• 제목/요약/키워드: Cyber terror

검색결과 77건 처리시간 0.022초

Cyber Terror의 체계분류 및 경호경비대책 방안 (Classification of Cyber Terror & Counterplan against It)

  • 김두현
    • 시큐리티연구
    • /
    • 제3호
    • /
    • pp.33-60
    • /
    • 2000
  • I study on the classification of cyber terror & counterplan against cyber terror The paper, purporting to consider security counterplans, comprise five chapters. Chapter I which introduction is followed by chapter II, dealing largely with the general definition and classification of cyber terror. Chapter III concerns the domestic & foreign cases of damages by cyber terror. Chapter III consider the condition of world nations against cyber terror and its actual condition. It is followed by concluding observation made in chapter V.

  • PDF

한국 사이버테러 방지를 위한 효과적 대응방안 (Effective Response Methods for the Prevention of Cyber-terror in South Korea)

  • 성용은;윤병훈
    • 융합보안논문지
    • /
    • 제16권2호
    • /
    • pp.11-17
    • /
    • 2016
  • 이 연구의 목적은 한국의 사이버테러 방지를 위한 효과적인 대응방안을 고찰하는 것이다. 이 연구는 문헌연구 분석의 방법을 사용하였다. 이 연구의 결과를 바탕으로 연구자들은 1) 사이버테러에 대한 효율성을 담보하기 위해 '사이버테러방지법(가칭)' 제정, 2) 사이버테러 관련 실질적 콘트롤타워의 구축, 3) 사이버테러 전문가 양성을 확대 할 것을 제안하였다. 끝으로 이 연구의 한계 및 향후 연구를 위한 제언을 논의하였다.

사회적 이슈 관점에서 바라 본 사이버 테러 유형에 대한 위험 대응방안 (The Countermeasure for Threat of Cyber Terror in Sociological Perspective)

  • 최희식;김현규
    • 디지털산업정보학회논문지
    • /
    • 제13권1호
    • /
    • pp.59-67
    • /
    • 2017
  • In recent years, cyber terror that break into major institution's information system and destroy and paralyzed important information occurs frequently. Some countries do dangerous acts such as train hackers and order hackers to hack important industrial confidential documents which are core of national competitiveness to reduce the competitiveness of the country and cause social confusion. In this thesis, it will study problems of cyber terror to help people to use Internet in web environment that safe from cyber terror and to avoid the risk from cyber terror such as malware and DDos. This thesis is organized as following. In second chapter, it will look thorough the research that are related to cyber terror. In third chapter, it will study attack types of cyber terror. In fourth chapter, to defend from cyber violence, it will suggest safe solution. In fifth chapter, it will end with conclusion. Finally, to prevent urgent incidents like North Korean Cyber-attack, every Internet user must indicate their recognition on Internet security and it is significant to make a quick response treatment to create the safe online environment.

인적 및 직무특성과 보안교육 이수율 및 사이버테러 대응과의 연관성 분석 (Association Analysis on The Completion Rate of Security education and Cyber Terror Response According to Personal and Job characteristics)

  • 신현조;이경복;박태형
    • 디지털산업정보학회논문지
    • /
    • 제10권4호
    • /
    • pp.97-107
    • /
    • 2014
  • The development of ICT has led positive aspects such as popularization of Internet. It, on the other hand, is causing a negative aspect, Cyber Terror. Although the causes for recent and continuous increase of cyber security incidents are various such as lack of technical and institutional security measure, the main cause which threatens the cyber security is the users' lack of awareness and attitude. The purpose of this study is the positive analysis of how the personal and job characteristics influence the cyber security training participation rate and the response ability to cyber terror response training with a sample case of K-corporation employees. In this paper, the relationship among career, gender, department, whether he/she is a cyber security specialist, whether he/she is a regular employee), "ratio of cyber security training courses during recent three years", "ratio that he/she has opened the malicious email in cyber terror response training during recent three years", "response index of virus active-x installation (higher index means poorer response)" is closely examined. Moreover, based on the examination result, the practical and political implications regarding K-corporation's cyber security courses and cyber terror response training are studied.

