{"id":11179,"date":"2021-05-20T08:10:20","date_gmt":"2021-05-20T15:10:20","guid":{"rendered":"https:\/\/www.couchbase.com\/blog\/?p=11179"},"modified":"2021-05-19T18:02:27","modified_gmt":"2021-05-20T01:02:27","slug":"why-data-encryption-is-essential-2","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/ko\/why-data-encryption-is-essential-2\/","title":{"rendered":"\ub370\uc774\ud130 \uc554\ud638\ud654\uac00 \ud544\uc218\uc801\uc778 \uc774\uc720"},"content":{"rendered":"<h4><i><span style=\"font-weight: 400;\">\uc774 \uae00\uc740 \ub370\uc774\ud130\uac00 \uc0dd\uc131, \uc804\uc1a1, \uc18c\ube44\ub418\ub294 \ub180\ub77c\uc6b4 \uc18d\ub3c4\ub97c \uace0\ub824\ud560 \ub54c \ub370\uc774\ud130 \uc554\ud638\ud654\uc758 \uc911\uc694\uc131\uc5d0 \ub300\ud55c \uc778\uc2dd\uc744 \uc81c\uace0\ud558\ub294 \uac83\uc744 \ubaa9\ud45c\ub85c \ud569\ub2c8\ub2e4. \ub370\uc774\ud130 \ubcf4\ud638\uc758 \ud544\uc694\uc131, \uaddc\uc81c \ubc0f \uba87 \uac00\uc9c0 \uc554\ud638\ud654 \ubaa8\ubc94 \uc0ac\ub840\uc5d0 \ub300\ud574 \uc124\uba85\ud569\ub2c8\ub2e4.<\/span><\/i><\/h4>\n<p><span style=\"font-weight: 400;\">\uc804 \uc138\uacc4 \ubaa8\ub4e0 \uaddc\ubaa8\uc758 \uc870\uc9c1 <\/span><span style=\"font-weight: 400;\">\ub294 \uac1c\uc778 \uc2dd\ubcc4 \uc815\ubcf4(PII)\ubd80\ud130 \ubcf4\ud638 \ub300\uc0c1 \uac74\uac15 \uc815\ubcf4(PHI), \uc7ac\ubb34 \uae30\ub85d, \uadf8\ub9ac\uace0 \uc81c\ub300\ub85c \uad00\ub9ac\ud558\uc9c0 \uc54a\uc73c\uba74 \uae08\ubc29 \ud1b5\uc81c \ubd88\ub2a5 \uc0c1\ud0dc\uac00 \ub420 \uc218 \uc788\ub294 \uae30\ud0c0 \ubbfc\uac10\ud55c \uc815\ubcf4\uc5d0 \uc774\ub974\uae30\uae4c\uc9c0 \uc5c4\uccad\ub09c \uc591\uc758 \ub370\uc774\ud130\ub97c \ucc98\ub9ac\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ub370\uc774\ud130 \uac1c\uc778\uc815\ubcf4 \ubcf4\ud638\ub294 \uac1c\uc778, \uc870\uc9c1, \uc815\ubd80 \ubaa8\ub450\uc5d0\uac8c \uc6b0\uc120\uc21c\uc704\uac00 \ub418\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uac01\uad6d \uc815\ubd80\uac00 \ub370\uc774\ud130 \ud504\ub77c\uc774\ubc84\uc2dc \uad8c\ub9ac\ub97c \ubcf4\ud638\ud558\uae30 \uc704\ud574 \ub178\ub825\ud568\uc5d0 \ub530\ub77c \uc870\uc9c1\uc740 \uac1c\uc778 \uc815\ubcf4\ub97c \uc218\uc9d1, \uc800\uc7a5, \ucc98\ub9ac\ud558\ub294 \ubc29\ubc95\uc744 \uc7ac\uace0\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \ub370\uc774\ud130 \uc554\ud638\ud654\ub294 \uc870\uc9c1\uc774 \uc704\ud5d8\uc744 \uc644\ud654\ud558\uace0 \ub370\uc774\ud130 \ud655\uc0b0\uacfc \uc0ac\uc774\ubc84 \uacf5\uaca9\uc744 \uc0ac\uc804\uc5d0 \ucc28\ub2e8\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub420 \uc218 \uc788\ub294 \ubc29\ubc95 \uc911 \ud558\ub098\uc785\ub2c8\ub2e4.<\/span><\/p>\n<h5><span style=\"color: #333399;\"><b>\ub370\uc774\ud130 \uc554\ud638\ud654\ub780 \ubb34\uc5c7\uc778\uac00\uc694?<\/b><\/span><\/h5>\n<p><b>\ub370\uc774\ud130 \uc554\ud638\ud654<\/b><span style=\"font-weight: 400;\"> \uc554\ud638\ud654\ub294 \uad8c\ud55c\uc774 \uc788\ub294 \ub2f9\uc0ac\uc790\ub9cc \uc774\ud574\ud560 \uc218 \uc788\ub294 \ube44\ubc00 \ud0a4\ub77c\ub294 \uc554\ud638\ud654 \ubaa8\ub4c8\uc744 \uc0ac\uc6a9\ud558\uc5ec \uc77c\ubc18 \ud14d\uc2a4\ud2b8 \uc815\ubcf4\ub97c \uc554\ud638 \ud14d\uc2a4\ud2b8\ub77c\uace0 \ud558\ub294 \uc774\ud574\ud560 \uc218 \uc5c6\ub294 \ud14d\uc2a4\ud2b8\ub85c \uc2a4\ud06c\ub7a8\ube14\ud558\ub294 \ud504\ub85c\uc138\uc2a4\uc785\ub2c8\ub2e4. \ubc18\uba74 \ubcf5\ud638\ud654\ub294 \ub3d9\uc77c\ud55c \ube44\ubc00 \ud0a4\ub97c \uc0ac\uc6a9\ud558\uc5ec \uc554\ud638 \ud14d\uc2a4\ud2b8\ub97c \ub2e4\uc2dc \uc77c\ubc18 \ud14d\uc2a4\ud2b8 \ub370\uc774\ud130\ub85c \ubcc0\ud658\ud558\ub294 \ud504\ub85c\uc138\uc2a4\uc785\ub2c8\ub2e4.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ub370\uc774\ud130 \uc554\ud638\ud654 \ud45c\uc900\uc5d0\ub294 \ub300\uce6d\ud615\uacfc \ube44\ub300\uce6d\ud615\uc758 \ub450 \uac00\uc9c0 \uc8fc\uc694 \uc720\ud615\uc774 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11207 size-full\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2021\/05\/Encryption-blog-05.png\" alt=\"Arrows pointing left and right towards documents with a key in between, signifying the way symmetric encryption works\" width=\"592\" height=\"333\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/Encryption-blog-05.png 592w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/Encryption-blog-05-300x169.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/Encryption-blog-05-20x11.png 20w\" sizes=\"auto, (max-width: 592px) 100vw, 592px\" \/><\/p>\n<p><em><span style=\"font-weight: 400;\">\ub300\uce6d \uc554\ud638\ud654\uc5d0\uc11c \uac1c\ubc1c\uc790\ub294 \uc554\ud638\ud654\uc640 \ubcf5\ud638\ud654 \ubaa8\ub450\uc5d0 \ud558\ub098\uc758 \ube44\ubc00 \ud0a4\ub9cc \uc0ac\uc6a9\ud569\ub2c8\ub2e4.