Skip to main content

2017 | OriginalPaper | Buchkapitel

Analysis on South Korean Cybersecurity Readiness Regarding North Korean Cyber Capabilities

verfasst von : Jeong Yoon Yang, So Jeong Kim, Il Seok Oh(Luke)

Erschienen in: Information Security Applications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cyber attacks cause fatal blow by destructing critical infrastructure of nations with relatively small cost. North Korea uses cyber attacks as a major asymmetric strategy along with nuclear weapon. In this situation, South Korea needs to find better way to cope with North Korea’s aggressive cyber threats. In the present paper, we shall see North Korean cyber capability including its backgrounds, organization, and personnel. By exploring some key signifying structures consisting North Korean cyber power, it is intended to broaden understanding of the nature of North Korean cyber operations. The purpose of this paper is to come up with appropriate and effective ways to respond North Korean cyber attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat KINU North Korea Studies Division: Analysis of North Korea’s 2016 New Year’s Address and Domestics and Foreign Policy Outlook: Korea Institute for National Unification (KINU) Online Series CO16-01 (2016) KINU North Korea Studies Division: Analysis of North Korea’s 2016 New Year’s Address and Domestics and Foreign Policy Outlook: Korea Institute for National Unification (KINU) Online Series CO16-01 (2016)
2.
Zurück zum Zitat Korea Institute for National Unification (KINU): North Korea Domestic and Foreign Policy Evaluation and Outlook after Kim Jong-un seizing the Power: 11th KINU Unification Forum, pp. 1–5 (2015) Korea Institute for National Unification (KINU): North Korea Domestic and Foreign Policy Evaluation and Outlook after Kim Jong-un seizing the Power: 11th KINU Unification Forum, pp. 1–5 (2015)
3.
Zurück zum Zitat Feakin, T.: Playing blind-man’s buff: estimating North Korea’s cyber capabilities. Int. J. Korean Unification Stud. 22(2), 63–90 (2013) Feakin, T.: Playing blind-man’s buff: estimating North Korea’s cyber capabilities. Int. J. Korean Unification Stud. 22(2), 63–90 (2013)
4.
Zurück zum Zitat Oh(Luke), I.S., Lee, S.Y., Kim, S.J.: Designing effective responding legal and political measures against North Korea’s cyber attacks. Institute for National Security Strategy (IISS) Policy Stud. 186 (2015) Oh(Luke), I.S., Lee, S.Y., Kim, S.J.: Designing effective responding legal and political measures against North Korea’s cyber attacks. Institute for National Security Strategy (IISS) Policy Stud. 186 (2015)
5.
Zurück zum Zitat Kwon, M.T.: A study on countermeasures to the North Korean asymmetric strategy - ‘cyber surprise attack’. J. Inf. Secur. 10(4) (2010) Kwon, M.T.: A study on countermeasures to the North Korean asymmetric strategy - ‘cyber surprise attack’. J. Inf. Secur. 10(4) (2010)
6.
Zurück zum Zitat Chanlett-Avery, E., Rinehart, I.E.: North Korea: U.S relations, nuclear diplomacy, and internal situation: Congressional Research service 7-5700, p. 20 (2014) Chanlett-Avery, E., Rinehart, I.E.: North Korea: U.S relations, nuclear diplomacy, and internal situation: Congressional Research service 7-5700, p. 20 (2014)
7.
Zurück zum Zitat Wood, D.L.: 2015 Index of U.S. Military Strength: The Heritage Foundation (2015) Wood, D.L.: 2015 Index of U.S. Military Strength: The Heritage Foundation (2015)
8.
Zurück zum Zitat ITU Global Cybersecurity Index & Cyberwellness Profiles (2016) ITU Global Cybersecurity Index & Cyberwellness Profiles (2016)
9.
Zurück zum Zitat Australian Strategic Policy Institute (ASPI): Cyber Maturity in the Asia-Pacific Region (2015) Australian Strategic Policy Institute (ASPI): Cyber Maturity in the Asia-Pacific Region (2015)
10.
Zurück zum Zitat Bae, S., Park, S., Kim, S.J.: A study on the development for the national cybersecurity capability assessment criteria. J. Korea Inst. Inf. Secur. Cryptology 25(5), 1293–1314 (2015)CrossRef Bae, S., Park, S., Kim, S.J.: A study on the development for the national cybersecurity capability assessment criteria. J. Korea Inst. Inf. Secur. Cryptology 25(5), 1293–1314 (2015)CrossRef
11.
Zurück zum Zitat Osborne, C.: North Korean tactics in cyberwarfare exposed, CNET Osborne, C.: North Korean tactics in cyberwarfare exposed, CNET
