Today, the rapid advance of scientific technologies has brought about fundamental
changes to the types and levels of terrorism while the war against the world more
than one thousand small and big terrorists and crime organizations has already
begun.
A method highly likely to be employed by terrorist groups that are using 21st
Century state of the art technology is cyber terrorism. In many instances, things that
you could only imagine in reality could be made possible in the cyber space. An easy
example would be to randomly alter a letter in the blood type of a terrorism subject
in the health care data system, which could inflict harm to subjects and impact the
overturning of the opponent's system or regime.
The CIH Virus Crisis which occurred on April 26, 1999 had significant implications
in various aspects. A virus program made of just a few lines by Taiwanese college
students without any specific objective ended up spreading widely throughout the
Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a
great number of Korean sites are employing loose security measures. In fact, there
are many cases where a company with millions of subscribers has very slackened
security systems. A nationwide preparation for cyber terrorism is called for. In this
context, this research will analyze the current status of Korea's cyber security
systems and its laws from a policy perspective, and move on to propose improvement
strategies.
This research suggests the following solutions.
First, the National Cyber Security Management Act should be passed to have its
effectiveness as the national cyber security management regulation. With the Act's
establishment, a more efficient and proactive response to cyber security management
will be made possible within a nationwide cyber security framework, and define its
relationship with other related laws. The newly passed National Cyber Security
Management Act will eliminate inefficiencies that are caused by functional
redundancies dispersed across individual sectors in current legislation.
Second, to ensure efficient nationwide cyber security management, national cyber
security standards and models should be proposed; while at the same time a national
cyber security management organizational structure should be established to
implement national cyber security policies at each government-agencies and
social-components. The National Cyber Security Center must serve as the
comprehensive collection, analysis and processing point for national cyber crisis
related information, oversee each government agency, and build collaborative
relations with the private sector. Also, national and comprehensive response system
in which both the private and public sectors participate should be set up, for advance
detection and prevention of cyber crisis risks and for a consolidated and timely
response using national resources in times of crisis.
Today, the rapid advance of scientific technologies has brought about fundamental
changes to the types and levels of terrorism while the war against the world more
than one thousand small and big terrorists and crime organizations has already
begun.
A method highly likely to be employed by terrorist groups that are using 21st
Century state of the art technology is cyber terrorism. In many instances, things that
you could only imagine in reality could be made possible in the cyber space. An easy
example would be to randomly alter a letter in the blood type of a terrorism subject
in the health care data system, which could inflict harm to subjects and impact the
overturning of the opponent's system or regime.
The CIH Virus Crisis which occurred on April 26, 1999 had significant implications
in various aspects. A virus program made of just a few lines by Taiwanese college
students without any specific objective ended up spreading widely throughout the
Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a
great number of Korean sites are employing loose security measures. In fact, there
are many cases where a company with millions of subscribers has very slackened
security systems. A nationwide preparation for cyber terrorism is called for. In this
context, this research will analyze the current status of Korea's cyber security
systems and its laws from a policy perspective, and move on to propose improvement
strategies.
This research suggests the following solutions.
First, the National Cyber Security Management Act should be passed to have its
effectiveness as the national cyber security management regulation. With the Act's
establishment, a more efficient and proactive response to cyber security management
will be made possible within a nationwide cyber security framework, and define its
relationship with other related laws. The newly passed National Cyber Security
Management Act will eliminate inefficiencies that are caused by functional
redundancies dispersed across individual sectors in current legislation.
Second, to ensure efficient nationwide cyber security management, national cyber
security standards and models should be proposed; while at the same time a national
cyber security management organizational structure should be established to
implement national cyber security policies at each government-agencies and
social-components. The National Cyber Security Center must serve as the
comprehensive collection, analysis and processing point for national cyber crisis
related information, oversee each government agency, and build collaborative
relations with the private sector. Also, national and comprehensive response system
in which both the private and public sectors participate should be set up, for advance
detection and prevention of cyber crisis risks and for a consolidated and timely
response using national resources in times of crisis.