<\/span><\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11208 size-full\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2021\/05\/Encryption-blog-04.png\" alt=\"Two arrows pointing different directions and a key above each one, representing how asymmetric data encryption works\" width=\"592\" height=\"333\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/Encryption-blog-04.png 592w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/Encryption-blog-04-300x169.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/Encryption-blog-04-20x11.png 20w\" sizes=\"auto, (max-width: 592px) 100vw, 592px\" \/><\/p>\n<p><em><span style=\"font-weight: 400;\">\ube44\ub300\uce6d \uc554\ud638\ud654\uc5d0\uc11c \uac1c\ubc1c\uc790\ub294 \uacf5\uac1c \ud0a4\uc640 \uac1c\uc778 \ud0a4\uc758 \ub450 \uac00\uc9c0 \ud0a4\ub97c \uc0ac\uc6a9\ud569\ub2c8\ub2e4. \ub204\uad6c\ub098 \uc0ac\uc6a9\ud560 \uc218 \uc788\ub294 \uacf5\uac1c \uc554\ud638\ud654 \ud0a4\uc640 \ube44\ubc00\ub85c \uc720\uc9c0\ud574\uc57c \ud558\ub294 \ube44\uacf5\uac1c \uc554\ud638 \ud574\ub3c5 \ud0a4\uac00 \uc788\uc2b5\ub2c8\ub2e4. \uac1c\ubc1c\uc790\ub294 \uc77c\ubc18\uc801\uc73c\ub85c SSL \ubc0f TLS\uc640 \uac19\uc740 \ud504\ub85c\ud1a0\ucf5c\uc744 \uc0ac\uc6a9\ud558\uc5ec '\uc804\uc1a1 \uc911 \ub370\uc774\ud130 \uc554\ud638\ud654'\ub77c\uace0\ub3c4 \ud558\ub294 \uc720\uc120\ubcf4\ub2e4 \ube44\ub300\uce6d \uc554\ud638\ud654\ub97c \uc120\ud638\ud569\ub2c8\ub2e4.<\/span><\/em><\/p>\n<h5><span style=\"color: #333399;\"><b>\ub370\uc774\ud130 \uc554\ud638\ud654\uac00 \ud544\uc218\uc801\uc778 \uc774\uc720<\/b><\/span><\/h5>\n<p><span style=\"font-weight: 400;\">\ub2e4\uc74c\uacfc \uac19\uc740 \uae30\uac04 \ub3d9\uc548 \ubc1c\uc0dd\ud55c \uba87 \uac00\uc9c0 \ub370\uc774\ud130 \uc720\ucd9c \uc0ac\ub840\ub97c \uc0b4\ud3b4\ubcf4\uaca0\uc2b5\ub2c8\ub2e4. <\/span><b>2020.<\/b><\/p>\n<p><b>1\uc6d4 22\uc77c: <\/b><span style=\"font-weight: 400;\">2\uc5b5 8\ucc9c\ub9cc \uac1c\uac00 \ub118\ub294 Microsoft \uace0\uac1d \uae30\ub85d\uc744 \ubcf4\uc720\ud55c \uace0\uac1d \uc9c0\uc6d0 \ub370\uc774\ud130\ubca0\uc774\uc2a4\uac00 \uc6f9\uc5d0 \ubcf4\ud638\ub418\uc9c0 \uc54a\uc740 \ucc44\ub85c \ubc29\uce58\ub418\uc5b4 \uc788\uc5c8\uc2b5\ub2c8\ub2e4. <\/span><a href=\"https:\/\/www.zdnet.com\/article\/microsoft-discloses-security-breach-of-customer-support-database\/\"><span style=\"font-weight: 400;\">Microsoft\uc758 \ub178\ucd9c\ub41c \ub370\uc774\ud130\ubca0\uc774\uc2a4<\/span><\/a><span style=\"font-weight: 400;\"> \uc774\uba54\uc77c \uc8fc\uc18c, IP \uc8fc\uc18c, \uc9c0\uc6d0 \uc0ac\ub840 \uc138\ubd80 \uc815\ubcf4\uac00 \uacf5\uac1c\ub418\uc5c8\uc2b5\ub2c8\ub2e4. Microsoft\ub294 \ub370\uc774\ud130\ubca0\uc774\uc2a4\uc5d0 \ub2e4\ub978 \uac1c\uc778 \uc815\ubcf4\ub294 \ud3ec\ud568\ub418\uc9c0 \uc54a\uc558\ub2e4\uace0 \ubc1d\ud614\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><b>2\uc6d4 11\uc77c: <\/b><a href=\"https:\/\/www.cincinnati.com\/story\/money\/2020\/02\/11\/fifth-third-data-breach-consumer-federation-america-slams\/4722455002\/\"><span style=\"font-weight: 400;\">\ub2e4\uc12f \ubc88\uc9f8 \uc138 \ubc88\uc9f8 \uc740\ud589<\/span><\/a><span style=\"font-weight: 400;\">\ubbf8\uad6d 10\uac1c \uc8fc\uc5d0 1,150\uac1c \uc9c0\uc810\uc744 \ubcf4\uc720\ud55c \uae08\uc735 \uae30\uad00\uc778 \ubc45\ud06c\uc624\ube0c\ud638\ud504\ub294 \uc804\uc9c1 \uc9c1\uc6d0\uc774 \uace0\uac1d \uc774\ub984, \uc8fc\ubbfc\ub4f1\ub85d\ubc88\ud638, \uc6b4\uc804\uba74\ud5c8 \uc815\ubcf4, \uc5b4\uba38\ub2c8\uc758 \uacb0\ud63c \uc804 \uc774\ub984, \uc8fc\uc18c, \uc804\ud654\ubc88\ud638, \uc0dd\ub144\uc6d4\uc77c, \uacc4\uc88c \ubc88\ud638\uac00 \uc720\ucd9c\ub41c \ub370\uc774\ud130 \uc720\ucd9c \uc0ac\uac74\uc758 \ucc45\uc784\uc774 \uc788\ub2e4\uace0 \uc8fc\uc7a5\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc601\ud5a5\uc744 \ubc1b\uc740 \uc9c1\uc6d0\uacfc \uc740\ud589 \uace0\uac1d\uc758 \ucd1d \uc218\ub294 \uc544\uc9c1 \uacf5\uac1c\ub418\uc9c0 \uc54a\uc558\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><b>4\uc6d4 6\uc77c:<\/b><span style=\"font-weight: 400;\"> \ub514\uc9c0\ud138 \uc9c0\uac11 \uc571\uc785\ub2c8\ub2e4,<\/span> <a href=\"https:\/\/securityboulevard.com\/2020\/04\/data-leak-private-information-of-14-million-key-ring-users-exposed\/\"><span style=\"font-weight: 400;\">\uc5f4\uc1e0\uace0\ub9ac<\/span><\/a><span style=\"font-weight: 400;\">\ub294 1,400\ub9cc \uc0ac\uc6a9\uc790\uc758 \uace0\uac1d \ub370\uc774\ud130\ub97c \ubcf4\uc548\ub418\uc9c0 \uc54a\uc740 \ub370\uc774\ud130\ubca0\uc774\uc2a4\uc5d0 \uc800\uc7a5\ud588\uc2b5\ub2c8\ub2e4. \uc774 \uc571\uc744 \ud1b5\ud574 \uc0ac\uc6a9\uc790\ub294 \uba64\ubc84\uc2ed \ubc0f \ud3ec\uc778\ud2b8 \uce74\ub4dc\uc758 \uc2a4\uce94\ubcf8\uacfc \uc0ac\uc9c4\uc744 \ubaa8\ubc14\uc77c \ub514\ubc14\uc774\uc2a4\uc758 \ub514\uc9c0\ud138 \ud3f4\ub354\uc5d0 \uc27d\uac8c \uc5c5\ub85c\ub4dc\ud558\uace0 \uc800\uc7a5\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub178\ucd9c\ub41c \ub370\uc774\ud130\uc5d0\ub294 \uc774\ub984, \uc804\uccb4 \uc2e0\uc6a9\uce74\ub4dc \uc138\ubd80 \uc815\ubcf4(CVV \ubc88\ud638 \ud3ec\ud568), \uc774\uba54\uc77c \uc8fc\uc18c, \uc0dd\ub144\uc6d4\uc77c, \uc8fc\uc18c, \ud68c\uc6d0 ID \ubc88\ud638, \ub9ac\ud14c\uc77c \ud074\ub7fd \ubc0f \ud3ec\uc778\ud2b8 \uce74\ub4dc \ud68c\uc6d0, \uc815\ubd80 ID, \uae30\ud504\ud2b8 \uce74\ub4dc, \uc758\ub8cc \ubcf4\ud5d8 \uce74\ub4dc, \uc758\ub8cc\uc6a9 \ub9c8\ub9ac\ud654\ub098 ID, IP \uc8fc\uc18c \ubc0f \uc554\ud638\ud654\ub41c \ube44\ubc00\ubc88\ud638\uac00 \ud3ec\ud568\ub418\uc5c8\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><b>6\uc6d4 23\uc77c <\/b><span style=\"font-weight: 400;\">A <\/span><a href=\"https:\/\/techcrunch.com\/2020\/06\/23\/twitter-says-some-business-users-had-their-pivate-data-exposed\/\"><span style=\"font-weight: 400;\">\ud2b8\uc704\ud130\uc758 \ubcf4\uc548 \ucde8\uc57d\uc810<\/span><\/a><span style=\"font-weight: 400;\"> \uc774\uba54\uc77c \uc8fc\uc18c, \uc804\ud654\ubc88\ud638, \uc2e0\uc6a9\uce74\ub4dc \ubc88\ud638 \ub9c8\uc9c0\ub9c9 \ub124 \uc790\ub9ac \ub4f1 \uacf5\uac1c\ub418\uc9c0 \uc54a\uc740 \ub2e4\uc218\uc758 \ube44\uc988\ub2c8\uc2a4 \uc0ac\uc6a9\uc790 \uacc4\uc815 \uc815\ubcf4\uac00 \ub178\ucd9c\ub418\uc5c8\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uc774 \ubaa9\ub85d\uc740 \ud3ec\uad04\uc801\uc778 \ubaa9\ub85d\uc740 \uc544\ub2c8\uc9c0\ub9cc \uc870\uc9c1\uc758 \uaddc\ubaa8, \uc704\uce58, \uc720\ud615\uc5d0 \uad00\uacc4\uc5c6\uc774 \ub370\uc774\ud130 \uc720\ucd9c\uc774 \ubc1c\uc0dd\ud560 \uc218 \uc788\ub294 \uaddc\ubaa8\ub97c \ud30c\uc545\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uc5d0 \ub530\ub974\uba74 <\/span><a href=\"https:\/\/www.ibm.com\/downloads\/cas\/RZAX14GX\"><span style=\"font-weight: 400;\">IBM \ub370\uc774\ud130 \uc720\ucd9c \ube44\uc6a9 \ubcf4\uace0\uc11c 2020<\/span><\/a><span style=\"font-weight: 400;\">\uc5d0 \ub530\ub974\uba74 \ubbf8\uad6d\uc5d0\uc11c\ub9cc \ub370\uc774\ud130 \uc720\ucd9c\ub85c \uc778\ud55c \ud3c9\uade0 \ube44\uc6a9\uc740 $8.64M\uc5d0 \ub2ec\ud569\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uacf5\uaca9\uc758 \ub300\ubd80\ubd84\uc740 \uace0\uac1d PII\ub97c \ub178\ucd9c\uc2dc\ucf1c \ub3c4\ub09c\ub2f9\ud55c \ub808\ucf54\ub4dc\ub2f9 \ud3c9\uade0 $150\uc758 \ube44\uc6a9\uc774 \ubc1c\uc0dd\ud569\ub2c8\ub2e4. \uc5ec\uae30\uc5d0 \ub2e4\uc74c\uacfc \uac19\uc740 \uac04\uc811 \ube44\uc6a9\uc774 \ucd94\uac00\ub429\ub2c8\ub2e4.\u00a0<\/span><span style=\"font-weight: 400;\">\ud64d\ubcf4\uc5d0 \uc545\uc601\ud5a5\uc744 \ubbf8\uce58\uace0 \uc18c\ube44\uc790 \uc2e0\ub8b0\ub97c \uc783\uc744 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub370\uc774\ud130 \uc720\ucd9c\uc740 \ud5a5\ud6c4 \uc218\ub144\uac04 \ub9e4\ucd9c\uc5d0 \uc601\ud5a5\uc744 \ubbf8\uce60 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uc555\ub3c4\uc801\uc774\ub77c\uace0\uc694? <\/span><span style=\"font-weight: 400;\">\ubc14\ub85c \uc774 \ubd80\ubd84\uc5d0\uc11c \ub370\uc774\ud130 \uc554\ud638\ud654\uac00 \ucc28\uc774\ub97c \ub9cc\ub4e4 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<h5><span style=\"color: #333399;\"><strong>\uac15\ub825\ud55c \uc554\ud638\ud654:<\/strong><\/span><\/h5>\n<ul>\n<li><span style=\"font-weight: 400;\">\ubcf4\uc7a5 <\/span><b>\ub370\uc774\ud130 \uac1c\uc778 \uc815\ubcf4 \ubcf4\ud638<\/b><span style=\"font-weight: 400;\"> - \uc815\ub2f9\ud55c \ub370\uc774\ud130 \uc18c\uc720\uc790 \uc678\uc5d0\ub294 \ub204\uad6c\ub3c4 \uc2e4\uc81c \ub370\uc774\ud130\ub97c \ubcfc \uc218 \uc5c6\uc2b5\ub2c8\ub2e4. \uc554\ud638\ud654\ub41c \uc554\ud638 \ud14d\uc2a4\ud2b8\ub294 \uad8c\ud55c\uc774 \uc5c6\ub294 \uc0ac\uc6a9\uc790\uc5d0\uac8c\ub294 \ud6a1\uc124\uc218\uc124\uc5d0 \ubd88\uacfc\ud569\ub2c8\ub2e4. <\/span><\/li>\n<li>\uc81c\uacf5 <b>\ub370\uc774\ud130 \ubcf4\uc548<\/b> - \uc801\uc808\ud55c \uc554\ud638\ud654\ub294 \uc804\uc1a1 \uc911\uc778 \ub370\uc774\ud130(\uc720\uc120)\uc640 \ubbf8\uc0ac\uc6a9 \ub370\uc774\ud130\ub97c \ubcf4\ud638\ud569\ub2c8\ub2e4. \uc774\ub294 \ub124\ud2b8\uc6cc\ud06c\uac00 \uc190\uc0c1\ub418\uac70\ub098 \ubb3c\ub9ac\uc801 \uc2a4\ud1a0\ub9ac\uc9c0 \ub514\uc2a4\ud06c\uac00 \ub3c4\ub09c\ub2f9\ud55c \uacbd\uc6b0\uc5d0 \ub9e4\uc6b0 \uc911\uc694\ud569\ub2c8\ub2e4.<\/li>\n<li>\uc720\uc9c0 \uad00\ub9ac <b>\ub370\uc774\ud130 \ubb34\uacb0\uc131 <\/b>- \ub2e4\uc74c\uacfc \uac19\uc740 \uacbd\uc6b0 <a href=\"https:\/\/www.internetsociety.org\/resources\/doc\/2020\/fact-sheet-man-in-the-middle-attacks\/\">\uc911\uac04\uc790 \uacf5\uaca9<\/a>\uc554\ud638\ud654\ub294 (\ub2e4\ub978 \ubcf4\uc548 \uc870\uce58\uc640 \ud568\uaed8) \ub370\uc774\ud130\uac00 \ubcc0\uc870\ub418\uc9c0 \uc54a\ub3c4\ub85d \ubcf4\uc7a5\ud569\ub2c8\ub2e4.