기관회원 [로그인]
소속기관에서 받은 아이디, 비밀번호를 입력해 주세요.
개인회원 [로그인]

비회원 구매시 입력하신 핸드폰번호를 입력해 주세요.
본인 인증 후 구매내역을 확인하실 수 있습니다.

회원가입
서지반출
사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰
[STEP1]서지반출 형식 선택
파일형식
@
서지도구
SNS
기타
[STEP2]서지반출 정보 선택
  • 제목
  • URL
돌아가기
확인
취소
  • 사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰
  • A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues
저자명
한희원
간행물명
시큐리티연구KCI
권/호정보
2014년|39호(통권39호)|pp.319-353 (35 pages)
발행정보
한국보안관리학회(구:한국경호경비학회)|한국
파일정보
정기간행물|KOR|
PDF텍스트(0.86MB)
주제분야
사회과학
서지반출

국문초록

2001년 9/11 테러공격 이후에 미국은 사이버 안보를 가장 위중한 국가안보 문제로 인식 한다. 미국 국방부는 2013년 처음으로 사이버 전쟁이 물리적인 테러보다 더 큰 국가안보 위협임을 확인했다. 단적으로 윌리암 린(William J. Lynn) 국방부 차관의 지적처럼 오늘날 사이버 공간은 육지, 바다, 하늘, 우주 다음의 ‘제5의 전장(the fifth domain of warfare)’이라 고 함에 의문이 없다. 인터넷의 활용과 급속한 보급은 사이버 공간에서의 상상하지 못했던 역기능을 창출한 것이다. 이에 사이버 정보와 사이버 네트워크 보호까지를 포괄하지 않으면 국가안보 수호의 목 표를 달성할 수 없게 되었다. 그런데 이러한 위험성에도 불구하고 각국은 운영상의 효율성 과 편리성, 국제교류 등 외부세계와의 교류확대를 위해 국가기간망의 네트워크화를 더욱 확대해 가고 있고 인터넷에의 의존도는 심화되고 있다. 하지만 그 실천적인 위험성에도 불구하고 우리의 법제도적 장치와 사이버 안전에 대한 인식수준은 현실을 제대로 반영하 지 못하고 있는 것으로 판단된다. 오늘날 가장 실천적이고 현실적인 위협을 제기하는 사이버 안보의 핵심은 하나도 둘도 계획의 구체성과 실천력의 배양이다. 대책회의나 교육 등은 부차적이다. 실전적인 사이버 사령부와 사이버 정보기구 그리고 사이버 전사의 창설과 육성에 더 커다란 노력을 경주해 야 하고, 우리의 경우에는 가장 많은 경험을 가지고 인력과 장비를 가진 국가정보원의 사 이버 수호 역량을 고양하고 더 많은 책무를 부담시키고 합리적인 업무 감독을 다하는 것에 있다고 할 것이다. 이에 본고는 법규범적으로 치안질서와 별개 개념으로서의 국가안보에 대한 무한책임기 구인 국가정보기구의 사이버 안보에 대한 책무와 그에 더하여 필요한 사이버 정보활동과 유관활동의 범위를 검토하고자 한다. 사이버 테러와 사이버 공격을 포괄한 사이버 공격(Cyber Attack)에 대한 이해와 전자기장을 물리적으로 장악하는 전자전에 대한 연구도 포함 한다.

영문초록

Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country’s heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

목차

Ⅰ. 새로운 국가안보 환경
Ⅱ. 사이버 위협자
Ⅲ. 사이버 정보와 사이버 공격(Cyber Attack)
Ⅳ. 사이버 안보와 국가정보기구
Ⅴ. 마무리

참고문헌 (50건)

