd\ud558\ub294 \uaca9\ucc28\ub97c \uadf9\ubcf5\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\u00a0<\/p>\n<h2>\ubbf8\ub798\ub97c \ub300\ube44\ud558\ub294 \ubc14\uc774\ud2b8 \ub2e8\uc704 \ubcf4\uc548<\/h2>\n<p>\ub514\uc9c0\ud138 \ub124\ud2b8\uc6cc\ud06c\uc640 \uc628\ub77c\uc778 \ud658\uacbd\uc774 \uacc4\uc18d \uc131\uc7a5\ud568\uc5d0 \ub530\ub77c, \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc218\uce59\uc740 \uc870\uc9c1\uc774 \uad00\ub9ac\ud558\ub294 \ubbfc\uac10\ud558\uace0 \ud575\uc2ec\uc801\uc778 \uc815\ubcf4\ub97c \ubcf4\ud638\ud558\uae30 \uc704\ud574 \uc801\uc751\ud574\uc57c \ud569\ub2c8\ub2e4.<\/p>\n<p>\uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790\uac00 \ub354\uc6b1 \uc815\uad50\ud574\uc9c0\uace0 \uaddc\uc81c\uc5d0 \ub300\ud55c \uae30\ub300\uac00 \uc99d\uac00\ud568\uc5d0 \ub530\ub77c, \uc778\uacf5\uc9c0\ub2a5 \ubc0f \uba38\uc2e0\ub7ec\ub2dd\uacfc \uac19\uc740 \uc0c8\ub85c\uc6b4 \uae30\uc220\uc758 \uc5ed\ud560\uc740 \ub354\uc6b1 \uc911\uc694\ud574\uc9c0\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uae30\uc220\uc740 \ud655\uc7a5\ub41c \uc704\ud611 \ud658\uacbd\uc744 \ubaa8\ub2c8\ud130\ub9c1\ud558\uace0 \uc0c8\ub85c\uc6b4 \uc704\ud5d8\uc5d0 \uc801\uc751\ud558\ub294\ub370 \ub3c4\uc6c0\uc774 \ub429\ub2c8\ub2e4.<\/p>\n<p>\ub354\ubd88\uc5b4 \uc778\uac04\uc801\uc778 \uc694\uc18c\ub3c4 \ub9e4\uc6b0 \uc911\uc694\ud569\ub2c8\ub2e4. \uc5ec\ub7ec\ubd84\uc758 IT \ud300\ubd80\ud130 \uc77c\ubc18 \uc9c1\uc6d0, \uacf5\uae09\uc5c5\uccb4 \ubc0f \ud611\ub825\uc0ac\uae4c\uc9c0 \ubaa8\ub450\uac00 \uc704\ud5d8\uc5d0 \ub300\ud574 \uc219\uc9c0\ud558\uace0 \ubaa8\ubc94\uc801\uc778 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc218\uce59\uc744 \uc801\uadf9\uc801\uc73c\ub85c \uc720\uc9c0\ud574\uc57c \ud569\ub2c8\ub2e4.<\/p>\n<p>\uc5ed\ub3d9\uc801\uc778 \ub514\uc9c0\ud138 \uc138\uacc4\uc5d0\uc11c \uae30\uc220\uacfc \uc778\uac04\uc758 \uacbd\uacc4\uc2ec\uc758 \ud611\ub825\uc740 \uc131\uc7a5\ud558\ub294 \uc0ac\uc774\ubc84 \uc704\ud611\uc5d0 \ub300\ud56d\ud558\uae30 \uc704\ud55c \ucd5c\uace0\uc758 \ubc29\uc5b4 \uc218\ub2e8\uc785\ub2c8\ub2e4.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\uc0ac\uc774\ubc84 \ubcf4\uc548\uc740 \ub0b4\u00b7\uc678\ubd80 \ub514\uc9c0\ud138 \uc704\ud611\uc73c\ub85c\ubd80\ud130 \uc870\uc9c1\uc744 \ubc29\uc5b4\ud558\uace0, \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc5d0 \ub300\ube44\ud558\uc5ec \ub370\uc774\ud130\ubfd0\ub9cc \uc544\ub2c8\ub77c \ube44\uc988\ub2c8\uc2a4\uc640 \ud3c9\ud310\uc744 \ubcf4\ud638\ud558\ub294 \uc5ed\ud560\uc744 \ud569\ub2c8\ub2e4. \ud6a8\uacfc\uc801\uc778 \ubcf4\uc548 \uc870\uce58\ub294 \uc790\uc0b0, \uace0\uac1d \ubc0f \ube0c\ub79c\ub4dc\ub97c \ubcf4\ud638\ud558\uace0 \uc870\uc9c1\uc758 \ud0c4\ub825\uc131\uacfc \uc2e0\ub8b0\uc131\uc744 \uac15\ud654\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub2e4\uc74c \uae00\uc744&hellip;<\/p>\n","protected":false},"author":1,"featured_media":429,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sf_justforyou_enable_alt":true,"optimizely_content_id":"","post_meta_title":"","ai_synopsis":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"sf_content_type":[],"blog":[84,174,24],"coauthors":[8],"class_list":["post-430","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","blog-it","blog-security","blog-trust"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\uc0ac\uc774\ubc84 \ubcf4\uc548(Cybersecurity)\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc815\uc758\uc640 \uc804\ub7b5 \uac00\uc774\ub4dc- \uc138\uc77c\uc988\ud3ec\uc2a4 - Salesforce<\/title>\n<meta name=\"description\" content=\"\uc0ac\uc774\ubc84 \ubcf4\uc548\uc774\ub780 \ubb34\uc5c7\uc774\uba70 \ube44\uc988\ub2c8\uc2a4\uc5d0 \uc65c \uc911\uc694\ud560\uae4c\uc694? \ub79c\uc12c\uc6e8\uc5b4, \ud53c\uc2f1 \ub4f1 \uc9c4\ud654\ud558\ub294 \uc704\ud611\uc73c\ub85c\ubd80\ud130 \uae30\uc5c5\uc758 \uac00\uc7a5 \uc18c\uc911\ud55c \uc790\uc0b0\uc778 &#039;\uace0\uac1d \ub370\uc774\ud130&#039;\ub97c \uc548\uc804\ud558\uac8c \uc9c0\ud0a4\ub294 \ubc29\ubc95\uc744 \uc18c\uac1c\ud569\ub2c8\ub2e4. \ud074\ub77c\uc6b0\ub4dc \ud658\uacbd\uc5d0\uc11c\uc758 \ud544\uc218 \ubcf4\uc548 \uc218\uce59\uacfc \uc138\uc77c\uc988\ud3ec\uc2a4\uc758 \uac15\ub825\ud55c \ubcf4\uc548 \uc804\ub7b5\uc744 \ud655\uc778\ud558\uc138\uc694.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\uc0ac\uc774\ubc84 \ubcf4\uc548(Cybersecurity)\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc815\uc758\uc640 \uc804\ub7b5 \uac00\uc774\ub4dc\" \/>\n<meta property=\"og:description\" content=\"\uc0ac\uc774\ubc84 \ubcf4\uc548\uc774\ub780 \ubb34\uc5c7\uc774\uba70 \ube44\uc988\ub2c8\uc2a4\uc5d0 \uc65c \uc911\uc694\ud560\uae4c\uc694? \ub79c\uc12c\uc6e8\uc5b4, \ud53c\uc2f1 \ub4f1 \uc9c4\ud654\ud558\ub294 \uc704\ud611\uc73c\ub85c\ubd80\ud130 \uae30\uc5c5\uc758 \uac00\uc7a5 \uc18c\uc911\ud55c \uc790\uc0b0\uc778 &#039;\uace0\uac1d \ub370\uc774\ud130&#039;\ub97c \uc548\uc804\ud558\uac8c \uc9c0\ud0a4\ub294 \ubc29\ubc95\uc744 \uc18c\uac1c\ud569\ub2c8\ub2e4. \ud074\ub77c\uc6b0\ub4dc \ud658\uacbd\uc5d0\uc11c\uc758 \ud544\uc218 \ubcf4\uc548 \uc218\uce59\uacfc \uc138\uc77c\uc988\ud3ec\uc2a4\uc758 \uac15\ub825\ud55c \ubcf4\uc548 \uc804\ub7b5\uc744 \ud655\uc778\ud558\uc138\uc694.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-12T20:23:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-26T12:01:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.salesforce.com\/kr\/blog\/wp-content\/uploads\/sites\/31\/2025\/11\/cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Salesforce Korea\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Salesforce Korea\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/\"},\"author\":[{\"@id\":\"https:\/\/www.salesforce.com\/kr\/blog\/#\/schema\/person\/image\/6a2eaeaff1fe89a20af388fa12e0a8d6\"}],\"headline\":\"\uc0ac\uc774\ubc84 \ubcf4\uc548(Cybersecurity)\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc815\uc758\uc640 \uc804\ub7b5 \uac00\uc774\ub4dc\",\"datePublished\":\"2025-11-12T20:23:19+00:00\",\"dateModified\":\"2025-12-26T12:01:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/\"},\"wordCount\":23,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/kr\/blog\/wp-content\/uploads\/sites\/31\/2025\/11\/cybersecurity.