{"id":387042,"date":"2020-05-29T06:59:56","date_gmt":"2020-05-29T13:59:56","guid":{"rendered":"https:\/\/blog.webex.com\/uncategorized-ko\/%ed%97%a4%eb%93%9c%ec%85%8b-%eb%b3%b4%ec%95%88-%ec%95%8c%ea%b3%a0-%ec%9e%88%eb%8a%94-%ea%b2%83\/"},"modified":"2020-05-29T06:59:56","modified_gmt":"2020-05-29T13:59:56","slug":"%ed%97%a4%eb%93%9c%ec%85%8b-%eb%b3%b4%ec%95%88-%ec%95%8c%ea%b3%a0-%ec%9e%88%eb%8a%94-%ea%b2%83","status":"publish","type":"post","link":"https:\/\/blog.webex.com\/ko\/%ed%98%91%ec%97%85\/%ed%97%a4%eb%93%9c%ec%85%8b-%eb%b3%b4%ec%95%88-%ec%95%8c%ea%b3%a0-%ec%9e%88%eb%8a%94-%ea%b2%83\/","title":{"rendered":"\ud5e4\ub4dc\uc14b \ubcf4\uc548: \uc54c\uace0 \uc788\ub294 \uac83"},"content":{"rendered":"<h2><span><br \/>\n  <strong>\ud5e4\ub4dc\uc14b \ubcf4\uc548 \uc774\ud574\ud558\uae30<\/strong><br \/>\n<\/span><\/h2>\n<p>\ube14\ub8e8\ud22c\uc2a4 \ud5e4\ub4dc\uc14b\uc744 \uc120\ud0dd\ud560 \ub54c \uace0\ub824\ud574\uc57c \ud560 \uc8fc\uc694 \uc0ac\ud56d\uc740 \ubb34\uc5c7\uc785\ub2c8\uae4c? \ub300\ubd80\ubd84\uc758 \uad6c\ub9e4\uc790\ub294 \uc74c\ud5a5, \ud3b8\uc548\ud558\uac8c, \uc591\uc2dd \uc694\uc18c, \uae30\ub2a5, \uc18c\uc74c, \uc5f0\uacb0 \uc2a4\ud0c0\uc77c \ub610\ub294 \uc751\uc6a9\ud504\ub85c\uadf8\ub7a8 \ubc0f \uc7a5\uce58\uc640\uc758 \ud638\ud658\uc131\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ub108\ubb34 \ub9ce\uc740 \uad6c\uc785\uc790\uac00 \uace0\ub824\ud558\uc9c0 \uc54a\ub294 \uc911\uc694\ud55c \uc694\uc18c\ub294 \ud5e4\ub4dc\uc14b\uc5d0 \uc5b4\ub5a4 \uc885\ub958\uc758 \ubcf4\uc548 \uae30\ub2a5\uc774 \ucd94\uac00\ub418\uc5b4 \uc788\uc9c0\ub294 \uc54a\uc740\uc9c0 \uc0dd\uac01\ud574 \ubcf4\uc544\uc57c \ud569\ub2c8\ub2e4. \uc608\ub97c \ub4e4\uc5b4, 85%<sup>1<\/sup> \uc758 \uc0ac\uc6a9\uc790\ub294 \ube14\ub8e8\ud22c\uc2a4\uac00 \uc548\uc804\ud55c \ud1b5\uc2e0\uc744 \uc81c\uacf5\ub41c\ub2e4\uace0 \ub290\ub07c\uace0 \uc788\uc9c0\ub9cc, \uc624\ub298\ub0a0 IoT \uc138\uacc4\uc5d0\uc11c \uc704\ud611\uc740 \ub354\uc6b1 \uc815\uad50\ud574\uc9c0\uace0 \uc788\uc2b5\ub2c8\ub2e4. \ub300\ubd80\ubd84\uc758 \uc0ac\ub78c\ub4e4\uc774 \ud5e4\ub4dc\uc14b\uc744 \uc88b\uc740 \uae30\ub2a5\uc744 \uc81c\uacf5\ud558\uace0 \uc2a4\ub9c8\ud2b8\ud3f0 \ub610\ub294 \ub178\ud2b8\ubd81\uc5d0 \uc5f0\uacb0\ud558\ub294 \uae30\ubcf8 \uc7a5\uce58\ub85c \uace0\ub824\ud569\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \uc2e4\uc81c\ub85c \uadf8\ub4e4\uc740 \uc548\uc804\ud558\uace0 \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \ud1b5\uc2e0\uc744 \uc81c\uacf5\ud558\uae30 \uc704\ud574 \ub9e4\uc6b0 \uc911\uc694\ud55c \uc5ed\ud560\uc744 \ud569\ub2c8\ub2e4. \ub2e4\ub978 \uc2a4\ub9c8\ud2b8 \uc7a5\uce58\uc640 \uac19\uc774, \ub300\ubd80\ubd84\uc758 \ud604\ub300\uc2dd \ud5e4\ub4dc\uc14b\uc740 \ubcf5\uc7a1\ud55c \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub97c \uc2e4\ud589\ud558\uba70, \ud2b9\ud788 \ud398\uc5b4\ub9c1\ub41c \uc7a5\uce58 \uac04\uc5d0 \uc774\ub3d9\ud558\ub294 \ub370\uc774\ud130\uc758 \uc591\uacfc \ud568\uaed8 \uc548\uc804\ud558\uc9c0 \uc54a\uc740 \uacbd\uc6b0 \uacf5\uaca9\uc5d0 \ucde8\uc57d\ud558\uac8c \ud569\ub2c8\ub2e4.