.img_security_consulting{overflow-x:auto;margin-top:30px}.img_security_consulting img{width:100%}.cover.security_consulting{background-image:url(../../images/solution/security-consulting/bg_security-consulting_cover.png)}.section_table.security_consulting_1 .img{background-image:url(../../images/solution/security-consulting/bg_security-consulting_1.png)}.section_table.security_consulting_2 .img{background-image:url(../../images/solution/security-consulting/bg_security-consulting_2.png)}.section_table.security_consulting_1 .box h2,.section_table.security_consulting_2 .box h2{font-weight:600}.section.security_consulting_4 h2,.section.security_consulting_5 h2,.section.security_consulting_6 h2{margin-bottom:40px}.section.security_consulting_4 h3,.section.security_consulting_5 h3,.section.security_consulting_6 h3{margin-top:0;margin-bottom:10px}.section.security_consulting_3{background-color:#0a0f10}.section.security_consulting_3 .inner{color:#fff}.section.security_consulting_3 .inner h3{margin-bottom:40px}.section.security_consulting_3 .consulting_business_list{overflow-x:auto;display:flex;justify-content:space-between;gap:10px}.section.security_consulting_3 .consulting_business_item{display:flex;flex-direction:column;align-items:center;width:376px;min-height:300px;background-color:#202733;border-radius:20px}.section.security_consulting_3 .consulting_business_item:before{content:'';display:block;width:110px;height:110px;background-image:url(../../images/solution/security-consulting/sprites_security-consulting_2x.png);background-size:110px;background-repeat:no-repeat;margin:25px 0}.section.security_consulting_3 .consulting_business_item.business_1:before{background-position:0 0}.section.security_consulting_3 .consulting_business_item.business_2:before{background-position:0 -110px}.section.security_consulting_3 .consulting_business_item.business_3:before{background-position:0 -220px}.section.security_consulting_3 .consulting_business_item p{color:rgba(255,255,255,0.6);font-weight:400;text-align:center;margin:0}.section.security_consulting_3 .consulting_business_item p span{display:block;font-size:1.375rem;font-weight:600;line-height:1.875rem;color:rgba(255,255,255,1);margin-bottom:10px}.section.security_consulting_4{background-color:#eee;padding-bottom:120px}.section.security_consulting_5{padding:120px 0}.section.security_consulting_4 p{margin-bottom:0;padding-right:10px}.section.security_consulting_5 p{margin-bottom:0;padding-right:20px}.section.security_consulting_4 h4,.section.security_consulting_5 h4{position:relative;font-size:1.125rem;font-weight:600;line-height:1.625rem;padding-left:12px;margin-bottom:10px;margin-top:40px}.section.security_consulting_4 h4:before,.section.security_consulting_5 h4:before{content:'';position:absolute;left:0;top:12px;width:4px;height:4px;background-color:#333}@media screen and (max-width:1023px){.cover.security_consulting p br{display:none}.img_security_consulting{margin-top:20px;padding-right:20px}.img_security_consulting img{min-width:1200px}.cover .btn_area .btn:nth-child(1){width:100%}.section_table h2{padding-right:16px}.section h3{font-size:1.125rem}.section>.inner{padding-right:0}.section.security_consulting_3 .consulting_business_item{min-width:300px;min-height:250px}.section.security_consulting_3 .consulting_business_item:before{width:88px;height:88px;background-size:88px;margin:20px auto}.section.security_consulting_3 .consulting_business_item.business_2:before{background-position:0 -88px}.section.security_consulting_3 .consulting_business_item.business_3:before{background-position:0 -176px}.section.security_consulting_4{padding-bottom:30px}.section.security_consulting_5{padding:40px 0 70px 0}.section.security_consulting_4 h2,.section.security_consulting_5 h2{margin-bottom:30px}.section.security_consulting_4 h3,.section.security_consulting_5 h3{padding-right:20px}.section.security_consulting_4 p,.section.security_consulting_5 p{padding-right:20px}.section.security_consulting_4 h4,.section.security_consulting_5 h4{margin-top:30px}.section.security_consulting_3 .consulting_business_list{padding-bottom:20px}.section.security_consulting_3 .consulting_business_list::-webkit-scrollbar{height:4px}.section.security_consulting_3 .consulting_business_list::-webkit-scrollbar-thumb{background:rgba(33,33,33,1);border-radius:16px}.section.security_consulting_3 .consulting_business_list::-webkit-scrollbar-track{background:#dbdbdb;border-radius:16px}.img_security_consulting{padding-bottom:20px}.img_security_consulting::-webkit-scrollbar{height:4px}.img_security_consulting::-webkit-scrollbar-thumb{background:#13bd33;border-radius:2px}.img_security_consulting::-webkit-scrollbar-track{background:#dbdbdb;border-radius:2px}}