File:Developing a reliable methodology for assessing the computer network operations threat of North Korea (IA developingreliab109451457).pdf

From Wikimedia Commons, the free media repository
Jump to navigation Jump to search
Go to page
next page →
next page →
next page →

Original file(1,275 × 1,650 pixels, file size: 1.94 MB, MIME type: application/pdf, 94 pages)

Captions

Captions

Add a one-line explanation of what this file represents

Summary[edit]

Developing a reliable methodology for assessing the computer network operations threat of North Korea   (Wikidata search (Cirrus search) Wikidata query (SPARQL)  Create new Wikidata item based on this file)
Author
Brown, Christopher
Title
Developing a reliable methodology for assessing the computer network operations threat of North Korea
Publisher
Monterey, California. Naval Postgraduate School
Description

Computer network operations (CNO) can be considered a relatively new phenomenon being encount modern warfare. Computer network operation is comprised of three components, computer network attack computer network exploitation (CNE), and computer network defense (CND). Computer network attack is def operations to disrupt, deny, degrade, or destroy information resident in computer networks, or the computers and ne themselves. Computer network exploitation is the intelligence collection and enabling operations to gather data from adversary automated information systems (AIS) or networks. Finally, computer network defense are those me internal to the protected entity, taken to protect and defend information, computers, and networks from disruption, degradation, or destruction. No longer is warfare limited to the use of kinetic weapons and conventional methods of war. Computer network operations have become an integral part of our adversary's arsenal and more attention must be paid to the effects of CNO activities, particularly CNA and CNE being conducted by our adversaries. Of the many states suspected of conducting active CNO activities against the United States and other nations, none warrants more attention than North Korea. This thesis presents the development of methodology using information available from open sources. This work is intended to prove that a useful methodology for assessing the CNO capabilities and limitations of North Korea can be developed using only open source information.


Subjects: Information warfare; Korea (North); Computer networks; Security measures
Language English
Publication date September 2004
Current location
IA Collections: navalpostgraduateschoollibrary; fedlink
Accession number
developingreliab109451457
Source
Internet Archive identifier: developingreliab109451457
https://archive.org/download/developingreliab109451457/developingreliab109451457.pdf
Permission
(Reusing this file)
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.

Licensing[edit]

Public domain
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code. Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current08:14, 17 July 2020Thumbnail for version as of 08:14, 17 July 20201,275 × 1,650, 94 pages (1.94 MB) (talk | contribs)FEDLINK - United States Federal Collection developingreliab109451457 (User talk:Fæ/IA books#Fork8) (batch 1993-2020 #13713)

Metadata