{"id":37571,"date":"2026-03-30T07:02:24","date_gmt":"2026-03-30T07:02:24","guid":{"rendered":"https:\/\/smartdev.com\/?post_type=glossary&#038;p=37571"},"modified":"2026-04-01T01:48:31","modified_gmt":"2026-04-01T01:48:31","slug":"glossary-ai-security-compliance","status":"publish","type":"glossary","link":"https:\/\/smartdev.com\/kr\/glossary-ai-security-compliance\/","title":{"rendered":"AI Security &#038; Compliance"},"content":{"rendered":"<div id=\"fws_69e3d025adf84\"  data-column-margin=\"30px\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone flex_gap_desktop_10px\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<div id=\"fws_69e3d025ae241\" data-midnight=\"\" data-column-margin=\"default\" class=\"wpb_row vc_row-fluid vc_row inner_row\"  style=\"\"><div class=\"row-bg-wrap\"> <div class=\"row-bg\" ><\/div> <\/div><div class=\"row_col_wrap_12_inner col span_12  left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col child_column no-extra-padding inherit_tablet inherit_phone flex_gap_desktop_10px\"   data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<h3><span class=\"ez-toc-section\" id=\"TLDR\"><\/span>\uc694\uc57d<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<div class=\"flex flex-col text-sm\">\n<section class=\"text-token-text-primary w-full focus:outline-none &#091;--shadow-height:45px&#093; has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) &#091;&amp;:has(&#091;data-writing-block&#093;)&gt;*&#093;:pointer-events-auto scroll-mt-&#091;calc(var(--header-height)+min(200px,max(70px,20svh)))&#093;\" dir=\"auto\" data-turn-id=\"request-WEB:a8324a52-b801-4732-9b11-09235454e29e-4\" data-testid=\"conversation-turn-10\" data-scroll-anchor=\"true\" data-turn=\"assistant\">\n<div class=\"text-base my-auto mx-auto pb-10 &#091;--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))&#093; @w-sm\/main:&#091;--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))&#093; @w-lg\/main:&#091;--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))&#093; px-(--thread-content-margin)\">\n<div class=\"&#091;--thread-content-max-width:40rem&#093; @w-lg\/main:&#091;--thread-content-max-width:48rem&#093; mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\">\n<div class=\"flex max-w-full flex-col gap-4 grow\">\n<div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring &#091;.text-message+&amp;&#093;:mt-1\" dir=\"auto\" tabindex=\"0\" data-message-author-role=\"assistant\" data-message-id=\"88c8d49e-25cf-462b-b70d-f9969a317276\" data-message-model-slug=\"gpt-4o-mini\" data-turn-start-message=\"true\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden\">\n<div class=\"markdown prose dark:prose-invert w-full wrap-break-word dark markdown-new-styling\">\n<ul data-start=\"67\" data-end=\"432\" data-is-last-node=\"\" data-is-only-node=\"\">\n<li data-section-id=\"osjst4\" data-start=\"67\" data-end=\"162\"><strong data-start=\"69\" data-end=\"97\">AI security &amp; compliance<\/strong> ensures AI systems are safe and meet legal, ethical standards.<\/li>\n<li data-section-id=\"h7wsi3\" data-start=\"163\" data-end=\"250\"><strong data-start=\"165\" data-end=\"187\">It mitigates risks<\/strong> like cyberattacks and non-compliance with laws (GDPR, CCPA).<\/li>\n<li data-section-id=\"e138sy\" data-start=\"251\" data-end=\"335\"><strong data-start=\"253\" data-end=\"279\">Trust and transparency<\/strong> are key, ensuring AI decisions are clear and ethical.<\/li>\n<li data-section-id=\"xdd58x\" data-start=\"336\" data-end=\"432\" data-is-last-node=\"\"><strong data-start=\"338\" data-end=\"368\">Integration from the start<\/strong> is crucial, with continuous updates as laws and threats evolve.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<h3><span class=\"ez-toc-section\" id=\"What_is_AI_Security_Compliance\"><\/span><b><span data-contrast=\"auto\">What is AI Security &amp; Compliance?<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<\/div>\n\n\n\n\n\t\t<\/div> \n\t<\/div>\n\t<\/div> \n<\/div><\/div><div id=\"fws_69e3d025ae4b2\" data-midnight=\"\" data-column-margin=\"default\" class=\"wpb_row vc_row-fluid vc_row inner_row\"  style=\"\"><div class=\"row-bg-wrap\"> <div class=\"row-bg\" ><\/div> <\/div><div class=\"row_col_wrap_12_inner col span_12  left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col child_column no-extra-padding inherit_tablet inherit_phone flex_gap_desktop_10px\"   data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t\n\t<div class=\"wpb_video_widget wpb_content_element vc_clearfix   vc_video-aspect-ratio-916 vc_video-el-width-30 vc_video-align-center\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t\n\t\t\t<div class=\"wpb_video_wrapper\"><iframe title=\"Is Your AI Safe? The Truth About AI Security &amp; Compliance\" width=\"500\" height=\"281\" data-src=\"https:\/\/www.youtube.com\/embed\/XGJNtcCWfwg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" data-load-mode=\"1\"><\/iframe><\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t\t<\/div> \n\t<\/div>\n\t<\/div> \n<\/div><\/div><div id=\"fws_69e3d025aeb71\" data-midnight=\"\" data-column-margin=\"default\" class=\"wpb_row vc_row-fluid vc_row inner_row\"  style=\"\"><div class=\"row-bg-wrap\"> <div class=\"row-bg\" ><\/div> <\/div><div class=\"row_col_wrap_12_inner col span_12  left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col child_column no-extra-padding inherit_tablet inherit_phone flex_gap_desktop_10px\"   data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<p><span data-contrast=\"auto\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-37349 lazyload\" data-src=\"https:\/\/smartdev.com\/wp-content\/uploads\/2026\/03\/Blog-Thumbnail-Design-NA-Ha-27.png\" alt=\"\" width=\"1366\" height=\"768\" data-srcset=\"https:\/\/smartdev.com\/wp-content\/uploads\/2026\/03\/Blog-Thumbnail-Design-NA-Ha-27.png 1366w, https:\/\/smartdev.com\/wp-content\/uploads\/2026\/03\/Blog-Thumbnail-Design-NA-Ha-27-300x169.png 300w, https:\/\/smartdev.com\/wp-content\/uploads\/2026\/03\/Blog-Thumbnail-Design-NA-Ha-27-1024x576.png 1024w, https:\/\/smartdev.com\/wp-content\/uploads\/2026\/03\/Blog-Thumbnail-Design-NA-Ha-27-768x432.png 768w, https:\/\/smartdev.com\/wp-content\/uploads\/2026\/03\/Blog-Thumbnail-Design-NA-Ha-27-18x10.png 18w\" data-sizes=\"(max-width: 1366px) 100vw, 1366px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1366px; --smush-placeholder-aspect-ratio: 1366\/768;\" \/>AI security &amp; compliance refers to the practices and regulations designed to ensure the safe and ethical deployment of artificial intelligence technologies while ensuring they meet legal and regulatory requirements. As AI systems become more integrated into business operations,&nbsp;it\u2019s&nbsp;crucial to address both the risks AI poses and the need for compliance with various standards and laws. AI security focuses on protecting AI systems from cyber threats, data breaches, and adversarial attacks, while AI compliance ensures that the use of AI adheres to privacy, fairness, and accountability standards.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">With the rapid development and use of AI across industries, businesses must prioritize securing AI systems from potential vulnerabilities while ensuring they&nbsp;comply with&nbsp;regulations like GDPR, CCPA, and other industry-specific requirements.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Why_is_AI_Security_Compliance_Important_for_Businesses\"><\/span><b><span data-contrast=\"auto\">Why is AI Security &amp; Compliance Important for Businesses?<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-37352 lazyload\" data-src=\"https:\/\/smartdev.com\/wp-content\/uploads\/2026\/03\/Blog-Thumbnail-Design-NA-Ha-28.png\" alt=\"\" width=\"1366\" height=\"768\" data-srcset=\"https:\/\/smartdev.com\/wp-content\/uploads\/2026\/03\/Blog-Thumbnail-Design-NA-Ha-28.png 1366w, https:\/\/smartdev.com\/wp-content\/uploads\/2026\/03\/Blog-Thumbnail-Design-NA-Ha-28-300x169.png 300w, https:\/\/smartdev.com\/wp-content\/uploads\/2026\/03\/Blog-Thumbnail-Design-NA-Ha-28-1024x576.png 1024w, https:\/\/smartdev.com\/wp-content\/uploads\/2026\/03\/Blog-Thumbnail-Design-NA-Ha-28-768x432.png 768w, https:\/\/smartdev.com\/wp-content\/uploads\/2026\/03\/Blog-Thumbnail-Design-NA-Ha-28-18x10.png 18w\" data-sizes=\"(max-width: 1366px) 100vw, 1366px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1366px; --smush-placeholder-aspect-ratio: 1366\/768;\" \/><\/p>\n<ol>\n<li aria-setsize=\"-1\" data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"5\" data-list-defn-props=\"{&quot;335551671&quot;:1,&quot;335552541&quot;:0,&quot;335559683&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:&#091;65533,0,46&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Mitigating Cybersecurity Risks:<\/span><\/b><span data-contrast=\"auto\">&nbsp;AI systems can be a target for cyber-attacks such as data poisoning, adversarial attacks, and model theft. Securing AI systems&nbsp;ensures&nbsp;that they remain robust against these threats and continue to deliver accurate results.