{"id":176628,"date":"2022-12-05T05:47:11","date_gmt":"2022-12-05T13:47:11","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=176628"},"modified":"2022-12-05T05:46:10","modified_gmt":"2022-12-05T13:46:10","slug":"medical-iot-security-to-depend-on","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2022\/12\/medical-iot-security-to-depend-on\/?lang=ko","title":{"rendered":"\ud658\uc790\uc758 \uc0dd\uba85\uc744 \uc9c0\ud0a4\ub294 \uc758\ub8cc\uc6a9 IoT Security"},"content":{"rendered":"<h3>\uc758\uc57d\ud488\uc6a9\uc73c\ub85c \ub9de\ucda4 \uc81c\uc791\ub41c \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 \uc758\ub8cc\uc6a9 IoT Security\ub85c \ubaa8\ub4e0 \ucee4\ub125\ud2f0\ub4dc \ub514\ubc14\uc774\uc2a4\ub97c \ubcf4\ud638\ud558\uc138\uc694.<\/h3>\n<p>\ucee4\ub125\ud2f0\ub4dc \uc758\ub8cc \uae30\uae30\ub294 \ub354\uc6b1 \ube60\ub974\uace0 \uc815\ud655\ud55c \uc9c4\ub2e8\uc73c\ub85c \ud658\uc790 \uacbd\ud5d8\uc744 \ud5a5\uc0c1\ud558\uace0, \uc6b4\uc601 \ube44\uc6a9\uc744 \uc808\uac10\ud558\uace0, \uc790\ub3d9\ud654\ub97c \ud1b5\ud574 \ud6a8\uc728\uc744 \ub192\uc774\uace0, \uc804\ubc18\uc801\uc778 \ud658\uc790 \uc9c4\ub8cc \uc131\uacfc\ub97c \uac1c\uc120\ud558\ub294 \ub370 \uae30\uc5ec\ud568\uc73c\ub85c\uc368 \uc758\ub8cc \uc11c\ube44\uc2a4\uc758 \ud601\uc2e0\uc744 \uc774\ub04c\uace0 \uc788\uc2b5\ub2c8\ub2e4. \ucee4\ub125\ud2f0\ub4dc \uc784\uc0c1 \ubc0f \uc6b4\uc601 IoT \ub514\ubc14\uc774\uc2a4\ub294 \ud658\uc790 \ubaa8\ub2c8\ud130\ub9c1\ubd80\ud130 \uc0ac\ubb34 \uc2dc\uc2a4\ud15c\uae4c\uc9c0 \ubaa8\ub4e0 \ubd84\uc57c\uc5d0 \ud65c\uc6a9\ub429\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ub3d9\uc2dc\uc5d0 \uc774\ub7ec\ud55c \ub514\ubc14\uc774\uc2a4\ub294 \uacf5\uaca9 \ud45c\uba74\uc744 \ud655\ub300\ud558\uace0 \uacf5\uaca9\uc790\uac00 \ubcd1\uc6d0 \ub124\ud2b8\uc6cc\ud06c\ub85c \uce68\ud22c\ud560 \uc218 \uc788\ub294 \uac00\uc7a5 \ucde8\uc57d\ud55c \uacbd\ub85c\uc774\uae30\ub3c4 \ud569\ub2c8\ub2e4.<\/p>\n<p>\uc758\ub8cc \uc11c\ube44\uc2a4\ub294 \uc9c0\ub09c 12\ub144\uac04(2010~2022\ub144) \uafb8\uc900\ud788 \ub2e4\ub978 \uc0b0\uc5c5\uc5d0 \ube44\ud574 <a href=\"https:\/\/www.scmagazine.com\/analysis\/breach\/healthcare-data-breaches-cost-an-average-of-10-1m-more-than-any-other-industry\" rel=\"nofollow,noopener\" >\ud3c9\uade0 <\/a><a href=\"https:\/\/www.scmagazine.com\/analysis\/breach\/healthcare-data-breaches-cost-an-average-of-10-1m-more-than-any-other-industry\" rel=\"nofollow,noopener\" >\uce68\ud574 \ube44\uc6a9<\/a>\uc774 <a href=\"https:\/\/www.ic3.gov\/\" rel=\"nofollow,noopener\" >\uac00\uc7a5 \ub192\uc740<\/a> \uc0b0\uc5c5 \uc911 \ud558\ub098\uc600\uc2b5\ub2c8\ub2e4. \ucee4\ub125\ud2f0\ub4dc \uc758\ub8cc \uae30\uae30\ub294 \ub79c\uc12c\uc6e8\uc5b4\ub85c \ubcd1\uc6d0\uc744 \uc778\uc9c8\ub85c \uc0bc\uac70\ub098, \ub514\ubc14\uc774\uc2a4\uac00 \ud658\uc790\uc758 \uc911\uc694\ud55c \uac1c\uc778 \uac74\uac15 \uc815\ubcf4(PHI)\ub97c \ud638\uc2a4\ud305\ud558\uba74\uc11c \uadc0\uc911\ud55c \ub370\uc774\ud130\ub97c \ud6d4\uce58\ub294 \ub4f1 \uacf5\uaca9\uc790\uac00 \ub192\uc740 \uc218\uc775\uc744 \ub0bc \uc218 \uc788\ub294 \ud45c\uc801\uc785\ub2c8\ub2e4.<\/p>\n<p>Palo Alto Networks\uc758<a href=\"https:\/\/unit42.paloaltonetworks.com\/infusion-pump-vulnerabilities\/\"> Unit 42 \uc704\ud611 \uc5f0\uad6c<\/a> \uacb0\uacfc, \uc758\ub8cc \uae30\uae30\ub294 \uce58\uba85\uc801\uc778 \ucde8\uc57d\uc810\uc744 \uac00\uc9c0\uace0 \uc788\uc73c\ubbc0\ub85c \ubcd1\uc6d0 \ub124\ud2b8\uc6cc\ud06c\uc758 \uac00\uc7a5 \ucde8\uc57d\ud55c \uacbd\ub85c\ub77c\ub294 \uc0ac\uc2e4\uc774 \ub4dc\ub7ec\ub0ac\uc2b5\ub2c8\ub2e4.<\/p>\n<ul>\n<li>\uc5f0\uad6c\ub41c \uc8fc\uc785 \ud38c\ud504\uc758 75%\ub294 \ud558\ub098 \uc774\uc0c1\uc758 \ucde8\uc57d\uc810\uc5d0 \ub178\ucd9c\ub418\uac70\ub098 \ud558\ub098 \uc774\uc0c1\uc758 \ubcf4\uc548 \uc54c\ub9bc\uc744 \uc0dd\uc131\ud588\uc2b5\ub2c8\ub2e4.<\/li>\n<li>X-\ub808\uc774, MRI \ubc0f CT \uc2a4\uce90\ub108\uc640 \uac19\uc740 \uc774\ubbf8\uc9d5 \ub514\ubc14\uc774\uc2a4\uac00 \ud2b9\ud788 \ucde8\uc57d\ud588\uc73c\uba70, \ubaa8\ub4e0 X-\ub808\uc774 \uc7a5\ube44\uc758 51%\uac00 \ub192\uc740 \uc2ec\uac01\uc131\uc758 \uacf5\ud1b5 \ucde8\uc57d\uc810 \ubc0f \ub178\ucd9c(<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-11687\" rel=\"nofollow,noopener\" >CVE-2019-11687<\/a>)\uc5d0 \ub178\ucd9c\ub418\uc5b4 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li>\uc77c\ubc18\uc801\uc778 \uc774\ubbf8\uc9d5 \ub514\ubc14\uc774\uc2a4\uc758 20%\ub294 \uc9c0\uc6d0\ub418\uc9c0 \uc54a\ub294 \ubc84\uc804\uc758 Windows\ub97c \uc2e4\ud589 \uc911\uc774\uc5c8\uc2b5\ub2c8\ub2e4.<\/li>\n<li>CT \uc2a4\uce90\ub108\uc758 44%\uc640 MRI \uc7a5\ube44\uc758 31%\ub294 \ub192\uc740 \uc2ec\uac01\ub3c4\uc758 CVE\uc5d0 \ub178\ucd9c\ub418\uc5b4 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<\/ul>\n<p>\ub514\ubc14\uc774\uc2a4\uc640 \uc774\ub4e4\uc758 \ucde8\uc57d\uc810 \uaddc\ubaa8\ub294 \ube59\uc0b0\uc758 \uc77c\uac01\uc5d0 \ubd88\uacfc\ud569\ub2c8\ub2e4. \ucd5c\uadfc \ubbf8\uad6d \ub809\uc2f1\ud134\uc758 CommonSpirit, CHI St. Joseph Hospital, \ud504\ub791\uc2a4 \ud30c\ub9ac\uc758 CHSF \ubcd1\uc6d0, \uc778\ub3c4 \ub378\ub9ac\uc758 AIMS \ubcd1\uc6d0\uc5d0\uc11c \ubc1c\uc0dd\ud55c \uc0ac\uc774\ubc84 \uacf5\uaca9\uc744 \uc0b4\ud3b4\ubcfc \ub54c \ucee4\ub125\ud2f0\ub4dc \uc758\ub8cc \uae30\uae30\uc758 \ubcf4\uc548\uc740 \ub3c4\uc804 \uacfc\uc81c \uadf8 \uc774\uc0c1\uc774\ub77c\ub294 \uac83\uc744 \uc54c \uc218 \uc788\uc2b5\ub2c8\ub2e4. 