ICFICE 2018
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
Function and Technology Analysis of Cyber-attack Weapons |
¿µ¹®Á¦¸ñ(English Title) |
Function and Technology Analysis of Cyber-attack Weapons |
ÀúÀÚ(Author) |
Dea-woo Park
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 10 NO. 01 PP. 0078 ~ 0080 (2018. 06) |
Çѱ۳»¿ë (Korean Abstract) |
|
¿µ¹®³»¿ë (English Abstract) |
¬¤¬Ý¬Ñ¬Ó¬ß¬à¬Ö ¬â¬Ñ¬Ù¬Ó¬Ö¬Õ¬í¬Ó¬Ñ¬ä¬Ö¬Ý¬î¬ß¬à¬Ö ¬å¬á¬â¬Ñ¬Ó¬Ý¬Ö¬ß¬Ú¬Ö, ¬¤¬²¬µ (GRU) hacked more than 300 computers related to the Olympic Organizing Committee and made the access system and main press center WiFi a mess. protection and authentication between countries. This paper will contribute to national cybersecurity. The United States announced in early 2018 that it had established the Cyber-attack Base for six months to carry out cyber operations against North Korea. In this paper, I analyze cyber-attack weapon functions by hardware type and software type in order to carry out cyber warfare. And cyber-attack techniques to perform cyber warfare were analyzed. This paper will contribute to the development of technology to carry out cyberwarfare and the balance of power in the world.
|
Å°¿öµå(Keyword) |
Cyber-attack
Cyber-attack Weapons
cyberwarfare
national cybersecurity
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|