{"id":21043,"date":"2022-07-18T04:00:00","date_gmt":"2022-07-18T04:00:00","guid":{"rendered":"https:\/\/www.lightspeedsystems.com\/blog\/why-hackers-target-k12-schools\/"},"modified":"2024-12-05T22:55:02","modified_gmt":"2024-12-05T22:55:02","slug":"why-hackers-target-k12-schools","status":"publish","type":"post","link":"https:\/\/www.lightspeedsystems.com\/ko\/blog\/why-hackers-target-k12-schools\/","title":{"rendered":"\ud574\ucee4\uac00 K-12 \ud559\uad50\ub97c \ud45c\uc801\uc73c\ub85c \uc0bc\ub294 \uc774\uc720"},"content":{"rendered":"<div class=\"section__content__main__content\">\n<p>\uc5d0 \ub530\ub974\uba74 <a href=\"https:\/\/www.cosn.org\/edtech-topics\/state-of-edtech-leadership\/\">2022 EdTech \ub9ac\ub354\uc2ed \uc124\ubb38 \ubcf4\uace0\uc11c<\/a>, \uc0ac\uc774\ubc84 \ubcf4\uc548\uc740 \ud559\uad50 IT \uc778\ub825\uc758 \ucd5c\uc6b0\uc120 \uad00\uc2ec\uc0ac\uc774\uc9c0\ub9cc, IT \ub9ac\ub354\uc758 8%\ub9cc\uc774 \uc790\uc2e0\uc758 \ud559\uad70\uc774 \uace0\uc704\ud5d8\uc5d0 \ucc98\ud574 \uc788\ub2e4\uace0 \uc0dd\uac01\ud588\uc2b5\ub2c8\ub2e4. \uc65c \uc774\ub7f0 \ub2e8\uc808\uc774 \uc0dd\uacbc\uc744\uae4c\uc694? \uc544\ub9c8\ub3c4 \ud559\uad50\ub294 \uc5ec\uc804\ud788 \ud574\ucee4\uc758 \ud45c\uc801\uc774 \ub420 \uac00\ub2a5\uc131\uc774 \ub0ae\uc544 \ubcf4\uc77c\uae4c\uc694? \uacb0\uad6d, \uae08\uc735 \uae30\uad00\uacfc \uae30\uc5c5\uc5d0 \ube44\ud574 K-12 \ud559\uad50\ub294 \ud574\ucee4\uc5d0\uac8c \uc81c\ud55c\uc801\uc778 \ubcf4\uc0c1\uc744 \uc81c\uacf5\ud558\ub294 \uac83\ucc98\ub7fc \ubcf4\uc77c \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\ud558\uc9c0\ub9cc \uc0ac\uc2e4 \ud559\uad50\ub294 \ud559\uc0dd\uacfc \uad50\uc9c1\uc6d0\uc5d0 \ub300\ud55c \uac1c\uc778 \ub370\uc774\ud130\ub97c \ub300\ub7c9\uc73c\ub85c \ubcf4\uad00\ud558\uace0 \uc788\uc744 \ubfd0\ub9cc \uc544\ub2c8\ub77c, K-12 \ud559\uad50\ub294 \uc8fc \ubc0f \uc9c0\ubc29 \uc815\ubd80\uc758 \uc9c0\uc6d0\uc744 \ubc1b\uace0 \uc788\uc73c\uba70, \uc774\ub4e4\uc740 \ub9e4\uc6b0 \ubbfc\uac10\ud55c \ub370\uc774\ud130\uac00 \uacf5\uac1c\ub418\uac70\ub098 \uc774\uba54\uc77c, \ub124\ud2b8\uc6cc\ud06c \ub610\ub294 \ud30c\uc77c\uc5d0 \uc561\uc138\uc2a4\ud560 \uc218 \uc5c6\uac8c \ub418\ub294 \uac83\uc744 \ub9c9\uae30 \uc704\ud574 \ube44\uc6a9\uc744 \uc9c0\ubd88\ud560 \uc218\ub3c4 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\uac15\ub825\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uad00\ud589\uacfc \uc2dc\uc2a4\ud15c\uc774 \ub3c4\uc6c0\uc774 \ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4. <a href=\"https:\/\/www.lightspeedsystems.com\/ko\/blog\/improve-k12-schools-cybersecurity\/\">\ub124\ud2b8\uc6cc\ud06c\ub97c \ubcf4\ud638\ud558\uc138\uc694<\/a>\uc704\ud611\uc758 \ubcf8\uc9c8\uc744 \uc774\ud574\ud558\ub294 \uac83\uc740 \uadc0\ud558\uc758 \ud559\uad70\uc758 \ub370\uc774\ud130\uc640 \ud559\uc0dd \ubc0f \uc9c1\uc6d0\uc758 \ub370\uc774\ud130\ub97c \uc548\uc804\ud558\uac8c \uc720\uc9c0\ud558\uae30 \uc704\ud55c \uccab \ubc88\uc9f8 \ub2e8\uacc4\uc785\ub2c8\ub2e4.<\/p>\n<h3>\n<span><br \/>\n<span><br \/>\n\ubbf8\uad6d\uacfc \ud574\uc678\uc5d0\uc11c K-12 \ud559\uad50\uc5d0 \ub300\ud55c \uc0ac\uc774\ubc84 \uacf5\uaca9\uc774 \uc99d\uac00\ud558\ub294 \uc774\uc720<br \/>\n<\/span><br \/>\n<\/span><br \/>\n<\/h3>\n<p>2016\ub144\ubd80\ud130 <a href=\"https:\/\/www.edweek.org\/leadership\/cyberattacks-force-schools-to-bolster-online-security\/2020\/03\">\ud559\uad50\ub97c \ub300\uc0c1\uc73c\ub85c \ud55c \uc0ac\uc774\ubc84\ubc94\uc8c4\uac00 \uacf5\uac1c\ub41c \uc0ac\ub840 775\uac74<\/a>, 2020\ub144\uc5d0\ub9cc 408\uac74\uc774 \ubc1c\uc0dd\ud588\uc2b5\ub2c8\ub2e4. \uc774\ub294 \uc804\ub144\uc5d0 \ubcf4\uace0\ub41c \uc22b\uc790\uc758 \ub450 \ubc30 \uc774\uc0c1\uc774\uba70, \uc804\ubb38\uac00\ub4e4\uc740 \uc774 \uc22b\uc790\uac00 \uc54c\ub824\uc9c4 \uc0ac\ub840\uc5d0 \ubd88\uacfc\ud558\ub2e4\uace0 \uc9c0\uc801\ud569\ub2c8\ub2e4. \ud559\uad50 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \ub300\ud55c \uacf5\uaca9\uc740 \ub300\uc911\uc758 \ub208\uc5d0 \ub744\uc9c0 \uc54a\uac8c \ud6e8\uc52c \ub354 \ub9ce\uc774 \ubc1c\uc0dd\ud588\uc744 \uac00\ub2a5\uc131\uc774 \ub192\uc2b5\ub2c8\ub2e4.<\/p>\n<p>COVID-19 \ud32c\ub370\ubbf9\uc73c\ub85c \uc778\ud55c \uad50\uc721\uc758 \uad11\ubc94\uc704\ud55c \ubcc0\ud654\uac00 \ubd80\ubd84\uc801\uc73c\ub85c \uc6d0\uc778\uc77c \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc6d0\uaca9 \ud559\uc2b5\uc740 \ud559\uc0dd, \uad50\uc0ac, \uad00\ub9ac\uc790\uac00 \uc5ec\ub7ec \uc624\ud504\uc0ac\uc774\ud2b8 \uc704\uce58\uc640 \ub124\ud2b8\uc6cc\ud06c\uc758 \uc7a5\uce58\uc5d0\uc11c \ub85c\uadf8\uc778\ud568\uc5d0 \ub530\ub77c \uc7a0\uc7ac\uc801\uc778 \uacf5\uaca9\uc5d0 \ub300\ud55c \uc561\uc138\uc2a4 \ud3ec\uc778\ud2b8\ub97c \ub354 \ub9ce\uc774 \uc5f4\uc5c8\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\ud558\uc9c0\ub9cc 1\ub3001 \uae30\uae30\uc758 \ub354 \ub9ce\uc740 \ucc44\ud0dd, \uc0c8\ub85c\uc6b4 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \ubc0f \uc571\uc758 \uad11\ubc94\uc704\ud55c \uc0ac\uc6a9, \uc18c\uaddc\ubaa8 \ud559\uad50 IT \uc9c1\uc6d0\uc5d0 \ub300\ud55c \uc555\ubc15 \uc99d\uac00\uc640 \uac19\uc740 \uadf8\ub7ec\ud55c \ubcc0\ud654 \uc911 \ub2e4\uc218\ub294 \ud559\uc0dd\ub4e4\uc774 \ub300\uba74 \uc218\uc5c5\uc73c\ub85c \ubcf5\uadc0\ud558\ub354\ub77c\ub3c4 \uc5ec\uc804\ud788 \uc9c0\uc18d\ub420 \uac83\uc73c\ub85c \ubcf4\uc785\ub2c8\ub2e4. \ub530\ub77c\uc11c <a href=\"https:\/\/www.lightspeedsystems.com\/ko\/blog\/improve-k12-schools-cybersecurity\/\">\uc9c0\uad6c\uac00 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc804\ub7b5\uc744 \uac1c\uc120\ud558\uae30\uc5d0 \uc644\ubcbd\ud55c \uc2dc\uae30\uc785\ub2c8\ub2e4.<\/a>.<\/p>\n<h3>\n<span><br \/>\n<span><br \/>\n\ud574\ucee4\uac00 K-12 \ud559\uad50\ub97c \ud45c\uc801\uc73c\ub85c \uc0bc\ub294 \uc774\uc720<br \/>\n<\/span><br \/>\n<\/span><br \/>\n<\/h3>\n<p>\ud559\uad50\ub294 \ub300\uaddc\ubaa8 \uae30\uad00\uc758 \uc7ac\uc815 \uc790\uc6d0\uc774 \uc5c6\uc744 \uc218 \uc788\uc9c0\ub9cc, \uadf8\ub4e4\uc758 \ub124\ud2b8\uc6cc\ud06c\uc5d0\ub294 \uc774\ub984, \uc8fc\uc18c, \uc0ac\ud68c\ubcf4\uc7a5\ubc88\ud638\uc640 \uac19\uc740 \uad50\uc0ac\uc640 \ud559\uc0dd \ubaa8\ub450\uc758 \ubbfc\uac10\ud55c \uac1c\uc778 \uc815\ubcf4\uac00 \ub9ce\uc774 \ud3ec\ud568\ub418\uc5b4 \uc788\uc2b5\ub2c8\ub2e4. &quot;edu&quot;\ub85c \ub05d\ub098\ub294 \uc774\uba54\uc77c \uc8fc\uc18c\ub294 \ub2e4\ub978 \uc704\uce58\uc5d0 \ub300\ud55c \ubbf8\ub798\uc758 \uacf5\uaca9\uc5d0 \uc720\uc6a9\ud558\uae30 \ub54c\ubb38\uc5d0 \ud574\ucee4\uc5d0\uac8c \ud2b9\ud788 \ub9e4\ub825\uc801\uc785\ub2c8\ub2e4.<\/p>\n<p>\ud558\uc9c0\ub9cc K-12 \ud559\uad50\uac00 \ud574\ucee4\uc758 \uc778\uae30 \uc788\ub294 \ud0c0\uae43\uc774 \ub418\ub294 \uc8fc\ub41c \uc774\uc720 \uc911 \ud558\ub098\ub294 \uac04\ub2e8\ud569\ub2c8\ub2e4. \uc27d\uac8c \ub178\ub9b4 \uc218 \uc788\uae30 \ub54c\ubb38\uc785\ub2c8\ub2e4. \ub300\ubd80\ubd84 \ud559\uad50\ub294 \ubcf4\uc548 \ubcf4\ud638\uac00 \uc81c\ud55c\uc801\uc785\ub2c8\ub2e4. \ud559\uad50 IT \ubd80\uc11c\ub294 \uc885\uc885 \uaddc\ubaa8\uac00 \uc791\uace0, \ud300\uc740 \uc885\uc885 \ud06c\uace0 \ubcf5\uc7a1\ud55c \uc0ac\uc6a9\uc790 \ubc0f \ubc29\ubb38\uc790 \ub124\ud2b8\uc6cc\ud06c\uc758 \uc77c\uc0c1\uc801\uc778 \uc77c\uc0c1 \uc5c5\ubb34\ub85c \uc778\ud574 \uc587\uc544\uc9d1\ub2c8\ub2e4.<\/p>\n<p>\uc6d0\uaca9 \ud559\uc2b5\uc744 \uc9c0\uc6d0\ud558\ub294 \uae30\uae30\uac00 \ud655\uc0b0\ub418\uba74\uc11c IT \ud300\uc758 \uad00\ub9ac \uae30\ub2a5\uc740 \ub354\uc6b1 \uac15\ud654\ub418\uc5c8\uc2b5\ub2c8\ub2e4. \ub354 \ub098\uc05c \uac83\uc740 \ub9ce\uc740 \ud559\uad50\uc5d0\uc11c \uad50\uc0ac\uc640 \uc9c1\uc6d0\uc744 \uc704\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uad50\uc721\uc744 \uc81c\uacf5\ud558\uc9c0 \uc54a\uace0, \ub9ce\uc740 \ud559\uad50 IT \ubd80\uc11c\uc5d0\ub294 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc804\ub2f4\uc790\uac00 \uc5c6\ub2e4\ub294 \uac83\uc785\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uc0c1\ud669\uc73c\ub85c \uc778\ud574 \uacfc\ub85c\ud55c \uad50\uc0ac\uac00 \uc704\ud5d8\uc744 \uae68\ub2eb\uc9c0 \ubabb\ud55c \ucc44 \ud574\ucee4\uc758 \ud53c\uc2f1 \ub9c1\ud06c\ub97c \ud074\ub9ad\ud560 \uac00\ub2a5\uc131\uc774 \ub354 \ud07d\ub2c8\ub2e4.<\/p>\n<p>K-12 \ub124\ud2b8\uc6cc\ud06c\ub294 \ubcf4\uc548 \ud504\ub85c\ud1a0\ucf5c\uc744 \ud1b5\uacfc\ud558\uc9c0 \ubabb\ud55c \ud504\ub85c\uadf8\ub7a8\uc73c\ub85c \uacfc\ubd80\ud558\ub420 \uc218\ub3c4 \uc788\uc2b5\ub2c8\ub2e4. IT \ubd80\uc11c\uc758 \uc5c5\ub370\uc774\ud2b8 \ubc0f \ud328\uce58 \ubc31\ub85c\uadf8\uac00 \ud300\uc758 \uc704\ud611 \uc778\uc2dd \ubc0f \ucc28\ub2e8 \ub2a5\ub825\uc744 \ubc29\ud574\ud558\uae30 \ub54c\ubb38\uc5d0 \uc774\ub7ec\ud55c \uc704\ud5d8\uc774 \uc2ec\ud654\ub418\ub294 \uacbd\uc6b0\uac00 \ub9ce\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\ud32c\ub370\ubbf9\uc740 \ub610\ud55c \uad50\uc721\uc5d0 \ub3c4\uc6c0\uc774 \ub418\ub294 \uc0c8\ub85c\uc6b4 \uc18c\ud504\ud2b8\uc6e8\uc5b4\uc640 \uc571\uc758 \ud655\uc0b0\uc744 \ud1b5\ud574 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \uc704\ud611\uc744 \uac00\ud588\uc2b5\ub2c8\ub2e4. \ub9ce\uc740 \ud504\ub85c\uadf8\ub7a8\uc774 \ubb34\ub8cc\ub85c \uad50\uc0ac\uc5d0\uac8c \uc9c1\uc811 \uc81c\uacf5\ub418\uc5c8\ub294\ub370, \uad50\uc0ac\ub294 \ud559\uad50\uc758 \uc815\uc0c1\uc801\uc778 IT \uc6b4\uc601 \uc808\ucc28\uc758 \ubc94\uc704 \ubc16\uc5d0\uc11c \ub2e4\uc6b4\ub85c\ub4dc\ud588\uc744 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub9c8\ucc2c\uac00\uc9c0\ub85c, \ud559\uc0dd\ub4e4\uc774 \ubd09\uc1c4 \uae30\uac04 \ub3d9\uc548 \uac80\uc99d\ub418\uc9c0 \uc54a\uc740 \uc571\uc744 \uc790\uc2e0\uc758 \uae30\uae30\ub97c \ud1b5\ud574 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uac00\uc838\uc624\ub294 \uac83\uc774 \ub108\ubb34 \uc26c\uc6e0\uc2b5\ub2c8\ub2e4(\uadf8\ub9ac\uace0 \uac1c\uc778 \uae30\uae30\ub294 \uc5ec\uc804\ud788 \uc704\ud5d8\ud55c \ub9ec\uc6e8\uc5b4\uc758 \uc26c\uc6b4 \uc9c4\uc785\uc810\uc785\ub2c8\ub2e4). \uc774\ub7ec\ud55c \ud504\ub85c\uadf8\ub7a8\uc740 \ud559\uad50 \ubc0f \ud559\uc0dd \uae30\uae30\uc5d0 \ub0a8\uc544 \uc788\uc744 \uc218 \uc788\uc73c\uba70, \ud574\ucee4\uac00 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uce68\uc785\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\uadc0\ud558\uc758 \ud559\uad70\uc740 \ud574\ucee4\ub4e4\uc774 \uadc0\ud558\uc758 \ub124\ud2b8\uc6cc\ud06c\uc758 \ucde8\uc57d\uc810\uc744 \uc545\uc6a9\ud558\ub294 \ubc29\ubc95\uc744 \ub354\uc6b1 \uc815\uad50\ud558\uac8c \ubc1c\uc804\uc2dc\ud0ac \uac83\uc774\ub77c\uace0 \uac00\uc815\ud574\uc57c \ud569\ub2c8\ub2e4. \uc704\ud5d8\uc744 \uc54c\uace0 \ud559\uc0dd\uacfc \uad50\uc9c1\uc6d0\uc744 \ubcf4\ud638\ud558\ub294 \uac00\uc7a5 \uc88b\uc740 \ubc29\ubc95, \uadf8\ub9ac\uace0 \uacf5\uaca9\uc774 \ubc1c\uc0dd\ud588\uc744 \ub54c \ubb34\uc5c7\uc744 \ud574\uc57c \ud558\ub294\uc9c0 \uc544\ub294 \uac83\uc740 \uadf8 \uc5b4\ub290 \ub54c\ubcf4\ub2e4 \uc911\uc694\ud569\ub2c8\ub2e4.<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>2022\ub144 \uad50\uc721 \uae30\uc220 \ub9ac\ub354\uc2ed \uc124\ubb38 \uc870\uc0ac \ubcf4\uace0\uc11c\uc5d0 \ub530\ub974\uba74, \uc0ac\uc774\ubc84 \ubcf4\uc548\uc740 \ud559\uad50 IT \ub2f4\ub2f9\uc790\ub4e4\uc758 \ucd5c\ub300 \uad00\uc2ec\uc0ac\uc774\uc9c0\ub9cc, IT \ub9ac\ub354 \uc911 8%\ub9cc\uc774 \uc790\uc2e0\uc758 \ud559\uad70\uc774 \uace0\uc704\ud5d8\uad70\uc5d0 \uc18d\ud55c\ub2e4\uace0 \ub2f5\ud588\uc2b5\ub2c8\ub2e4. \uadf8 \uc774\uc720\ub294\u2026<\/p>","protected":false},"author":14,"featured_media":1168,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Hackers K-12","_yoast_wpseo_title":"Why Do Hackers Target