Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

북한의 사이버공격과 대응방안에 관한 연구A Study on North Korea’s Cyber Attacks and Countermeasures

Other Titles
A Study on North Korea’s Cyber Attacks and Countermeasures
Authors
정민경임종인권헌영
Issue Date
2016
Publisher
한국IT서비스학회
Keywords
North Korea; DPRK(Democratic People' s Republic of Korea); Cyber Attacks; SPE(Sony Pictures Entertainment) Hacking; Cyber Attacks on Estonia; Stuxnet; KHNP(Korea Hydro & Nuclear Power Plant) Hacking
Citation
한국IT서비스학회지, v.15, no.1, pp.67 - 79
Indexed
KCI
Journal Title
한국IT서비스학회지
Volume
15
Number
1
Start Page
67
End Page
79
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/90451
DOI
10.9716/KITS.2016.15.1.067
ISSN
1975-4256
Abstract
This study aims to present the necessary elements that should be part of South Korea’s National Defense Strategy against the recent North Korean cyber-attacks. The elements proposed in this study also reflect the recent trend of cyber-attack incidents that are happening in the Unites States and other countries and have been classified into the three levels of cyber incidents: cyberwarfare, cyberterrorism and cybercrime. As such, the elements proposed are presented in accordance with this classification system. In order to properly take into account the recent trend of cyber-attacks perpetrated by North Korea, this paper analyzed the characteristics of recent North Korean cyber-attacks as well as the countermeasures and responses of South Korea. Moreover, by making use of case studies of cyber-attack incidents by foreign nations that threaten national security, the response measures at a national level can be deduced and applied as in this study. Thus, the authors of this study hope that the newly proposed elements here within will help to strengthen the level of Korea’s cyber security against foreign attacks, specifically that of North Korea such as the KHNP hacking incidents and so on. It is hoped that further damage such as leakage of confidential information, invasion of privacy and physical intimidation can be mitigated.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE