South Korea to Establish New Cyber Security and Attack Deterrence Department

By Tracey E. Schelmetic April 02, 2013

While South Korea worries about belligerence from its nearest and most troublesome neighbor – North Korea – the nation also has a lot of work to do on a different kind of security: cyber security.

South Korea's defense ministry announced this week that it plans to establish a new department to oversee cyber deterrence policies and prepare information security measures to better deal with the emerging form of threats, according to senior military officials. The South Korean military launched the Cyber Command in early 2010 to handle cyber security issues, along with different military and intelligence organizations, but there is no control tower to integrate the policies and strategies that defend military networks.

The new cyber team is expected to be in place in the first half of 2013. Its goal will be to develop defensive cyber warfare methods and recruiting more forces to carry out cyber space operations, the official said.

South Korea has been the target of a number of serious, concentrated cyber attacks in recent years. In 2009, the nation was the victim of mass DDoS (Distributed Denial of Service) attacks that disrupted business and communications in the country. Other large-scale DDoS attacks occurred in 2010, 2011 and 2012, and the most recent attack, which occurred last month, has reportedly damaged thousands of critical computers and even ATM machines.

Many of the attacks were aimed at the South Korean news media, and are reportedly becoming more sophisticated, which worries the South Korean governments.

While it has been generally accepted that North Korean agents were behind the attacks, South Korean government agencies have been careful not to express this information openly in the media, and security experts have warned that this explanation may be too simplistic.

According to Symantec, the most recent attacks would appear to be linked to the spate of 2011 denial-of-service attacks. The computer security firm noted that it has identified a particular back door (Backdoor.Prioxer) that surfaced during the 2011 attacks, and that a modified version of this back door was also discovered during the 2013 attacks.




Edited by Braden Becker

TechZone360 Contributor

SHARE THIS ARTICLE
Related Articles

ITEXPO's IBM Keynoter: AI is Here Today

By: Paula Bernier    2/20/2018

Many folks think the artificial intelligence is something we'll see in the future. That's true. AI will be employed in a broader variety of more sophi…

Read More

The Blockchain Event Draws a Crowd

By: Paula Bernier    2/20/2018

The Blockchain Event in Fort Lauderdale draws a crowd, offers some answers, and raises lots of interesting questions. Why have some cryptocurrencies g…

Read More

Hughes: WAN Optimization Expertise, Homegrown Solution Differentiate SD-WAN

By: Paula Bernier    2/16/2018

The SD-WAN marketplace is a crowded one. But Hughes Network Systems says it brings unique expertise and proven technology to the table. And that, Jeff…

Read More

Juniper Security Expert: Behavior Analytics Helps Address Threat Complexity

By: Paula Bernier    2/16/2018

Organizations are changing their cybersecurity strategies, says Juniper Networks Cybersecurity Strategist Nick Bilogorskiy, who presented the closing …

Read More

Welbitz Wins ITEXPO's Idea SHOWCASE

By: Paula Bernier    2/16/2018

It was a sweep. Both the audience and the judges at ITEXPO's IDEA Showcase Thursday picked Welbitz as the winner. The company went up against fellow s…

Read More