K-12 Schools? | Lightspeed Systems","_yoast_wpseo_metadesc":"Learn why hackers target K-12 schools so you can better prepare and mitigate the risks of your district falling victim to a cyberattack.","footnotes":""},"categories":[1],"tags":[10,15],"class_list":["post-21043","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-lightspeed-filter","tag-web-content-filtering"],"acf":{"authors":[531]},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why Do Hackers Target K-12 Schools? | Lightspeed Systems<\/title>\n<meta name=\"description\" content=\"Learn why hackers target K-12 schools so you can better prepare and mitigate the risks of your district falling victim to a cyberattack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lightspeedsystems.com\/ko\/blog\/why-hackers-target-k12-schools\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Hackers Target K-12 Schools\" \/>\n<meta property=\"og:description\" content=\"Learn why hackers target K-12 schools so you can better prepare and mitigate the risks of your district falling victim to a cyberattack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lightspeedsystems.com\/ko\/blog\/why-hackers-target-k12-schools\/\" \/>\n<meta property=\"og:site_name\" content=\"Lightspeed Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lightspeedsystems\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-18T04:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-05T22:55:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2023\/10\/why-hackers-target-schools-featured-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Irelene C\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lightspeedsys\" \/>\n<meta name=\"twitter:site\" content=\"@lightspeedsys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lightspeed Systems\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/\"},\"author\":{\"name\":\"Irelene C\",\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/person\/b2d65d2b53e3b886eb2380a1198e9a90\"},\"headline\":\"Why Hackers Target K-12 Schools\",\"datePublished\":\"2022-07-18T04:00:00+00:00\",\"dateModified\":\"2024-12-05T22:55:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/\"},\"wordCount\":658,\"publisher\":{\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2023\/10\/why-hackers-target-schools-featured-min.png\",\"keywords\":[\"Lightspeed Filter\u2122\",\"Web Content Filtering\"],\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/\",\"url\":\"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/\",\"name\":\"Why Do Hackers Target K-12 Schools? | Lightspeed Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2023\/10\/why-hackers-target-schools-featured-min.png\",\"datePublished\":\"2022-07-18T04:00:00+00:00\",\"dateModified\":\"2024-12-05T22:55:02+00:00\",\"description\":\"Learn why hackers target K-12 schools so you can better prepare and mitigate the risks of your district falling victim to a cyberattack.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#primaryimage\",\"url\":\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2023\/10\/why-hackers-target-schools-featured-min.png\",\"contentUrl\":\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2023\/10\/why-hackers-target-schools-featured-min.png\",\"width\":1200,\"height\":628,\"caption\":\"Why hackers target schools featured\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.lightspeedsystems.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Hackers Target K-12 Schools\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/#website\",\"url\":\"https:\/\/www.lightspeedsystems.com\/zh\/\",\"name\":\"Lightspeed Systems\",\"description\":\"Helping K-12 communities provide safe, secure, and equitable education\u2014effortlessly.\",\"publisher\":{\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lightspeedsystems.com\/zh\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/#organization\",\"name\":\"Lightspeed Systems\",\"url\":\"https:\/\/www.lightspeedsystems.com\/zh\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2024\/12\/lightspeed_systems_logo.svg\",\"contentUrl\":\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2024\/12\/lightspeed_systems_logo.svg\",\"caption\":\"Lightspeed Systems\"},\"image\":{\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/lightspeedsystems\/\",\"https:\/\/x.com\/lightspeedsys\",\"https:\/\/www.linkedin.com\/company\/lightspeed-systems\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/person\/b2d65d2b53e3b886eb2380a1198e9a90\",\"name\":\"Irelene C\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fb16e9af0359e050aa2c99062e2757ade98c557d1780989523bc02ba93a0fdb9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fb16e9af0359e050aa2c99062e2757ade98c557d1780989523bc02ba93a0fdb9?s=96&d=mm&r=g\",\"caption\":\"Irelene C\"},\"sameAs\":[\"https:\/\/caffeineinteractive.com\"],\"url\":\"https:\/\/www.lightspeedsystems.com\/ko\/person\/lightspeed-systems\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\ud574\ucee4\ub4e4\uc740 \uc65c \uc720\uce58\uc6d0\ubd80\ud130 \uace0\ub4f1\ud559\uad50\uae4c\uc9c0\ub97c \uacf5\uaca9\ud560\uae4c\uc694? | \ub77c\uc774\ud2b8\uc2a4\ud53c\ub4dc \uc2dc\uc2a4\ud15c\uc988","description":"\ud574\ucee4\ub4e4\uc774 \uc720\uce58\uc6d0\ubd80\ud130 \uace0\ub4f1\ud559\uad50\uae4c\uc9c0\ub97c \uacf5\uaca9\ud558\ub294 \uc774\uc720\ub97c \ud30c\uc545\ud558\uc5ec, \uad50\uc721\uad6c\uac00 \uc0ac\uc774\ubc84 \uacf5\uaca9\uc758 \ud53c\ud574\uc790\uac00 \ub418\ub294 \uc704\ud5d8\uc744 \uc904\uc774\uace0 \ub354 \ub098\uc740 \ub300\ube44\ucc45\uc744 \ub9c8\ub828\ud558\uc2ed\uc2dc\uc624.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lightspeedsystems.com\/ko\/blog\/why-hackers-target-k12-schools\/","og_locale":"ko_KR","og_type":"article","og_title":"Why Hackers Target K-12 Schools","og_description":"Learn why hackers target K-12 schools so you can better prepare and mitigate the risks of your district falling victim to a cyberattack.","og_url":"https:\/\/www.lightspeedsystems.com\/ko\/blog\/why-hackers-target-k12-schools\/","og_site_name":"Lightspeed Systems","article_publisher":"https:\/\/www.facebook.com\/lightspeedsystems\/","article_published_time":"2022-07-18T04:00:00+00:00","article_modified_time":"2024-12-05T22:55:02+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2023\/10\/why-hackers-target-schools-featured-min.png","type":"image\/png"}],"author":"Irelene C","twitter_card":"summary_large_image","twitter_creator":"@lightspeedsys","twitter_site":"@lightspeedsys","twitter_misc":{"Written by":"Lightspeed Systems","Est. reading time":"3\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#article","isPartOf":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/"},"author":{"name":"Irelene C","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/person\/b2d65d2b53e3b886eb2380a1198e9a90"},"headline":"Why Hackers Target K-12 Schools","datePublished":"2022-07-18T04:00:00+00:00","dateModified":"2024-12-05T22:55:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/"},"wordCount":658,"publisher":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2023\/10\/why-hackers-target-schools-featured-min.png","keywords":["Lightspeed Filter\u2122","Web Content Filtering"],"articleSection":["Uncategorized"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/","url":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/","name":"\ud574\ucee4\ub4e4\uc740 \uc65c \uc720\uce58\uc6d0\ubd80\ud130 \uace0\ub4f1\ud559\uad50\uae4c\uc9c0\ub97c \uacf5\uaca9\ud560\uae4c\uc694? | \ub77c\uc774\ud2b8\uc2a4\ud53c\ub4dc \uc2dc\uc2a4\ud15c\uc988","isPartOf":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#primaryimage"},"image":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2023\/10\/why-hackers-target-schools-featured-min.png","datePublished":"2022-07-18T04:00:00+00:00","dateModified":"2024-12-05T22:55:02+00:00","description":"\ud574\ucee4\ub4e4\uc774 \uc720\uce58\uc6d0\ubd80\ud130 \uace0\ub4f1\ud559\uad50\uae4c\uc9c0\ub97c \uacf5\uaca9\ud558\ub294 \uc774\uc720\ub97c \ud30c\uc545\ud558\uc5ec, \uad50\uc721\uad6c\uac00 \uc0ac\uc774\ubc84 \uacf5\uaca9\uc758 \ud53c\ud574\uc790\uac00 \ub418\ub294 \uc704\ud5d8\uc744 \uc904\uc774\uace0 \ub354 \ub098\uc740 \ub300\ube44\ucc45\uc744 \ub9c8\ub828\ud558\uc2ed\uc2dc\uc624.","breadcrumb":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#primaryimage","url":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2023\/10\/why-hackers-target-schools-featured-min.png","contentUrl":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2023\/10\/why-hackers-target-schools-featured-min.png","width":1200,"height":628,"caption":"Why hackers target schools