<\/li>\n<li><b>\uc778\uc99d <\/b>\ub370\uc774\ud130\uc758 \ucd9c\ucc98\ub97c \ud655\uc778\ud558\uc5ec \ubc1c\uc2e0\uc790 \ud655\uc778\uc744 \uc9c0\uc6d0\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">\uc774 \ubaa8\ub4e0 \uac83\uc744 \uc54c\uc544\ub450\uba74 \uc88b\uc9c0\ub9cc \uc554\ud638\ud654\ub294 \ud544\uc218\uc778\uac00\uc694? \uac70\ubc84\ub10c\uc2a4\uac00 \uc788\ub098\uc694? Do <\/span><a href=\"https:\/\/www.thesslstore.com\/blog\/10-data-privacy-and-encryption-laws-every-business-needs-to-know\/\"><span style=\"font-weight: 400;\">\ub370\uc774\ud130 \uac1c\uc778\uc815\ubcf4 \ubcf4\ud638\ubc95, \uaddc\uc815<\/span><\/a><span style=\"font-weight: 400;\"> \uadf8\ub9ac\uace0 \ud45c\uc900\uc5d0\uc11c \uba85\uc2dc\uc801\uc73c\ub85c \uc554\ud638\ud654\ub97c \uc694\uad6c\ud558\uace0 \uc788\ub098\uc694? \uc774\ub7ec\ud55c \uc9c8\ubb38\uc5d0 \ub300\ud55c \ub2f5\uc744 \uc5bb\uae30 \uc704\ud574 \uc624\ub298\ub0a0 \uac00\uc7a5 \ub110\ub9ac \ud1b5\uc6a9\ub418\ub294 \ub370\uc774\ud130 \uac1c\uc778\uc815\ubcf4 \ubcf4\ud638\ubc95\uacfc \ud45c\uc900\uc744 \uc0b4\ud3b4\ubcf4\uaca0\uc2b5\ub2c8\ub2e4.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">1996\ub144 \uac74\uac15 \ubcf4\ud5d8 \uc774\ub3d9\uc131 \ubc0f \ucc45\uc784\uc5d0 \uad00\ud55c \ubc95\ub960(<\/span><a href=\"https:\/\/www.cdc.gov\/phlp\/publications\/topic\/hipaa.html\"><span style=\"font-weight: 400;\">HIPAA<\/span><\/a><span style=\"font-weight: 400;\">)\ub294 \ubbfc\uac10\ud55c \ud658\uc790 \uac74\uac15 \uc815\ubcf4(PHI)\uac00 \ud658\uc790\uc758 \ub3d9\uc758\ub098 \ubaa8\ub974\uac8c \uacf5\uac1c\ub418\uc9c0 \uc54a\ub3c4\ub85d \ubcf4\ud638\ud558\uae30 \uc704\ud55c \uad6d\uac00 \ud45c\uc900\uc744 \ub9c8\ub828\ud558\ub3c4\ub85d \uc694\uad6c\ud558\ub294 \ubbf8\uad6d \uc5f0\ubc29\ubc95\uc785\ub2c8\ub2e4. HIPAA\ub294 \uc870\uc9c1\uacfc \uc801\uc6a9 \ub300\uc0c1 \uae30\uad00\uc774 \ubaa8\ub4e0 \ud658\uc790\uc758 PHI\ub97c \ubcf4\ud638\ud560 \uac83\uc744 \uc694\uad6c\ud569\ub2c8\ub2e4. \uaddc\uc81c \ub2f9\uad6d\uc740 \uc870\uc9c1\uc5d0 \ub2e4\uc74c\uc744 \uc694\uad6c\ud569\ub2c8\ub2e4. <\/span>\uc554\ud638\ud654\ub97c \uad6c\ud604\ud560 \uc218 \uc5c6\ub294 \uc774\uc720\ub97c \uc815\ub2f9\ud654\ud558\uace0 \ub3d9\ub4f1\ud55c \ub300\uc548\uc744 \uc81c\uc2dc\ud560 \uc218 \uc5c6\ub2e4\uba74 \ub370\uc774\ud130\ub97c \uc554\ud638\ud654\ud558\uc9c0 \uc54a\ub294 \uac83\uc774 \uc88b\uc2b5\ub2c8\ub2e4.<\/p>\n<p><span style=\"font-weight: 400;\">\uacb0\uc81c \uce74\ub4dc \uc0b0\uc5c5 \ub370\uc774\ud130 \ubcf4\uc548 \ud45c\uc900(<\/span><a href=\"https:\/\/www.pcisecuritystandards.org\"><span style=\"font-weight: 400;\">PCI DSS<\/span><\/a><span style=\"font-weight: 400;\">)\ub294 \uc804\uccb4 \uacb0\uc81c \uce74\ub4dc \uc0dd\ud0dc\uacc4\ub97c \ubcf4\ud638\ud558\uace0 \ubcf4\uc548\uc744 \uc720\uc9c0\ud558\uae30 \uc704\ud574 \uac1c\ubc1c\ub418\uc5c8\uc2b5\ub2c8\ub2e4. \uc774 \ud45c\uc900\uc5d0 \ub530\ub77c \uae30\uc5c5\uc740 \uc804\uc1a1 \uc911 \ubc0f \ubbf8\uc0ac\uc6a9 \uc911\uc778 \uacb0\uc81c \uce74\ub4dc \ub370\uc774\ud130\ub97c \uc554\ud638\ud654\ud574\uc57c \ud569\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uc77c\ubc18 \ub370\uc774\ud130 \ubcf4\ud638 \uaddc\uc815(<\/span><a href=\"https:\/\/gdpr-info.eu\/\"><span style=\"font-weight: 400;\">GDPR<\/span><\/a><span style=\"font-weight: 400;\">)\ub294 \uc720\ub7fd\uc5f0\ud569 \ubc0f \uc720\ub7fd \uacbd\uc81c \uc9c0\uc5ed\uc758 \ub370\uc774\ud130 \ubcf4\ud638 \ubc0f \uac1c\uc778\uc815\ubcf4 \ubcf4\ud638\uc5d0 \uad00\ud55c \ubc95\ub960\uc785\ub2c8\ub2e4. \uc774 \ubc95\uc758 \uc8fc\uc694 \ubaa9\ud45c\ub294 \uac1c\uc778\uc774 \uc790\uc2e0\uc758 \uac1c\uc778 \ub370\uc774\ud130\ub97c \uc81c\uc5b4\ud558\uace0 EU \uaddc\uc81c \ud658\uacbd\uc744 \uac04\uc18c\ud654\ud558\ub294 \uac83\uc785\ub2c8\ub2e4. GDPR\uc5d0 \ub530\ub77c \uc870\uc9c1\uc740 \uc554\ud638\ud654\ub97c \ub3c4\uc785\ud558\uc5ec \ub370\uc774\ud130 \uc720\ucd9c\uacfc \uad00\ub828\ub41c \uc704\ud5d8\uc744 \uc644\ud654\ud574\uc57c \ud569\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uce98\ub9ac\ud3ec\ub2c8\uc544 \uc18c\ube44\uc790 \uac1c\uc778\uc815\ubcf4 \ubcf4\ud638\ubc95(<\/span><a href=\"https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id=201720180SB1121\"><span style=\"font-weight: 400;\">CCPA<\/span><\/a><span style=\"font-weight: 400;\">)\ub294 \uc804 \uc138\uacc4 \uae30\uc5c5\uc774 \uce98\ub9ac\ud3ec\ub2c8\uc544 \uc8fc\ubbfc\uc758 \uac1c\uc778 \uc815\ubcf4(PI)\ub97c \ucc98\ub9ac\ud558\ub294 \ubc29\ubc95\uc744 \uaddc\uc81c\ud558\ub294 \uc8fc \uc804\uc5ed\uc758 \ub370\uc774\ud130 \uac1c\uc778\uc815\ubcf4 \ubcf4\ud638\ubc95\uc785\ub2c8\ub2e4. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uaddc\uc81c \uae30\uad00\uc740 \ud2b9\ud788 '\uc554\ud638\ud654\ub418\uc9c0 \uc54a\uac70\ub098 \uc218\uc815\ub418\uc9c0 \uc54a\uc740 \uac1c\uc778\uc815\ubcf4'\uac00 \ud3ec\ud568\ub41c \uc0ac\uace0\uc758 \uacbd\uc6b0 \ub370\uc774\ud130 \uc720\ucd9c\uc5d0 \ub300\ud574 \uc870\uc9c1\uc5d0 \ubc8c\uae08\uc744 \ubd80\uacfc\ud560 \uc758\ud5a5\uc774 \uc788\ub294 \uac83\uc73c\ub85c \ub098\ud0c0\ub0ac\uc2b5\ub2c8\ub2e4.  \uaddc\uc81c \uae30\uad00\uc740 \uc870\uc9c1\uc774 \uc554\ud638\ud654\ub97c \uc0ac\uc6a9\ud558\uae30 \uc704\ud574 \ub178\ub825\ud558\ub294 \uacbd\uc6b0 \ucc45\uc784\uc744 \uba74\uc81c\ud560 \uac00\ub2a5\uc131\uc774 \ub192\uc2b5\ub2c8\ub2e4. \ub610\ud55c \uc601\ud5a5\uc744 \ubc1b\uc740 \ub370\uc774\ud130\uac00 \uc554\ud638 \ud574\ub3c5 \ud0a4 \uc5c6\uc774\ub294 \uc0ac\uc6a9\ud560 \uc218 \uc5c6\ub294 \uacbd\uc6b0\uc5d0\ub3c4 \uba74\ucc45\ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<h5><span style=\"color: #333399;\"><b>\ub370\uc774\ud130 \uc554\ud638\ud654 \ubaa8\ubc94 \uc0ac\ub840:<\/b><\/span><\/h5>\n<p><span style=\"font-weight: 400;\">\uc774\uc81c \uc554\ud638\ud654\uac00 \ubb34\uc5c7\uc778\uc9c0, \uc5b4\ub5bb\uac8c \uc791\ub3d9\ud558\ub294\uc9c0, \uc5b4\ub5bb\uac8c \ud53c\ud574\ub97c \uc644\ud654\ud560 \uc218 \uc788\ub294\uc9c0, \uadf8\ub9ac\uace0 \uc554\ud638\ud654\uc640 \uad00\ub828\ub41c \ub2e4\uc591\ud55c \uaddc\uc815\uc744 \uc54c\uc544\ubcf4\uc558\uc73c\ub2c8 \uc774\uc81c <\/span><span style=\"font-weight: 400;\">\uc870\uc9c1\uc744 \ub370\uc774\ud130 \uc720\ucd9c\uc5d0 \ucde8\uc57d\ud558\uac8c \ub9cc\ub4dc\ub294 \uc0ac\uace0\uc640 \ud5c8\uc810\uc744 \ud53c\ud558\uae30 \uc704\ud574 \ub370\uc774\ud130 \uc554\ud638\ud654\ub97c \uad6c\ud604\ud558\ub294 \uac00\uc7a5 \uc88b\uc740 \ubc29\ubc95\uc785\ub2c8\ub2e4.\u00a0<\/span><\/p>\n<p><strong>\ub2e4\uc74c\uc740 \uba87 \uac00\uc9c0 \uad8c\uc7a5 \uc0ac\ub840\uc785\ub2c8\ub2e4:<\/strong><\/p>\n<ul>\n<li><b>\uc774\ud574 \uad00\uacc4\uc790\uc640\uc758 \ud611\ub825 <\/b>\ubaa8\ub4e0 \uc774\ud574\uad00\uacc4\uc790, \ud2b9\ud788 \uc2e4\uc81c \ub370\uc774\ud130 \uc561\uc138\uc2a4 \uad8c\ud55c\uc774 \uc788\ub294 \uc774\ud574\uad00\uacc4\uc790\ub97c \ud30c\uc545\ud558\uace0 \ub370\uc774\ud130 \ubcf4\uc548\uc744 \uc704\ud55c \uac01\uc790\uc758 \uc5ed\ud560\uc744 \uc815\ud569\ub2c8\ub2e4. \ub2e4\uc74c\uc73c\ub85c \uc5b4\ub5a4 \uc815\ubcf4\ub97c \ubcf4\ud638\ud574\uc57c \ud558\ub294\uc9c0 \ud30c\uc545\ud558\uc138\uc694. \uc774\ub294 \ub370\uc774\ud130 \ubcf4\uc548\uc744 \uc704\ud55c \ub9e4\uc6b0 \uc911\uc694\ud55c \ub2e8\uacc4\uc785\ub2c8\ub2e4.<\/li>\n<li><b>\uc554\ud638\ud654 \ub3c4\uad6c \uc2dd\ubcc4 <\/b>\uc5b4\ub5a4 \ube44\ubc00 \ud0a4\/\uc554\ud638\ud654 \uc54c\uace0\ub9ac\uc998\uc744 \uc120\ud0dd\ud558\ub4e0 \ub2e4\uc74c\uacfc \uac19\uc740 \ud655\ub9bd\ub41c \ud45c\uc900 \ubc0f \ud504\ub808\uc784\uc6cc\ud06c\ub97c \ub530\ub77c\uc57c \ud569\ub2c8\ub2e4. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Federal_Information_Processing_Standards\">FIPS<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/ISO\/IEC_27000-series\">ISO\/IEC 27000<\/a>\ub610\ub294 <a href=\"https:\/\/en.wikipedia.org\/wiki\/NIST_Cybersecurity_Framework\">NIST<\/a>\ub97c \uc0ac\uc6a9\ud558\uc5ec \uc81c 3\uc790\uac00 \ub2e4\uc74c\uacfc \uac19\uc740 \ubc29\ubc95\uc73c\ub85c \uc554\ud638 \ud14d\uc2a4\ud2b8\ub97c \ud574\ub3c5\ud560 \uc218 \uc5c6\ub3c4\ub85d \ud569\ub2c8\ub2e4.<a href=\"https:\/\/en.wikipedia.org\/wiki\/Brute-force_attack\"> \ubb34\ucc28\ubcc4 \ub300\uc785<\/a>.<b><i> \u00a0<\/i><\/b><\/li>\n<li><b>\uc548\uc804\ud55c \uc554\ud638\ud654 \ud0a4 <\/b>\uad8c\ud55c\uc774 \uc5c6\ub294 \uc0ac\uc6a9\uc790\uc758 \uc190\uc5d0 \ub4e4\uc5b4\uac00\uc9c0 \uc54a\ub3c4\ub85d \ud0a4\ub97c \ubcf4\ud638\ud558\ub294 \uac83\uc740 \ub9e4\uc6b0 \uc911\uc694\ud569\ub2c8\ub2e4. \ub2e4\uc74c\uc740 \ud0a4\ub97c \ubcf4\ud638\ud558\ub294 \uba87 \uac00\uc9c0 \uae30\ubcf8 \ub2e8\uacc4\uc785\ub2c8\ub2e4:<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">\uc554\ud638\ud654\ub41c \ub370\uc774\ud130\uc640 \ud0a4\ub97c \ubd84\ub9ac\ud569\ub2c8\ub2e4.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">\ud0a4\ub97c \uc77c\ubc18 \ud14d\uc2a4\ud2b8 \ud30c\uc77c\uc5d0 \uc800\uc7a5\ud558\uc9c0 \ub9c8\uc138\uc694.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">\uad8c\ud55c\uc774 \ubd80\uc5ec\ub41c \uc0ac\uc6a9\uc790\uc5d0\uac8c\ub9cc \uad8c\ud55c\uc744 \uc81c\uacf5\ud558\uc138\uc694.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">\uc815\uae30\uc801\uc73c\ub85c \ud0a4\ub97c \ub3cc\ub9ac\uc138\uc694.