عرض عادي

North Korea's cyber operations : strategy and responses / authors, Jenny Jun, Scott LaFoy, Ethan Sohn ; project directors, Victor D. Cha, James A. Lewis.

بواسطة:المساهم (المساهمين):نوع المادة : نصنصالسلاسل:CSIS reportالناشر:Washington, DC : Center for Strategic and International Studies ; 2015الناشر:Lanham, Maryland : Rowman and Littlefield, 2015وصف:viii, 97 pages ; 28 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 9781442259027
  • 1442259027
  • 9781442259034
  • 1442259035
الموضوع:تصنيف مكتبة الكونجرس:
  • U163 .J86 2015
المحتويات:
Preface. -- Acknowledgments. -- Abbreviations. -- Introduction. -- Strategic context. -- Organization. -- Future trends and policy recommendations. -- Appendix. -- Bibliography. -- About the project directors and authors.
ملخص:North Korea is emerging as a significant actor in cyberspace with both its military and clandestine organizations gaining the ability to conduct cyber operations. However, there is no comprehensive standard literature about North Korea's cyber capabilities that takes an integrated view of the topic. Existing research is fragmented in pockets of strategic, technical, and policy pieces, though no individual study reaches far enough to create a standard reference document about North Korea's cyber capabilities. This report aims to fill this void, integrating Korean and English language information sources, existing work in each respective field, and creating a foundation for future deeper research.
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة U163 .J86 2015 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30020000031377
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة U163 .J86 2015 (إستعراض الرف(يفتح أدناه)) C.2 المتاح 30020000031378

"A report of the CSIS Korea Chair."

"December 2015."

Includes bibliographical references (pages 80-93).

Preface. -- Acknowledgments. -- Abbreviations. -- Introduction. -- Strategic context. -- Organization. -- Future trends and policy recommendations. -- Appendix. -- Bibliography. -- About the project directors and authors.

North Korea is emerging as a significant actor in cyberspace with both its military and clandestine organizations gaining the ability to conduct cyber operations. However, there is no comprehensive standard literature about North Korea's cyber capabilities that takes an integrated view of the topic. Existing research is fragmented in pockets of strategic, technical, and policy pieces, though no individual study reaches far enough to create a standard reference document about North Korea's cyber capabilities. This report aims to fill this void, integrating Korean and English language information sources, existing work in each respective field, and creating a foundation for future deeper research.

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة