North Korean Cyber Attacks and Policy Responses: An Interdisciplinary Theoretical Framework
نویسندگان
چکیده
Study conducts a qualitative analysis of the objectives, forms, current trends, and characteristics North Korean cyber terror attacks suggests way to ensure further progress towards successful international policy response. Despite capricious changes that have recently occurred within political atmosphere, Korea continues constitute threat stability through its ongoing advancement nuclear weapons long-range ballistic missiles. The difficulty attribution relatively low costs associated with launching offensives make terrorism an attractive option for Korea. In effort direct attention these circumstances, this study aims share explicit experts’ perspectives in field cyberterrorism South Consequently, purports contribute existing academic discussion practices on cybercrime. Furthermore, adopts from criminological theoretical frameworks network theory world politics substantiate more comprehensive view Korea’s which considers multifaceted asymmetrical nature context postmodern politicsfections.
منابع مشابه
A Statistical Framework for Analyzing Cyber Attacks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Chapter 1: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Res...
متن کاملA Deception Framework for Survivability Against Next Generation Cyber Attacks
Over the years, malicious entities in cyber-space have grown smarter and resourceful. For defenders to stay abreast of the increasingly sophisticated attacks, the need is to understand these attacks. In this paper, we study the current trends in security attacks and present a threat model that encapsulates their sophistication. Survivability is difficult to achieve because of its contradictory ...
متن کاملCyber attacks: awareness
7. Geosynchronous Orbital Ion Cannon source code. Accessed Jan 2011. . 8. Moyer, E. ‘Report: FBI seizes server in probe of Wikileaks attacks’. CNET, 1 Jan 2011. Accessed Jan 2011. . 9. ‘Jester’s Court’. . 10.Leyden, J. ‘Anonymous hacktivists fire ion cannons at Zimbabwe’. The Regi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of cybersecurity intelligence and cybercrime
سال: 2021
ISSN: ['2578-3297', '2578-3289']
DOI: https://doi.org/10.52306/04020221nhpz9033