2022\ub144 10\uc6d4,<a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-294a\" rel=\"nofollow,noopener\" > CISA\uac00 \ubc1c\ud45c\ud55c \uad8c\uace0\ubb38<\/a>\uc5d0\uc11c\ub294 \uc758\ub8cc \ubc0f \uacf5\uc911 \ubcf4\uac74 \ubd80\ubb38\uc744 \ud45c\uc801\uc73c\ub85c \ud558\ub294 \ub79c\uc12c\uc6e8\uc5b4 \ubc0f \ub370\uc774\ud130 \uac08\ucde8 \uadf8\ub8f9\uc5d0 \ub300\ud574 \uc758\ub8cc \uc11c\ube44\uc2a4 \uc81c\uacf5\uc790\ub4e4\uc5d0\uac8c \uacbd\uace0\ud588\uc2b5\ub2c8\ub2e4. \ud574\ub2f9 \uadf8\ub8f9\uc740 \ub124\ud2b8\uc6cc\ud06c \ub0b4 \ub370\uc774\ud130\ubca0\uc774\uc2a4, \uc774\ubbf8\uc9d5 \ubc0f \uc9c4\ub2e8 \uc2dc\uc2a4\ud15c\uc5d0 \uc561\uc138\uc2a4\ud558\uc5ec \ud2b9\uc815 \uc774\uc775\uc744 \uc5bb\uc740 \ubc14 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\uc774\ub7ec\ud55c \ucd5c\uc2e0 \uc758\ub8cc \uae30\uae30\ub97c \ubcf4\ud638\ud558\uae30 \uc5b4\ub824\uc6b4 \uc774\uc720\ub294 \ub2e4\uc591\ud569\ub2c8\ub2e4.<\/p>\n<ul>\n<li>\uc2e4\uc81c \uacf5\uaca9 \ud45c\uba74 \ud30c\uc545\uc5d0 \uc601\ud5a5\uc744 \ubbf8\uce58\ub294 \ube44\uad00\ub9ac\ud615 \ucee4\ub125\ud2f0\ub4dc \uc758\ub8cc \uae30\uae30\uc5d0 \ub300\ud55c \uac00\uc2dc\uc131\uc774 \ubd80\uc871\ud569\ub2c8\ub2e4.<\/li>\n<li>\ub514\ubc14\uc774\uc2a4 \ucee8\ud14d\uc2a4\ud2b8\uc758 \ubd80\uc871\uc5d0 \ub530\ub978 \ub208\uc5d0 \ub744\uc9c0 \uc54a\ub294 \ucde8\uc57d\uc810\uc73c\ub85c \uc778\ud574 \ubcd1\uc6d0\uc774 \uc54c\ub824\uc9c0\uc9c0 \uc54a\uc740 \uc704\ud611\uc5d0 \ub178\ucd9c\ub429\ub2c8\ub2e4.<\/li>\n<li>\ud3c9\uba74 \ub124\ud2b8\uc6cc\ud06c\uc758 \ub808\uac70\uc2dc \ubcf4\uc548 \uc544\ud0a4\ud14d\ucc98\uc640 \uc624\ub958\uac00 \ubc1c\uc0dd\ud558\uae30 \uc26c\uc6b4 \uc218\ub3d9 \ubc29\uc2dd\uc73c\ub85c \uc778\ud574 \ubcf4\uc548 \uc815\ucc45\uc774 HIPAA\uc640 \uac19\uc740 \uaddc\uc815 \uc694\uac74\uc744 \uc900\uc218\ud558\ub294 \ub370 \ubc29\ud574 \uc694\uc18c\ub85c \uc791\uc6a9\ud569\ub2c8\ub2e4.<\/li>\n<li>\uc5ec\ub7ec \ud3ec\uc778\ud2b8 \ubcf4\uc548 \uc81c\ud488\uc758 \uad00\ub9ac\ub85c \uc778\ud574 \ubcf5\uc7a1\uc131\uacfc \ubcf4\uc548 \uaca9\ucc28\uac00 \ubc1c\uc0dd\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n<p>\uc758\ub8cc \uae30\uad00\uc740 \ub354 \uc6b0\uc218\ud55c \ud658\uc790 \uc9c4\ub8cc \uc131\uacfc\ub97c \ucc3d\ucd9c\ud558\ub294 \ub3d9\uc2dc\uc5d0 \ud658\uc790 \ub370\uc774\ud130 \uac1c\uc778 \uc815\ubcf4 \ubcf4\ud638\uc640 \uaddc\uc815 \uc900\uc218\ub97c \uc704\ud55c \ub514\uc9c0\ud138 \ud601\uc2e0 \uc5ec\uc815\uc744 \uc9c0\uc6d0\ud560 \uc218 \uc788\ub294 \ud3ec\uad04\uc801\uc778 \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc194\ub8e8\uc158\uc774 \ud544\uc694\ud569\ub2c8\ub2e4. \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8\ub294 \ubaa8\ub4e0 \ub2e8\uacc4\uc758 \ub514\uc9c0\ud138 \uc0c1\ud638 \uc791\uc6a9\uc744 \uafb8\uc900\ud788 \uac80\uc99d\ud558\uc5ec \uc554\ubb35\uc801 \uc2e0\ub8b0\ub97c \uc81c\uac70\ud558\ub294 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc804\ub7b5\uc785\ub2c8\ub2e4. '\uc808\ub300 \uc2e0\ub8b0\ud558\uc9c0 \ub9d0\uace0 \uc0c1\uc2dc \uac80\uc99d\ud558\uae30'\ub77c\ub294 \uc6d0\uce59\uc744 \uae30\ubc18\uc73c\ub85c \ud558\ub294 \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8\ub294 \ucd5c\uc2e0 \ub514\uc9c0\ud138 \uc758\ub8cc \ud658\uacbd\uc744 \ubcf4\ud638\ud558\ub3c4\ub85d \uc124\uacc4\ub418\uc5c8\uc2b5\ub2c8\ub2e4. \uc774 \uc6d0\uce59\uc740 \uc81c\ub85c\ub370\uc774 \uacf5\uaca9\uc744 \ucc28\ub2e8\ud558\uae30 \uc704\ud55c \uc9c0\uc18d\uc801\uc778 \uc2e0\ub8b0 \uac80\uc99d\uacfc \ub514\ubc14\uc774\uc2a4 \ub3d9\uc791 \ubaa8\ub2c8\ud130\ub9c1\uc744 \ud1b5\ud574 \ucd5c\uc18c \uad8c\ud55c \uc561\uc138\uc2a4 \uc81c\uc5b4 \ubc0f \uc815\ucc45\uc744 \uc801\uc6a9\ud569\ub2c8\ub2e4.<\/p>\n<h2><strong>\uc624\uc9c1<\/strong><strong> Palo Alto Networks<\/strong><strong>\ub9cc\uc774<\/strong> <strong>\uc81c\ub85c<\/strong> <strong>\ud2b8\ub7ec\uc2a4\ud2b8<\/strong> <strong>\ubcf4\uc548\uc744<\/strong> <strong>\uc704\ud55c<\/strong> <strong>\uac00\uc7a5<\/strong> <strong>\ud3ec\uad04\uc801\uc774\uace0<\/strong> <strong>\uc2e0\uc18d\ud55c<\/strong> <strong>\ubc29\ubc95\uc744<\/strong> <strong>\uc81c\uacf5\ud558\ubbc0\ub85c<\/strong> <strong>\ucd5c\uc120\uc758<\/strong> <strong>\uc9c4\ub8cc<\/strong> <strong>\uc11c\ube44\uc2a4\uc5d0<\/strong> <strong>\uc9d1\uc911\ud558\uae30\ub9cc<\/strong> <strong>\ud558\uba74<\/strong> <strong>\ub429\ub2c8\ub2e4<\/strong><strong>.<\/strong><\/h2>\n<p>\ud604\uc7ac\uc758 \uac80\uc99d\ub41c IoT Security \uae30\uc220\ub85c \uad6c\ucd95\ud558\uace0 \ubcf4\uc548\uc5d0 \ub300\ud55c \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 \uc811\uadfc \ubc29\uc2dd\uc744 \uae30\ubc18\uc73c\ub85c, Palo Alto Networks\ub294 \uba38\uc2e0 \ub7ec\ub2dd(ML)\uc744 \uc0ac\uc6a9\ud558\ub294 <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/medical-device-security\">\uc758\ub8cc\uc6a9 IoT Security<\/a>\ub97c \ub3c4\uc785\ud558\uc5ec \uc758\ub8cc \uc11c\ube44\uc2a4 \uc81c\uacf5\uc790\uc5d0\uac8c \uc758\ub8cc \uae30\uae30\ub97c \uc704\ud574 \ud2b9\ubcc4 \uc124\uacc4\ub41c IoT Security \uc81c\ud488\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4. \uc194\ub8e8\uc158\uc744 \ud1b5\ud574 \ubaa8\ub4e0 \ub514\ubc14\uc774\uc2a4\ub97c \ube60\ub974\uac8c \uac80\uc0c9\ud558\uace0 \ud3c9\uac00\ud560 \uc218 \uc788\uc73c\uba70, \uc27d\uac8c \ubd84\ud560\ud558\uace0 \ucd5c\uc18c \uad8c\ud55c \uc561\uc138\uc2a4\ub97c \uc801\uc6a9\ud558\uba70 \ub2e8\uc21c\ud654\ub41c \uc6b4\uc601\uc744 \ud1b5\ud574 \uc54c\ub824\uc9c0\uac70\ub098 \uc54c\ub824\uc9c0\uc9c0 \uc54a\uc740 \uc704\ud611\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub610\ud55c \uc0c8\ub85c\uc6b4 \uc81c\ud488\uc744 \ud1b5\ud574 \uc758\ub8cc \uc11c\ube44\uc2a4 \uc81c\uacf5\uc790\ub294 \ub2e4\uc74c\uacfc \uac19\uc774 \ubcf4\uc548\uc744 \ud5a5\uc0c1\ud558\uace0 \ucde8\uc57d\uc810\uc744 \uc904\uc77c \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<ul>\n<li><strong>\ub124\ud2b8\uc6cc\ud06c<\/strong> <strong>\uc138\uadf8\uba3c\ud14c\uc774\uc158<\/strong> <strong>\uac80\uc99d<\/strong><strong>:<\/strong> \ucee4\ub125\ud2f0\ub4dc \ub514\ubc14\uc774\uc2a4\uc758 \uc804\uccb4 \ub9f5\uc744 \uc2dc\uac01\ud654\ud558\uace0 \uac01 \ub514\ubc14\uc774\uc2a4\uac00 \uc9c0\uc815\ub41c \ud574\ub2f9 \ub124\ud2b8\uc6cc\ud06c \uc138\uadf8\uba3c\ud2b8\uc5d0 \ubc30\uce58\ub418\ub3c4\ub85d \ud569\ub2c8\ub2e4. \uc62c\ubc14\ub978 \ub124\ud2b8\uc6cc\ud06c \uc138\uadf8\uba3c\ud14c\uc774\uc158\uc744 \ud1b5\ud574 \ub514\ubc14\uc774\uc2a4\ub294 \uc2b9\uc778\ub41c \uc2dc\uc2a4\ud15c\uacfc\ub9cc \ud1b5\uc2e0\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li><strong>\uaddc\uce59\uc744<\/strong> <strong>\uae30\ubc18\uc73c\ub85c<\/strong> <strong>\ubcf4\uc548<\/strong> <strong>\ub300\uc751<\/strong> <strong>\uc790\ub3d9\ud654<\/strong><strong>: <\/strong>\ub514\ubc14\uc774\uc2a4\uc758 \ub3d9\uc791 \uc774\uc0c1\uc744 \ud30c\uc545\ud558\uae30 \uc704\ud55c \uc815\ucc45 \uaddc\uce59\uc744 \uc0dd\uc131\ud558\uace0 \uc801\uc808\ud55c \ub300\uc751\uc744 \uc790\ub3d9\uc73c\ub85c \ud2b8\ub9ac\uac70\ud569\ub2c8\ub2e4. \uc608\ub97c \ub4e4\uc5b4, \uc57c\uac04\uc5d0\ub294 \uc77c\ubc18\uc801\uc73c\ub85c \uc18c\ub7c9\uc758 \ub370\uc774\ud130\ub9cc\uc744 \uc804\uc1a1\ud558\ub294 \uc758\ub8cc \uae30\uae30\uac00 \uac11\uc790\uae30 \ub9ce\uc740 \ub300\uc5ed\ud3ed\uc744 \uc0ac\uc6a9\ud558\uae30 \uc2dc\uc791\ud558\ub294 \uacbd\uc6b0, \uc0ac\uc804 \uc815\uc758\ub41c \uaddc\uce59\uc774 \uc778\ud130\ub137\uc73c\ub85c\ubd80\ud130 \ub514\ubc14\uc774\uc2a4 \uc5f0\uacb0\uc744 \uc790\ub3d9\uc73c\ub85c \ub04a\uace0 \ubcf4\uc548\ud300\uc5d0 \uc774\ub97c \uc54c\ub9bd\ub2c8\ub2e4.