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><b>\ud56d\uc0c1 \ub370\uc774\ud130 \ubcf4\ud638 <\/b>\uc870\uc9c1\uc740 \uc804\uc1a1 \uc911\uc778 \ub370\uc774\ud130\uc640 \ubbf8\uc0ac\uc6a9 \ub370\uc774\ud130\ub97c \ubcf4\ud638\ud560 \uacc4\ud68d\uc744 \uc138\uc6cc\uc57c \ud569\ub2c8\ub2e4. \ubbf8\uc0ac\uc6a9 \ub370\uc774\ud130 \uc554\ud638\ud654\ub97c \uc0ac\uc6a9\ud558\ub824\uba74 \uc911\uc694\ud55c \ud30c\uc77c\uc744 \uc800\uc7a5\ud558\uae30 \uc804\uc5d0 \uc554\ud638\ud654\ud558\uac70\ub098 \uc800\uc7a5 \ubbf8\ub514\uc5b4 \uc790\uccb4\ub97c \uc554\ud638\ud654\ud558\uc138\uc694. \uc804\uc1a1 \uc911\uc778 \ub370\uc774\ud130\ub97c \ubcf4\ud638\ud558\uae30 \uc704\ud574 \uc11c\ubc84\uc5d0 SSL\/TLS \uc778\uc99d\uc11c\ub97c \uc124\uce58\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<\/ul>\n<h5><strong><span style=\"color: #333399;\">\uacb0\ub860\u00a0<\/span><\/strong><\/h5>\n<p><span style=\"font-weight: 400;\">\ub370\uc774\ud130 \uc554\ud638\ud654\ub294 \uc815\ubcf4 \ubcf4\uc548\uc758 \uc911\uc694\ud55c \ubd80\ubd84\uc785\ub2c8\ub2e4. \ub370\uc774\ud130 \uc720\ucd9c\uc758 \uacb0\uacfc\ub294 \uaddc\uc81c \ucc98\ubc8c\ubd80\ud130 \uacbd\uc81c\uc801 \uc190\uc2e4\uc5d0 \uc774\ub974\uae30\uae4c\uc9c0 \uad11\ubc94\uc704\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. <\/span><span style=\"font-weight: 400;\">\uc554\ud638\ud654\ub97c \ubaa8\ubc94 \uc0ac\ub840\ub85c \ucc44\ud0dd\ud558\ub294 \uac83\uc740 \uc870\uc9c1\uc774 \uc774\ub7ec\ud55c \uc601\ud5a5\uc744 \uc644\ud654\ud560 \uc218 \uc788\ub294 \uac00\uc7a5 \uac04\ub2e8\ud558\uace0 \ud6a8\uacfc\uc801\uc778 \ubc29\ubc95\uc785\ub2c8\ub2e4.<\/span><span style=\"font-weight: 400;\">\uc774 \uae00\uc774 \uc554\ud638\ud654\uc758 \uc911\uc694\uc131\uacfc \uc774\uc640 \uad00\ub828\ub41c \uac70\ubc84\ub10c\uc2a4\uc5d0 \ub300\ud55c \uc815\ubcf4\ub97c \uc81c\uacf5\ud558\uace0 \uc815\ubcf4 \ubcf4\uc548\uc5d0 \ub300\ud55c \uc911\uc694\ud55c \uacb0\uc815\uc744 \ub0b4\ub9ac\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub418\uc5c8\uae30\ub97c \ubc14\ub78d\ub2c8\ub2e4.<\/span><\/p>\n<h5><span style=\"color: #333399;\"><strong>\ucc38\uc870<\/strong><\/span><\/h5>\n<p><a href=\"https:\/\/www.identityforce.com\/blog\/2020-data-breaches\"><span style=\"font-weight: 400;\">https:\/\/www.identityforce.com\/blog\/2020-data-breaches<\/span><\/a><\/p>\n<p><a href=\"https:\/\/securityboulevard.com\/2020\/03\/understanding-data-encryption-requirements-for-gdpr-ccpa-lgpd-hipaa\/\"><span style=\"font-weight: 400;\">https:\/\/securityboulevard.com\/2020\/03\/understanding-data-encryption-requirements-for-gdpr-ccpa-lgpd-hipaa\/<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.securitymetrics.com\/blog\/what-are-12-requirements-pci-dss-compliance\"><span style=\"font-weight: 400;\">https:\/\/www.securitymetrics.com\/blog\/what-are-12-requirements-pci-dss-compliance<\/span><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>This article aims to bring awareness around the importance of data encryption, considering the astounding rate at which data is being produced, transmitted and consumed. We will discuss the need for data protection, regulation, and some encryption best practices. Organizations [&hellip;]<\/p>","protected":false},"author":58641,"featured_media":11209,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1815],"tags":[1666,2135],"ppma_author":[9111],"class_list":["post-11179","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practices-and-tutorials","tag-encryption","tag-gdpr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v25.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Data Encryption Is Essential - The Couchbase Blog<\/title>\n<meta name=\"description\" content=\"Data encryption can help organizations mitigate risks and stop data sprawl and cyberattacks before they occur. \u2713 Do more with Couchbase.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/ko\/why-data-encryption-is-essential-2\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Data Encryption Is Essential\" \/>\n<meta property=\"og:description\" content=\"Data encryption can help organizations mitigate risks and stop data sprawl and cyberattacks before they occur. \u2713 Do more with Couchbase.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/ko\/why-data-encryption-is-essential-2\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-20T15:10:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2021\/05\/essential-encryption-blogbanner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1575\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Arun Vijayraghavan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arun Vijayraghavan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/\"},\"author\":{\"name\":\"Arun Vijayraghavan\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/159f967ae0328d6bd25d6389be35e843\"},\"headline\":\"Why Data Encryption Is Essential\",\"datePublished\":\"2021-05-20T15:10:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/\"},\"wordCount\":1314,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/essential-encryption-blogbanner.jpg\",\"keywords\":[\"Encryption\",\"gdpr\"],\"articleSection\":[\"Best Practices and Tutorials\"],\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/\",\"name\":\"Why Data Encryption Is Essential - The Couchbase Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/essential-encryption-blogbanner.jpg\",\"datePublished\":\"2021-05-20T15:10:20+00:00\",\"description\":\"Data encryption can help organizations mitigate risks and stop data sprawl and cyberattacks before they occur. \u2713 Do more with Couchbase.