Major Issues of the National Cyber Security System in South Korea, and its Future Direction
- Authors
- Young-do, Kim; Jin-sung, Kim; Kyung-ho, Lee
- Issue Date
- 2013
- Publisher
- KOREA INST DEFENSE ANALYSES-KIDA
- Keywords
- Cyber Security System; National Cyber Security System; Cyber Conflict; Cyber Control Tower; Integrated Information Sharing
- Citation
- KOREAN JOURNAL OF DEFENSE ANALYSIS, v.25, no.4, pp.435 - 455
- Indexed
- SSCI
SCOPUS
KCI
- Journal Title
- KOREAN JOURNAL OF DEFENSE ANALYSIS
- Volume
- 25
- Number
- 4
- Start Page
- 435
- End Page
- 455
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/106454
- ISSN
- 1016-3271
- Abstract
- The National Cyber Security System (NCSS) of South Korea came under criticism when North Korean cyber-terrorists attacked the office computers and servers of major South Korean broadcasting and financial companies on March 20, 2013. The NCSS had evolved up to that time by addressing problems that arose from incidents dating to the January 25, 2003 Internet crisis, the March 4, 2011 distributed denial of service (DDoS) crisis, and other events occurring between those attacks. The above 2013 cyber-terrorism incident magnified the limits of NCSS leadership, expertise, and collaborative systems, while revealing that past reforms were nothing more than stopgap measures. Cyber security is a problem that is no longer restricted to cyberspace. At the U.S.-China Summit of June 2013, U.S. President Obama and Chinese President Xi Jinping for the first time initiated discussions on cyber security, resulting in the summit centering on cyber safety. Additionally, the release of the "National Cyber Security Framework Manual" and the "Tallinn Manual" by the NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE) produced widespread agreement among many countries that cyber security is core to preserving national security. It is important for South Korea to discard its stopgap measures, recognize that a centralized cyber security system is an integral aspect of national security, and develop a comprehensive cyber security plan.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.