North Korea's cyber operations : strategy and responses / authors, Jenny Jun, Scott LaFoy, Ethan Sohn ; project directors, Victor D. Cha, James A. Lewis.
Material type: TextSeries: CSIS reportPublisher: Washington, DC : Center for Strategic and International Studies ; 2015Publisher: Lanham, Maryland : Rowman and Littlefield, 2015Description: viii, 97 pages ; 28 cmContent type:- text
- unmediated
- volume
- 9781442259027
- 1442259027
- 9781442259034
- 1442259035
- U163 .J86 2015
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Book | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | U163 .J86 2015 (Browse shelf(Opens below)) | C.1 | Library Use Only | داخل المكتبة فقط | 30020000031377 | ||
Book | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | U163 .J86 2015 (Browse shelf(Opens below)) | C.2 | Available | 30020000031378 |
"A report of the CSIS Korea Chair."
"December 2015."
Includes bibliographical references (pages 80-93).
Preface. -- Acknowledgments. -- Abbreviations. -- Introduction. -- Strategic context. -- Organization. -- Future trends and policy recommendations. -- Appendix. -- Bibliography. -- About the project directors and authors.
North Korea is emerging as a significant actor in cyberspace with both its military and clandestine organizations gaining the ability to conduct cyber operations. However, there is no comprehensive standard literature about North Korea's cyber capabilities that takes an integrated view of the topic. Existing research is fragmented in pockets of strategic, technical, and policy pieces, though no individual study reaches far enough to create a standard reference document about North Korea's cyber capabilities. This report aims to fill this void, integrating Korean and English language information sources, existing work in each respective field, and creating a foundation for future deeper research.