featured"},{"@type":"BreadcrumbList","@id":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lightspeedsystems.com\/"},{"@type":"ListItem","position":2,"name":"Why Hackers Target K-12 Schools"}]},{"@type":"WebSite","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#website","url":"https:\/\/www.lightspeedsystems.com\/zh\/","name":"\ub77c\uc774\ud2b8\uc2a4\ud53c\ub4dc \uc2dc\uc2a4\ud15c","description":"K-12 \ucee4\ubba4\ub2c8\ud2f0\uac00 \uc548\uc804\ud558\uace0, \ubcf4\uc548\uc801\uc774\uba70, \uacf5\ud3c9\ud55c \uad50\uc721\uc744 \uc190\uc27d\uac8c \uc81c\uacf5\ud560 \uc218 \uc788\ub3c4\ub85d \ub3d5\uc2b5\ub2c8\ub2e4.","publisher":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lightspeedsystems.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#organization","name":"\ub77c\uc774\ud2b8\uc2a4\ud53c\ub4dc \uc2dc\uc2a4\ud15c","url":"https:\/\/www.lightspeedsystems.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2024\/12\/lightspeed_systems_logo.svg","contentUrl":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2024\/12\/lightspeed_systems_logo.svg","caption":"Lightspeed Systems"},"image":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lightspeedsystems\/","https:\/\/x.com\/lightspeedsys","https:\/\/www.linkedin.com\/company\/lightspeed-systems\/"]},{"@type":"Person","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/person\/b2d65d2b53e3b886eb2380a1198e9a90","name":"\uc544\uc774\ub9b4\ub80c C","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fb16e9af0359e050aa2c99062e2757ade98c557d1780989523bc02ba93a0fdb9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fb16e9af0359e050aa2c99062e2757ade98c557d1780989523bc02ba93a0fdb9?s=96&d=mm&r=g","caption":"Irelene C"},"sameAs":["https:\/\/caffeineinteractive.com"],"url":"https:\/\/www.lightspeedsystems.com\/ko\/person\/lightspeed-systems\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lightspeedsystems.com\/ko\/wp-json\/wp\/v2\/posts\/21043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lightspeedsystems.com\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lightspeedsystems.com\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/ko\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/ko\/wp-json\/wp\/v2\/comments?post=21043"}],"version-history":[{"count":0,"href":"https:\/\/www.lightspeedsystems.com\/ko\/wp-json\/wp\/v2\/posts\/21043\/revisions"}],"acf:post":[{"embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/ko\/wp-json\/wp\/v2\/person\/531"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/ko\/wp-json\/wp\/v2\/media\/1168"}],"wp:attachment":[{"href":"https:\/\/www.lightspeedsystems.com\/ko\/wp-json\/wp\/v2\/media?parent=21043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/ko\/wp-json\/wp\/v2\/categories?post=21043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/ko\/wp-json\/wp\/v2\/tags?post=21043"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}