Additional sources and materials
1. Asia Internet Use, Population Data and Facebook Statistics - June 2017. URL: http://www.internetworldstats.com/stats3.htm#asia (data obrascheniya: 12.03.2018).
2. Akamai's Q4 2016 State of the Internet - Connectivity Report. URL: https://www.akamai.com/kr/ ko/multimedia/documents/state-of-the-internet/q4-2016-state-of-the-internet-connectivity-report.pdf (data obrascheniya: 11.03.2018).
3. Co Chkhol'in. Kukka vigi satkheh purynyn saibo chkhomdanpomchveryl' magara: [Ostanovite kiber-prestupleniya, nazyvaemye gosudarstvennym krizisom].URL: http://monthly.chosun.com/client/ news/viw_r.asp?ctcd=C&nNewsNumb=200812100013 (data obrascheniya: 12.03.2018).
4. Sm.: Whitman, M.E. Principles of information security. Boston: Cengage Learning, 2017. P. 92.; Analitiki podschitali uscherb ot ehpidemii chervya Helkern. URL: https://lenta.ru/news/2003/02/03/ slammer/ (data obrascheniya: 12.03.2018).
5. Li Gvan'bin. Samchkha DDoSkon'gyok sidzhak.. il'bu chopsokpuran: [Nachalas' tret'ya DDoS-ataka: bespokojstvo o dostupe v internet].URL: http://www.yonhapnews.co.kr/bulletin/2009/07/ 09/0200000000AKR20090709203700017.HTML?did=1179m (data obrascheniya: 10.03.2018).
6. Sin Chon'khvan. Kukneh chuyo intkhonet sago kyon'khomyl' tkhon'kheh pon chkhimkhehsago khyonkhvan': [Osnovnye internet-ataki v Koree i obschaya situatsiya internet-bezopasnosti] / Khanguk intkhonet chinkhyn'von: [Agentstvo internet-bezopasnosti Respubliki Koreya], 2013. S. 45.
7. Tam zhe. S. 45.
8. LiKhiuk. Chun'gukpal' khehkin.. Neity saivol'dy 3500man keinchon'bo yuchkhul': [Khakerskaya ataka iz Kitaya. Utechka lichnoj informatsii 35 mln pol'zovatelej Nate i Cyworld]. URL: http://www.bloter.net/archives/69734 (data obrascheniya: 11.03.2018).
9. Paganini, P. 31 Million of client records belonging to the virtual keyboard app AI.type leaked online. URL: http://securityaffairs.co/wordpress/66392/data-breach/keyboard-app-ai-type-data-leak.html (data obrascheniya: 10.03.2018).
10. Equifax data hack affected 694,000 UK customers. URL: http://www.bbc.com/news/business-41575188 (data obrascheniya: 12.03.2018).
11. China IP address link to South Korea cyber-attack. URL: http://www.bbc.com/news/world-asia-21873017 (data obrascheniya: 09.03.2018).
12. Kshetri, N. Cybersecurity in South Korea // The Quest to Cyber Superiority. Springer, Cham, 2016. P. 1 74.
13. Min, J. North Korea's Asymmetric Attack on South Korea's Nuclear Power Plants. URL: http://large.stanford.edu/courses/2017/ph241/min1/ (data obrascheniya: 10.03.2018).
14. North Korea tried to hack South's railway system: spy agency. URL: https://www.reuters.com/article/ us-northkorea-southkorea-cyber/north-korea-tried-to-hack-souths-railway-system-spy-agency-idUSKC№ 0WA0B6 (data obrascheniya: 11.03.2018).
15. Kim Young-do. Major Issues of the National Cyber Security System in South Korea, and its Future Direction / Kim Young-do, Kim Jin-sung, Lee Kyung-ho // The Korean Journal of Defense Analysis. 2013. Vol. 25. No. 4. P. 436.
16. Laws on the Internet and Information Security in Korea / Korea Internet & Security Agency. Pp. 37-38.
17. Kshetri, N. Op. cit. P. 176.
18. Lee Young-ju. Establishment of a Feasible Cyber Organization Structure to Enhance the Capabilities of Cyberspace Operations in the ROK's Defense Forces // The Korean Journal of Defense Analysis. 2016. Vol. 28. No. 2. P. 228.
19. Chkhve In'yon. Chon'bu kukka saibo anbo masyto pkhyllen surip: [Pravitel'stvo prinyalo Master-plan gosudarstvennoj kiberbezopasnosti]LZhE: http://www.yonhapnews.co.kr/bulletin/2011/ 08/08/0200000000AKR20110808147651017.HTML (data obrascheniya: 11.03.2018).
20. Kim Byon'khva. Kukneh saibotkhehro chzhon'chkheksuribyl' vikhan chollyakchzhok chopgyn pan'an: yongugeh saibotkhehro chzhon'chkhegyl' chunsimyro: [Strategicheskij podkhod k ustanovleniyu yuzhnokorejskoj politiki protivodejstviya kiberterrorizmu: analiz opyta Velikobritanii] // Khanguk kyon'kho kyon'bi khakkhvechzhi: [Zhurnal «Bezopasnost' Korei»]. 2017. № 51. S. 183-184.
21. Jeong Yoon Yang. Analysis on South Korean Cybersecurity Readiness Regarding North Korean Cyber Capabilities / Jeong Yoon Yang, So Jeong Kim, Il Seok Oh // Information Security Applications. 17th International Workshop, 2016: Revised Selected Papers. Springer, Cham, 2017. P. 108.
22. 2016 Defense White Paper / Ministry of National Defense. P. 57.
23. Cluely, G. South Korea launches its cyberwarfare command centre. URL: https://nakedsecurity.sophos.com/2010/01/11/south-korea-launches-cyberwarfare-command-centre/ (data obrascheniya: 12.03.2018).
24. 2016 Defense White Paper. Op. cit. P. 78.
25. South Korea to open cyber warfare school. URL: https://gadgets.ndtv.com/others/news/south-korea-to-open-cyber-warfare-school-225865 (data obrascheniya: 09.03.2018).
26. 2016 Defense White Paper. Op. cit. P. 79.
27. LiYonchzheh. Mi saibosaryon'gvan khanguk pan'mun.. puk saibo vikhyop tehyn non'i: [Vizit v Koreyu komanduyuschego kiberneticheskim podrazdeleniem vooruzhennykh sil SShA. obsuzhdenie kiberugrozy so storony KNDR]. URL: http://www.yonhapnews.co.kr/bulletin/2017/11/09/ 0200000000AKR20171109124151014.HTML?from=search (data obrascheniya: 10.03.2018).
28. South Korea traces cyber-attacks to Chinese IP address. URL: https://www.theguardian.com/world/ 2013/mar/21/south-korea-cyber-attack-chinese (data obrascheniya: 11.03.2018).
29. Sm.: Maksimov, B. Pressa Britanii: na Sony napali rossijskie khakery? URL: http://www.bbc.com/russian/uk/2014/12/141224_brit_press (data obrascheniya: 11.03.2018); Ehksperty vyyasnili, chto za kiberatakoj na OI-2018 ne stoyali severokorejskie khakery iz Lazarus. URL: https://www.5-tv.ru/news/188489/ (data obrascheniya: 11.03.2018).
30. Nguyen Minh Duc. Korea and US DDoS attacks: The attacking source located in United Kingdom. URL: https://web.archive.org/web/20110812141003/http://blog.bkis.com/en/korea-and-us-ddos-attacks-the-attacking-source-located-in-united-kingdom/ (data obrascheniya: 10.03.2018).
31. Sm.: Cho, Meeyoung. South Korea nuclear plant hacked, says operator. URL: https://www.smh.com.au/technology/south-korea-nuclear-plant-hacked-says-operator-20141222-12chrb.html (data obrascheniya: 12.03.2018); Park, Donghui. Making sense of North Korea's hacking strategy.URL: https://www.reuters.com/article/beyer-cyber/column-commentary-making-sense-of-north-koreas-hacking-strategy-idUSL1№ 1OL289 (data obrascheniya: 12.03.2018)
32. Kunmin pokhova kon'kon'anchzhonyl' vikhan tkhehropan'chzhipob: [Zakon O bor'be s terrorizmom dlya zaschity grazhdan i bezopasnosti obschestva]. URL: http://www.law.go.kr/ lsSc.do?menuId=0&p1=&subMenu=1&nwYn=1§ion=&tabNo=&query=%EA%B5%AD%EB% AF%BC%EB%B3%B4%ED%98%B8%EC%99%80%20%EA%B3%B5%EA%B3%B5%EC%95%8 8%EC%A0%84%EC%9D%84%20%EC%9C%84%ED%95%9C%20%ED%85%8C%EB%9F%AC %EB%B0%A9%EC%A7%80%EB%B2%95#undefined (data obrascheniya: 09.03.2018).
33. Kim Byon'khva. Ukaz. soch. S. 182.
34. Kunmin pokhova kon'kon'anchzhonyl'.
35. Cho Khvasun. Khangukkva migugeh saibo anbo gobonansy: saibovikhyobeh anbokhva gvanchzhomehsoeh pigyo: [Upravlenie v oblasti kiberbezopasnosti v SShA i Yuzhnoj Koree: sravnenie sek'yuritizatsii kiberugroz] / Cho Khvasun, Kvon Un // Chonbo sakhveva midio: [Informatsionnoe obschestvo i SMI]. 2017. Vol. 18. No. 2. P. 115.
Comments
No posts found