Browse > Article
http://dx.doi.org/10.6109/jkiice.2019.23.2.223

Cyber Weapon Model for the National Cybersecurity  

Bae, Si-Hyun (Department of Convergence Science and Technology, Hoseo Graduate School of Venture at Hoseo University)
Park, Dae-Woo (Department of Convergence Science and Technology, Hoseo Graduate School of Venture at Hoseo University)
Abstract
Recently, the United States has been trying to strengthen its cybersecurity by upgrading its position as an Unified Combatant Command that focuses on the Cyber Command in the United States, strengthening operations in cyberspace, and actively responding to cyber threats. Other major powers are also working to strengthen cyber capabilities, and they are working to strengthen their organization and power. The world demands economic power for its own interests rather than its own borders. But Cyber World is a world without borders and no defense. Therefore, a cyber weapon system is necessary for superiority in cyberspace (defense, attack) for national cybersecurity. In this paper, we analyze operational procedures for cyber weapons operation. And we design cyber weapons to analyze and develop the best cyber weapons to lead victory in cyberwarfare. It also conducts cyber weapons research to solve the confrontation between Cyber World.
Keywords
Cyber Weapon; Cyber Operations; Cybersecurity; Cyber Kill Chain; National Cybersecurity;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Department of Defense. Cyber Strategy. [Internet]. Available : https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF. 2018.
2 E. M. Hutchins, L. Martin, "Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains," 2011.
3 J. W. Yoo, and D. W. Park, "Cyber kill chain strategy for hitting attacker origin," Journal of the Korea Institute of Information and Communication Engineering, vol. 21, no. 11, pp. 3, Nov. 2017.
4 Department of Defense. (2015). Cybersecurity Test and Evaluation Guidebook. Version 1.0, 2015.
5 U.S. Joint Chief of Staff. Cyberspace Operations. (JP 3-12). 2018.
6 U.S. ARMY, CYBER OPERATIONS OFFICER, CAREERS & JOBS [Internet]. Available : https://www.goarmy.com/careers-and-jobs/browse-career-and-job-categories/computers-and-technology/cyber-operations-officer.html. 2017.
7 Headquaters, Department of the Army. Cyberspace and Electronic Warfare Operations (FM 3-12) [Internet]. Available : https://fas.org/irp/doddir/army/fm3-12.pdf. 2017.
8 U.S. Army. Operations. (FM 3-0). 2017.