• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd.

Vol. 10, No. 2, February 28, 2016
10.3837/tiis.2016.02.023, Download Paper (Free):

Abstract

Due to an increasing number of cyberattacks globally, cybersecurity has become a crucial part of national security in many countries. In particular, the Digital Pearl Harbor has become a real and aggressive security threat, and is considered to be a global issue that can introduce instability to the dynamics of international security. Against this context, the cyberattacks that targeted nuclear power plants (NPPs) in the Republic of Korea triggered concerns regarding the potential effects of cyber terror on critical infrastructure protection (CIP), making it a new security threat to society. Thus, in an attempt to establish measures that strengthen CIP from a cybersecurity perspective, we perform a case study on the cyber-terror attacks that targeted the Korea Hydro & Nuclear Power Co., Ltd. In order to fully appreciate the actual effects of cyber threats on critical infrastructure (CI), and to determine the challenges faced when responding to these threats, we examine factual relationships between the cyberattacks and their responses, and we perform analyses of the characteristics of the cyberattack under consideration. Moreover, we examine the significance of the event considering international norms, while applying the Tallinn Manual. Based on our analyses, we discuss implications for the cybersecurity of CI in South Korea, after which we propose a framework for strengthening cybersecurity in order to protect CI. Then, we discuss the direction of national policies.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
K. Lee and J. Lim, "The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd.," KSII Transactions on Internet and Information Systems, vol. 10, no. 2, pp. 857-880, 2016. DOI: 10.3837/tiis.2016.02.023.

[ACM Style]
Kyung-bok Lee and Jong-in Lim. 2016. The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd.. KSII Transactions on Internet and Information Systems, 10, 2, (2016), 857-880. DOI: 10.3837/tiis.2016.02.023.

[BibTeX Style]
@article{tiis:21030, title="The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd.", author="Kyung-bok Lee and Jong-in Lim and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2016.02.023}, volume={10}, number={2}, year="2016", month={February}, pages={857-880}}