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"5\" data-list-defn-props=\"{&quot;335551671&quot;:1,&quot;335552541&quot;:0,&quot;335559683&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:&#091;65533,0,46&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Ensuring Legal Compliance:<\/span><\/b><span data-contrast=\"auto\">&nbsp;As&nbsp;AI continues to revolutionize industries, legal frameworks governing its use are evolving. Regulations like the EU\u2019s GDPR, California\u2019s CCPA, and sector-specific guidelines (e.g., healthcare and finance) require businesses to&nbsp;comply with&nbsp;strict data privacy and ethical guidelines when using AI. Failure to meet these requirements can result in severe penalties.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"5\" data-list-defn-props=\"{&quot;335551671&quot;:1,&quot;335552541&quot;:0,&quot;335559683&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:&#091;65533,0,46&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Building Trust and Transparency:<\/span><\/b><span data-contrast=\"auto\">&nbsp;Trust in AI systems is critical. Businesses need to&nbsp;demonstrate&nbsp;transparency in how AI algorithms make decisions and how data is handled. This transparency builds customer trust and can be essential in industries that handle sensitive data like finance, healthcare, and insurance.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"5\" data-list-defn-props=\"{&quot;335551671&quot;:1,&quot;335552541&quot;:0,&quot;335559683&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:&#091;65533,0,46&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">\uc724\ub9ac\uc801 \uace0\ub824 \uc0ac\ud56d:<\/span><\/b><span data-contrast=\"auto\">&nbsp;AI\u2019s role in decision-making processes has raised ethical concerns.&nbsp;AI systems can inadvertently perpetuate biases in hiring, lending, and healthcare decisions. Compliance with ethical standards ensures fairness, avoids discrimination, and enhances the credibility of AI systems.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><\/li>\n<\/ol>\n<h3><span class=\"ez-toc-section\" id=\"Who_Needs_to_Ensure_AI_Security_Compliance\"><\/span><b><span data-contrast=\"auto\">Who Needs to Ensure AI Security &amp; Compliance?<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span data-contrast=\"auto\">AI security &amp; compliance is a shared responsibility that requires coordination across multiple roles within an organization. Key stakeholders include:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><\/p>\n<ol>\n<li aria-setsize=\"-1\" data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"6\" data-list-defn-props=\"{&quot;335551671&quot;:1,&quot;335552541&quot;:0,&quot;335559683&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:&#091;65533,0,46&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">C-suite Executives (CISO, CIO):<\/span><\/b><span data-contrast=\"auto\">&nbsp;The Chief Information Security Officer (CISO) and Chief Information Officer (CIO) play an integral role in the development and implementation of AI security policies. They&nbsp;are responsible for&nbsp;overseeing security measures, ensuring compliance, and aligning AI strategies with business goals.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"6\" data-list-defn-props=\"{&quot;335551671&quot;:1,&quot;335552541&quot;:0,&quot;335559683&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:&#091;65533,0,46&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">AI and Data Scientists:<\/span><\/b><span data-contrast=\"auto\">&nbsp;Data scientists, AI developers, and machine learning engineers&nbsp;are responsible for&nbsp;building and implementing secure AI models. These professionals must ensure that AI systems are free from biases, robust against attacks, and in compliance with legal frameworks. This may involve conducting regular audits and performance evaluations of AI models.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"6\" data-list-defn-props=\"{&quot;335551671&quot;:1,&quot;335552541&quot;:0,&quot;335559683&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:&#091;65533,0,46&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Compliance Officers and Legal Teams:<\/span><\/b><span data-contrast=\"auto\">&nbsp;These teams ensure that AI systems&nbsp;comply with&nbsp;industry-specific laws and regulations. They work closely with technical teams to&nbsp;establish&nbsp;compliance protocols and&nbsp;assist&nbsp;in auditing AI systems for regulatory alignment.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"6\" data-list-defn-props=\"{&quot;335551671&quot;:1,&quot;335552541&quot;:0,&quot;335559683&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:&#091;65533,0,46&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Employees and End Users:<\/span><\/b><span data-contrast=\"auto\">&nbsp;Every employee has a role to play in fostering AI security. For instance, those working with AI systems need to follow secure data-handling practices, and end users must be aware of potential security risks when interacting with AI-driven tools.