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#primaryimage\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/essential-encryption-blogbanner.jpg\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/essential-encryption-blogbanner.jpg\",\"width\":1575,\"height\":628,\"caption\":\"A padlock on a black wooden surface, representing the importance of protecting information with data encryption\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.couchbase.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Data Encryption Is Essential\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/159f967ae0328d6bd25d6389be35e843\",\"name\":\"Arun Vijayraghavan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/042b27309bc3f10ef696264d6a250a75\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ecf222f7ec7d1f7bb6305543ab979690ed30f98bbc8fa806ffca5bf8cf3dd8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ecf222f7ec7d1f7bb6305543ab979690ed30f98bbc8fa806ffca5bf8cf3dd8?s=96&d=mm&r=g\",\"caption\":\"Arun Vijayraghavan\"},\"description\":\"Arun Vijayraghavan is the Principal Product Manager for SDK and Connectors at Couchbase. As a customer obsessed product leader, he strives to shape the future of products, making critical decisions between performance, features, and time-to-market. He has a demonstrated ability and an established track record of over 20 years of providing strategic guidance to companies to launch developer platforms and new products in order to pull together the single vision of maximizing business value of the product. Arun holds dual master degree's in Physics and Information Technology.\",\"sameAs\":[\"https:\/\/www.couchbase.com\",\"https:\/\/www.linkedin.com\/in\/avijayraghavan\/\"],\"url\":\"https:\/\/www.couchbase.com\/blog\/ko\/author\/arun-vijayraghavan\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why Data Encryption Is Essential - The Couchbase Blog","description":"Data encryption can help organizations mitigate risks and stop data sprawl and cyberattacks before they occur. \u2713 Do more with Couchbase.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/ko\/why-data-encryption-is-essential-2\/","og_locale":"ko_KR","og_type":"article","og_title":"Why Data Encryption Is Essential","og_description":"Data encryption can help organizations mitigate risks and stop data sprawl and cyberattacks before they occur. \u2713 Do more with Couchbase.","og_url":"https:\/\/www.couchbase.com\/blog\/ko\/why-data-encryption-is-essential-2\/","og_site_name":"The Couchbase Blog","article_published_time":"2021-05-20T15:10:20+00:00","og_image":[{"width":1575,"height":628,"url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2021\/05\/essential-encryption-blogbanner.jpg","type":"image\/jpeg"}],"author":"Arun Vijayraghavan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Arun Vijayraghavan","Est. reading time":"7\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/"},"author":{"name":"Arun Vijayraghavan","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/159f967ae0328d6bd25d6389be35e843"},"headline":"Why Data Encryption Is Essential","datePublished":"2021-05-20T15:10:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/"},"wordCount":1314,"commentCount":0,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/essential-encryption-blogbanner.jpg","keywords":["Encryption","gdpr"],"articleSection":["Best Practices and Tutorials"],"inLanguage":"ko-KR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/","url":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/","name":"Why Data Encryption Is Essential - The Couchbase Blog","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/essential-encryption-blogbanner.jpg","datePublished":"2021-05-20T15:10:20+00:00","description":"Data encryption can help organizations mitigate risks and stop data sprawl and cyberattacks before they occur. \u2713 Do more with Couchbase.","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/essential-encryption-blogbanner.jpg","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/essential-encryption-blogbanner.jpg","width":1575,"height":628,"caption":"A padlock on a black wooden surface, representing the importance of protecting information with data encryption"},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why Data Encryption Is