DOI QR코드

DOI QR Code

Cyber Weapon Model for the National Cybersecurity

국가사이버안보를 위한 사이버무기 모델 연구

  • Bae, Si-Hyun (Department of Convergence Science and Technology, Hoseo Graduate School of Venture at Hoseo University) ;
  • Park, Dae-Woo (Department of Convergence Science and Technology, Hoseo Graduate School of Venture at Hoseo University)
  • Received : 2018.09.21
  • Accepted : 2018.11.02
  • Published : 2019.02.28

Abstract

Recently, the United States has been trying to strengthen its cybersecurity by upgrading its position as an Unified Combatant Command that focuses on the Cyber Command in the United States, strengthening operations in cyberspace, and actively responding to cyber threats. Other major powers are also working to strengthen cyber capabilities, and they are working to strengthen their organization and power. The world demands economic power for its own interests rather than its own borders. But Cyber World is a world without borders and no defense. Therefore, a cyber weapon system is necessary for superiority in cyberspace (defense, attack) for national cybersecurity. In this paper, we analyze operational procedures for cyber weapons operation. And we design cyber weapons to analyze and develop the best cyber weapons to lead victory in cyberwarfare. It also conducts cyber weapons research to solve the confrontation between Cyber World.

HOJBC0_2019_v23n2_223_f0001.png 이미지

Fig. 1 Cyber Kill Chain Model

HOJBC0_2019_v23n2_223_f0002.png 이미지

Fig. 2 Joint force commander objectives

Table. 1 Target management requirement ability

HOJBC0_2019_v23n2_223_t0001.png 이미지

Table. 2 Operation enforcement procedure

HOJBC0_2019_v23n2_223_t0002.png 이미지

Table. 3 CIPOE Procedure

HOJBC0_2019_v23n2_223_t0003.png 이미지

References

  1. Department of Defense. Cyber Strategy. [Internet]. Available : https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF. 2018.
  2. E. M. Hutchins, L. Martin, "Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains," 2011.
  3. J. W. Yoo, and D. W. Park, "Cyber kill chain strategy for hitting attacker origin," Journal of the Korea Institute of Information and Communication Engineering, vol. 21, no. 11, pp. 3, Nov. 2017.
  4. Department of Defense. (2015). Cybersecurity Test and Evaluation Guidebook. Version 1.0, 2015.
  5. U.S. Joint Chief of Staff. Cyberspace Operations. (JP 3-12). 2018.
  6. U.S. ARMY, CYBER OPERATIONS OFFICER, CAREERS & JOBS [Internet]. Available : https://www.goarmy.com/careers-and-jobs/browse-career-and-job-categories/computers-and-technology/cyber-operations-officer.html. 2017.
  7. U.S. Army. Operations. (FM 3-0). 2017.
  8. Headquaters, Department of the Army. Cyberspace and Electronic Warfare Operations (FM 3-12) [Internet]. Available : https://fas.org/irp/doddir/army/fm3-12.pdf. 2017.