A Case Study of the 2016 Korean Cyber Command Compromise

11/13/2017
by   Kyong Jae Park, et al.
0

On October 2016 the South Korean cyber military unit was the victim of a successful cyber attack that allowed access to internal networks. Per usual with large scale attacks against South Korean entities, the hack was immediately attributed to North Korea. Also, per other large-scale cyber security incidents, the same types of 'evidence' were used for attribution purposes. Disclosed methods of attribution provide weak evidence, and the procedure Korean organizations tend to use for information disclosure lead many to question any conclusions. We will analyze and discuss a number of issues with the current way that South Korean organizations disclose cyber attack information to the public. A time line of events and disclosures will be constructed and analyzed in the context of appropriate measures for cyber warfare. Finally, we will examine the South Korean cyber military attack in terms previously proposed cyber warfare response guidelines. Specifically, whether any of the guidelines can be applied to this real-world case, and if so, is South Korea justified in declaring war based on the most recent cyber attack.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/30/2019

An Argumentation-Based Approach to Assist in the Investigation and Attribution of Cyber-Attacks

We expect an increase in frequency and severity of cyber-attacks that co...
research
07/10/2023

Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies

Cyber ranges mimic real-world cyber environments and are in high demand....
research
06/29/2020

Pricing cyber insurance for a large-scale network

Facing the lack of cyber insurance loss data, we propose an innovative a...
research
11/16/2017

An n-sided polygonal model to calculate the impact of cyber security events

This paper presents a model to represent graphically the impact of cyber...
research
11/08/2017

RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis

Network forensic techniques help in tracking different types of cyber at...
research
09/27/2020

From Cyber Terrorism to Cyber Peacekeeping: Are we there yet?

In Cyberspace nowadays, there is a burst of information that everyone ha...

Please sign up or login with your details

Forgot password? Click here to reset