<\/p>\n<p>\uc6f9\ucea0\uc744 \ucee4\ubc84\ud558\uae30 \uc704\ud574 \uc77c\ubd80\ub97c \uc0ac\uc6a9\ud560 \uc218 \uc788\ub294 \uc11c\ube44\uc2a4\ub97c \ucd94\uac00\ud55c \uc0ac\uc6a9\uc790\uac00 \uc788\uc2b5\ub2c8\ub2e4. \ub610\ub294 \uc9c1\uc811 \ucee4\ubc84\ud55c \uac83\uc77c \uc218\ub3c4 \uc788\uc2b5\ub2c8\ub2e4. \ub354\uc6b1 \uc2e0\uc911\ud55c \uc0ac\uc6a9\uc790\ub294 \uc7a5\uce58\uc758 \ub9c8\uc774\ud06c\uac00 \ud574\ud0b9\ub418\ub294 \uac83\uc744 \uac71\uc815\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub610\ud55c \ud5e4\ub4dc\uc14b\uc740 \ubcfc\ub968 \ubcc0\uacbd, \ud2b8\ub799 \uac74\ub108\ub6f0\uae30, \uc624\ub514\uc624 \ub179\ud654 \ubc0f \uac1c\uc778 \uc815\ubcf4 \ub3c4\uc6a9\uacfc \uac19\uc740 \uc2ec\uac01\ud55c \uacf5\uaca9\uc73c\ub85c \uac74\ub108\ub6f0\uae30\ud558\ub294 \ub4f1 \uc758\ub3c4\uce58 \uc54a\uc740 \uc791\uc5c5\uc744 \uc218\ud589\ud558\uae30 \uc704\ud574 \ud574\ud0b9\ub420 \uc218\ub3c4 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<h2><span><br \/>\n  <strong>\ube14\ub8e8\ud22c\uc2a4 \ubcf4\uc548\uc5d0 \uc2ec\uac01\ud55c \ucde8\uc57d\uc810<\/strong><br \/>\n<\/span><\/h2>\n<p>\ucd5c\uadfc \uc5f0\uad6c\ud300\uc740 \uc774(\uac00) \uc774\uc804\uc758 \ube14\ub8e8\ud22c\uc2a4 \uce69\uc758 \ucde8\uc57d\uc810\uc73c\ub85c \uc774(\uac00) \uc870\uc778\ud2b8(OB) \uacf5\uaca9\uc774\ub77c\uace0 \ubc1d\ud614\uc2b5\ub2c8\ub2e4. \uc774 \ucde8\uc57d\uc810\uc740 \ub108\ubb34 \uae30\uc220\uc801\uc778 \uac83\uc774\ub098, \uc218\uc2e0\ud558\ub294 \uc7a5\uce58\uc5d0\uc11c \ud6e8\uc52c \ub0ae\uc740 \uc218\uc900\uc758 \ubcf4\uc548\uc744 \ud611\uc0c1\ud558\uae30 \uc704\ud55c \uac83\uc785\ub2c8\ub2e4. \uc77c\ubc18\uc801\uc73c\ub85c \ube14\ub8e8\ud22c\uc2a4 \uc5f0\uacb0 \ubc0f \uad50\ud658\uc740 \uc554\ud638\ud654\ub418\uba70, 128\ube44\ud2b8 \ud0a4\ub97c \uc0ac\uc6a9\ud558\uc5ec 128\ube44\ud2b8 \ud0a4\ub97c \uc554\ud638\ud654\ud558\ub294 \ub370 \uba87 \uac1c\uc6d4\uc774 \uac78\ub9ac\uc9c0\ub9cc, \uc9e7\uc740 \ud0a4\uac00 \ud611\uc0c1\ub420 \uacbd\uc6b0 \uba87 \ucd08\uac00 \uc18c\uc694\ub420 \uc218\ub3c4 \uc788\uc2b5\ub2c8\ub2e4. \uacf5\uaca9\uc790\uac00 \uc5f0\uacb0 \ubc0f \ub3c4\uc6b0\ubbf8\ub97c \ud574\ud0b9\ud560 \uc218 \uc788\ub294 \uacb0\uacfc\ub85c \uc774\uc5b4\uc9c0\uace0 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<h2><span><br \/>\n  <strong>Cisco \ud5e4\ub4dc\uc14b \u2014 \ubcf4\uc548\uc744 \uc704\ud55c \uc0c8\ub85c\uc6b4 \uae30\ucd08\ub97c \ub2e4\uc9c0\uae30\u00a0\u00a0<\/strong><br \/>\n<\/span><\/h2>\n<p>\ud604\uc7ac Cisco \ud5e4\ub4dc\uc14b\uc740 \uac00\uc7a5 \uc5c4\uaca9\ud55c \uac1c\uc778 \uc815\ubcf4 \ubc0f \ubcf4\uc548 \uc815\ucc45\uc774 \uc801\uc6a9\ub41c \uc815\ubd80, \uc758\ub8cc, \uae08\uc735 \ubc0f \ubc95\uc801 \uc870\uc9c1\uc5d0 \ubc30\ud3ec\ub418\uc5b4 \uc788\uc2b5\ub2c8\ub2e4. \ud558\uc9c0\ub9cc \ubcf4\uc548 \uc704\ud611\uc758 \ubcf4\uc548 \uc704\ud611\uc73c\ub85c \uc778\ud574 \uae30\ubc00 \uc815\ubcf4\ub97c \ucc98\ub9ac\ud558\ub294 \uae30\uc5c5 \ubc0f \uc5f0\ubc29 \uae30\uad00\uc5d0\uc11c\ub294 \ube14\ub8e8\ud22c\uc2a4 \ud5e4\ub4dc\uc14b\uc774 \uc544\uc9c1 \ucc44\ud0dd\ub418\uc9c0 \uc54a\uc558\uc2b5\ub2c8\ub2e4. \ubb34\uc120 \uc7a5\uce58\uc5d0 \ub300\ud55c \uc218\uc694\ub294 \uc774 \ubd80\ubb38\uc5d0\uc11c \ube60\ub974\uac8c \uc99d\uac00\ud558\uace0 \uc788\uc73c\uba70, \ud574\ub2f9 \uc5d0\uc774\uc804\uc2dc\ub4e4\uc740 \uc624\ub298\ub0a0 \uc2dc\uc7a5\uc5d0\uc11c \uac00\uc7a5 \ub192\uc740 \uc218\uc900\uc758 \ubcf4\uc548 \uc694\uad6c \uc0ac\ud56d \ubc0f \uae30\ub2a5\uc744 \uc0ac\uc6a9\ud560 \uc218 \uc788\ub294 \ube14\ub8e8\ud22c\uc2a4 \ud5e4\ub4dc\uc14b\uc744 \ube4c\ub4dc\ud558\ub3c4\ub85d Cisco\ub85c \uc804\ud658\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. (\uc608: \uace0\uc6a9\uc8fc\uac00 \uc81c\uacf5\ud55c \uc7a5\uce58\ub85c\ub9cc \ud398\uc5b4\ub9c1\uc744 \uc81c\ud55c\ud558\uac70\ub098 \uc7a5\uce58\uc5d0 \ud398\uc5b4\ub9c1\ud558\uae30 \uc704\ud574 \uace0\uc720\ud55c PIN\uc744 \uc694\uad6c\ud558\ub294 \uacbd\uc6b0)<\/p>\n<p><em>&#8220;Cisco \ud5e4\ub4dc\uc14b\uc5d0\uc11c \uac00\uc7a5 \uc9d1\uc911\ud55c \uc810\uc740 \uace0\uae09 \ubcf4\uc548 \uae30\ub2a5, \uadf8\ub9ac\uace0 \ubc31-\uc778 \uad00\ub9ac \uae30\ub2a5\uc785\ub2c8\ub2e4. Cisco \ud300\uc774 \uc218\ud589\ud558\uace0 \uc788\ub294 \uc5c5\ubb34\ub294 \ud2b9\ud788 \uc804\ud654 \ubc0f \ub2e4\ub978 \uc561\uc138\uc2a4 \ud3ec\uc778\ud2b8\uc5d0\uc11c Cisco\uc758 \ubcf4\uc548\uc5d0 \uc775\uc219\ud55c \ubcf4\uc548 \uc778\uc99d\uc790\ub4e4\uc774 \ube14\ub8e8\ud22c\uc2a4 \ud5e4\ub4dc\uc14b\uc744 \ucc44\ud0dd\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub420 \uac83\uc785\ub2c8\ub2e4.&#8221;\ub77c\uace0 \ud569\ub2c8\ub2e4. <\/em><\/p>\n<p>-Sr \uae30\uc220 \uace0\ubb38, \ubbf8\uc5f0\ubc29<\/p>\n<p>\ubcf4\uc548\uc740 \ud504\ub9ac\ubbf8\uc5c4 \ube14\ub8e8\ud22c\uc2a4 \ud5e4\ub4dc\uc14b\uc778 Cisco \ud5e4\ub4dc\uc14b 730\uc758 \ud575\uc2ec\uc5d0 \ub0b4\uc7a5\ub418\uc5b4 \uc788\uc2b5\ub2c8\ub2e4.\u00a0\uc624\ub298\ub0a0 \uc704\ud611\uc740 \uc9c0\uc18d\uc801\uc73c\ub85c \uc99d\uac00\ud558\uace0 \uc788\uc73c\uba70, \uc9c0\uc18d\uc801\uc73c\ub85c \uc9c0\uc6d0\uc774 \uc548\uc804\ud558\uac8c \ud1b5\uc2e0\ud560 \uc218 \uc788\ub3c4\ub85d \uc9c0\uc18d\uc801\uc73c\ub85c \ud22c\uc790\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. <a href=\"https:\/\/www.cisco.com\/c\/dam\/en_us\/about\/doing_business\/trust-center\/docs\/cisco-secure-development-lifecycle.pdf\">\ubaa8\ub4e0 \uc81c\ud488\uc740 Cisco Secure Development Lifecycle<\/a> (CSDL)\uc744 \ud1b5\uacfc\ud558\uba70, \uc774\ub294 \uac1c\ubc1c \uacfc\uc815\uc758 \ubaa8\ub4e0 \ub2e8\uacc4\uc5d0\uc11c \uc5c5\uacc4 \uc120\ub450\uc758 \uc0ac\ub840 \ubc0f \uae30\uc220\uc744 \uc801\uc6a9\ud558\uace0 \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \uc194\ub8e8\uc158\uc744 \uad6c\ucd95\ud558\uace0 \uc81c\ud488 \ucd9c\uc2dc \uc804\uc5d0 \ubcf4\uc548 \uac8c\uc774\ud2b8\uc758 \uc5ed\ud560\uc744 \ud558\ub294 \ub3c5\ub9bd\uc801\uc778 \ub2e8\uccb4\uc785\ub2c8\ub2e4. \ud5e4\ub4dc\uc14b 730\uc758 \uac1c\ubc1c\uc740 \ubcf4\uc548 \ubd80\ud305 \ubc0f \uc774\ubbf8\uc9c0 \uc778\uc99d\uc744 \ud1b5\ud55c \uae30\uc5c5\uc6a9 \ub4f1\uae09\uc758 \ud558\ub4dc\uc6e8\uc5b4 \ubc0f \uc18c\ud504\ud2b8\uc6e8\uc5b4 \ubcf4\ud638\uac00 \uc5c5\uacc4 \ucd5c\ucd08\uc774\uae30 \ub54c\ubb38\uc774\ub2e4.<\/p>\n<h2><span><br \/>\n  <strong>\uc18c\ud504\ud2b8\uc6e8\uc5b4\uc758 \ubcf8\uc9c8\uc801\uc778 \ubcf4\uc548<\/strong><br \/>\n<\/span><\/h2>\n<p>Cisco\ub294 AES 128\ube44\ud2b8 \ud0a4\ub97c \uc0ac\uc6a9\ud558\uc5ec \ud5e4\ub4dc\uc14b \ud38c\uc6e8\uc5b4\ub97c \uc554\ud638\ud654\ud558\uace0 \ud655\uc778\ub41c \uc774\ubbf8\uc9c0\ub9cc \uc124\uce58\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub610\ud55c \uc774 \ubcf4\ud638\ub97c \ubb34\uc2dc\ud560 \uc218 \uc788\ub294 \uaddc\uc815\ub3c4 \uc5c6\uc2b5\ub2c8\ub2e4. \uc774\ub294 \ud38c\uc6e8\uc5b4\uc758 \uc644\uc804\uc131\uc744 \ubcf4\uc7a5\ud558\uace0 \uc545\uc131 \ucf54\ub4dc \uc124\uce58\uc758 \uac00\ub2a5\uc131\uc744 \ucd5c\uc18c\ud654\ud569\ub2c8\ub2e4.<\/p>\n<h2><span><br \/>\n  <strong>\ubb3c\ub9ac\uc801 \ub3c4\ud0b9\uc5d0 \ub300\ud55c \ubcf4\ud638<\/strong><br \/>\n<\/span><\/h2>\n<p>\uc124\uce58\ub41c \ud38c\uc6e8\uc5b4 \ud655\uc778\uacfc \ubcc4\ub3c4\ub85c, AES-CCM \ub2e4\uc774\uc81c\uc2a4\ud2b8\ub97c \uc0ac\uc6a9\ud558\ub294 \ubaa8\ub4e0 \uc2f1\uae00 \ubd80\ud305 \ud504\ub85c\uc138\uc2a4\uc5d0\uc11c \ud5e4\ub4dc\uc14b 730\ub3c4 \uac80\uc99d\ub429\ub2c8\ub2e4. \uc774\ub97c \ud1b5\ud574 \uc7a5\uce58\uac00 \uc778\uc99d\ub418\uace0, \uad00\ub9ac\ub418\uc9c0 \uc54a\ub3c4\ub85d \ud569\ub2c8\ub2e4. \uc5ed\ub3d9\uc801\uc778 \uc0ac\uc6a9\uc790\uac00 \uc7a5\uce58\uc5d0 \ubb3c\ub9ac\uc801\uc73c\ub85c \uc561\uc138\uc2a4\ud560 \uc218 \uc788\ub294 \uacbd\uc6b0\uc5d0\ub3c4 \ud574\ub2f9 \uc7a5\uce58\uac00 \uc778\uc99d\ub418\uace0 \uc81c\uc5b4\ub418\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4. \ub610\ud55c \uc774 \uae30\ub2a5\uc740 \uae30\ubcf8\uac12\uc73c\ub85c \ud65c\uc131\ud654\ub418\uc5b4 \uc788\uc73c\uba70, \uc6b0\ud68c\ud558\uac70\ub098 \ube44\ud65c\uc131\ud654\ud560 \uc218 \uc788\ub294 \uaddc\uc815\uc740 \uc5c6\uc2b5\ub2c8\ub2e4.<\/p>\n<h2><span><br \/>\n  <strong>\uc778\ud154\ub9ac\uc804\ud2b8 \ubc0f \ud1b5\ud569 \ud5e4\ub4dc\uc14b \uad00\ub9ac<\/strong><br \/>\n<\/span><\/h2>\n<p>\ucd5c\uc2e0 \ud38c\uc6e8\uc5b4\uc5d0\uc11c \ud5e4\ub4dc\uc14b\uc774 \uc2e4\ud589\ub418\uace0 \uc788\ub294\uc9c0 \ud655\uc778\ud558\uba74 \uacf5\uaca9\uc5d0 \ub300\ud574 \uac00\uc7a5 \ub192\uc740 \uc218\uc900\uc758 \ubcf4\ud638\ub97c \ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ubbfc\uac10\ud55c \uc815\ubcf4\ub97c \ub2e4\ub8e8\ub294 \uac00\uc7a5 \ucde8\uc57d\ud55c \uc0ac\ub78c\uc740 \ud5e4\ub4dc\uc14b\uc744 \uad00\ub9ac\ud558\uac70\ub098 \uc5c5\uadf8\ub808\uc774\ub4dc\ud560 \uc2dc\uac04\uc774 \uc5c6\ub294 \uc0ac\ub78c\uc785\ub2c8\ub2e4.\u00a0 Cisco\uc758 \ud1b5\ud569\ub41c \uad00\ub9ac \uae30\ub2a5\uc744 \uc0ac\uc6a9\ud558\uc5ec IT \uad00\ub9ac\uc790\uac00 \ud5e4\ub4dc\uc14b \ud38c\uc6e8\uc5b4\ub97c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \ubc30\ud3ec, \uad6c\uc131\ud558\uace0 \ubaa8\ub2c8\ud130\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4&#8230; \ucd5c\uc885 \uc0ac\uc6a9\uc790\uac00 \ucde8\ud574\uc57c \ud560 \uc791\uc5c5\uc740 \uc5c6\uc2b5\ub2c8\ub2e4.<\/p>\n<p>Cisco\ub294 \ud5e4\ub4dc\uc14b \ubcf4\uc548\uc5d0 \ub300\ud55c \uc0c8\ub85c\uc6b4 \uae30\ucd08\ub97c \ub2e4\uc9c0\uba70, \ubcf4\uc548 \uc704\ud5d8\uc740 \ud56d\uc0c1 \uc624\ub298\ub0a0 \ud604\ub300\uc2dd \uc138\uacc4\uc5d0\uc11c \uacc4\uc18d \ubc1c\uc804\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc800\ud76c\uc758 \ube44\uc804\uc740 \ucd5c\uc2e0 \uae30\uc220, \ud604\ub300\uc2dd \uc591\uc2dd \uc694\uc18c \ubc0f \uc5b4\ub5a4 \ud658\uacbd\uc5d0\uc11c\ub4e0 \uc0ac\uc6a9\ud560 \uc218 \uc788\ub294 \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \uc548\uc804\ud55c \ud1b5\uc2e0\uc744 \uc9c0\uc6d0\ud560 \uc218 \uc788\ub294 \uae30\uc5c5\uae09\uc758 \ud1b5\ud569\ub41c \ud1b5\uc2e0 \ud5e4\ub4dc\uc14b\uc744 \ube4c\ub4dc\ud558\ub294 \uac83\uc785\ub2c8\ub2e4.<\/p>\n<blockquote><p>\uc801\ud569\ud55c \ube44\uc988\ub2c8\uc2a4 \ud5e4\ub4dc\uc14b\uc744 \ucc3e\uae30 \uc704\ud574 \ub3c4\uc6c0\uc774 \ud544\uc694\ud55c \uacbd\uc6b0, \uc5ec\uae30\uc5d0\uc11c <a href=\"https:\/\/ebooks.cisco.com\/story\/business-headsets-key-to-workplace-ebook-us\/?ccid=cc001192&#038;oid=ebkco020228\">eBook\uc744 \uc77d\uc73c\uc2ed\uc2dc\uc624<\/a>.