2014
DOI: 10.1007/s12140-014-9215-1
|View full text |Cite
|
Sign up to set email alerts
|

Cyberwarfare in the Korean Peninsula: Asymmetries and Strategic Responses

Abstract: In this paper, we argue that the two Koreas' intentions and actions on the cyber front point toward the possibility that they have engaged in cyber warfare against each other. From South Korea's standpoint, a key concern has been North Korea's advanced cyber warfare capabilities and alleged involvement of its substantial workforce in the Internet's dark side activities. These issues need to be looked at the backdrop of the North's nuclear and ballistic missile capabilities. This paper draws principally upon th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(12 citation statements)
references
References 21 publications
0
12
0
Order By: Relevance
“…North Korea uses cyberwarfare training simulation software and gathers intelligence widely by using phishing and spyware to target highranking officials. Also, the South Korean National Intelligence Service (NIS) has estimated that North Korea has developed offensive cyber capabilities to take over power-supply systems in South Korea (Kshetri, 2014).…”
Section: Offensive Capabilitiesmentioning
confidence: 99%
See 4 more Smart Citations
“…North Korea uses cyberwarfare training simulation software and gathers intelligence widely by using phishing and spyware to target highranking officials. Also, the South Korean National Intelligence Service (NIS) has estimated that North Korea has developed offensive cyber capabilities to take over power-supply systems in South Korea (Kshetri, 2014).…”
Section: Offensive Capabilitiesmentioning
confidence: 99%
“…Although some military networks and other essential networks are connected to the Internet, they also operate air-gapped intranets with security measures such as cryptographic modules that correspond to security levels. The MND does maintain the public Information Operation Condition (INFOCON) to respond appropriately (Kshetri, 2014).…”
Section: Defensive Capabilitiesmentioning
confidence: 99%
See 3 more Smart Citations