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><\/li>\n<\/ol>\n<h3><span class=\"ez-toc-section\" id=\"When_Should_Businesses_Focus_on_AI_Security_Compliance\"><\/span><b><span data-contrast=\"auto\">When Should Businesses Focus on AI Security &amp; Compliance?<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span data-contrast=\"auto\">AI security and compliance are not afterthoughts but integral parts of AI system development from the outset. Here&#8217;s when businesses should prioritize these measures:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"7\" data-list-defn-props=\"{&quot;335551671&quot;:1,&quot;335552541&quot;:0,&quot;335559683&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:&#091;65533,0,46&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Before Implementing AI Systems:<\/span><\/b><span data-contrast=\"auto\">&nbsp;AI security &amp; compliance need to be considered in the&nbsp;early stages&nbsp;of an AI project, from data collection and system design to deployment. This helps&nbsp;identify&nbsp;potential risks early and ensures that security controls are integrated from the start.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"7\" data-list-defn-props=\"{&quot;335551671&quot;:1,&quot;335552541&quot;:0,&quot;335559683&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:&#091;65533,0,46&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">During System Development:<\/span><\/b><span data-contrast=\"auto\">&nbsp;Security and compliance should be part of the development process. Developers and data scientists must incorporate security measures like encryption, secure data storage, and model integrity checks while adhering to privacy standards such as GDPR.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"7\" data-list-defn-props=\"{&quot;335551671&quot;:1,&quot;335552541&quot;:0,&quot;335559683&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:&#091;65533,0,46&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">When Scaling AI Systems:<\/span><\/b><span data-contrast=\"auto\">&nbsp;As AI models scale to handle more data or perform more complex tasks, they can become more susceptible to attacks and compliance challenges. Scaling AI systems without reviewing security and compliance could lead to vulnerabilities. Businesses must continuously assess and improve AI security measures as their systems evolve.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"7\" data-list-defn-props=\"{&quot;335551671&quot;:1,&quot;335552541&quot;:0,&quot;335559683&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:&#091;65533,0,46&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">In Response to New Regulations or Threats:<\/span><\/b><span data-contrast=\"auto\">&nbsp;Laws and regulations around AI security and privacy are evolving, and new threats are emerging. Organizations should stay informed about updates in regulatory requirements and AI security&nbsp;threats, and&nbsp;adjust their strategies accordingly to remain compliant.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><\/li>\n<\/ul>\n<\/div>\n\n\n\n\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<h3><span class=\"ez-toc-section\" id=\"Other_Related_Terms\"><\/span><b><span data-contrast=\"auto\">Other Related Terms:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><b><span data-contrast=\"auto\">1. AI Governance<\/span><\/b><b><\/b><\/h4>\n<p><b><\/b><span data-contrast=\"auto\">AI governance refers to the policies and practices organizations follow to ensure AI is developed and used responsibly, with a focus on transparency, fairness, and accountability. It helps ensure that AI systems align with security and compliance standards while preventing biases and unethical use.<\/span><\/p>\n<h4><strong>2. Responsible AI<\/strong><\/h4>\n<p><span style=\"font-size: 16px;\" data-contrast=\"auto\">Responsible AI is the development and deployment of AI technologies in an ethical manner, ensuring fairness, transparency, and respect for privacy. It focuses on reducing bias and ensuring AI decisions are made without harm to individuals or groups, promoting trust in AI systems.