  • 박노형 (2014). 국내외 사이버안보 법제정 동향과 시사점: 미국을 중심으로. 국가안보전략연구소 학술회의 초록집. (4. 17). 은행회관 2층 국제회의실.
  • 박준석 (2014). 국가안보 위기관리 대테러론. 서울: 백산출판사.
  • 한희원 (2011). 국가정보(법의 지배와 국가정보). 서울: 법률출판사.
  • 김두현, 안광호(2010), 다중이용시설의 대테러 안전대책, 한국경호경비학회지, 제22호, pp. 37-64.
  • 최진혁(2010), 산업보안의 제도적 발전방안 연구: 미국 사례를 중심으로, 한국경호경비학회지, 제22호, pp. 197-230.
  • 이창무(2010), 우리나라 보안산업의 역사적 기원에 관한 연구, 한국경호경비학회지, 제22호, pp. 91-111.
  • Park, Dong-Kyun(2010) The Counter-Terrorism Measures for International Sports Events in Korea (한국의 국제스포츠 행사에 대한 대테러 전략), 한국경호경비학회지, 제22호, pp. 65-90.
  • 박준석(2006), “한국민간보안 ․ 시큐리티Security) 산업의 발전방안” 龍仁大學校 논문집 제24집.
  • 조재현(2009), “테러방지법의 제정방향”, 「테러방지법의 제정의 필요성과 방향」, 한국테러학회 춘계학술세미나자료집, pp. 18-31.
  • Andrew Rathmell. (2001). Controlling Computer and Network Operations. Information and Security. Vol(7).
  • Bob Drogin. (1999). Russians Seem To Be Hacking Into Pentagon: Sensitive information taken but nothing top secret. Los Angeles Times. (10. 7).
  • Charles Doyle. (2010). Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws. CRS Report 97-1025.
  • Carroll, Chris. (2012). US can trace cyberattacks, mount pre-emptive strikes, Panetta says. Stars and Stripes. (10.11).
  • Catherine A. Theohary. (2013). Information Operations, Cyberwarfare, and Cybersecurity Capabilities and Related Policy Issues. CRS Report RL31787.
  • Clarke, Richard. (2011). "China's Cyberassault on America", Wall Street Journal.
  • Clay Wilson. (2006). Information Operation and Cyberwar: Capabilities and Related Policy Issues. Congressional Research Service‐The Library of Congress. (9.14).
  • David Fulghum. (2004). Sneak Attack. Aviation Week & Space Technology.
  • Ellen Nakashima. (2013). U.S. Said to Be Target of Massive Cyber-Espionage Campaign. Washington Post. (2. 10).
  • Graham, B. (2005). Hackers Attack Via Chinese Web Sites: U.S. Agencies' Networks Are Among Targets. Washington Post. (8. 25).
  • Hicks, Jesse. (2014). This machine kills trolls. The Verge.
  • Ian Traynor. (2007). Russia accused of unleashing cyberwar to disable E., The Guardian. (5. 17).
  • James Middleton. (2001). Hackers launch 'cyber jihad' on US: Pakistani group defaces government website .Maura Conway-DORAS. (10.18)
  • John W. Rollins and Clay Wilson. (2007). Terrorist Capabilities for Cyberattack: Overview and Policy Issues. CRS Report RL33123,
  • Joint Chiefs of Staff. (2007). Joint Publication. Department of Defense Dictionary of Military and Associated Terms. 1(2).
  • Kristin Adair. (2006). Rumsfeld's Roadmap to Propaganda. National Security Archive Electronic Briefing Book. No(177). (1.26).
  • Kristin Archick. (2004). The Council of Europe Convention. Foreign Affairs. Defense, and Trade Division. (7.22).
  • Kristin Finklea. (2011). The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement. CRS Report R41927.
  • Kumar, S. (2010). "Denial of Service Due to Direct and Indirect ARP Storm Attacks in LAN Environment*". Journal of Information Security 01(2).
  • Larry Greenemeier. (2007). Estonian Attacks Raise Concern Over Cyber 'Nuclear Winter”. Information Week. (5. 24).
  • Latimer, Jon. (2001). Deception in War. New York: Overlook Press.
  • Lynn, William J. III. (2010). "Defending a New Domain: The Pentagon's Cyberstrategy", Foreign Affairs.
  • Mandiant Intelligence Center Repor. (2014). APT1: Exposing One of China’'s Cyber Espionage Units. DC Headquarters.
  • Michael A Vatis. (2001). Cyber Attacks during the War on Terrorism: A Predictive Analysis, Institute for Security Technology Studies. Dartmouth College. (9. 22).
  • Michael Riley & Eric Engleman. (2012). Code in Aramco Cyber Attack Indicates Lone Perpetrator. Bloomberg Businessweek. (10. 25).
  • Peter Brookes. (2005). The Art of (Cyber) War. The Heritage Foundation.
  • Robert Lemos. (2007). Electronic Jihad' fails to threaten, again. SecurityFocus. Shawn Henry. (2011). Responding to the Cyber Threat. Federal Bureau of Investigation, Baltimore, MD.
  • Sterling, Bruce. (1993). "Part 2(d)". The Hacker Crackdown. McLean, Virginia: IndyPublish.
  • The World. (2013). US hands China cyber propaganda weapon, David Pilling. U.S. Department
  • of Defense. (2010). Cyber Command Fact Sheet. (5. 21).
  • Wael Mahdi. (2012). Saudi Arabia Says Aramco Cyberattack Came from Foreign States. Bloomberg News. (12. 9).
  • White House. (2007). President Bush to Welcome President Toomas Ilves of Estonia. (5. 4).
  • Will Dunham. (2003). U.S. May Debut Secret Microwave Weapons versus Iraq. Reuters. (2.2).
  • William J. Lynn III. (2010). Defending a New Domain. Foreign Affairs.
  • 보안뉴스. 2014. 3. 31. http://www.boannews.com/media/view.asp?idx=40381&kind=3.
  • 조선비즈. 2014. 2. 17, http://biz.chosun.com/site/data/html_dir/2014/02/16/2014021602442.html
  • Kim, Eun-jung. (2013). Korean military to prepare with U.S. for cyber warfare scenarios". Yonhap News Agency. (4. 6).
  • http://www.newswire.co.kr/newsRead.php?no=703568.
  • CIA. https://www.cia.gov/index.html.
  • FBI. http://www.fbi.gov/.
  • NSA. http://www.nsa.gov/.
구매하기 (6,400)
추천 연관논문