{"id":246,"date":"2024-12-05T12:11:24","date_gmt":"2024-12-05T03:11:24","guid":{"rendered":"https:\/\/guide.jinbo.net\/digital-security-2024\/?page_id=246"},"modified":"2024-12-16T13:19:19","modified_gmt":"2024-12-16T04:19:19","slug":"2024-%eb%94%94%ec%a7%80%ed%84%b8-%eb%b3%b4%ec%95%88-%ea%b0%80%ec%9d%b4%eb%93%9c","status":"publish","type":"page","link":"https:\/\/guide.jinbo.net\/digital-security-2024\/","title":{"rendered":"2024 \ub514\uc9c0\ud138 \ubcf4\uc548 \uac00\uc774\ub4dc"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">2024 \ub514\uc9c0\ud138 \ubcf4\uc548 \uac00\uc774\ub4dc<\/h1>\n\n\n\n<p class=\"back\"><a href=\"https:\/\/act.jinbo.net\/wp\/wp-content\/uploads\/2024\/12\/2024-%EB%94%94%EC%A7%80%ED%84%B8-%EB%B3%B4%EC%95%88%EA%B0%80%EC%9D%B4%EB%93%9C.pdf\" data-type=\"URL\" data-id=\"https:\/\/act.jinbo.net\/wp\/wp-content\/uploads\/2024\/12\/2024-%EB%94%94%EC%A7%80%ED%84%B8-%EB%B3%B4%EC%95%88%EA%B0%80%EC%9D%B4%EB%93%9C.pdf\">2024 \ub514\uc9c0\ud138 \ubcf4\uc548 \uac00\uc774\ub4dc PDF \ud30c\uc77c \ub2e4\uc6b4 \ubc1b\uae30<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/guide.jinbo.net\/digital-security\/\" data-type=\"URL\" data-id=\"https:\/\/guide.jinbo.net\/digital-security\/\">2015\ub144 8\uc6d4 \uc9c4\ubcf4\ub124\ud2b8\uc6cc\ud06c\uc13c\ud130\uc640 \uc815\ubcf4\uc778\uad8c\uc5f0\uad6c\uc18c\uc758 \u201c\ub514\uc9c0\ud138\ubcf4\uc548 \uac00\uc774\ub4dc\ubd81 &lt;\uad6d\uac00\uac10\uc2dc\ub85c\ubd80\ud130 \uc790\uc2e0\uc744 \ubcf4\ud638\ud558\ub294 \ubc29\ubc95&gt;\u201d \ubc1c\ud589 \ud6c4 10\ub144\uc774 \ub418\uc5b4\uac11\ub2c8\ub2e4.<\/a> \uc0dd\uc131\ud615 \uc778\uacf5\uc9c0\ub2a5, \ud074\ub77c\uc6b0\ub4dc \ud611\uc5c5 \ud234\uc774 \uc2dc\ubbfc\ub4e4\uc758 \uc77c\uc0c1, \uc2dc\ubbfc\uc0ac\ud68c\ub2e8\uccb4\uc758 \uc5c5\ubb34\uc5d0 \uc2a4\uba70\ub4e4\uc5c8\uc2b5\ub2c8\ub2e4. \ud65c\ub3d9\uac00\ub4e4\uc5d0\uac8c \uc2a4\ub9c8\ud2b8\ud3f0, \uba54\uc2e0\uc800, \ud611\uc5c5 \ub3c4\uad6c, \ud074\ub77c\uc6b0\ub4dc \ub4f1\uc740 \ub354 \uc774\uc0c1 \ub0af\uc124\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4. \ud558\uc9c0\ub9cc \uc0c8\ub85c\uc6b4 \ub3c4\uad6c\uc5d0 \ub9de\ucdb0 \uaf2d \uc54c\uc544\uc57c \ud560 \ub514\uc9c0\ud138 \ubcf4\uc548 \uac1c\ub150\uc740 \uc5ec\uc804\ud788 \ub0af\uc124\uace0 \uc5b4\ub835\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>2024\ub144\uc758 \uac00\uc774\ub4dc\ub294 2015\ub144\uc758 \uac00\uc774\ub4dc \ubc0f EFF(Electronic Frontier