Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information.
FUNDING NUMBERS
AUTHOR(S) Ji Min Park
PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES)Naval Postgraduate School Monterey, CA 93943-5000
PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES)N/A
SPONSORING / MONITORING AGENCY REPORT NUMBER11. SUPPLEMENTARY NOTES The views expressed in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. IRB Protocol number ____N/A____.
12a. DISTRIBUTION / AVAILABILITY STATEMENTApproved for public release; distribution is unlimited 12b. DISTRIBUTION CODE
ABSTRACT (maximum 200 words)There can be hostile relations between nations that are divided politically or ideologically, and there are threats in cyberspace as well as physical space. Although every cyber threat, like a physical threat, has countermeasures, this can be hard because of the complexity of cyberspace and the ethics in cyberspace.This study tries to find effective countermeasures for South Korea in cyberspace against North Korea's continuing cyber attacks in light of the Korean peninsula's situation, a typical example of divided nations in the world. To find good solutions, South and North Korea's cyber capabilities are compared in terms of infrastructure, organization, defensive capabilities, offensive capabilities, and vulnerabilities. Characteristics and features of North Korea's cyber attacks are inferred by analyses of past attacks. Based on these analyses, this study recommends defensive and offensive countermeasures to mitigate these cyber threats and prevent escalation. Each countermeasure is assessed using considerations such as prevention of escalation, efficient use of limited resources, international laws and ethics, and bargaining power in the real world.
SUBJECT TERMS
ABSTRACTThere can be hostile relations between nations that are divided politically or ideologically, and there are threats in cyberspace as well as physical space.