12.
Zurück zum Zitat Lewis, J.A., Zheng, D.E.: Significant Cyber Events: Center for Strategic & International Studies (CSIS) (2016) Lewis, J.A., Zheng, D.E.: Significant Cyber Events: Center for Strategic & International Studies (CSIS) (2016)
13.
Zurück zum Zitat Jun, J., LaFoy, S., Sohn, E.: North Korea’s Cyber Operations - Strategy and Response: Center for Strategic & International Studies (CSIS) (2016) Jun, J., LaFoy, S., Sohn, E.: North Korea’s Cyber Operations - Strategy and Response: Center for Strategic & International Studies (CSIS) (2016)
14.
Zurück zum Zitat Choi, H.Y., Jung, H.S.: Analysis of North Korean Cyber Capability, Shindonga, vol. 644 (2015) Choi, H.Y., Jung, H.S.: Analysis of North Korean Cyber Capability, Shindonga, vol. 644 (2015)
15.
Zurück zum Zitat Korea Institute for National Unification (KINU): North Korea’s internal state of affairs. KINU Mon. North Korean Rev. 3(4) (2009) Korea Institute for National Unification (KINU): North Korea’s internal state of affairs. KINU Mon. North Korean Rev. 3(4) (2009)
16.
Zurück zum Zitat Robinson, N.: Information Sharing for Cyber-Security: Evidence from Europe: The Asan Institute for Policy Studies, Issue Brief, No. 72 (2013) Robinson, N.: Information Sharing for Cyber-Security: Evidence from Europe: The Asan Institute for Policy Studies, Issue Brief, No. 72 (2013)
17.
Zurück zum Zitat Jun, Y.O., Yong, B.K., Hong, K.J., Jun, S.H., Tae, S.Y.: A study on measures for strengthening cybersecurity through analysis of cyberattack response. J. Inf. Secur. 15(4) (2015) Jun, Y.O., Yong, B.K., Hong, K.J., Jun, S.H., Tae, S.Y.: A study on measures for strengthening cybersecurity through analysis of cyberattack response. J. Inf. Secur. 15(4) (2015)
18.
Zurück zum Zitat National Intelligence Service: Ministry of Science, ICT and Future Planning, Korea Communications Commission. National Information Security White Paper, Ministry of Interior (2016) National Intelligence Service: Ministry of Science, ICT and Future Planning, Korea Communications Commission. National Information Security White Paper, Ministry of Interior (2016)
19.
Zurück zum Zitat Park, S., Kim, S.J.: A study on cybersecurity bills for the legislation of cybersecurity act in Korea. J. Inf. Secur. 13(6) (2013) Park, S., Kim, S.J.: A study on cybersecurity bills for the legislation of cybersecurity act in Korea. J. Inf. Secur. 13(6) (2013)
20.
Zurück zum Zitat Jeongyoon, Y., Sangdon, P., Sojeong, K.: Analysis on the U.S Legislation Relation to Cybersecurity: Overview and Discussion of Five Acts Including National Cybersecurity Protection Act: Legislation and Policy, vol. 7, no. 2 (2015) Jeongyoon, Y., Sangdon, P., Sojeong, K.: Analysis on the U.S Legislation Relation to Cybersecurity: Overview and Discussion of Five Acts Including National Cybersecurity Protection Act: Legislation and Policy, vol. 7, no. 2 (2015)
21.
Zurück zum Zitat Kim, S.J., Park, S.: A study on cybersecurity policy in the context of international security. J. Inf. Secur. 13(6) (2013) Kim, S.J., Park, S.: A study on cybersecurity policy in the context of international security. J. Inf. Secur. 13(6) (2013)
22.
Zurück zum Zitat Park, S., Kim, I.: A study on tasks for the legal improvement for the governance system in cybersecurity. J. Inf. Secur. 13(4) (2013) Park, S., Kim, I.: A study on tasks for the legal improvement for the governance system in cybersecurity. J. Inf. Secur. 13(4) (2013)
23.
Zurück zum Zitat Ministry of National Defense, ROK, 2014 Defense White Paper (2014) Ministry of National Defense, ROK, 2014 Defense White Paper (2014)
24.
Zurück zum Zitat Morgus, R., Skierka, I., Hohmann, M., Maurer, T.: National CSIRTs and Their Role in Computer Security Incident Response: GPPi, New America, Ministry of Foreign Affairs of the Netherlands (2015) Morgus, R., Skierka, I., Hohmann, M., Maurer, T.: National CSIRTs and Their Role in Computer Security Incident Response: GPPi, New America, Ministry of Foreign Affairs of the Netherlands (2015)
Metadaten
Titel
Analysis on South Korean Cybersecurity Readiness Regarding North Korean Cyber Capabilities
verfasst von
Jeong Yoon Yang
So Jeong Kim
Il Seok Oh(Luke)
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-56549-1_9