Foundation)\uc758 SSD(Surveillance Self-Defence), Front Line Defenders\uc758 Security in a Box \ub4f1\uc758 \uac00\uc774\ub4dc\ub97c \ucd9c\ubc1c\uc810\uc73c\ub85c \ub9ce\uc740 \ub0b4\uc6a9\uc744 \uc7ac\uad6c\uc131\ud569\ub2c8\ub2e4. \ub514\uc9c0\ud138 \ubcf4\uc548 \uac00\uc774\ub4dc\ub97c \ubbf8\ub9ac \uc219\uc9c0\ud558\uae30 \uc5b4\ub824\uc6cc\ub3c4 \ucd5c\uc18c\ud55c \uc774\uac83\ub9cc\uc740 \uc54c\uc544\uc57c \ud55c\ub2e4\ub294 \uac83\uc744 \uccb4\ud06c\ub9ac\uc2a4\ud2b8\ub85c \uc18c\uac1c\ud558\uace0, \ub3cc\ubc1c \uc0c1\ud669\uc5d0 \ube60\ub974\uac8c \ub300\ucc98\ud560 \ubc29\ubc95\uc744 \ub2e8\uacc4\uc801\uc73c\ub85c \ucc3e\uc744 \uc218 \uc788\ub3c4\ub85d \ubc30\uce58\ud558\uc600\uc2b5\ub2c8\ub2e4. \ud604\uc7ac\uc5d0 \ub9de\uc9c0 \uc54a\ub294 \ub0b4\uc6a9\uc740 \uacfc\uac10\ud788 \ub35c\uc5b4\ub0b4\uace0, \ud55c\uad6d \uc2dc\ubbfc\uc0ac\ud68c\ub2e8\uccb4\uc5d0\uc11c \ub9ce\uc774 \uc0ac\uc6a9\ub418\ub294 \ud074\ub77c\uc6b0\ub4dc \ud611\uc5c5 \ub3c4\uad6c\uc5d0 \ub300\ud55c \ub0b4\uc6a9\uacfc \u201c\uc6a9\uc5b4\u201d\uc5d0 \ub300\ud55c \uc124\uba85\uc744 \uc27d\uace0 \ube60\ub974\uac8c \ucc3e\uc544\ubcfc \uc218 \uc788\ub3c4\ub85d \ud558\ub294 \ub370 \ucd08\uc810\uc744 \ub9de\ucd94\uc5c8\uc2b5\ub2c8\ub2e4.&nbsp;<\/p>\n\n\n\n<p>\ubaa8\ub4e0 \uc0ac\ub78c\uc774 \ub611\uac19\uc740 \uc218\uc900\uc758 \ubcf4\uc548\uc744 \ud560 \ud544\uc694\ub294 \uc5c6\uc2b5\ub2c8\ub2e4. \uc704\ud611\uc758 \uc885\ub958\uc640 \uc815\ub3c4\ub294 \uc0ac\ub78c\ub4e4\ub9c8\ub2e4 \ub2e4\ub985\ub2c8\ub2e4. \uadf8\ub798\uc11c \uc801\uc808\ud55c \ubcf4\uc548\uc744 \uc704\ud574\uc11c\ub294 \uc790\uc2e0\uc758 \uc0c1\ud669\uc744 \uc798 \ud30c\uc545\ud560 \ud544\uc694\uac00 \uc788\uc2b5\ub2c8\ub2e4. \ubcf4\uc548\uc5d0 \ub300\ud55c \uc9c0\uc2dd\uc744 \ub9ce\uc774 \uac16\uace0 \uc788\uc744\uc218\ub85d, \uc790\uc2e0\uc5d0\uac8c \uc801\ud569\ud55c \uc218\uc900\uc758 \ubcf4\uc548 \uc870\uce58\ub97c \ucde8\ud560 \uc218 \uc788\uc744 \uac83\uc785\ub2c8\ub2e4. \uc774 \uac00\uc774\ub4dc\uac00 \uc2dc\ubbfc\uc0ac\ud68c\ub2e8\uccb4 \ud65c\ub3d9\uac00\ub97c \ube44\ub86f\ud55c \ub514\uc9c0\ud138 \ubcf4\uc548\uc744 \uc6d0\ud558\ub294 \ubaa8\ub4e0 \uc2dc\ubbfc\uc5d0\uac8c \ub3c4\uc6c0\uc774 \ub418\uae30\ub97c \ubc14\ub78d\ub2c8\ub2e4.