The cyber threat from Pyongyang
Poverty-stricken North Korea spends a lot of its national resources on the military, including cyber, capabilities. Its cyber units, especially Bureau 121, are assumed to possess sophisticated cyber espionage capabilities, operating systems, and intrusion software; and the expertise to create highly...
Main Author: | |
---|---|
Other Authors: | |
Format: | Commentary |
Language: | English |
Published: |
2023
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/165458 |
_version_ | 1811678300792160256 |
---|---|
author | Nah, Liang Tuang |
author2 | S. Rajaratnam School of International Studies |
author_facet | S. Rajaratnam School of International Studies Nah, Liang Tuang |
author_sort | Nah, Liang Tuang |
collection | NTU |
description | Poverty-stricken North Korea spends a lot of its national resources on the military, including cyber, capabilities. Its cyber units, especially Bureau 121, are assumed to possess sophisticated cyber espionage capabilities, operating systems, and intrusion software; and the expertise to create highly destructive malware deliverable online to networked computers, or to standalone systems autonomous of the internet. Military and national security planners must implement relevant threat mitigation measures in the face of Pyongyang’s cyber offensives. |
first_indexed | 2024-10-01T02:51:05Z |
format | Commentary |
id | ntu-10356/165458 |
institution | Nanyang Technological University |
language | English |
last_indexed | 2024-10-01T02:51:05Z |
publishDate | 2023 |
record_format | dspace |
spelling | ntu-10356/1654582023-04-02T15:44:51Z The cyber threat from Pyongyang Nah, Liang Tuang S. Rajaratnam School of International Studies Social sciences::Political science Country and Region Studies Technology and Future Issues Poverty-stricken North Korea spends a lot of its national resources on the military, including cyber, capabilities. Its cyber units, especially Bureau 121, are assumed to possess sophisticated cyber espionage capabilities, operating systems, and intrusion software; and the expertise to create highly destructive malware deliverable online to networked computers, or to standalone systems autonomous of the internet. Military and national security planners must implement relevant threat mitigation measures in the face of Pyongyang’s cyber offensives. Published version 2023-03-27T12:15:02Z 2023-03-27T12:15:02Z 2023 Commentary Nah, L. T. (2023). The cyber threat from Pyongyang. RSIS Commentaries, 001-23. https://hdl.handle.net/10356/165458 en RSIS Commentaries, 001-23 Nanyang Technological University application/pdf |
spellingShingle | Social sciences::Political science Country and Region Studies Technology and Future Issues Nah, Liang Tuang The cyber threat from Pyongyang |
title | The cyber threat from Pyongyang |
title_full | The cyber threat from Pyongyang |
title_fullStr | The cyber threat from Pyongyang |
title_full_unstemmed | The cyber threat from Pyongyang |
title_short | The cyber threat from Pyongyang |
title_sort | cyber threat from pyongyang |
topic | Social sciences::Political science Country and Region Studies Technology and Future Issues |
url | https://hdl.handle.net/10356/165458 |
work_keys_str_mv | AT nahliangtuang thecyberthreatfrompyongyang AT nahliangtuang cyberthreatfrompyongyang |