정부 주요기관에 대한 사이버 공격의 대처 방법 (A Countermeasures on the Cyber Terror for the National Key Organizations)

  • 이영교;박종순
    • 디지털산업정보학회논문지
    • /
    • 제4권2호
    • /
    • pp.39-47
    • /
    • 2008
  • As internet is spreaded widely, the number of cyber terror using hacking and virus is increased. Also the international cyber terror to the national key organizations go on increasing. If the national key organizations is attacked by the attack, the national paper, document and records are exposed to the other nations. The national paper, document and records can give damage to the nation. Especially, the unknown attack can give much damage to the nation. Therefore, this paper suggested a countermeasures on the cyber terror for the national key organizations provided the inner of the organization is safe. The uneffective item and invasion privacy item are included among the countermeasures. However the countermeasures can protect only one cyber terror to the national key organizations.

사이버테러의 현황과 대책에 관한 연구 (Countermeasures against Cyber terror in Korea)

  • 안창훈
    • 시큐리티연구
    • /
    • 제5호
    • /
    • pp.211-241
    • /
    • 2002
  • Koreans are the most avid Internet surfers in the world according to Nielson/NetRatings(Reuters, August 2001) and most Internet connections are made through high-speed connections like Digital Subscriber Lines (DSLs). The result of such internet fervor is a nation that is fertile in both hackers and software companies(over 200 in the field of network security alone). However, by-product of Internet activity is cyber crime and the need to protect innocent users from the dangers of cyber criminals and cyber-terrorists be they are individuals or organized groups. Hence the Cyber Terror Response Team (CTRT) was organized in late 2000 with the mandate to fulfill that role. In these contexts, this study analyzes the actual conditions of cyber terror and suggests the countermeasures against cyber terror in Korea.

  • PDF

사이버테러 대응체제와 법치주의 (Encounter Measure System Against Cyber-Terror And Legalism)

  • 정준현;김귀남
    • 융합보안논문지
    • /
    • 제4권3호
    • /
    • pp.83-90
    • /
    • 2004
  • 사이버테러는 넓게는 "네티즌 사이에 공포감을 조성할 목적으로 행하는 사이버상의 일체의 만행(act of Vandalization of cyber)"으로 새길 수 있고 오프라인 상의 테러리즘에 근접하는 좁은 개념으로는 "특정한 집단이나 개인이 자신의 정치적 목적이나 이념을 관철시킬 목적으로 대중, 정부요인 또는 정부기관이나 공공기반시설 등에 대해 위협을 가할 수 있는 무기로서의 컴퓨터 사용"으로 각각 새길 수 있다. 사이버테러가 갖는 파급효과의 연쇄성(개인적 법익침해가 사회적 법익의 침해로 그리고 사회적 법익의 침해가 국가질서의 혼란으로 이어지는 연쇄성)과 공간초월성(개인적 법익침해를 매개로 하는 국가기반질서의 파괴도 가능)을 감안할 때 국가정보원은 일반경찰권한에 속하는 것에 대한 것에 대하여도 초기단계에서부터 가급적 경찰청이나 관련 국가기관과 정보를 공유하거나 모니터링하면서 국가질서에 대한 위협으로 전이되지 아니하도록 예방작용을 해야 한다.