<\/p><\/blockquote>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-325004 size-full\" title=\"https:\/\/www.cisco.com\/c\/m\/en_us\/products\/conferencing\/webex-secure-video-conferencing.html?socialshare=webex_secure\" src=\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2020\/05\/Security-thats-built-in-not-bolted-on.png\" sizes=\"auto, (max-width: 752px) 100vw, 752px\" srcset=\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2020\/05\/Security-thats-built-in-not-bolted-on-300x69.png 300w, https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2020\/05\/Security-thats-built-in-not-bolted-on.png 752w\" alt=\"\ub0b4\uc7a5\ub41c \ubcf4\uc548\uc774 \uac15\ud654\ub418\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4.\" width=\"752\" height=\"174\" \/><\/p>\n<hr \/>\n<p><strong>\ucc38\uc870<\/strong>  <sup>1 <\/sup>Cisco\uc758 &#8220;Business Headsets&#8221; \uc124\ubb38\uc870\uc0ac 2019,  <strong><\/strong>  <a href=\"https:\/\/blogs.cisco.com\/collaboration\/an-inside-view-on-the-red-dot-winning-cisco-headset-730-design\">\uae00\ub85c\ubc8c \ub370\uc774\ud130\uace0\uae09 \ube68\uac04\uc0c9 \uc810\uc5d0\uc11c \ub354 \ubcf4\uae30 \ube68\uac04\uc0c9 \uc810 \ub354 \ubcf4\uae30Cisco \ud5e4\ub4dc\uc14b 730 \ub514\uc790\uc778<\/a> <a href=\"https:\/\/blogs.cisco.com\/collaboration\/headsets-built-for-the-modern-user-and-enterprise\"><\/a> <a href=\"https:\/\/blogs.cisco.com\/collaboration\/intelligent-integrated-management-with-cisco-headsets\">\ud5e4\ub4dc\uc14b \ud604\ub300\uc2dd \uc0ac\uc6a9\uc790 \ubc0f \uae30\uc5c5\uc6a9 \ub0b4\uc7a5, Cisco<\/a> <a href=\"https:\/\/blogs.cisco.com\/collaboration\/cisco-change-headsets\">\ud5e4\ub4dc\uc14b\uacfc \ud1b5\ud569 \uad00\ub9acWhy Cisco\ub294 \ud5e4\ub4dc\uc14b\uc5d0 \ub300\ud55c \uc0dd\uac01 \ubc29\ubc95\uc744 \ubcc0\uacbd\ud560 \uc608\uc815<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cisco \ud5e4\ub4dc\uc14b\uc740 \ucd5c\uc2e0 \uae30\uc220, \ud604\ub300\uc2dd \uc591\uc2dd \uc694\uc18c \ubc0f \uc5b4\ub5a4 \ud658\uacbd\uc5d0\uc11c\ub4e0 \uc0ac\uc6a9\ud560 \uc218 \uc788\ub294 \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \uc548\uc804\ud55c \ud1b5\uc2e0\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4.<\/p>\n","protected":false},"author":5490,"featured_media":381222,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[8025],"tags":[4000,11607,3181,12380,11612,1851,8317],"class_list":["post-387042","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-8025","tag-business-headset","tag-cisco--700-","tag-webex-","tag---ko","tag-11612","tag-1851","tag-8317"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\ud5e4\ub4dc\uc14b \ubcf4\uc548: \uc54c\uace0 \uc788\ub294 \uac83 | Webex Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\ud5e4\ub4dc\uc14b \ubcf4\uc548: \uc54c\uace0 \uc788\ub294 \uac83 | Webex Blog\" \/>\n<meta property=\"og:description\" content=\"Cisco \ud5e4\ub4dc\uc14b\uc740 \ucd5c\uc2e0 \uae30\uc220, \ud604\ub300\uc2dd \uc591\uc2dd \uc694\uc18c \ubc0f \uc5b4\ub5a4 \ud658\uacbd\uc5d0\uc11c\ub4e0 \uc0ac\uc6a9\ud560 \uc218 \uc788\ub294 \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \uc548\uc804\ud55c \ud1b5\uc2e0\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"Webex Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-29T13:59:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.webex.com\/wp-content\/uploads\/2020\/08\/072721_Cisco_Webex_1_WorkingTalking-000297.png\" \/>\n\t<meta property=\"og:image:width\" content=\"975\" \/>\n\t<meta property=\"og:image:height\" content=\"554\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Padmini Krishnan\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"Padmini Krishnan\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/\"},\"author\":{\"name\":\"Padmini Krishnan\",\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/5078cfb6a0aa8f1a95929c64e18f3b69\"},\"headline\":\"\ud5e4\ub4dc\uc14b \ubcf4\uc548: \uc54c\uace0 \uc788\ub294 \uac83\",\"datePublished\":\"2020-05-29T13:59:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/\"},\"wordCount\":31,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.webex.com\/wp-content\/uploads\/2020\/08\/072721_Cisco_Webex_1_WorkingTalking-000297.png\",\"keywords\":[\"Business Headset\",\"Cisco \ud5e4\ub4dc\uc14b 700 \uc2dc\ub9ac\uc988\",\"Webex \ub514\ubc14\uc774\uc2a4\",\"\ube44\uc988\ub2c8\uc2a4 \ud5e4\ub4dc\uc14b\",\"\ud5e4\ub4dc\uc14b \ubcf4\uc548\",\"\ud611\uc5c5 \ub3c4\uad6c\",\"\ud611\uc5c5 \uc194\ub8e8\uc158\"],\"articleSection\":[\"\ud611\uc5c5\"],\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/\",\"url\":\"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/\",\"name\":\"\ud5e4\ub4dc\uc14b \ubcf4\uc548: \uc54c\uace0 \uc788\ub294 \uac83 | Webex Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.webex.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.webex.com\/wp-content\/uploads\/2020\/08\/072721_Cisco_Webex_1_WorkingTalking-000297.png\",\"datePublished\":\"2020-05-29T13:59:56+00:00\",\"author\":{\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/5078cfb6a0aa8f1a95929c64e18f3b69\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/#primaryimage\",\"url\":\"https:\/\/blog.webex.com\/wp-content\/uploads\/2020\/08\/072721_Cisco_Webex_1_WorkingTalking-000297.png\",\"contentUrl\":\"https:\/\/blog.webex.com\/wp-content\/uploads\/2020\/08\/072721_Cisco_Webex_1_WorkingTalking-000297.png\",\"width\":975,\"height\":554,\"caption\":\"Man walking outside wearing headsets\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.webex.com\/ko\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\ud5e4\ub4dc\uc14b \ubcf4\uc548: \uc54c\uace0 \uc788\ub294 \uac83\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.webex.com\/es\/#website\",\"url\":\"https:\/\/blog.webex.com\/es\/\",\"name\":\"Webex Blog\",\"description\":\"Webex by Cisco powers collaboration through industry-leading video conferencing, cloud calling and contact center solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.webex.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/5078cfb6a0aa8f1a95929c64e18f3b69\",\"name\":\"Padmini Krishnan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/30f6379a8a61b47592c47356d997d35c9d85758f8a368c35ae33e8376aa0255d?s=96&d=wp_user_avatar&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/30f6379a8a61b47592c47356d997d35c9d85758f8a368c35ae33e8376aa0255d?s=96&d=wp_user_avatar&r=g\",\"caption\":\"Padmini Krishnan\"},\"description\":\"Padmini Krishnan is a Product Manager in the Collaboration Technology Group working on next generation devices and wearables. She holds a bachelor\u2019s degree in Electronics and Communications and a Masters in Computer Networks from the University of Massachusetts \u2013 Amherst. Currently, she is pursuing her MBA from the UT McCombs School of Business. Padmini has been with Cisco for over 10 years and brings positive energy to every situation. Integrity is at the core of how she conducts herself both in business and personal. As a product engineering manager, she loves the challenge of taking innovative products from conception to market while being able to shape the future of collaboration. Work-life balance is vital to Padmini as a wife and mom to two young girls. She loves to travel with her family and create lifelong memories. Padmini is always planning her next vacation which usually includes a tropical paradise or a pristine beach.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/padmini-krishnan-0a202212\/\"],\"url\":\"https:\/\/blog.webex.com\/ko\/contributors\/padminikrishnan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\ud5e4\ub4dc\uc14b \ubcf4\uc548: \uc54c\uace0 \uc788\ub294 \uac83 | Webex Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/","og_locale":"ko_KR","og_type":"article","og_title":"\ud5e4\ub4dc\uc14b \ubcf4\uc548: \uc54c\uace0 \uc788\ub294 \uac83 | Webex Blog","og_description":"Cisco \ud5e4\ub4dc\uc14b\uc740 \ucd5c\uc2e0 \uae30\uc220, \ud604\ub300\uc2dd \uc591\uc2dd \uc694\uc18c \ubc0f \uc5b4\ub5a4 \ud658\uacbd\uc5d0\uc11c\ub4e0 \uc0ac\uc6a9\ud560 \uc218 \uc788\ub294 \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \uc548\uc804\ud55c \ud1b5\uc2e0\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4.","og_url":"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/","og_site_name":"Webex Blog","article_published_time":"2020-05-29T13:59:56+00:00","og_image":[{"width":975,"height":554,"url":"https:\/\/blog.webex.com\/wp-content\/uploads\/2020\/08\/072721_Cisco_Webex_1_WorkingTalking-000297.png","type":"image\/png"}],"author":"Padmini Krishnan","twitter_misc":{"\uae00\uc4f4\uc774":"Padmini Krishnan"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/"},"author":{"name":"Padmini Krishnan","@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/5078cfb6a0aa8f1a95929c64e18f3b69"},"headline":"\ud5e4\ub4dc\uc14b \ubcf4\uc548: \uc54c\uace0 \uc788\ub294 \uac83","datePublished":"2020-05-29T13:59:56+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/"},"wordCount":31,"commentCount":0,"image":{"@id":"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.webex.com\/wp-content\/uploads\/2020\/08\/072721_Cisco_Webex_1_WorkingTalking-000297.png","keywords":["Business Headset","Cisco \ud5e4\ub4dc\uc14b 700 \uc2dc\ub9ac\uc988","Webex \ub514\ubc14\uc774\uc2a4","\ube44\uc988\ub2c8\uc2a4 \ud5e4\ub4dc\uc14b","\ud5e4\ub4dc\uc14b \ubcf4\uc548","\ud611\uc5c5 \ub3c4\uad6c","\ud611\uc5c5 \uc194\ub8e8\uc158"],"articleSection":["\ud611\uc5c5"],"inLanguage":"ko-KR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/","url":"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/","name":"\ud5e4\ub4dc\uc14b \ubcf4\uc548: \uc54c\uace0 \uc788\ub294 \uac83 | Webex Blog","isPartOf":{"@id":"https:\/\/blog.webex.