<\/span><span style=\"font-size: 16px;\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">&nbsp;<\/span><\/p>\n<\/div>\n\n\n\n\n\t\t<\/div> \n\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>","protected":false},"excerpt":{"rendered":"TL;DR AI security &amp; compliance ensures AI systems are safe and meet legal, ethical standards....","protected":false},"author":38,"featured_media":37348,"comment_status":"open","ping_status":"closed","template":"","glossary-category":[230,229,228],"class_list":{"0":"post-37571","1":"glossary","2":"type-glossary","3":"status-publish","4":"has-post-thumbnail","6":"glossary-category-ai-adoption","7":"glossary-category-glossary","8":"glossary-category-technology"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AI Security &amp; Compliance | SmartDev<\/title>\n<meta name=\"description\" content=\"AI security &amp; compliance refers to the practices and regulations designed to ensure the safe and ethical deployment\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/smartdev.com\/kr\/glossary-ai-security-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI Security &amp; Compliance | SmartDev\" \/>\n<meta property=\"og:description\" content=\"AI security &amp; compliance refers to the practices and regulations designed to ensure the safe and ethical deployment\" \/>\n<meta property=\"og:url\" content=\"https:\/\/smartdev.com\/kr\/glossary-ai-security-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"SmartDev\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.youtube.com\/@smartdevllc\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T01:48:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/smartdev.com\/wp-content\/uploads\/2026\/03\/ai-robot-using-cyber-security-protect-information-privacy-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1447\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@smartdevllc\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"5\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/glossary-ai-security-compliance\\\/\",\"url\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/glossary-ai-security-compliance\\\/\",\"name\":\"AI Security & Compliance | SmartDev\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/glossary-ai-security-compliance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/glossary-ai-security-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/smartdev.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/ai-robot-using-cyber-security-protect-information-privacy-scaled.jpg\",\"datePublished\":\"2026-03-30T07:02:24+00:00\",\"dateModified\":\"2026-04-01T01:48:31+00:00\",\"description\":\"AI security & compliance refers to the practices and regulations designed to ensure the safe and ethical deployment\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/glossary-ai-security-compliance\\\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/smartdev.com\\\/kr\\\/glossary-ai-security-compliance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/glossary-ai-security-compliance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/smartdev.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/ai-robot-using-cyber-security-protect-information-privacy-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/smartdev.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/ai-robot-using-cyber-security-protect-information-privacy-scaled.jpg\",\"width\":2560,\"height\":1447,\"caption\":\"AI robot using cyber security to protect information privacy . Futuristic concept of cybercrime prevention by artificial intelligence and machine learning process . 3D rendering illustration .\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/glossary-ai-security-compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/smartdev.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI Security &#038; Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/#website\",\"url\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/\",\"name\":\"SmartDev\",\"description\":\"Al Powered Software Development\",\"publisher\":{\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/#organization\"},\"alternateName\":\"SmartDev\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/#organization\",\"name\":\"SmartDev\",\"alternateName\":\"SmartDev\",\"url\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/smartdev.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/SMD-Logo-New-Main-scaled.png\",\"contentUrl\":\"https:\\\/\\\/smartdev.