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/\",\"url\":\"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/\",\"name\":\"\uc0ac\uc774\ubc84 \ubcf4\uc548(Cybersecurity)\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc815\uc758\uc640 \uc804\ub7b5 \uac00\uc774\ub4dc- \uc138\uc77c\uc988\ud3ec\uc2a4 - Salesforce\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/kr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/kr\/blog\/wp-content\/uploads\/sites\/31\/2025\/11\/cybersecurity.jpg\",\"datePublished\":\"2025-11-12T20:23:19+00:00\",\"dateModified\":\"2025-12-26T12:01:23+00:00\",\"author\":{\"@id\":\"https:\/\/www.salesforce.com\/kr\/blog\/#\/schema\/person\/601f410a2801f4ddcf6f00cb182e69d3\"},\"description\":\"\uc0ac\uc774\ubc84 \ubcf4\uc548\uc774\ub780 \ubb34\uc5c7\uc774\uba70 \ube44\uc988\ub2c8\uc2a4\uc5d0 \uc65c \uc911\uc694\ud560\uae4c\uc694? \ub79c\uc12c\uc6e8\uc5b4, \ud53c\uc2f1 \ub4f1 \uc9c4\ud654\ud558\ub294 \uc704\ud611\uc73c\ub85c\ubd80\ud130 \uae30\uc5c5\uc758 \uac00\uc7a5 \uc18c\uc911\ud55c \uc790\uc0b0\uc778 '\uace0\uac1d \ub370\uc774\ud130'\ub97c \uc548\uc804\ud558\uac8c \uc9c0\ud0a4\ub294 \ubc29\ubc95\uc744 \uc18c\uac1c\ud569\ub2c8\ub2e4. \ud074\ub77c\uc6b0\ub4dc \ud658\uacbd\uc5d0\uc11c\uc758 \ud544\uc218 \ubcf4\uc548 \uc218\uce59\uacfc \uc138\uc77c\uc988\ud3ec\uc2a4\uc758 \uac15\ub825\ud55c \ubcf4\uc548 \uc804\ub7b5\uc744 \ud655\uc778\ud558\uc138\uc694.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/kr\/blog\/wp-content\/uploads\/sites\/31\/2025\/11\/cybersecurity.jpg\",\"contentUrl\":\"https:\/\/www.salesforce.com\/kr\/blog\/wp-content\/uploads\/sites\/31\/2025\/11\/cybersecurity.jpg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.salesforce.com\/kr\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\uc0ac\uc774\ubc84 \ubcf4\uc548(Cybersecurity)\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc815\uc758\uc640 \uc804\ub7b5 \uac00\uc774\ub4dc\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/kr\/blog\/#website\",\"url\":\"https:\/\/www.salesforce.com\/kr\/blog\/\",\"name\":\"Salesforce\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/kr\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.salesforce.com\/kr\/blog\/#\/schema\/person\/image\/6a2eaeaff1fe89a20af388fa12e0a8d6\",\"name\":\"Salesforce Korea\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g23494c9101089ad44ae88ce9d2f56aac\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"caption\":\"Salesforce Korea\"},\"url\":\"https:\/\/www.salesforce.com\/kr\/blog\/author\/salesforce\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\uc0ac\uc774\ubc84 \ubcf4\uc548(Cybersecurity)\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc815\uc758\uc640 \uc804\ub7b5 \uac00\uc774\ub4dc- \uc138\uc77c\uc988\ud3ec\uc2a4 - Salesforce","description":"\uc0ac\uc774\ubc84 \ubcf4\uc548\uc774\ub780 \ubb34\uc5c7\uc774\uba70 \ube44\uc988\ub2c8\uc2a4\uc5d0 \uc65c \uc911\uc694\ud560\uae4c\uc694? \ub79c\uc12c\uc6e8\uc5b4, \ud53c\uc2f1 \ub4f1 \uc9c4\ud654\ud558\ub294 \uc704\ud611\uc73c\ub85c\ubd80\ud130 \uae30\uc5c5\uc758 \uac00\uc7a5 \uc18c\uc911\ud55c \uc790\uc0b0\uc778 '\uace0\uac1d \ub370\uc774\ud130'\ub97c \uc548\uc804\ud558\uac8c \uc9c0\ud0a4\ub294 \ubc29\ubc95\uc744 \uc18c\uac1c\ud569\ub2c8\ub2e4. \ud074\ub77c\uc6b0\ub4dc \ud658\uacbd\uc5d0\uc11c\uc758 \ud544\uc218 \ubcf4\uc548 \uc218\uce59\uacfc \uc138\uc77c\uc988\ud3ec\uc2a4\uc758 \uac15\ub825\ud55c \ubcf4\uc548 \uc804\ub7b5\uc744 \ud655\uc778\ud558\uc138\uc694.