• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

Çмú´ëȸ ÇÁ·Î½Ãµù

Ȩ Ȩ > ¿¬±¸¹®Çå > Çмú´ëȸ ÇÁ·Î½Ãµù > ICFICE > ICFICE 2018

ICFICE 2018

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) Function and Technology Analysis of Cyber-attack Weapons
¿µ¹®Á¦¸ñ(English Title) Function and Technology Analysis of Cyber-attack Weapons
ÀúÀÚ(Author) Dea-woo Park  
¿ø¹®¼ö·Ïó(Citation) VOL 10 NO. 01 PP. 0078 ~ 0080 (2018. 06)
Çѱ۳»¿ë
(Korean Abstract)
¿µ¹®³»¿ë
(English Abstract)
¬¤¬Ý¬Ñ¬Ó¬ß¬à¬Ö ¬â¬Ñ¬Ù¬Ó¬Ö¬Õ¬í¬Ó¬Ñ¬ä¬Ö¬Ý¬î¬ß¬à¬Ö ¬å¬á¬â¬Ñ¬Ó¬Ý¬Ö¬ß¬Ú¬Ö, ¬¤¬²¬µ (GRU) hacked more than 300 computers related to the Olympic Organizing Committee and made the access system and main press center WiFi a mess. protection and authentication between countries. This paper will contribute to national cybersecurity. The United States announced in early 2018 that it had established the Cyber-attack Base for six months to carry out cyber operations against North Korea. In this paper, I analyze cyber-attack weapon functions by hardware type and software type in order to carry out cyber warfare. And cyber-attack techniques to perform cyber warfare were analyzed. This paper will contribute to the development of technology to carry out cyberwarfare and the balance of power in the world.
Å°¿öµå(Keyword) Cyber-attack   Cyber-attack Weapons   cyberwarfare   national cybersecurity  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå