Normal view

North Korea's cyber operations : strategy and responses / authors, Jenny Jun, Scott LaFoy, Ethan Sohn ; project directors, Victor D. Cha, James A. Lewis.

By: Contributor(s): Material type: TextTextSeries: CSIS reportPublisher: Washington, DC : Center for Strategic and International Studies ; 2015Publisher: Lanham, Maryland : Rowman and Littlefield, 2015Description: viii, 97 pages ; 28 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781442259027
  • 1442259027
  • 9781442259034
  • 1442259035
Subject(s): LOC classification:
  • U163 .J86 2015
Contents:
Preface. -- Acknowledgments. -- Abbreviations. -- Introduction. -- Strategic context. -- Organization. -- Future trends and policy recommendations. -- Appendix. -- Bibliography. -- About the project directors and authors.
Summary: North Korea is emerging as a significant actor in cyberspace with both its military and clandestine organizations gaining the ability to conduct cyber operations. However, there is no comprehensive standard literature about North Korea's cyber capabilities that takes an integrated view of the topic. Existing research is fragmented in pockets of strategic, technical, and policy pieces, though no individual study reaches far enough to create a standard reference document about North Korea's cyber capabilities. This report aims to fill this void, integrating Korean and English language information sources, existing work in each respective field, and creating a foundation for future deeper research.
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Book Book UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة U163 .J86 2015 (Browse shelf(Opens below)) C.1 Library Use Only | داخل المكتبة فقط 30020000031377
Book Book UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة U163 .J86 2015 (Browse shelf(Opens below)) C.2 Available 30020000031378

"A report of the CSIS Korea Chair."

"December 2015."

Includes bibliographical references (pages 80-93).

Preface. -- Acknowledgments. -- Abbreviations. -- Introduction. -- Strategic context. -- Organization. -- Future trends and policy recommendations. -- Appendix. -- Bibliography. -- About the project directors and authors.

North Korea is emerging as a significant actor in cyberspace with both its military and clandestine organizations gaining the ability to conduct cyber operations. However, there is no comprehensive standard literature about North Korea's cyber capabilities that takes an integrated view of the topic. Existing research is fragmented in pockets of strategic, technical, and policy pieces, though no individual study reaches far enough to create a standard reference document about North Korea's cyber capabilities. This report aims to fill this void, integrating Korean and English language information sources, existing work in each respective field, and creating a foundation for future deeper research.

Share

Abu Dhabi, United Arab Emirates

reference@ecssr.ae

+97124044780

Copyright © 2024 Emirates Center for Strategic Studies and Research All Rights Reserved