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"\uc0ac\uc774\ubc84 \ubcf4\uc548(Cybersecurity)\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc815\uc758\uc640 \uc804\ub7b5 \uac00\uc774\ub4dc","og_description":"\uc0ac\uc774\ubc84 \ubcf4\uc548\uc774\ub780 \ubb34\uc5c7\uc774\uba70 \ube44\uc988\ub2c8\uc2a4\uc5d0 \uc65c \uc911\uc694\ud560\uae4c\uc694? \ub79c\uc12c\uc6e8\uc5b4, \ud53c\uc2f1 \ub4f1 \uc9c4\ud654\ud558\ub294 \uc704\ud611\uc73c\ub85c\ubd80\ud130 \uae30\uc5c5\uc758 \uac00\uc7a5 \uc18c\uc911\ud55c \uc790\uc0b0\uc778 '\uace0\uac1d \ub370\uc774\ud130'\ub97c \uc548\uc804\ud558\uac8c \uc9c0\ud0a4\ub294 \ubc29\ubc95\uc744 \uc18c\uac1c\ud569\ub2c8\ub2e4. \ud074\ub77c\uc6b0\ub4dc \ud658\uacbd\uc5d0\uc11c\uc758 \ud544\uc218 \ubcf4\uc548 \uc218\uce59\uacfc \uc138\uc77c\uc988\ud3ec\uc2a4\uc758 \uac15\ub825\ud55c \ubcf4\uc548 \uc804\ub7b5\uc744 \ud655\uc778\ud558\uc138\uc694.","og_url":"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/","og_site_name":"Salesforce","article_published_time":"2025-11-12T20:23:19+00:00","article_modified_time":"2025-12-26T12:01:23+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/www.salesforce.com\/kr\/blog\/wp-content\/uploads\/sites\/31\/2025\/11\/cybersecurity.jpg","type":"image\/jpeg"}],"author":"Salesforce Korea","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Salesforce Korea","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/"},"author":[{"@id":"https:\/\/www.salesforce.com\/kr\/blog\/#\/schema\/person\/image\/6a2eaeaff1fe89a20af388fa12e0a8d6"}],"headline":"\uc0ac\uc774\ubc84 \ubcf4\uc548(Cybersecurity)\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc815\uc758\uc640 \uc804\ub7b5 \uac00\uc774\ub4dc","datePublished":"2025-11-12T20:23:19+00:00","dateModified":"2025-12-26T12:01:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/"},"wordCount":23,"commentCount":0,"image":{"@id":"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/kr\/blog\/wp-content\/uploads\/sites\/31\/2025\/11\/cybersecurity.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/","url":"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/","name":"\uc0ac\uc774\ubc84 \ubcf4\uc548(Cybersecurity)\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc815\uc758\uc640 \uc804\ub7b5 \uac00\uc774\ub4dc- \uc138\uc77c\uc988\ud3ec\uc2a4 - Salesforce","isPartOf":{"@id":"https:\/\/www.salesforce.com\/kr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/kr\/blog\/wp-content\/uploads\/sites\/31\/2025\/11\/cybersecurity.jpg","datePublished":"2025-11-12T20:23:19+00:00","dateModified":"2025-12-26T12:01:23+00:00","author":{"@id":"https:\/\/www.salesforce.com\/kr\/blog\/#\/schema\/person\/601f410a2801f4ddcf6f00cb182e69d3"},"description":"\uc0ac\uc774\ubc84 \ubcf4\uc548\uc774\ub780 \ubb34\uc5c7\uc774\uba70 \ube44\uc988\ub2c8\uc2a4\uc5d0 \uc65c \uc911\uc694\ud560\uae4c\uc694? \ub79c\uc12c\uc6e8\uc5b4, \ud53c\uc2f1 \ub4f1 \uc9c4\ud654\ud558\ub294 \uc704\ud611\uc73c\ub85c\ubd80\ud130 \uae30\uc5c5\uc758 \uac00\uc7a5 \uc18c\uc911\ud55c \uc790\uc0b0\uc778 '\uace0\uac1d \ub370\uc774\ud130'\ub97c \uc548\uc804\ud558\uac8c \uc9c0\ud0a4\ub294 \ubc29\ubc95\uc744 \uc18c\uac1c\ud569\ub2c8\ub2e4. \ud074\ub77c\uc6b0\ub4dc \ud658\uacbd\uc5d0\uc11c\uc758 \ud544\uc218 \ubcf4\uc548 \uc218\uce59\uacfc \uc138\uc77c\uc988\ud3ec\uc2a4\uc758 \uac15\ub825\ud55c \ubcf4\uc548 \uc804\ub7b5\uc744 \ud655\uc778\ud558\uc138\uc694.","breadcrumb":{"@id":"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/#primaryimage","url":"https:\/\/www.salesforce.com\/kr\/blog\/wp-content\/uploads\/sites\/31\/2025\/11\/cybersecurity.jpg","contentUrl":"https:\/\/www.salesforce.com\/kr\/blog\/wp-content\/uploads\/sites\/31\/2025\/11\/cybersecurity.jpg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.salesforce.com\/kr\/blog\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.salesforce.com\/kr\/blog\/"},{"@type":"ListItem","position":2,"name":"\uc0ac\uc774\ubc84 \ubcf4\uc548(Cybersecurity)\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc815\uc758\uc640 \uc804\ub7b5 \uac00\uc774\ub4dc"}]},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/kr\/blog\/#website","url":"https:\/\/www.salesforce.com\/kr\/blog\/","name":"Salesforce","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/kr\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.salesforce.com\/kr\/blog\/#\/schema\/person\/image\/6a2eaeaff1fe89a20af388fa12e0a8d6","name":"Salesforce Korea","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g23494c9101089ad44ae88ce9d2f56aac","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"Salesforce Korea"},"url":"https:\/\/www.salesforce.com\/kr\/blog\/author\/salesforce\/"}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/kr\/blog\/wp-content\/uploads\/sites\/31\/2025\/11\/cybersecurity.jpg","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/kr\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.salesforce.com\/kr\/blog\/wp-json\/wp\/v2\/posts\/430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/kr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/kr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/kr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/kr\/blog\/wp-json\/wp\/v2\/comments?post=430"}],"version-history":[{"count":3,"href":"https:\/\/www.salesforce.com\/kr\/blog\/wp-json\/wp\/v2\/posts\/430\/revisions"}],"predecessor-version":[{"id":1455,"href":"https:\/\/www.salesforce.com\/kr\/blog\/wp-json\/wp\/v2\/posts\/430\/revisions\/1455"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/kr\/blog\/wp-json\/wp\/v2\/media\/429"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/kr\/blog\/wp-json\/wp\/v2\/media?parent=430"}],"wp:term":[{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/kr\/blog\/wp-json\/wp\/v2\/sf_content_type?post=430"},{"taxonomy":"blog","embeddable":true,"href":"https:\/\/www.salesforce.com\/kr\/blog\/wp-json\/wp\/v2\/blog?post=430"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/kr\/blog\/wp-json\/wp\/v2\/coauthors?post=430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}