The cyber threat from Pyongyang

Poverty-stricken North Korea spends a lot of its national resources on the military, including cyber, capabilities. Its cyber units, especially Bureau 121, are assumed to possess sophisticated cyber espionage capabilities, operating systems, and intrusion software; and the expertise to create highly...

Full description

Bibliographic Details
Main Author: Nah, Liang Tuang
Other Authors: S. Rajaratnam School of International Studies
Format: Commentary
Language:English
Published: 2023
Subjects:
Online Access:https://hdl.handle.net/10356/165458
_version_ 1811678300792160256
author Nah, Liang Tuang
author2 S. Rajaratnam School of International Studies
author_facet S. Rajaratnam School of International Studies
Nah, Liang Tuang
author_sort Nah, Liang Tuang
collection NTU
description Poverty-stricken North Korea spends a lot of its national resources on the military, including cyber, capabilities. Its cyber units, especially Bureau 121, are assumed to possess sophisticated cyber espionage capabilities, operating systems, and intrusion software; and the expertise to create highly destructive malware deliverable online to networked computers, or to standalone systems autonomous of the internet. Military and national security planners must implement relevant threat mitigation measures in the face of Pyongyang’s cyber offensives.
first_indexed 2024-10-01T02:51:05Z
format Commentary
id ntu-10356/165458
institution Nanyang Technological University
language English
last_indexed 2024-10-01T02:51:05Z
publishDate 2023
record_format dspace
spelling ntu-10356/1654582023-04-02T15:44:51Z The cyber threat from Pyongyang Nah, Liang Tuang S. Rajaratnam School of International Studies Social sciences::Political science Country and Region Studies Technology and Future Issues Poverty-stricken North Korea spends a lot of its national resources on the military, including cyber, capabilities. Its cyber units, especially Bureau 121, are assumed to possess sophisticated cyber espionage capabilities, operating systems, and intrusion software; and the expertise to create highly destructive malware deliverable online to networked computers, or to standalone systems autonomous of the internet. Military and national security planners must implement relevant threat mitigation measures in the face of Pyongyang’s cyber offensives. Published version 2023-03-27T12:15:02Z 2023-03-27T12:15:02Z 2023 Commentary Nah, L. T. (2023). The cyber threat from Pyongyang. RSIS Commentaries, 001-23. https://hdl.handle.net/10356/165458 en RSIS Commentaries, 001-23 Nanyang Technological University application/pdf
spellingShingle Social sciences::Political science
Country and Region Studies
Technology and Future Issues
Nah, Liang Tuang
The cyber threat from Pyongyang
title The cyber threat from Pyongyang
title_full The cyber threat from Pyongyang
title_fullStr The cyber threat from Pyongyang
title_full_unstemmed The cyber threat from Pyongyang
title_short The cyber threat from Pyongyang
title_sort cyber threat from pyongyang
topic Social sciences::Political science
Country and Region Studies
Technology and Future Issues
url https://hdl.handle.net/10356/165458
work_keys_str_mv AT nahliangtuang thecyberthreatfrompyongyang
AT nahliangtuang cyberthreatfrompyongyang