<\/li>\n<li><strong>\uc81c\ub85c<\/strong> <strong>\ud2b8\ub7ec\uc2a4\ud2b8<\/strong> <strong>\ubaa8\ubc94<\/strong> <strong>\uc0ac\ub840<\/strong> <strong>\uc815\ucc45<\/strong> <strong>\ubc0f<\/strong> <strong>\uc801\uc6a9<\/strong> <strong>\uc790\ub3d9\ud654<\/strong><strong>:<\/strong> \uc9c0\uc6d0\ub418\ub294 \uc801\uc6a9 \uae30\uc220\uc758 \ub514\ubc14\uc774\uc2a4\uc5d0 \ub300\ud574 \uad8c\uc7a5\ub418\ub294 \ucd5c\uc18c \uad8c\ud55c \uc561\uc138\uc2a4 \uc815\ucc45\uc744 \uc6d0\ud074\ub9ad\uc73c\ub85c \uc801\uc6a9\ud569\ub2c8\ub2e4. \ub530\ub77c\uc11c \uc624\ub958\uac00 \ubc1c\uc0dd\ud558\uae30 \uc27d\uace0 \uc2dc\uac04\uc774 \uc18c\uc694\ub418\ub294 \uc218\ub3d9 \uc815\ucc45 \uc0dd\uc131 \uacfc\uc815\uc744 \ud574\uc18c\ud558\uace0 \ub3d9\uc77c\ud55c \ud504\ub85c\ud544\ub85c \uc77c\ub828\uc758 \ub514\ubc14\uc774\uc2a4 \uc804\uccb4\ub97c \uc27d\uac8c \ud655\ub300\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li><strong>\ub514\ubc14\uc774\uc2a4<\/strong> <strong>\ucde8\uc57d\uc810<\/strong> <strong>\ubc0f<\/strong> <strong>\uc704\ud5d8<\/strong> <strong>\uc0c1\ud0dc<\/strong> <strong>\ud30c\uc545<\/strong><strong>: <\/strong>\uac01 \ub514\ubc14\uc774\uc2a4\uc758 \uc704\ud5d8 \uc0c1\ud0dc\uc5d0 \ub300\ud55c \uc989\uac01\uc801\uc778 \uc778\uc0ac\uc774\ud2b8\uac00 \uc81c\uacf5\ub418\uba70, \uc5ec\uae30\uc5d0\ub294 \uc218\uba85 \uc885\ub8cc \uc0c1\ud0dc, FDA \ub9ac\ucf5c \uc54c\ub9bc, \uae30\ubcf8 \ube44\ubc00\ubc88\ud638 \uacbd\uace0, \ubb34\ub2e8 \uc678\ubd80 \uc6f9\uc0ac\uc774\ud2b8 \ud1b5\uc2e0, MDS2, CVE, \ub3d9\uc791 \uc774\uc0c1, Unit42 \uc704\ud611 \uc5f0\uad6c \ub4f1\uc774 \uc788\uc2b5\ub2c8\ub2e4. \ub610\ud55c \uac01 \uc758\ub8cc \uae30\uae30\uc758 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uc7ac\ub8cc \uba85\uc138\uc11c(SBOM)\uc5d0 \uc561\uc138\uc2a4\ud558\uace0 \uc774\ub97c \uacf5\ud1b5 \ucde8\uc57d\uc810 \ubc0f \ub178\ucd9c(CVE)\ub85c \ub9e4\ud551\ud569\ub2c8\ub2e4. \uc774 \ub9e4\ud551\uc744 \ud1b5\ud574 \uc758\ub8cc \uae30\uae30\uc5d0 \uc0ac\uc6a9\ub41c \uc18c\ud504\ud2b8\uc6e8\uc5b4 \ub77c\uc774\ube0c\ub7ec\ub9ac \ubc0f \ubaa8\ub4e0 \uad00\ub828 \ucde8\uc57d\uc810\uc744 \uc2dd\ubcc4\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li><strong>\uaddc\uc815<\/strong> <strong>\uc900\uc218<\/strong> <strong>\ud5a5\uc0c1<\/strong><strong>:<\/strong> \uc758\ub8cc \uae30\uae30 \ucde8\uc57d\uc810, \ud328\uce58 \uc0c1\ud0dc, \ubcf4\uc548 \uc124\uc815\uc744 \uc27d\uac8c \uc774\ud574\ud558\uace0 \ub514\ubc14\uc774\uc2a4\uac00 \uac74\uac15 \ubcf4\ud5d8 \uc591\ub3c4 \ubc0f \ucc45\uc784\ubc95(HIPAA), \uc77c\ubc18 \ub370\uc774\ud130 \ubcf4\ud638 \uaddc\uc815(GDPR), \uc720\uc0ac \ubc95\ub960 \ubc0f \uaddc\uc815\uacfc \uac19\uc740 \uaddc\uce59 \ubc0f \uc9c0\uce68\uc744 \uc900\uc218\ud558\ub3c4\ub85d \ud558\ub294 \uad8c\uc7a5 \uc0ac\ud56d\uc744 \uc81c\uacf5\ubc1b\uc744 