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2024 \ub514\uc9c0\ud138 \ubcf4\uc548 \uac00\uc774\ub4dc 2024 \ub514\uc9c0\ud138 \ubcf4\uc548 \uac00\uc774\ub4dc PDF \ud30c\uc77c \ub2e4\uc6b4 \ubc1b\uae30 2015\ub144 8\uc6d4 \uc9c4\ubcf4\ub124\ud2b8\uc6cc\ud06c\uc13c\ud130\uc640 \uc815\ubcf4\uc778\uad8c\uc5f0\uad6c\uc18c\uc758 \u201c\ub514\uc9c0\ud138\ubcf4\uc548 \uac00\uc774\ub4dc\ubd81 &lt;\uad6d\uac00\uac10\uc2dc\ub85c\ubd80\ud130 \uc790\uc2e0\uc744 \ubcf4\ud638\ud558\ub294 \ubc29\ubc95&gt;\u201d \ubc1c\ud589 \ud6c4 10\ub144\uc774 \ub418\uc5b4\uac11\ub2c8\ub2e4. \uc0dd\uc131\ud615 \uc778\uacf5\uc9c0\ub2a5, \ud074\ub77c\uc6b0\ub4dc \ud611\uc5c5 \ud234\uc774 \uc2dc\ubbfc\ub4e4\uc758 \uc77c\uc0c1, \uc2dc\ubbfc\uc0ac\ud68c\ub2e8\uccb4\uc758 \uc5c5\ubb34\uc5d0 \uc2a4\uba70\ub4e4\uc5c8\uc2b5\ub2c8\ub2e4. \ud65c\ub3d9\uac00\ub4e4\uc5d0\uac8c \uc2a4\ub9c8\ud2b8\ud3f0, \uba54\uc2e0\uc800, \ud611\uc5c5 \ub3c4\uad6c, \ud074\ub77c\uc6b0\ub4dc \ub4f1\uc740 \ub354 \uc774\uc0c1 \ub0af\uc124\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4. \ud558\uc9c0\ub9cc \uc0c8\ub85c\uc6b4 \ub3c4\uad6c\uc5d0 \ub9de\ucdb0 \uaf2d \uc54c\uc544\uc57c \ud560 \ub514\uc9c0\ud138&hellip; <a class=\"more-link\" href=\"https:\/\/guide.jinbo.net\/digital-security-2024\/\"><span class=\"screen-reader-text\">2024 \ub514\uc9c0\ud138 \ubcf4\uc548 \uac00\uc774\ub4dc<\/span> \uacc4\uc18d \uc77d\uae30<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"categories":[],"tags":[],"_links":{"self":[{"href":"https:\/\/guide.jinbo.net\/digital-security-2024\/wp-json\/wp\/v2\/pages\/246"}],"collection":[{"href":"https:\/\/guide.jinbo.net\/digital-security-2024\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/guide.jinbo.net\/digital-security-2024\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/guide.jinbo.net\/digital-security-2024\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/guide.jinbo.net\/digital-security-2024\/wp-json\/wp\/v2\/comments?post=246"}],"version-history":[{"count":3,"href":"https:\/\/guide.jinbo.net\/digital-security-2024\/wp-json\/wp\/v2\/pages\/246\/revisions"}],"predecessor-version":[{"id":649,"href":"https:\/\/guide.jinbo.net\/digital-security-2024\/wp-json\/wp\/v2\/pages\/246\/revisions\/649"}],"wp:attachment":[{"href":"https:\/\/guide.jinbo.net\/digital-security-2024\/wp-json\/wp\/v2\/media?parent=246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guide.jinbo.net\/digital-security-2024\/wp-json\/wp\/v2\/categories?post=246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/guide.jinbo.net\/digital-security-2024\/wp-json\/wp\/v2\/tags?post=246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}