메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색

논문 기본 정보

자료유형
학술저널
저자정보
저널정보
통일연구원 International Journal of Korean Unification Studies International Journal of Korean Unification Studies 제22권 제2호
발행연도
2013.1
수록면
63 - 90 (28page)

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색

초록· 키워드

오류제보하기
This paper aims to create a clearer understanding of the size and scope of North Korean cyber capabilities. Due to the opaque and secretive nature of the North Korean regime, and the difficulties of attribution in cyberspace, it is problematic to present a complete picture of the North’s malicious activities in cyberspace. This paper presents an open source literature based review of this issue. It begins by defining terminology used to describe cyber threats, and whilst seemingly these threats are new, cyberspace has merely facilitated a new method of achieving old ends. North Korean motivations for developing cyber capabilities are examined, followed by an examination of the historical context to their development of such efforts, and a breakdown of the various North Korean military departments involved cyber activities is presented. An analysis of the growing private sector-led evidential trail of North Korean cyber attacks is followed by an assessment of the impacts that these attacks have had on South Korean policymaking, and operational responses. Finally the author examines the potential impacts fornational and regional destabilisation that unabated North Korean cyberattacks could have, concluding that severe damage to South Korea’s economic, political and international reputation could be a distinctly negative consequence.

목차

등록된 정보가 없습니다.

참고문헌 (35)

참고문헌 신청

이 논문의 저자 정보

최근 본 자료

전체보기

댓글(0)

0