Developing a reliable methodology for assessing the computer network operations threat of North Korea

Download
Author
Brown, Christopher
Date
2004-09Advisor
Denning, Dorothy
Second Reader
Kim, Joanne
Metadata
Show full item recordAbstract
Computer network operations (CNO) can be considered a relatively new phenomenon being encount modern warfare. Computer network operation is comprised of three components, computer network attack computer network exploitation (CNE), and computer network defense (CND). Computer network attack is def operations to disrupt, deny, degrade, or destroy information resident in computer networks, or the computers and ne themselves. Computer network exploitation is the intelligence collection and enabling operations to gather data from adversary automated information systems (AIS) or networks. Finally, computer network defense are those me internal to the protected entity, taken to protect and defend information, computers, and networks from disruption, degradation, or destruction. No longer is warfare limited to the use of kinetic weapons and conventional methods of war. Computer network operations have become an integral part of our adversary's arsenal and more attention must be paid to the effects of CNO activities, particularly CNA and CNE being conducted by our adversaries. Of the many states suspected of conducting active CNO activities against the United States and other nations, none warrants more attention than North Korea. This thesis presents the development of methodology using information available from open sources. This work is intended to prove that a useful methodology for assessing the CNO capabilities and limitations of North Korea can be developed using only open source information.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Developing a reliable methodology for assessing the computer network operations threat of Iran
Smith, Matthew N. (Monterey, California. Naval Postgraduate School, 2005-09);This thesis is part of a project at the Naval Postgraduate School to assess the Computer Network Operations (CNO) threat of foreign countries. CNO consists of Computer Network Attack (CNA), Computer Network Exploitation ... -
Internetworking: integrating IP/ATM LAN/WAN security
Dennis, Ronald M. (Monterey, California. Naval Postgraduate School, 1996-09);Computer and network security is a complex problem that is not solely restricted to classified computer systems and networks. Accelerating trends in networking and the emphasis on open interoperable networks has left many ... -
A Technique for Presenting a Deceptive Dynamic Network Topology
Trassare, Samuel T. (Monterey, California: Naval Postgraduate School, 2013-03);Adversaries scan Department of Defense networks looking for vulnerabilities that allow surveillance or the embedding of destructive malware weapons. In cyberspace, adversaries either actively probe or passively observe ...