• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

Çмú´ëȸ ÇÁ·Î½Ãµù

Ȩ Ȩ > ¿¬±¸¹®Çå > Çмú´ëȸ ÇÁ·Î½Ãµù > Çѱ¹Á¤º¸Åë½ÅÇÐȸ Çмú´ëȸ > 2016³â Ãß°èÇмú´ëȸ

2016³â Ãß°èÇмú´ëȸ

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ³²ºÏÅëÀÏÀ» ´ëºñÇÑ ±¹°¡»çÀ̹ö¾Èº¸ Á¤Ã¥ ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) Research on National Cybersecurity Policy Preparing for the Reunification of North Korea and South Korea
ÀúÀÚ(Author) ÇÔ½ÂÇö   ¹Ú´ë¿ì   Seung-hyeon Ham   Dae-woo Park  
¿ø¹®¼ö·Ïó(Citation) VOL 20 NO. 02 PP. 0358 ~ 0361 (2016. 10)
Çѱ۳»¿ë
(Korean Abstract)
´ëÇѹα¹ÀÇ ³²ÇÑ°ú ºÏÇÑÀÌ ÆòÈ­ÅëÀÏÀ» À§ÇÏ¿©, º¯Çõ°ú °³ÇõÀ» ÁÖµµÇÒ ¼ö ÀÖ°í, Á¤Ã¥À» ¸¸µé°í º¸¿ÏÇÏ°í Çù»óÇÏ¿©, ½Çõ ÇÒ ¼ö ÀÖ´Â »çÀ̹ö¾Èº¸Á¤Ã¥ÀÌ ÇÊ¿äÇÏ´Ù. º» ³í¹®Àº »çÀ̹öÀüÀÇ Á¤ÀÇ¿Í, ÇØ¿ÜÀÇ »çÀ̹öÅ×·¯¿Í »çÀ̹öÀüÀï ´ëÀÀ, »çÀ̹öÀü ´ëÀÀ ±â¼úÀ» »ìÆ캻´Ù. ³²ÇÑ°ú ºÏÇÑÀÇ ´ëÄ¡ »óȲ¿¡¼­ »çÀ̹ö¾Èº¸ È°µ¿À» ºÐ¼®ÇÏ°í, ³²ºÏÅëÀÏÀ» ´ëºñÇÑ »çÀ̹ö¾Èº¸ Á¤Ã¥À» ¿¬±¸ÇÑ´Ù. º» ¿¬±¸´Â »çÀ̹öÀ§ÇùÀ¸·ÎºÎÅÍ ¾ÈÀüÇÑ »çÀ̹ö°ø°£À» ±¸Ãà ¹× ¿î¿µÀ¸·Î ³²ºÏÅëÀÏÀ» ´ëºñÇÏ¿© ÇÕ¸®ÀûÀÎ »çÀ̹ö¾Èº¸ Á¤Ã¥ ¹× ¹ý·üÀÇ ¹æ¾ÈÀ» Á¦¾ÈÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
The North and South Korea for the peaceful reunification of the Republic of Korea, to lead the transformation and reform, and to complement the policy making and negotiations, there is a need for cyber security policy to practice. This paper explores the definition and overseas cyber terrorism and cyber warfare correspondence, correspondence between the versions of the technology between versions. Analysis of cyber security activities in the North and South confrontation, and research the cyber security policy against the unification. In this study, we compared the unification to build and operate a secure cyberspace from cyber threats and cyber security policy suggestions for ways of rational and legal.
Å°¿öµå(Keyword) ±¹°¡»çÀ̹ö¾Èº¸   ±¹°¡»çÀ̹öÁ¤Ã¥   ³²ºÏÅëÀÏ   »çÀ̹öÀü  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå