Abstract
Cyber attacks cause fatal blow by destructing critical infrastructure of nations with relatively small cost. North Korea uses cyber attacks as a major asymmetric strategy along with nuclear weapon. In this situation, South Korea needs to find better way to cope with North Korea’s aggressive cyber threats. In the present paper, we shall see North Korean cyber capability including its backgrounds, organization, and personnel. By exploring some key signifying structures consisting North Korean cyber power, it is intended to broaden understanding of the nature of North Korean cyber operations. The purpose of this paper is to come up with appropriate and effective ways to respond North Korean cyber attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
KINU North Korea Studies Division: Analysis of North Korea’s 2016 New Year’s Address and Domestics and Foreign Policy Outlook: Korea Institute for National Unification (KINU) Online Series CO16-01 (2016)
Korea Institute for National Unification (KINU): North Korea Domestic and Foreign Policy Evaluation and Outlook after Kim Jong-un seizing the Power: 11th KINU Unification Forum, pp. 1–5 (2015)
Feakin, T.: Playing blind-man’s buff: estimating North Korea’s cyber capabilities. Int. J. Korean Unification Stud. 22(2), 63–90 (2013)
Oh(Luke), I.S., Lee, S.Y., Kim, S.J.: Designing effective responding legal and political measures against North Korea’s cyber attacks. Institute for National Security Strategy (IISS) Policy Stud. 186 (2015)
Kwon, M.T.: A study on countermeasures to the North Korean asymmetric strategy - ‘cyber surprise attack’. J. Inf. Secur. 10(4) (2010)
Chanlett-Avery, E., Rinehart, I.E.: North Korea: U.S relations, nuclear diplomacy, and internal situation: Congressional Research service 7-5700, p. 20 (2014)
Wood, D.L.: 2015 Index of U.S. Military Strength: The Heritage Foundation (2015)
ITU Global Cybersecurity Index & Cyberwellness Profiles (2016)
Australian Strategic Policy Institute (ASPI): Cyber Maturity in the Asia-Pacific Region (2015)
Bae, S., Park, S., Kim, S.J.: A study on the development for the national cybersecurity capability assessment criteria. J. Korea Inst. Inf. Secur. Cryptology 25(5), 1293–1314 (2015)
Osborne, C.: North Korean tactics in cyberwarfare exposed, CNET
Lewis, J.A., Zheng, D.E.: Significant Cyber Events: Center for Strategic & International Studies (CSIS) (2016)
Jun, J., LaFoy, S., Sohn, E.: North Korea’s Cyber Operations - Strategy and Response: Center for Strategic & International Studies (CSIS) (2016)
Choi, H.Y., Jung, H.S.: Analysis of North Korean Cyber Capability, Shindonga, vol. 644 (2015)
Korea Institute for National Unification (KINU): North Korea’s internal state of affairs. KINU Mon. North Korean Rev. 3(4) (2009)
Robinson, N.: Information Sharing for Cyber-Security: Evidence from Europe: The Asan Institute for Policy Studies, Issue Brief, No. 72 (2013)
Jun, Y.O., Yong, B.K., Hong, K.J., Jun, S.H., Tae, S.Y.: A study on measures for strengthening cybersecurity through analysis of cyberattack response. J. Inf. Secur. 15(4) (2015)
National Intelligence Service: Ministry of Science, ICT and Future Planning, Korea Communications Commission. National Information Security White Paper, Ministry of Interior (2016)
Park, S., Kim, S.J.: A study on cybersecurity bills for the legislation of cybersecurity act in Korea. J. Inf. Secur. 13(6) (2013)
Jeongyoon, Y., Sangdon, P., Sojeong, K.: Analysis on the U.S Legislation Relation to Cybersecurity: Overview and Discussion of Five Acts Including National Cybersecurity Protection Act: Legislation and Policy, vol. 7, no. 2 (2015)
Kim, S.J., Park, S.: A study on cybersecurity policy in the context of international security. J. Inf. Secur. 13(6) (2013)
Park, S., Kim, I.: A study on tasks for the legal improvement for the governance system in cybersecurity. J. Inf. Secur. 13(4) (2013)
Ministry of National Defense, ROK, 2014 Defense White Paper (2014)
Morgus, R., Skierka, I., Hohmann, M., Maurer, T.: National CSIRTs and Their Role in Computer Security Incident Response: GPPi, New America, Ministry of Foreign Affairs of the Netherlands (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Yang, J.Y., Kim, S.J., Oh(Luke), I.S. (2017). Analysis on South Korean Cybersecurity Readiness Regarding North Korean Cyber Capabilities. In: Choi, D., Guilley, S. (eds) Information Security Applications. WISA 2016. Lecture Notes in Computer Science(), vol 10144. Springer, Cham. https://doi.org/10.1007/978-3-319-56549-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-56549-1_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-56548-4
Online ISBN: 978-3-319-56549-1
eBook Packages: Computer ScienceComputer Science (R0)