Essential"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"\uce74\uc6b0\uce58\ubca0\uc774\uc2a4 \ube14\ub85c\uadf8","description":"NoSQL \ub370\uc774\ud130\ubca0\uc774\uc2a4, Couchbase","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"\uce74\uc6b0\uce58\ubca0\uc774\uc2a4 \ube14\ub85c\uadf8","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/159f967ae0328d6bd25d6389be35e843","name":"\uc544\ub8ec \ube44\uc81c\uc774\ub77c\uac00\ubc18","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/042b27309bc3f10ef696264d6a250a75","url":"https:\/\/secure.gravatar.com\/avatar\/c4ecf222f7ec7d1f7bb6305543ab979690ed30f98bbc8fa806ffca5bf8cf3dd8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ecf222f7ec7d1f7bb6305543ab979690ed30f98bbc8fa806ffca5bf8cf3dd8?s=96&d=mm&r=g","caption":"Arun Vijayraghavan"},"description":"\uc544\ub8ec \ube44\uc81c\uc774\ub77c\uac00\ubc18\uc740 \uce74\uc6b0\uce58\ubca0\uc774\uc2a4\uc758 SDK \ubc0f \ucee4\ub125\ud130 \ubd80\ubb38 \uc218\uc11d \uc81c\ud488 \uad00\ub9ac\uc790\uc785\ub2c8\ub2e4. \uace0\uac1d\uc5d0 \uc9d1\ucc29\ud558\ub294 \uc81c\ud488 \ub9ac\ub354\uc778 \uadf8\ub294 \uc131\ub2a5, \uae30\ub2a5, \ucd9c\uc2dc \uae30\uac04 \uc0ac\uc774\uc5d0\uc11c \uc911\uc694\ud55c \uacb0\uc815\uc744 \ub0b4\ub9ac\ub294 \ub4f1 \uc81c\ud488\uc758 \ubbf8\ub798\ub97c \uc124\uacc4\ud558\uae30 \uc704\ud574 \ub178\ub825\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\ub294 \uc81c\ud488\uc758 \ube44\uc988\ub2c8\uc2a4 \uac00\uce58\ub97c \uadf9\ub300\ud654\ud55c\ub2e4\ub294 \ub2e8\uc77c \ube44\uc804\uc744 \ub2ec\uc131\ud558\uae30 \uc704\ud574 \uac1c\ubc1c\uc790 \ud50c\ub7ab\ud3fc\uacfc \uc2e0\uc81c\ud488 \ucd9c\uc2dc\ub97c \uc704\ud55c \uc804\ub7b5\uc801 \uc9c0\uce68\uc744 \uae30\uc5c5\uc5d0 \uc81c\uacf5\ud558\ub294 \ub370 \uc788\uc5b4 20\ub144\uc774 \ub118\ub294 \uae30\uac04 \ub3d9\uc548 \uc785\uc99d\ub41c \ub2a5\ub825\uacfc \ud0c4\ud0c4\ud55c \uc2e4\uc801\uc744 \ubcf4\uc720\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc544\ub8ec\uc740 \ubb3c\ub9ac\ud559 \ubc0f \uc815\ubcf4 \uae30\uc220 \ubd84\uc57c\uc758 \ubcf5\uc218 \uc11d\uc0ac \ud559\uc704\ub97c \ubcf4\uc720\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","sameAs":["https:\/\/www.couchbase.com","https:\/\/www.linkedin.com\/in\/avijayraghavan\/"],"url":"https:\/\/www.couchbase.com\/blog\/ko\/author\/arun-vijayraghavan\/"}]}},"authors":[{"term_id":9111,"user_id":58641,"is_guest":0,"slug":"arun-vijayraghavan","display_name":"Arun Vijayraghavan","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/c4ecf222f7ec7d1f7bb6305543ab979690ed30f98bbc8fa806ffca5bf8cf3dd8?s=96&d=mm&r=g","author_category":"","last_name":"Vijayraghavan","first_name":"Arun","job_title":"","user_url":"https:\/\/www.couchbase.com","description":"\uc544\ub8ec \ube44\uc81c\uc774\ub77c\uac00\ubc18\uc740 \uce74\uc6b0\uce58\ubca0\uc774\uc2a4\uc758 SDK \ubc0f \ucee4\ub125\ud130 \ubd80\ubb38 \uc218\uc11d \uc81c\ud488 \uad00\ub9ac\uc790\uc785\ub2c8\ub2e4. \uace0\uac1d\uc5d0 \uc9d1\ucc29\ud558\ub294 \uc81c\ud488 \ub9ac\ub354\uc778 \uadf8\ub294 \uc131\ub2a5, \uae30\ub2a5, \ucd9c\uc2dc \uae30\uac04 \uc0ac\uc774\uc5d0\uc11c \uc911\uc694\ud55c \uacb0\uc815\uc744 \ub0b4\ub9ac\ub294 \ub4f1 \uc81c\ud488\uc758 \ubbf8\ub798\ub97c \uc124\uacc4\ud558\uae30 \uc704\ud574 \ub178\ub825\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\ub294 \uc81c\ud488\uc758 \ube44\uc988\ub2c8\uc2a4 \uac00\uce58\ub97c \uadf9\ub300\ud654\ud55c\ub2e4\ub294 \ub2e8\uc77c \ube44\uc804\uc744 \ub2ec\uc131\ud558\uae30 \uc704\ud574 \uac1c\ubc1c\uc790 \ud50c\ub7ab\ud3fc\uacfc \uc2e0\uc81c\ud488 \ucd9c\uc2dc\ub97c \uc704\ud55c \uc804\ub7b5\uc801 \uc9c0\uce68\uc744 \uae30\uc5c5\uc5d0 \uc81c\uacf5\ud558\ub294 \ub370 \uc788\uc5b4 20\ub144\uc774 \ub118\ub294 \uae30\uac04 \ub3d9\uc548 \uc785\uc99d\ub41c \ub2a5\ub825\uacfc \ud0c4\ud0c4\ud55c \uc2e4\uc801\uc744 \ubcf4\uc720\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc544\ub8ec\uc740 \ubb3c\ub9ac\ud559 \ubc0f \uc815\ubcf4 \uae30\uc220 \ubd84\uc57c\uc758 \ubcf5\uc218 \uc11d\uc0ac \ud559\uc704\ub97c \ubcf4\uc720\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4."}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/posts\/11179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/users\/58641"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/comments?post=11179"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/posts\/11179\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/media\/11209"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/media?parent=11179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/categories?post=11179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/tags?post=11179"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/ppma_author?post=11179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}