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li><strong>\uc6b4\uc601<\/strong> <strong>\ub2e8\uc21c\ud654<\/strong><strong>:<\/strong> \ub450 \uac1c\uc758 \uad6c\ubd84\ub41c \ub300\uc2dc\ubcf4\ub4dc\ub97c \ud1b5\ud574 IT\uc640 \uc0dd\uccb4 \uc758\ud559 \uc5d4\uc9c0\ub2c8\uc5b4\ub9c1 \ud300\uc774 \uc5c5\ubb34\ub97c \uc704\ud55c \uc911\uc694\ud55c \uc815\ubcf4\ub97c \ubaa8\ub450 \ud655\uc778\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. AIMS \ubc0f Epic Systems\uc640 \uac19\uc740 \uae30\uc874 \uc758\ub8cc \uc815\ubcf4 \uad00\ub9ac \uc2dc\uc2a4\ud15c\uacfc \ud1b5\ud569\ud558\uc5ec \uc6cc\ud06c\ud50c\ub85c \uc790\ub3d9\ud654\ub97c \uc9c0\uc6d0\ud569\ub2c8\ub2e4.<\/li>\n<li><strong>\ub370\uc774\ud130<\/strong> <strong>\uc0c1\uc8fc<\/strong> <strong>\uc694\uad6c<\/strong> <strong>\uc0ac\ud56d<\/strong> <strong>\ucda9\uc871<\/strong><strong>: <\/strong>\uc758\ub8cc\uc6a9 IoT Security\ub85c \ubbf8\uad6d, \ub3c5\uc77c, \uc2f1\uac00\ud3ec\ub974, \uc77c\ubcf8 \ubc0f \ud638\uc8fc\uc758 \uace0\uac1d\uc774 \ub85c\uceec \ud074\ub77c\uc6b0\ub4dc \ud638\uc2a4\ud305\uc744 \ud1b5\ud574 IoT Security\ub97c \ub354\uc6b1 \uc27d\uac8c \ub3c4\uc785\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc9c0\uc5ed\ubcc4 \uc758\ub8cc\uc6a9 IoT Security \uc11c\ube44\uc2a4 \uac00\uc6a9\uc131\uc5d0 \ub530\ub77c, GDPR\uacfc \uac19\uc740 \ub85c\uceec \ub370\uc774\ud130 \uc0c1\uc8fc \ubc0f \ud604\uc9c0\ud654 \uc694\uad6c \uc0ac\ud56d\uc744 \ucda9\uc871\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<\/ul>\n<p><strong>\uc758\ub8cc\uc6a9<\/strong><strong> IoT Security<\/strong><strong>\uc640<\/strong> <strong>\ud568\uaed8<\/strong> <strong>\uc81c\uacf5\ub418\ub294<\/strong> <strong>\uc2e4\ucc9c<\/strong> <strong>\uac00\ub2a5\ud55c<\/strong> <strong>\uac00\uc774\ub4dc\ub77c\uc778<\/strong><\/p>\n<p>\ud658\uc790\uc758 \ub354\uc6b1 \uc6b0\uc218\ud55c \uc9c4\ub8cc\ub97c \uc704\ud574 \uc758\ub8cc \uc0b0\uc5c5\uc758 \uc790\uccb4\uc801\uc778 \ud601\uc2e0\uc5d0 \ub530\ub77c, \ucee4\ub125\ud2f0\ub4dc \uc758\ub8cc \uae30\uae30 \ub610\ud55c \uacc4\uc18d \ubc1c\uc804\ud560 \uac83\uc785\ub2c8\ub2e4. \uac15\ub825\ud55c \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 \ud504\ub808\uc784\uc6cc\ud06c\uc5d0 \uae30\ubc18\uc744 \ub454 \uc758\ub8cc\uc6a9 IoT Security\ub97c \ud1b5\ud574 \uc758\ub8cc \uc0b0\uc5c5\uc740 \uc804\uccb4 \uc8fc\uae30 \ubcf4\ud638\ub97c \uc704\ud55c \uc2e4\ucc9c \uac00\ub2a5\ud55c \uac00\uc774\ub4dc\ub77c\uc778\uc73c\ub85c \ucee4\ub125\ud2f0\ub4dc \uc784\uc0c1 \ub514\ubc14\uc774\uc2a4\ub97c \ub354\uc6b1 \uc548\uc804\ud558\uac8c \uc0ac\uc6a9\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc758\ub8cc\uc6a9 IoT Security\uac00 \uc81c\uacf5\ud558\ub294 \uac00\uc2dc\uc131, \ub9ac\uc2a4\ud06c \ubc0f \uc870\uce58\ub97c \ud1b5\ud574 \uc758\ub8cc \uc2dc\uc2a4\ud15c\uc740 \ubaa8\ub4e0 \ucee4\ub125\ud2f0\ub4dc \uc758\ub8cc \uae30\uae30 \ubc0f \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc5d0 \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8\ub97c \uc2e4\ud604\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\uc758\ub8cc\uc6a9 IoT Security\uc5d0 \ub300\ud55c \ub354 \uc790\uc138\ud55c \ub0b4\uc6a9\uc744 \ud655\uc778\ud558\ub824\uba74 <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/right-approach-zero-trust-medical-iot\">\uc758\ub8cc\uc6a9 IoT \ub514\ubc14\uc774\uc2a4\uc5d0\uc11c\uc758 \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8\uc5d0 \ub300\ud55c \uc62c\ubc14\ub978 \uc811\uadfc \ubc29\uc2dd \ubc31\uc11c<\/a>\ub97c \uc77d\uc5b4\ubcf4\uc2dc\uae30 \ubc14\ub78d\ub2c8\ub2e4.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\uc758\uc57d\ud488\uc6a9\uc73c\ub85c \ub9de\ucda4 \uc81c\uc791\ub41c \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 \uc758\ub8cc\uc6a9 IoT Security\ub85c \ubaa8\ub4e0 \ucee4\ub125\ud2f0\ub4dc \ub514\ubc14\uc774\uc2a4\ub97c \ubcf4\ud638\ud558\uc138\uc694. \ucee4\ub125\ud2f0\ub4dc \uc758\ub8cc \uae30\uae30\ub294 \ub354\uc6b1 \ube60\ub974\uace0 \uc815\ud655\ud55c \uc9c4\ub2e8\uc73c\ub85c \ud658\uc790 \uacbd\ud5d8\uc744 \ud5a5\uc0c1\ud558\uace0, \uc6b4\uc601 \ube44\uc6a9\uc744 \uc808\uac10\ud558\uace0, \uc790\ub3d9\ud654\ub97c \ud1b5\ud574 \ud6a8\uc728\uc744 \ub192\uc774\uace0, \uc804\ubc18\uc801\uc778 \ud658\uc790 \uc9c4\ub8cc &hellip;<\/p>\n","protected":false},"author":563,"featured_media":176463,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3555],"tags":[8963,8964],"coauthors":[7704],"class_list":["post-176628","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-3555","tag-iot-security-ko","tag-zero-trust-ko"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2022\/12\/Hospital-Worker.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/176628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/563"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=176628"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/176628\/revisions"}],"predecessor-version":[{"id":176629,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/176628\/revisions\/176629"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/176463"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=176628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=176628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=176628"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=176628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}