A Comparative Study of the Proposed National Cyber-terror Prevention Act

被引:0
|
作者
Park, Dea-woo [1 ]
Shin, Jin [2 ]
机构
[1] Hoseo Grad Sch Venture, Dept Conversing Technol, Seoul, South Korea
[2] Dankook Univ, Sch Gen Educ, Yongin, South Korea
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2015年 / 9卷 / 10期
基金
新加坡国家研究基金会;
关键词
Cybersecurity; Cyber-terror; Hacking; National Cybersecurity; Prevention Act;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cybercrimes and cyber-terror attacks disturb national order, and can result in cyber warfare that ruins people's happiness, and destroys national security and people's safety. Cyber-terror attacks have occurred in the 7.7 DDoS attack, the 3.4 DDoS attack, the attack that paralyzed the NH Computer Network, the Jungang Ilbo Incident, The APT attack against KBS, MBC, YTN, the Shinhan Bank, and the NH Bank to stop computer operation. In 2013, the website of Cheongwadae was attacked through the 6.25 cyber-terror attack. In January, 2014, confidential personal information of approximately 85 million customers of 3 credit card companies of the Lotte Card, KB Kookmin Card and the NH Card was stolen. There is a need for real-time response system that can respond in real-time cyber-hacking attacks. However, acts and regulations are insufficient, the budget and the policies and institutions of national cyber security is needed to support the organization. In this study, we analyze and compare the two Cyber-terro Prevention Act was proposed to the National Assembly. And, triggered alarm in the control tower and cyber need for cyber security against cyber crisis.
引用
收藏
页码:267 / 273
页数:7
相关论文
共 14 条
  • [1] A comparative study of the proposed national cyber-terror prevention act
    Department of Conversing Technology, Hoseo Graduate School of Venture, Korea, Republic of
    不详
    Int. J. Secur. Appl., 10 (267-274): : 267 - 274
  • [2] The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd.
    Lee, Kyung-bok
    Lim, Jong-in
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (02): : 857 - 880
  • [3] National Cyber Threat Prevention Mechanism as a part of the E-EWS
    Simola, Jussi
    Lehto, Martti J.
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 539 - 548
  • [4] The Human Element in Cyber Security: A Study on Student Motivation to Act
    LeFebvre, Rebecca
    PROCEEDINGS OF THE 2012 INFORMATION SECURITY CURRICULUM DEVELOPMENT CONFERENCE (INFOSEC CD '12), 2012, : 1 - 8
  • [5] Cyber Security Awareness, Knowledge and Behavior: A Comparative Study
    Zwilling, Moti
    Klien, Galit
    Lesjak, Dusan
    Wiechetek, Lukasz
    Cetin, Fatih
    Basim, Hamdullah Nejat
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (01) : 82 - 97
  • [6] Cyber security in nuclear industry - Analytic study from the terror incident in nuclear power plants (NPPs)
    Cho, Hyo Sung
    Woo, Tae Ho
    ANNALS OF NUCLEAR ENERGY, 2017, 99 : 47 - 53
  • [7] Complexity of Cyber Security Architecture for IoT Healthcare Industry: A Comparative Study
    Alharam, Aysha K.
    El-madany, Wael
    2017 5TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW) 2017, 2017, : 246 - 250
  • [8] A Comparative study of applications of Game Theory in Cyber Security and Cloud Computing
    Kakkad, Vishruti
    Shah, Hitarth
    Patel, Reema
    Doshi, Nishant
    16TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2019),THE 14TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2019),THE 9TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, 2019, 155 : 680 - 685
  • [9] A Comparative Study of Different Intrusion Prevention Systems
    Sawant, Atul
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [10] Toward Next-Generation Cyber Range: A Comparative Study of Training Platforms
    Grimaldi, Alexandre
    Ribiollet, Julien
    Nespoli, Pantaleone
    Garcia-Alfaro, Joaquin
    COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 271 - 290