Browse > Article

Research on Cyber-terrorism preparation scheme  

Kim, Yeon Jun (용인대학교 군사학과)
Kim, Sang Jin (용인대학교 학점은행제 경호비서전공(항공보안))
Publication Information
Abstract
While evolving information-oriented society provides a lot of benefits to the human life, new types of threats have been increasing. Particularly, cyber terrorism, happen on the network that is composed of a computer system and information communication network, and the mean and scale of damage has reached a serious level. In other words, it is hard to locate cyber terror since it occurs in the virtual space, not in the real world, so identifying "Who is attacking?" (Non-visibility, non-formulas), or "Where the attack takes place?" (trans-nation) are hard. Hackers, individuals or even a small group of people, who carried out the cyber terror are posing new threats that could intimidate national security and the pace and magnitude of threats keep evolving. Scale and capability of North Korea's cyber terrorism are assessed as world-class level. Recently, North Korea is focusing on strengthen their cyber terrorism force. So improving a response system for cyber terror is a key necessity as North Korea's has emerged as a direct threat to South Korean security. Therefore, Korea has to redeem both legal and institutional systems immediately to perform as a unified control tower for preemptive response to cyber terrors arise from North Korea and neighboring countries.
Keywords
cyber-terrorism; non-visibility; non-formulas; trans-nation; preemptive-response;
Citations & Related Records
연도 인용수 순위
  • Reference
1 김흥석, 2010, "사이버 테러와 국가안보", 저스티스 121, p. 323-324.
2 디지털타임스, (2010. 7. 5자)
3 매일경제, 2013년 12월 24일자.
4 송봉선, "실패한 대남전략", 북한문제연구소, 2009, pp. 51-52.
5 이완수, "국가사이버안보 구축전략에 관한 연구", 경기대학교 박사논문, pp. 108-110.
6 오일석, 2014, "보안기관의 사이버보안활동 강화에 대한 법적고찰", 과학기술법연구, 20(3), pp. 41-56.
7 연합뉴스, (2014. 12. 20)
8 조선비즈, 2011년 3월 4일.
9 장노순, 2005. "초국가적 행위자의 사이버공격과 핵공격에 관한 비교연구," 한국정치학회보 39(5), pp. 263-281.
10 장노순, "사이버 무기와 국제안보", JPI 정책포럼 제13호, 2012, pp. 2.
11 장노순, "사이버 무기와 국제안보", JPI 정책포럼 제13호, 2012, pp. 6.
12 Schmitt, N. N., Tallinn manual on the International Law application to cyber warfare, Cambridge Press, 2013.
13 김배중, 2015. "사이버테러의 국제정치," 연세대학교 석사논문, pp. 27-28.
14 권태영, "21세기 군사혁신과 미래전," 법문사, 2008, p. 224-225. 재정리