A Comparative Study of the Proposed National Cyber-terror Prevention Act

被引:0
|
作者
Park, Dea-woo [1 ]
Shin, Jin [2 ]
机构
[1] Hoseo Grad Sch Venture, Dept Conversing Technol, Seoul, South Korea
[2] Dankook Univ, Sch Gen Educ, Yongin, South Korea
基金
新加坡国家研究基金会;
关键词
Cybersecurity; Cyber-terror; Hacking; National Cybersecurity; Prevention Act;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cybercrimes and cyber-terror attacks disturb national order, and can result in cyber warfare that ruins people's happiness, and destroys national security and people's safety. Cyber-terror attacks have occurred in the 7.7 DDoS attack, the 3.4 DDoS attack, the attack that paralyzed the NH Computer Network, the Jungang Ilbo Incident, The APT attack against KBS, MBC, YTN, the Shinhan Bank, and the NH Bank to stop computer operation. In 2013, the website of Cheongwadae was attacked through the 6.25 cyber-terror attack. In January, 2014, confidential personal information of approximately 85 million customers of 3 credit card companies of the Lotte Card, KB Kookmin Card and the NH Card was stolen. There is a need for real-time response system that can respond in real-time cyber-hacking attacks. However, acts and regulations are insufficient, the budget and the policies and institutions of national cyber security is needed to support the organization. In this study, we analyze and compare the two Cyber-terro Prevention Act was proposed to the National Assembly. And, triggered alarm in the control tower and cyber need for cyber security against cyber crisis.
引用
收藏
页码:267 / 273
页数:7
相关论文
共 50 条
  • [1] A comparative study of the proposed national cyber-terror prevention act
    Department of Conversing Technology, Hoseo Graduate School of Venture, Korea, Republic of
    不详
    Int. J. Secur. Appl., 10 (267-274):
  • [2] Crouching tiger or phantom dragon? Examining the discourse on global cyber-terror
    Helms, Ronald
    Costanza, S. E.
    Johnson, Nicholas
    SECURITY JOURNAL, 2012, 25 (01) : 57 - 75
  • [3] Crouching tiger or phantom dragon? Examining the discourse on global cyber-terror
    Ronald Helms
    S E Costanza
    Nicholas Johnson
    Security Journal, 2012, 25 : 57 - 75
  • [4] The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd.
    Lee, Kyung-bok
    Lim, Jong-in
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (02): : 857 - 880
  • [5] PROPOSED NATIONAL COURT ASSISTANCE ACT
    ARMSTRONG, FM
    AMERICAN BAR ASSOCIATION JOURNAL, 1970, 56 (AUG): : 755 - 759
  • [6] Cyber-physical Facts: A Proposed Analysis for Cyber Threats in the National Cybersecurity Strategies
    Aguilar-Antonio, Juan-Manuel
    URVIO-REVISTA LATINOAMERICANA DE ESTUDIOS DE SEGURIDAD, 2019, (25): : 24 - 40
  • [7] Analysis of case studies on cyber attacks and proposed methods for their prevention
    Leu, Daniel Mihai
    Udroiu, Catalin
    Raicu, Gabriel Margarit
    Garban, Horatius Nicolae
    Scheau, Mircea Constantin
    ROMANIAN JOURNAL OF INFORMATION TECHNOLOGY AND AUTOMATIC CONTROL-REVISTA ROMANA DE INFORMATICA SI AUTOMATICA, 2023, 33 (02): : 119 - 134
  • [9] A Comparative Study of the National Infertility Registry System and the Proposed Model for Iran
    Asadi, Farkhondeh
    Mirshekarlou, Soheila Jahangiri
    Rahimi, Forough
    CRESCENT JOURNAL OF MEDICAL AND BIOLOGICAL SCIENCES, 2019, 6 (03): : 318 - 324
  • [10] An act of terror and an act of hate: national elite and populace newspaper framing of pulse nightclub shooting
    Valcore, Jace L.
    Buckler, Kevin
    CRIMINAL JUSTICE STUDIES, 2020, 33 (03) : 276 - 296