A Study on the NATIONAL SECURITY Crime in Cyber Space
- 동북아학술저널연합(J-INSTITUTE)
- International Journal of Terrorism & National Security
- vol.4 no.1
-
2019.0615 - 19 (5 pages)
- 23
North Korea is becoming more and more secretive of the cyber duties and activities that use the Internet, and the activities of espionage are becoming increasingly internationalized and intelligent in the Ministry of United Front and Ministry of National Security. For example, it is expanding the base for penetration into China, South-east Asia and Central and South America, strengthening the overseas pro-North Korean organization, and strengthening the foreign embassies. In case of investigating a violation of the National Security Act against cyber security, it is necessary to post several articles about production and distribution of the transfer document so that the unspecified number can see it. The standards of institutions are also different and depend on subjec-tive judgments of judicial institutions. In recent years, the number of deliberations by the Korea Communications Standards Commission(KCSC) has been rapidly increasing over the past five years(2013-2017). In relation to transferring activities in the cyber space, there is a tendency that an unspecified number of people can access before past 2010, so that they can share information. Peer to Peer format in which information can be shared. In other words, cyber attacks have been placed in the key areas of the new security concept and security war, and cyber attacks that transcend national boundaries have been frequent by hostile countries or international terrorist groups, Reality supports this possibility. Therefore, in view of the changing security concept, cyber attacks are very likely to directly threaten national security, so it is important for the agency to perform security related tasks.
1. Introduction
2. Meaning and Reality of Cyber Security Threat
3. Analysis of Major Decisions on Benefiting Enemy(Praise, Incitement, etc.)
4. Conclusion and Suggestions
(0)
(0)