Skip to main content

Analysis on South Korean Cybersecurity Readiness Regarding North Korean Cyber Capabilities

  • Conference paper
  • First Online:
Information Security Applications (WISA 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10144))

Included in the following conference series:

Abstract

Cyber attacks cause fatal blow by destructing critical infrastructure of nations with relatively small cost. North Korea uses cyber attacks as a major asymmetric strategy along with nuclear weapon. In this situation, South Korea needs to find better way to cope with North Korea’s aggressive cyber threats. In the present paper, we shall see North Korean cyber capability including its backgrounds, organization, and personnel. By exploring some key signifying structures consisting North Korean cyber power, it is intended to broaden understanding of the nature of North Korean cyber operations. The purpose of this paper is to come up with appropriate and effective ways to respond North Korean cyber attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. KINU North Korea Studies Division: Analysis of North Korea’s 2016 New Year’s Address and Domestics and Foreign Policy Outlook: Korea Institute for National Unification (KINU) Online Series CO16-01 (2016)

    Google Scholar 

  2. Korea Institute for National Unification (KINU): North Korea Domestic and Foreign Policy Evaluation and Outlook after Kim Jong-un seizing the Power: 11th KINU Unification Forum, pp. 1–5 (2015)

    Google Scholar 

  3. Feakin, T.: Playing blind-man’s buff: estimating North Korea’s cyber capabilities. Int. J. Korean Unification Stud. 22(2), 63–90 (2013)

    Google Scholar 

  4. Oh(Luke), I.S., Lee, S.Y., Kim, S.J.: Designing effective responding legal and political measures against North Korea’s cyber attacks. Institute for National Security Strategy (IISS) Policy Stud. 186 (2015)

    Google Scholar 

  5. Kwon, M.T.: A study on countermeasures to the North Korean asymmetric strategy - ‘cyber surprise attack’. J. Inf. Secur. 10(4) (2010)

    Google Scholar 

  6. Chanlett-Avery, E., Rinehart, I.E.: North Korea: U.S relations, nuclear diplomacy, and internal situation: Congressional Research service 7-5700, p. 20 (2014)

    Google Scholar 

  7. Wood, D.L.: 2015 Index of U.S. Military Strength: The Heritage Foundation (2015)

    Google Scholar 

  8. ITU Global Cybersecurity Index & Cyberwellness Profiles (2016)

    Google Scholar 

  9. Australian Strategic Policy Institute (ASPI): Cyber Maturity in the Asia-Pacific Region (2015)

    Google Scholar 

  10. Bae, S., Park, S., Kim, S.J.: A study on the development for the national cybersecurity capability assessment criteria. J. Korea Inst. Inf. Secur. Cryptology 25(5), 1293–1314 (2015)

    Article  Google Scholar 

  11. Osborne, C.: North Korean tactics in cyberwarfare exposed, CNET

    Google Scholar 

  12. Lewis, J.A., Zheng, D.E.: Significant Cyber Events: Center for Strategic & International Studies (CSIS) (2016)

    Google Scholar 

  13. Jun, J., LaFoy, S., Sohn, E.: North Korea’s Cyber Operations - Strategy and Response: Center for Strategic & International Studies (CSIS) (2016)

    Google Scholar 

  14. Choi, H.Y., Jung, H.S.: Analysis of North Korean Cyber Capability, Shindonga, vol. 644 (2015)

    Google Scholar 

  15. Korea Institute for National Unification (KINU): North Korea’s internal state of affairs. KINU Mon. North Korean Rev. 3(4) (2009)

    Google Scholar 

  16. Robinson, N.: Information Sharing for Cyber-Security: Evidence from Europe: The Asan Institute for Policy Studies, Issue Brief, No. 72 (2013)

    Google Scholar 

  17. Jun, Y.O., Yong, B.K., Hong, K.J., Jun, S.H., Tae, S.Y.: A study on measures for strengthening cybersecurity through analysis of cyberattack response. J. Inf. Secur. 15(4) (2015)

    Google Scholar 

  18. National Intelligence Service: Ministry of Science, ICT and Future Planning, Korea Communications Commission. National Information Security White Paper, Ministry of Interior (2016)

    Google Scholar 

  19. Park, S., Kim, S.J.: A study on cybersecurity bills for the legislation of cybersecurity act in Korea. J. Inf. Secur. 13(6) (2013)

    Google Scholar 

  20. Jeongyoon, Y., Sangdon, P., Sojeong, K.: Analysis on the U.S Legislation Relation to Cybersecurity: Overview and Discussion of Five Acts Including National Cybersecurity Protection Act: Legislation and Policy, vol. 7, no. 2 (2015)

    Google Scholar 

  21. Kim, S.J., Park, S.: A study on cybersecurity policy in the context of international security. J. Inf. Secur. 13(6) (2013)

    Google Scholar 

  22. Park, S., Kim, I.: A study on tasks for the legal improvement for the governance system in cybersecurity. J. Inf. Secur. 13(4) (2013)

    Google Scholar 

  23. Ministry of National Defense, ROK, 2014 Defense White Paper (2014)

    Google Scholar 

  24. Morgus, R., Skierka, I., Hohmann, M., Maurer, T.: National CSIRTs and Their Role in Computer Security Incident Response: GPPi, New America, Ministry of Foreign Affairs of the Netherlands (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jeong Yoon Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Yang, J.Y., Kim, S.J., Oh(Luke), I.S. (2017). Analysis on South Korean Cybersecurity Readiness Regarding North Korean Cyber Capabilities. In: Choi, D., Guilley, S. (eds) Information Security Applications. WISA 2016. Lecture Notes in Computer Science(), vol 10144. Springer, Cham. https://doi.org/10.1007/978-3-319-56549-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-56549-1_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-56548-4

  • Online ISBN: 978-3-319-56549-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics