North Korea's Cyber Operations

Strategy and Responses

Nonfiction, Social & Cultural Studies, Political Science, International, International Security
Cover of the book North Korea's Cyber Operations by Jenny Jun, Scott LaFoy, Ethan Sohn, Center for Strategic & International Studies
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Jenny Jun, Scott LaFoy, Ethan Sohn ISBN: 9781442259034
Publisher: Center for Strategic & International Studies Publication: January 11, 2016
Imprint: Center for Strategic & International Studies Language: English
Author: Jenny Jun, Scott LaFoy, Ethan Sohn
ISBN: 9781442259034
Publisher: Center for Strategic & International Studies
Publication: January 11, 2016
Imprint: Center for Strategic & International Studies
Language: English

This report presents an open source analysis of North Korea’s cyber operations capabilities and its strategic implications for the United States and South Korea. The purpose is to mitigate the current knowledge gap among various academic and policy communities on the topic by synthesizing authoritative and comprehensive open source reference material. The report is divided into three chapters, the first chapter examining North Korea’s cyber strategy. The authors then provide an assessment of North Korea’s cyber operations capabilities by examining the organizational structure, history, and functions of North Korea’s cyber units, their supporting educational training and technology base, and past cyber attacks widely attributed to North Korea. This assessment is followed by a discussion on policy implications for U.S. and ROK policymakers and the larger security community.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This report presents an open source analysis of North Korea’s cyber operations capabilities and its strategic implications for the United States and South Korea. The purpose is to mitigate the current knowledge gap among various academic and policy communities on the topic by synthesizing authoritative and comprehensive open source reference material. The report is divided into three chapters, the first chapter examining North Korea’s cyber strategy. The authors then provide an assessment of North Korea’s cyber operations capabilities by examining the organizational structure, history, and functions of North Korea’s cyber units, their supporting educational training and technology base, and past cyber attacks widely attributed to North Korea. This assessment is followed by a discussion on policy implications for U.S. and ROK policymakers and the larger security community.

More books from Center for Strategic & International Studies

Cover of the book The Changing Landscape of Global Health Diplomacy by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book In the Wake of Arbitration by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Iraq in Crisis by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Beyond the Water's Edge by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Enhancing Value Chains by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Nuclear Notes by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Managing Fragility and Promoting Resilience to Advance Peace, Security, and Sustainable Development by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Global Development Monitor by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Realizing the Vision by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book The New Southbound Policy by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Restoring U.S. Leadership in Nuclear Energy by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Winning the Peace by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Turkey in a Reconnecting Eurasia by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Tell Me How This Ends by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book A New Approach to the Nuclear Fuel Cycle by Jenny Jun, Scott LaFoy, Ethan Sohn
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy