북한의 사이버공격과 대응방안에 관한 연구A Study on North Korea’s Cyber Attacks and Countermeasures
- Other Titles
- A Study on North Korea’s Cyber Attacks and Countermeasures
- Authors
- 정민경; 임종인; 권헌영
- Issue Date
- 2016
- Publisher
- 한국IT서비스학회
- Keywords
- North Korea; DPRK(Democratic People' s Republic of Korea); Cyber Attacks; SPE(Sony Pictures Entertainment) Hacking; Cyber Attacks on Estonia; Stuxnet; KHNP(Korea Hydro & Nuclear Power Plant) Hacking
- Citation
- 한국IT서비스학회지, v.15, no.1, pp.67 - 79
- Indexed
- KCI
- Journal Title
- 한국IT서비스학회지
- Volume
- 15
- Number
- 1
- Start Page
- 67
- End Page
- 79
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/90451
- DOI
- 10.9716/KITS.2016.15.1.067
- ISSN
- 1975-4256
- Abstract
- This study aims to present the necessary elements that should be part of South Korea’s National Defense Strategy against the recent North Korean cyber-attacks. The elements proposed in this study also reflect the recent trend of cyber-attack incidents that are happening in the Unites States and other countries and have been classified into the three levels of cyber incidents: cyberwarfare, cyberterrorism and cybercrime. As such, the elements proposed are presented in accordance with this classification system.
In order to properly take into account the recent trend of cyber-attacks perpetrated by North Korea, this paper analyzed the characteristics of recent North Korean cyber-attacks as well as the countermeasures and responses of South Korea. Moreover, by making use of case studies of cyber-attack incidents by foreign nations that threaten national security, the response measures at a national level can be deduced and applied as in this study. Thus, the authors of this study hope that the newly proposed elements here within will help to strengthen the level of Korea’s cyber security against foreign attacks, specifically that of North Korea such as the KHNP hacking incidents and so on. It is hoped that further damage such as leakage of confidential information, invasion of privacy and physical intimidation can be mitigated.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.