• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ±¹°¡ »çÀ̹ö¾Èº¸¸¦ À§ÇÑ Á¤Ã¥ ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) Study on Policies for National Cybersecurity
ÀúÀÚ(Author) ÇÔ½ÂÇö   ¹Ú´ë¿ì   Seung-hyeon Ham   Dea-woo Park  
¿ø¹®¼ö·Ïó(Citation) VOL 21 NO. 09 PP. 1666 ~ 1673 (2017. 09)
Çѱ۳»¿ë
(Korean Abstract)
´ëÇѹα¹Àº ³²ÇÑ°ú ºÏÇÑÀ¸·Î ºÐ´ÜµÇ¾î, ±º»çÀû ´ë¸³°ú »çȸÀû °¥µîÀ» ¹ß»ý½ÃÅ°°í ÀÖ´Ù. ºÏÇÑÀº ³²ÇÑ¿¡ ´ëÇØ »çÀ̹ö°ø°ÝÀ» ¼öÇàÇÏ°í ÀÖÀ¸¸ç, ³²ÇÑÀÇ ±¹¹æ¸ÁÀ» ÇØÅ·ÇÏ¿´´Ù. »çÀ̹ö°ø°£¿¡¼­ ¼¼°è °¢±¹Àº ±¹°æµµ ÇÑ°èµµ ¸ðÈ£ÇØÁö°í ÀÖÀ¸¸ç, »çÀ̹öÀüÀïÀ» À§ÇÑ »çÀ̹ö°ø°Ý°ú »çÀ̹öÅ×·¯´Â Á¡°ú ½Ã°£°ú °ø°£À¸·Î ¿¬°áµÈ µðÁöÅÐ ÄÄÇ»ÆÃÀ¸·Î ÀÛµ¿µÈ´Ù. ±¹°¡ »çÀ̹ö¾Èº¸¸¦ À§Çؼ­´Â ¾ÆÁ¨´Ù¿Í ¸Å´º¾óÀÌ ÇÊ¿äÇÏ´Ù. ¶ÇÇÑ ±¹°¡ »çÀ̹ö¾Èº¸ Á¤Ã¥À» ¸¸µé°í, ¼öÇà ÇÒ ¼ö ÀÖ´Â ±¹°¡ »çÀ̹ö¾Èº¸ ¹ý·ü°ú Á¤Ã¥¿¡ ´ëÇÑ ¿¬±¸°¡ ÇÊ¿äÇÏ´Ù. º» ³í¹®Àº ÇöÀç ³²ºÏÇÑ ´ëÄ¡ »óȲÀÇ »çÀ̹öÅ×·¯ »óȲ°ú ¼¼°èÀÇ »çÀ̹öÀüÀï¿¡ ´ëÇÑ ÇÇÇظ¦ ¿¬±¸ÇÑ´Ù. ¶ÇÇÑ ±¹³»¡¤¿ÜÀÇ »çÀ̹ö¾Èº¸ È°µ¿°ú »çÀ̹öÀüÀï ´ëÀÀ ¾ÆÁ¨´Ù¿Í ¸Å´º¾ó°ú ½Å±â¼úÀ» ¿¬±¸ÇÑ´Ù. ±×¸®°í ±¹°¡»çÀ̹ö¾Èº¸ Á¤Ã¥À» Á¦½ÃÇÏ¿© ¡®(°¡Äª)±¹°¡»çÀ̹ö¾Èº¸¹ý¡¯ÀÌ ¸¶·ÃµÇµµ·Ï Á¤Ã¥À» Á¦¾ÈÇÑ´Ù. º» ¿¬±¸´Â ±¹°¡ »çÀ̹ö¾Èº¸¹ý°ú Á¤Ã¥ÀÇ ±âÃÊÀÚ·á·Î È°¿ëµÉ °ÍÀÌ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Republic of Korea is divided into South Korea and North Korea, creating military conflicts and social conflicts. North Korea is conducting cyberattacks against South Korea and has hacked South Korea 's defense network. In the world of cyberspace, the boundaries of the borders are becoming obscured, and cyberattacks and cyberterrorism for cyberwarfare operate with digital computing connected to points, time and space. Agenda and manual are needed for national cybersecurity. Also, it is necessary to study national cybersecurity laws and policies that can create and implement nationalcyber security policy. This paper investigates cyberterrorism situation in North and South Korean confrontation situation and damage to cyberwarfare in the world. We also study cybersecurity activities and cyberwarfare response agendas, manuals and new technologies at home and abroad. And propose national cybersecurity policy and propose policies so that '(tentative) The National Cybersecurity Law' is established. This study will be used as basic data of national cybersecurity law and policy.
Å°¿öµå(Keyword) »çÀ̹öÀüÀï   ±¹°¡ »çÀ̹ö¾Èº¸   »çÀ̹öº¸¾È Á¤Ã¥   ¹ýÁ¤Ã¥   Cyberwarfare   National Cybersecurity   Cybersecurity Policy   Law & Policy  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå