North Korean Cyber Attacks and Policy Responses: An Interdisciplinary Theoretical Framework

نویسندگان

چکیده

Study conducts a qualitative analysis of the objectives, forms, current trends, and characteristics North Korean cyber terror attacks suggests way to ensure further progress towards successful international policy response. Despite capricious changes that have recently occurred within political atmosphere, Korea continues constitute threat stability through its ongoing advancement nuclear weapons long-range ballistic missiles. The difficulty attribution relatively low costs associated with launching offensives make terrorism an attractive option for Korea. In effort direct attention these circumstances, this study aims share explicit experts’ perspectives in field cyberterrorism South Consequently, purports contribute existing academic discussion practices on cybercrime. Furthermore, adopts from criminological theoretical frameworks network theory world politics substantiate more comprehensive view Korea’s which considers multifaceted asymmetrical nature context postmodern politicsfections.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Statistical Framework for Analyzing Cyber Attacks

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Chapter 1: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Res...

متن کامل

A Deception Framework for Survivability Against Next Generation Cyber Attacks

Over the years, malicious entities in cyber-space have grown smarter and resourceful. For defenders to stay abreast of the increasingly sophisticated attacks, the need is to understand these attacks. In this paper, we study the current trends in security attacks and present a threat model that encapsulates their sophistication. Survivability is difficult to achieve because of its contradictory ...

متن کامل

Cyber attacks: awareness

7. Geosynchronous Orbital Ion Cannon source code. Accessed Jan 2011. . 8. Moyer, E. ‘Report: FBI seizes server in probe of Wikileaks attacks’. CNET, 1 Jan 2011. Accessed Jan 2011. . 9. ‘Jester’s Court’. . 10.Leyden, J. ‘Anonymous hacktivists fire ion cannons at Zimbabwe’. The Regi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of cybersecurity intelligence and cybercrime

سال: 2021

ISSN: ['2578-3297', '2578-3289']

DOI: https://doi.org/10.52306/04020221nhpz9033