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/SMD-Logo-New-Main-scaled.png\",\"width\":2560,\"height\":550,\"caption\":\"SmartDev\"},\"image\":{\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.youtube.com\\\/@smartdevllc\",\"https:\\\/\\\/x.com\\\/smartdevllc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/4873071\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI Security & Compliance | SmartDev","description":"AI security & compliance refers to the practices and regulations designed to ensure the safe and ethical deployment","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/smartdev.com\/kr\/glossary-ai-security-compliance\/","og_locale":"ko_KR","og_type":"article","og_title":"AI Security & Compliance | SmartDev","og_description":"AI security & compliance refers to the practices and regulations designed to ensure the safe and ethical deployment","og_url":"https:\/\/smartdev.com\/kr\/glossary-ai-security-compliance\/","og_site_name":"SmartDev","article_publisher":"https:\/\/www.youtube.com\/@smartdevllc","article_modified_time":"2026-04-01T01:48:31+00:00","og_image":[{"width":2560,"height":1447,"url":"https:\/\/smartdev.com\/wp-content\/uploads\/2026\/03\/ai-robot-using-cyber-security-protect-information-privacy-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@smartdevllc","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"5\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/smartdev.com\/kr\/glossary-ai-security-compliance\/","url":"https:\/\/smartdev.com\/kr\/glossary-ai-security-compliance\/","name":"AI Security & Compliance | SmartDev","isPartOf":{"@id":"https:\/\/smartdev.com\/kr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/smartdev.com\/kr\/glossary-ai-security-compliance\/#primaryimage"},"image":{"@id":"https:\/\/smartdev.com\/kr\/glossary-ai-security-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/smartdev.com\/wp-content\/uploads\/2026\/03\/ai-robot-using-cyber-security-protect-information-privacy-scaled.jpg","datePublished":"2026-03-30T07:02:24+00:00","dateModified":"2026-04-01T01:48:31+00:00","description":"AI security & compliance refers to the practices and regulations designed to ensure the safe and ethical deployment","breadcrumb":{"@id":"https:\/\/smartdev.com\/kr\/glossary-ai-security-compliance\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/smartdev.com\/kr\/glossary-ai-security-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/smartdev.com\/kr\/glossary-ai-security-compliance\/#primaryimage","url":"https:\/\/smartdev.com\/wp-content\/uploads\/2026\/03\/ai-robot-using-cyber-security-protect-information-privacy-scaled.jpg","contentUrl":"https:\/\/smartdev.com\/wp-content\/uploads\/2026\/03\/ai-robot-using-cyber-security-protect-information-privacy-scaled.jpg","width":2560,"height":1447,"caption":"AI robot using cyber security to protect information privacy . Futuristic concept of cybercrime prevention by artificial intelligence and machine learning process . 3D rendering illustration ."},{"@type":"BreadcrumbList","@id":"https:\/\/smartdev.com\/kr\/glossary-ai-security-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/smartdev.com\/"},{"@type":"ListItem","position":2,"name":"AI Security &#038; Compliance"}]},{"@type":"WebSite","@id":"https:\/\/smartdev.com\/kr\/#website","url":"https:\/\/smartdev.com\/kr\/","name":"\uc2a4\ub9c8\ud2b8\ub370\ube0c","description":"AI \uae30\ubc18 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c","publisher":{"@id":"https:\/\/smartdev.com\/kr\/#organization"},"alternateName":"SmartDev","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/smartdev.com\/kr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/smartdev.com\/kr\/#organization","name":"\uc2a4\ub9c8\ud2b8\ub370\ube0c","alternateName":"SmartDev","url":"https:\/\/smartdev.com\/kr\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/smartdev.com\/kr\/#\/schema\/logo\/image\/","url":"https:\/\/smartdev.com\/wp-content\/uploads\/2025\/04\/SMD-Logo-New-Main-scaled.png","contentUrl":"https:\/\/smartdev.com\/wp-content\/uploads\/2025\/04\/SMD-Logo-New-Main-scaled.png","width":2560,"height":550,"caption":"SmartDev"},"image":{"@id":"https:\/\/smartdev.com\/kr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.youtube.com\/@smartdevllc","https:\/\/x.com\/smartdevllc","https:\/\/www.linkedin.com\/company\/4873071\/"]}]}},"_links":{"self":[{"href":"https:\/\/smartdev.com\/kr\/wp-json\/wp\/v2\/glossary\/37571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smartdev.com\/kr\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/smartdev.com\/kr\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/smartdev.com\/kr\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/smartdev.com\/kr\/wp-json\/wp\/v2\/comments?post=37571"}],"version-history":[{"count":0,"href":"https:\/\/smartdev.com\/kr\/wp-json\/wp\/v2\/glossary\/37571\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smartdev.com\/kr\/wp-json\/wp\/v2\/media\/37348"}],"wp:attachment":[{"href":"https:\/\/smartdev.com\/kr\/wp-json\/wp\/v2\/media?parent=37571"}],"wp:term":[{"taxonomy":"glossary-category","embeddable":true,"href":"https:\/\/smartdev.com\/kr\/wp-json\/wp\/v2\/glossary-category?post=37571"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}