Çѱ¹±º ÇÕµ¿ »çÀ̹öÀÛÀü °È¹æ¾È ¿¬±¸ -ÇÕµ¿ÀÛÀü°ú ¿¬°è¸¦ Áß½ÉÀ¸·Î- | |
---|---|
A Study on Enhancing Joint Cyber Operations of the Republic of Korea(ROK) Forces - Focused on Linkag | |
Àú ÀÚ | ¼ÛÀçÀÍ |
---|---|
Ãâ ó | Çѱ¹±º»ç Á¦2È£ |
¹ßÇà ³âµµ | 2017 |
ÁÖÁ¦ Å°¿öµå | »çÀ̹ö°ø°£»çÀ̹öÀü4¼¼´ë ÀüÀï»çÀ̹öÀÛÀüÇØÅ· |
÷ºÎÆÄÀÏ | |
ÃÊ ·Ï [±¹¹®] | |
Çö´ë ÀüÀåÀº Áö»ó, ÇØ»ó, °øÁßÀÇ 3Â÷¿ø °ø°£¿¡¼ ¿ìÁÖ ¹× »çÀ̹ö°ø°£±îÁö È®ÀåµÇ |
|
ÃÊ ·Ï [¿µ¹®] | |
Contemporary Battlefield has been expanded to multi-dimensions in ground, sea, air, airspace and cyberspace. Development of Information Communication Technology (ICT) has increased battlefield control domains and a possibility of cyber warfare. Since cyber warfare is executed by asymmetric method of conducting war, it has difficulty in understanding an attacking agent. Cyber experts expect that cyber warfare is now referred to as fourth generation war in the 21st century. North Korea has developed cyber warfare capabilities after recognizing the importance of cyber warfare since 2000. In fact, North Korea's DDoS attacks in 2009 and 2011 as well as 3.20 and 6.25 cyber terror in 2013 eutralized our mass media service and finance company. Additionally, North Korea, in 2014, hacked Korea Hydro & Nuclear Power (KHNP) and stole a nuclear plan and in 2016, broke into the Defense Integrated Data Center (DIDC) and took out classified military documents. |