학술논문

북한 사이버/전자전 능력 분석 및 평가 - 전투발전요소(DOTMLPF-P) 및 SWOT 분석을 중심으로-
Document Type
Article
Author
Source
안보군사학연구 (2022): 135-162.
Subject
Language
Korean
ISSN
2713704X
Abstract
In the past, North Korea carried out '3·20 cyber terror' and large-scale GPS jamming attacks, causing significant damage to South Korea's national functions and proving its ability to conduct cyber/electronic warfare. Today, as the UN imposes sanctions on North Korea and the COVID-19 blockade is prolonged, cyber crimes such as hacking banks' computer networks and stealing crypto-currency are committed to maintaining the government system and raising funds for nuclear and missile development. Cyber/electronic warfare is excellent cost-effectiveness and is the best way to implement a 'gray zone' strategy for North Korea, where it is difficult to build conventional power due to economic difficulties. To effectively respond to these cyber/electronic warfare threats from North Korea, it is necessary to grasp its capabilities, strengths, and weaknesses properly. Therefore, in this study, North Korea's cyber/electronic warfare capabilities were analyzed based on the analysis frame of the DOTMLPF-P, and strengths, weaknesses, opportunities, and threats were evaluated using the SWOT analysis. As a result of the analysis, North Korea's cyber/electronic warfare capabilities had strengths in Doctrine(D), Policy(P), Organization(O), Training(T), and Leadership(L), but Material(M) and Facilities(F) were classified as weaknesses due to North Korea's severe economic difficulties, weak production capacity, and high dependence on China. Changes in the external environment, such as the rise in crypto-currency value and security vulnerabilities, will create opportunities for cyber/electronic warfare in North Korea. On the contrary, falling crypto-currency value and strengthening cyber security will be their threats. Therefore, ROK and the international community should devise and implement strategies to counteract North Korea's cyber/electronic warfare capabilities, make its weaknesses more vulnerable, block opportunities, and increasing threats.

Online Access