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.webex.com\/wp-content\/uploads\/2020\/08\/072721_Cisco_Webex_1_WorkingTalking-000297.png","datePublished":"2020-05-29T13:59:56+00:00","author":{"@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/5078cfb6a0aa8f1a95929c64e18f3b69"},"breadcrumb":{"@id":"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/#primaryimage","url":"https:\/\/blog.webex.com\/wp-content\/uploads\/2020\/08\/072721_Cisco_Webex_1_WorkingTalking-000297.png","contentUrl":"https:\/\/blog.webex.com\/wp-content\/uploads\/2020\/08\/072721_Cisco_Webex_1_WorkingTalking-000297.png","width":975,"height":554,"caption":"Man walking outside wearing headsets"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.webex.com\/collaboration\/headset-security-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.webex.com\/ko\/"},{"@type":"ListItem","position":2,"name":"\ud5e4\ub4dc\uc14b \ubcf4\uc548: \uc54c\uace0 \uc788\ub294 \uac83"}]},{"@type":"WebSite","@id":"https:\/\/blog.webex.com\/es\/#website","url":"https:\/\/blog.webex.com\/es\/","name":"Webex Blog","description":"Webex by Cisco powers collaboration through industry-leading video conferencing, cloud calling and contact center solutions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.webex.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Person","@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/5078cfb6a0aa8f1a95929c64e18f3b69","name":"Padmini Krishnan","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/30f6379a8a61b47592c47356d997d35c9d85758f8a368c35ae33e8376aa0255d?s=96&d=wp_user_avatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/30f6379a8a61b47592c47356d997d35c9d85758f8a368c35ae33e8376aa0255d?s=96&d=wp_user_avatar&r=g","caption":"Padmini Krishnan"},"description":"Padmini Krishnan is a Product Manager in the Collaboration Technology Group working on next generation devices and wearables. She holds a bachelor\u2019s degree in Electronics and Communications and a Masters in Computer Networks from the University of Massachusetts \u2013 Amherst. Currently, she is pursuing her MBA from the UT McCombs School of Business. Padmini has been with Cisco for over 10 years and brings positive energy to every situation. Integrity is at the core of how she conducts herself both in business and personal. As a product engineering manager, she loves the challenge of taking innovative products from conception to market while being able to shape the future of collaboration. Work-life balance is vital to Padmini as a wife and mom to two young girls. She loves to travel with her family and create lifelong memories. Padmini is always planning her next vacation which usually includes a tropical paradise or a pristine beach.","sameAs":["https:\/\/www.linkedin.com\/in\/padmini-krishnan-0a202212\/"],"url":"https:\/\/blog.webex.com\/ko\/contributors\/padminikrishnan\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.webex.com\/ko\/wp-json\/wp\/v2\/posts\/387042","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.webex.com\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.webex.com\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.webex.com\/ko\/wp-json\/wp\/v2\/users\/5490"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.webex.com\/ko\/wp-json\/wp\/v2\/comments?post=387042"}],"version-history":[{"count":0,"href":"https:\/\/blog.webex.com\/ko\/wp-json\/wp\/v2\/posts\/387042\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.webex.com\/ko\/wp-json\/wp\/v2\/media\/381222"}],"wp:attachment":[{"href":"https:\/\/blog.webex.com\/ko\/wp-json\/wp\/v2\/media?parent=387042"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.webex.com\/ko\/wp-json\/wp\/v2\/categories?post=387042"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.webex.com\/ko\/wp-json\/wp\/v2\/tags?post=387042"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}