1 "헤럴드경제"
2 서형준, "한반도 주변4강 사이버역량 평가" 한국전자통신연구소 부설연구소 2010
3 "중앙일보"
4 "조선비즈"
5 "전자신문"
6 임종인, "북한의 사이버전력 현황과 한국의 국가적 대응전략" 한국국방연구원 29 (29): 9-45, 2014
7 "동아사이언스"
8 "동아닷컴"
9 김종구, "김정은 체제수호를 위한 북한의 정보∙보안기구" 통일연구원 2015
10 "https://www.youtube.com/user/uriminzokkiri"
1 "헤럴드경제"
2 서형준, "한반도 주변4강 사이버역량 평가" 한국전자통신연구소 부설연구소 2010
3 "중앙일보"
4 "조선비즈"
5 "전자신문"
6 임종인, "북한의 사이버전력 현황과 한국의 국가적 대응전략" 한국국방연구원 29 (29): 9-45, 2014
7 "동아사이언스"
8 "동아닷컴"
9 김종구, "김정은 체제수호를 위한 북한의 정보∙보안기구" 통일연구원 2015
10 "https://www.youtube.com/user/uriminzokkiri"
11 "https://www.facebook.com/pages/Uriminzokkiri/124452740935216"
12 "https://twitter.com/uriminzok _engl"
13 "https://twitter.com/uriminzok"
14 "https://plus.google.com/u/0/112306344682887627095"
15 "http://www.voakorea.com/content/article/2583728.html"
16 Richard A. Clarke, "http://en.wikipedia.org/wiki/Richard_A._Clarke"
17 Technolytics, "World WarⅢ: A Cyber War has begun"
18 Duk-ki Kim, "The Republic of Korea’s Counter-Asymmetric Strategy" 63 (63): 2012
19 Committee on foreign affairs house of representatives, "The North Korean Threat: Nuclear, Missiles and Cyber, No. 114-2"
20 United Nations Institute for Disarmament Research, "The Cyber Index: International Security Trends and Realities"
21 The Guardian, "South Korea arrests five over gaming scam linked to hackers in North"
22 Wall Street Journal, "Sony Hack Shines Light on North Korea’s Cyber Attackers"
23 "SBS 뉴스"
24 "Russia’s Cyber Forces"
25 POLITICO Pro, "Obama signs executive order on sharing cyberthreat info"
26 WIRES, "Obama ranks N.Korea cyber capabilities as not so good"
27 New York Times, "Obama Says North Korea Hacked Sony, Vows Response"
28 Jennifer J. Erlendson, "North Korean Strategic Strategy:Combining Conventional Warfare with the Asymmetrical Effects of Cyber Warfare"
29 Global post, "North Korea: How the least-wired country became a hacking superpower"
30 Aljazeera, "North Korea recruits hackers at school"
31 The White House, "National Security Strategy"
32 New York Times, "N.S.A. Breached North Korean Networks Before Sony Attack, Officials Say"
33 NTI, "Kim Il Sung University"
34 "Iranian Cyber Warfare Threat Assessment"
35 Alastair Stevenson, "Iran and North Korea sign technology treaty to combat hostile malware"
36 Dakora L. Wood, "Index of U.S. Military Strength: Assessing America’s Ability to Provide for the Common Defense" The Heritage Foundation 2015
37 The Christian Science Monitor, "In cyberarms race, North Korea emerging as a power, not a pushover"
38 The Week, "How to kill Americans with geometry : A North Korean Propaganda film for kids"
39 Stephen C. Mercado, "Hermit Surfers of P’yongyang: North Korea and the Internet"
40 The White House, "Fact sheet: Cyber Threat Intelligence Integration Center"
41 "Defense Tech"
42 Institute for Security Technology Studies, "Cyber Warfare"
43 Richard A. Clarke, "Cyber War: The Next Threat to National Security and What to do about it" Ecco 2010
44 Booze Allen Hamilton, "Cyber Operation Maturity Framework"
45 H.J. Seo, "Criteria for Comparing Cyberwarfare Capability Lecture Notes in Electrical Engineering" Springer Science Business Media 111-120, 2012
46 "China’s Cyber Forces"
47 Robert Lentz, "Challenge: From Information Security To Cyber Security"
48 "Asymmetric warfare"