North Korea's Cyber Operations

Strategy and Responses

Nonfiction, Social & Cultural Studies, Political Science, International, International Security
Cover of the book North Korea's Cyber Operations by Jenny Jun, Scott LaFoy, Ethan Sohn, Center for Strategic & International Studies
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Jenny Jun, Scott LaFoy, Ethan Sohn ISBN: 9781442259034
Publisher: Center for Strategic & International Studies Publication: January 11, 2016
Imprint: Center for Strategic & International Studies Language: English
Author: Jenny Jun, Scott LaFoy, Ethan Sohn
ISBN: 9781442259034
Publisher: Center for Strategic & International Studies
Publication: January 11, 2016
Imprint: Center for Strategic & International Studies
Language: English

This report presents an open source analysis of North Korea’s cyber operations capabilities and its strategic implications for the United States and South Korea. The purpose is to mitigate the current knowledge gap among various academic and policy communities on the topic by synthesizing authoritative and comprehensive open source reference material. The report is divided into three chapters, the first chapter examining North Korea’s cyber strategy. The authors then provide an assessment of North Korea’s cyber operations capabilities by examining the organizational structure, history, and functions of North Korea’s cyber units, their supporting educational training and technology base, and past cyber attacks widely attributed to North Korea. This assessment is followed by a discussion on policy implications for U.S. and ROK policymakers and the larger security community.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This report presents an open source analysis of North Korea’s cyber operations capabilities and its strategic implications for the United States and South Korea. The purpose is to mitigate the current knowledge gap among various academic and policy communities on the topic by synthesizing authoritative and comprehensive open source reference material. The report is divided into three chapters, the first chapter examining North Korea’s cyber strategy. The authors then provide an assessment of North Korea’s cyber operations capabilities by examining the organizational structure, history, and functions of North Korea’s cyber units, their supporting educational training and technology base, and past cyber attacks widely attributed to North Korea. This assessment is followed by a discussion on policy implications for U.S. and ROK policymakers and the larger security community.

More books from Center for Strategic & International Studies

Cover of the book Deterring Iran after the Nuclear Deal by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book The Iranian Sea-Air-Missile Threat to Gulf Shipping by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Iran's Rocket and Missile Forces and Strategic Options by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Her Health, Her Lifetime, Our World by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Distributed Defense by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book The Evolving Military Balance in the Korean Peninsula and Northeast Asia by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Alternative Defense Strategies in a Cost-Capped Environment by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Perspectives on Taiwan by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book The New Ice Curtain by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Nuclear Scholars Initiative by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Thinking about the Unthinkable in a Highly Proliferated World by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book The Uncertain Transition from Stability to Peace by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Exploring New Ways to Provide Enduring Strategic Effects for the Department of Defense by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Rethinking Cybersecurity by Jenny Jun, Scott LaFoy, Ethan Sohn
Cover of the book Central Asia in a Reconnecting Eurasia by Jenny Jun, Scott LaFoy, Ethan Sohn
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy