RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      KCI등재

      North Korean Cyber Terrorism: Past and Future

      한글로보기

      https://www.riss.kr/link?id=A105989549

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      With the success of hydrogen bomb and intercontinental ballistic missile tests by North Korea, international peace and security are continuously being threatened. Not only conventional battlefield, but also cyber domain has been exploited by North Korea as the weapon to hold asymmetric superiority over the adversaries. Cyber terrorism, which is expected to cause severe damage to property and injury or death to human, is one of the primary security threats in the international community. Therefore, this article highlights North Korean cyber terrorism by defining cyber terrorism and classifying it by characteristic. Based on the analysis of cyber terrorism in the past, it explores the possibilities of cyber terrorism in the future.
      번역하기

      With the success of hydrogen bomb and intercontinental ballistic missile tests by North Korea, international peace and security are continuously being threatened. Not only conventional battlefield, but also cyber domain has been exploited by North Kor...

      With the success of hydrogen bomb and intercontinental ballistic missile tests by North Korea, international peace and security are continuously being threatened. Not only conventional battlefield, but also cyber domain has been exploited by North Korea as the weapon to hold asymmetric superiority over the adversaries. Cyber terrorism, which is expected to cause severe damage to property and injury or death to human, is one of the primary security threats in the international community. Therefore, this article highlights North Korean cyber terrorism by defining cyber terrorism and classifying it by characteristic. Based on the analysis of cyber terrorism in the past, it explores the possibilities of cyber terrorism in the future.

      더보기

      참고문헌 (Reference)

      1 Solon, Olivia, "WannaCry ransomware has links to North Korea, cybersecurity experts say" The Guardian

      2 The Economic Times, "US charges North Korean programmer with WannaCry, other cyber attacks"

      3 Smith, Gary, "Threat posed by Electromagnetic Pulse(EMP) to U.S Military System and Civil Infrastructure" Testimony before the House National Security Committee 1997

      4 Liptak, Andrew, "The WannaCry ransomware attack has spread to 150 countries" The Verge

      5 Guterres, Antonio, "The Secretary-General Address to the General Assembly" 2017

      6 Thomas, T. L., "The Russian Military Today and Tomorrow: Essays in Memory of Mary Fitzgerald" U.S. Army War College Press 265-299, 2010

      7 Godwin, J. B, "The Russia-US bilateral on Cybersecurity: Critical Terminology Foundations" The East-West Institute 2014

      8 Chekinov, Sergey, "The Nature and Content of a New-Generation War" (4) : 12-23, 2013

      9 Russia, Presidential Executive Office, "The Military Doctrine of the Russian Federation"

      10 Lewis, J. A, "The Korean Cyber Attacks and Their Implication for Cyber Conflict" Center for Strategic and International Studies 2009

      1 Solon, Olivia, "WannaCry ransomware has links to North Korea, cybersecurity experts say" The Guardian

      2 The Economic Times, "US charges North Korean programmer with WannaCry, other cyber attacks"

      3 Smith, Gary, "Threat posed by Electromagnetic Pulse(EMP) to U.S Military System and Civil Infrastructure" Testimony before the House National Security Committee 1997

      4 Liptak, Andrew, "The WannaCry ransomware attack has spread to 150 countries" The Verge

      5 Guterres, Antonio, "The Secretary-General Address to the General Assembly" 2017

      6 Thomas, T. L., "The Russian Military Today and Tomorrow: Essays in Memory of Mary Fitzgerald" U.S. Army War College Press 265-299, 2010

      7 Godwin, J. B, "The Russia-US bilateral on Cybersecurity: Critical Terminology Foundations" The East-West Institute 2014

      8 Chekinov, Sergey, "The Nature and Content of a New-Generation War" (4) : 12-23, 2013

      9 Russia, Presidential Executive Office, "The Military Doctrine of the Russian Federation"

      10 Lewis, J. A, "The Korean Cyber Attacks and Their Implication for Cyber Conflict" Center for Strategic and International Studies 2009

      11 Schneider, Mark, "The Emerging EMP Threat to the United States" National Institute Press 2007

      12 Hawkins, Derek, "The Cybersecurity 202: North Korea is even less likely to give up hacking than nukes" The Washington Post

      13 Denning, D. E, "Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives" 2000

      14 Schmitt, M. N., "Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations" Cambridge University Press 2017

      15 Collins, Sean, "Stuxnet: the emergence of a new cyber weapon and its implication" 7 (7): 80-91, 2012

      16 Langner, Ralph, "Stuxnet: Dissecting a Cyberwarfare Weapon" 9 (9): 49-51, 2011

      17 McCurry, Justin, "South Korean nuclear operator hacked amid cyber-attack fears" The Guardian

      18 Lee, Hyun-Jeong, "Seoul subway server allegedly hacked by N.K" The Korea Herald

      19 Connell, Michael, "Russia’s Approach to Cyber Warfare" Center for Naval Analyses 2017

      20 Foster, J. S. Jr, "Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack: Critical National Infrastructures" Electromagnetic Pulse (EMP) Commission 2008

      21 Willian A. Owens, "Policy, Law, and Ethics Regarding U.S Acquisition and Use of Cyberattack Capabilities" National Academics Press 2009

      22 Lee, Dae-Sung, "Policy Suggestions and Threat Analysis about Electronic Warfare by the North Korea: Focused on the Electromagnetic Pulse" 188 : 59-80, 2016

      23 Tobias Feakin, "Playing Blind-Man’s Buff: Estimating North Korea’s Cyber Capabilities" 통일연구원 22 (22): 63-90, 2013

      24 Kim, In-Jung, "North Korea’s Cyber-terrorism Development and Prospect" 2015

      25 National Crime Agency, "North Korean programmer linked to WannaCry cyber attack on UK"

      26 Erlendson, J. J, "North Korean Strategic Strategy: Combining Conventional Warfare with the Asymmetric Effects of Cyber Warfare" Utica College 2013

      27 Meyers, Adam, "North Korean Cyber Operations: Weapons of Mass Disruption" 38 North

      28 Harley, Nicola, "North Korea behind WannaCry attack which crippled the NHS after stealing US cyber weapons, Microsoft chief claims" The Telegraph

      29 Haggard, Stephan, "North Korea and the Sony Hack: Exporting Instability Through Cyberspace" East-West Center (117) : 2015

      30 Farral, Travis, "Nation-state attacks: practical defences against advanced adversaries" 2017 (2017): 5-7, 2017

      31 BBC News, "NHS cyber-attack: GPs and hospitals hit by ransomware"

      32 Carey, C. C. Ⅲ., "NATO’s Options for Defensive Cyber Against Non-State Actors" U.S. Army War College 2013

      33 O’Dowd, Adrian, "Major global cyber-attack hits NHS and delays treatment" The BMJ

      34 Walling, E. M., "High Power Microwaves: Strategic and Operational Implication for Warfare" Center for Strategy and Technology, Air War College 2000

      35 Capozzella, R. J, "High Power Microwaves on the Future Battlefield: Implications for U.S. Defense" Air War College 2010

      36 Valeriano, Brandon, "Handbook of International Political Theory" Oxford University Press 259-271, 2018

      37 CBS News, "Global cyberattack strikes dozens of countries, cripples U.K. hospitals"

      38 Finland, Secretariat of the Security Committee, "Finland’s Cyber Security Strategy:Government Resolution 24.1.2013"

      39 "Executive Order 13636, Improving Critical Infrastructure Cybersecurity" Federal Register

      40 "Executive Order 13010, Critical Infrastructure Protection" Federal Register

      41 Miller, C. R, "Electromagnetic Pulse Threats in 2010" Center for Strategy and Technology, Air War College 2005

      42 Geis, J. P, "Directed Energy Weapons on the Battlefield: A New Vision for 2025" Center for Strategy and Technology, Air War College 2003

      43 Bechtol, B. E. Jr, "Developments in the North Korean Asymmetric Threat: Missiles and Electronic Warfare" XVI (XVI): 107-129, 2012

      44 Dogrul, Murat, "Developing an International Cooperation on Cyber Defense and Deterrence against Cyber terrorism" CCD COE Publication 29-43, 2011

      45 U.S. Joint Chiefs of Staff, "DOD Dictionary of Military and Associated Terms"

      46 Chang, Zen, "Cyberwarfare and International Humanitarian Law" 9 (9): 29-53, 2017

      47 Yannakogeorgos, P. A., "Cyberterrorism:Understanding, Assessment, and Response" Springer 43-62, 2014

      48 Blank, S. J, "Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition" U.S. Army War College Press 205-272, 2016

      49 Thomas, T. L., "Cyberpower and National Security" National Defense University Press 465-485, 2009

      50 BBC News, "Cyber-attack: Europol says it was unprecedented in scale"

      51 Rudner, Martin, "Cyber-Threats to Critical National Infrastructure: An Intelligence Challenge" 26 (26): 453-481, 2013

      52 Kenny, Michael, "Cyber-Terrorism in a Post-Stuxnet World" 59 (59): 111-128, 2015

      53 Clarke, R. A, "Cyber War" HarperCollins 2010

      54 Boo, Hyeong-Wook, "An Assessment of North Korean Cyber Threats" 31 (31): 97-117, 2017

      55 Brunst, P. W, "A War on Terror?: The European Stance on a New Threat, Changing Laws and Human Rights Implications" Springer 51-78, 2010

      더보기

      동일학술지(권/호) 다른 논문

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      인용정보 인용지수 설명보기

      학술지 이력

      학술지 이력
      연월일 이력구분 이력상세 등재구분
      2027 평가예정 재인증평가 신청대상 (재인증)
      2021-01-01 평가 등재학술지 유지 (재인증) KCI등재
      2018-01-01 평가 등재학술지 선정 (계속평가) KCI등재
      2017-12-01 평가 등재후보로 하락 (계속평가) KCI등재후보
      2013-01-01 평가 등재학술지 유지 (등재유지) KCI등재
      2011-08-22 학회명변경 영문명 : Research Institute On National Security Affairs -> Research Institute for National Security Affairs KCI등재
      2011-08-18 학술지명변경 한글명 : 영문학술지(KJSA) -> The Korean Journal of Security Affairs
      외국어명 : 미등록 -> The Korean Journal of Security Affairs
      KCI등재
      2010-01-01 평가 등재학술지 선정 (등재후보2차) KCI등재
      2009-01-01 평가 등재후보 1차 PASS (등재후보1차) KCI등재후보
      2007-01-01 평가 등재후보학술지 선정 (신규평가) KCI등재후보
      더보기

      학술지 인용정보

      학술지 인용정보
      기준연도 WOS-KCI 통합IF(2년) KCIF(2년) KCIF(3년)
      2016 0.42 0.42 0.37
      KCIF(4년) KCIF(5년) 중심성지수(3년) 즉시성지수
      0.32 0.24 0.744 0
      더보기

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