Browse > Article
http://dx.doi.org/10.17662/ksdim.2017.13.1.059

The Countermeasure for Threat of Cyber Terror in Sociological Perspective  

Choi, Heesik (삼육대학교 컴퓨터학부)
Kim, Hyunkyu (삼육대학교 컴퓨터학부)
Publication Information
Journal of Korea Society of Digital Industry and Information Management / v.13, no.1, 2017 , pp. 59-67 More about this Journal
Abstract
In recent years, cyber terror that break into major institution's information system and destroy and paralyzed important information occurs frequently. Some countries do dangerous acts such as train hackers and order hackers to hack important industrial confidential documents which are core of national competitiveness to reduce the competitiveness of the country and cause social confusion. In this thesis, it will study problems of cyber terror to help people to use Internet in web environment that safe from cyber terror and to avoid the risk from cyber terror such as malware and DDos. This thesis is organized as following. In second chapter, it will look thorough the research that are related to cyber terror. In third chapter, it will study attack types of cyber terror. In fourth chapter, to defend from cyber violence, it will suggest safe solution. In fifth chapter, it will end with conclusion. Finally, to prevent urgent incidents like North Korean Cyber-attack, every Internet user must indicate their recognition on Internet security and it is significant to make a quick response treatment to create the safe online environment.
Keywords
Cyber Terror; Cyber Attack; Malignity Code;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 신현조, 이경복, 박태형, "인적 및 직무특성과 보안교육 이수율 및 사이버테러 대응과의 연관성 분석," 디지털산업정보학회, 제10권, 제4호, 2014 년, p. 98.
2 곽병선, "사이버테러 대응을 위한 법체계 검토," 한국법학회, 제59집, 2015년, p. 2.
3 김태계, "사이버테러 범죄 대응에 관한 제도적 문제점과 대책," 한국법정책학회, 제14집, 제3호, 2014년, p. 1346.
4 정기석, "최근의 사이버테러에 대한 대응방안," 정보보안 논문지, 제12권, 제1호, 2012년, p. 92.
5 권양섭, "사이버 범죄 처벌규정의 문제점과 대응방안," 한국법학회, 제53집, 2014년, pp. 186.
6 http://www.voakorea.com/a/3443836.html
7 http://www.hani.co.kr/arti/international/america/776799.html#csidx5440747dcd90c4789e3152d9f13112a
8 http://www.dailysecu.com/news/articleView.html?idxno=7673
9 http://www.hankookilbo.com/m/v/8ef329feb1db439cbac47c6fdb3825a5
10 www.nars.go.kr\'이슈와논점'\제640호\2013년4 월18일
11 http://www.zdnet.co.kr/news/news_view.asp?artice_id=20141022172754&type=det&re=#csidx6e88e2365fed2518b91f5d4f16108c3
12 http://www.itworld.co.kr/slideshow/86276#csidx615b2c1176b76c7a91d6ab57cf225f7
13 http://www.etnews.com/20161013000198
14 http://www.dailysecu.com/news/articleView.html?idxno=131
15 http://quickbooks.intuit.com/r/technology-and-security/8-types-of-cyber-attacks-your-business-needs-to-avoid
16 http://www.itworld.co.kr/howto/101250
17 http://www.boannews.com/media/view.asp?idx=49946
18 서우석, 박대우, 전문석, "TCP/IP Layer별 공격패턴 분석에 기반한 CFC를 이용한 DDoS 방어 알고리즘 연구," 디지털산업정보학회, 제 6권, 제 4호, 2010년, p.118.