  • PDF

사이버테러대응활동에 대한 근거법률과 대응기관 연구 (A Study on Law and Organization about Cyber Terror Respons)

  • 이민영;박대우
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2011년도 춘계학술대회
    • /
    • pp.425-428
    • /
    • 2011
  • 인터넷 인프라와 기술의 발달로 세계가 인터넷으로 연결되면서, 전쟁과 테러공격의 한 방법으로 사이버테러가 발생하고 있다. 2009년 7월 7일 한국의 주요 홈페이지를 공격한 DDoS공격으로 인하여 사이버테러대응활동의 중요성이 더해졌다. 본 논문에서는 사이버테러대응활동에 대한 근거법률과 대응기관에 관한 연구이다. 상위법인 국가보안법과 법률 제8874호 국가안전보장회의법 등을 연구한다. 또한 사이버테러대응활동의 중요기관인 국가정보원법과, 대통령령훈령 제47호의 국가대테러활동지침, 대통령훈령 제267호인 국가사이버안전관리규정을 연구한다. 본 논문의 연구를 통하여 최근의 급격히 증가하는 사이버테러로부터 국가를 안전하게 지키고, 국민의 평안한 생활을 보장하는 기초 연구 자료로 활용될 것이다.

  • PDF

Review on improving measurement of cyber terror management system

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권6호
    • /
    • pp.89-96
    • /
    • 2016
  • Damage and attack size of cyber terror is growing to the national size. Not only targeting at a certain companies or individuals but number of cyber terror targeting government bodies or unspecific people is increasing. This is because compared to traditional weapon, input cost is very cheap but ripple effect and shock are much stronger, affecting not only certain groups but also each individuals. 'Anti-terror measurement for protection of nation and public safety' passed last month is one of the renowned measurement passed regardless of objection from opposition party. The opposition party went against this through filibuster for 192 hours but this finally passed National Congress due to lack of oppositions. Korean government is taking post actions after passage of anti-terror measurement. Legislation of enforcement ordinance and regulations is due by 6th of next month. This regulation will be executed from June 4th after legislation. Whenever there is any security issues such as hacking of Korea Hydro and Nuclear Power and National Intelligence Service happens, lot of attention is made to those hackers. However, social recognition or management of those hackers need lot more improvement. Especially, as market of internet of things is increasing, there is an increased anxiety on information security. But as we only rely on security solutions, this problems are keep happening. Therefore, active investment on nurturing hackers who play the role of 'spear and shield' shall be made. Government should put more efforts to allow white hackers to show their abilities. We should have a policy for supporting high-quality programs such as BoB. To make information protection industry into future growth engine, it is necessary to nurture professionals for information protection and white hackers through special programs. Politicians should make related regulations as soon as possible to remove factors that prevent swift management of cyber attack due to lack of legislation. Government should pay lot more financial investment to nurturing professional manpower than now. Protecting life and asset of nation is responsibility and duty of our government. We all should recognize that controlling cyber attack is a part of national defense.

The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd.

  • Lee, Kyung-bok;Lim, Jong-in
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권2호
    • /
    • pp.857-880
    • /
    • 2016
  • Due to an increasing number of cyberattacks globally, cybersecurity has become a crucial part of national security in many countries. In particular, the Digital Pearl Harbor has become a real and aggressive security threat, and is considered to be a global issue that can introduce instability to the dynamics of international security. Against this context, the cyberattacks that targeted nuclear power plants (NPPs) in the Republic of Korea triggered concerns regarding the potential effects of cyber terror on critical infrastructure protection (CIP), making it a new security threat to society. Thus, in an attempt to establish measures that strengthen CIP from a cybersecurity perspective, we perform a case study on the cyber-terror attacks that targeted the Korea Hydro & Nuclear Power Co., Ltd. In order to fully appreciate the actual effects of cyber threats on critical infrastructure (CI), and to determine the challenges faced when responding to these threats, we examine factual relationships between the cyberattacks and their responses, and we perform analyses of the characteristics of the cyberattack under consideration. Moreover, we examine the significance of the event considering international norms, while applying the Tallinn Manual. Based on our analyses, we discuss implications for the cybersecurity of CI in South Korea, after which we propose a framework for strengthening cybersecurity in order to protect CI. Then, we discuss the direction of national policies.