PUKYONG

The Dilemma of Software Uniformity and Cybersecurity in South Korea

Metadata Downloads
Abstract
This dissertation examines South Korea’s cyber security dilemma in the context of software uniformity. In doing so, the author ascertains the motives, capabilities, behavior and technical characteristics of actors within the South Korean cyber dynamic. It makes the supposition that continuous public-key policies and strategies have contributed to threats from both state and non-state actors, in the form of security vulnerabilities in Windows and Internet Explorer. In addition, domestic antivirus manufacturers Ahnlab and Esoft, whose programs are V3 and Alyac respectively, share in an oligopoly of the South Korean antivirus market, and also contribute to similar vulnerabilities. It is the author’s contention that the uniformity of operating systems (Windows), browsers (Internet Explorer), and antivirus software (V3 and Alyac) have created an environment that not only negatively impacts cybersecurity in South Korea, but also may motivate hackers, the success of whom is aided by South Korean computer users’ risky online behavior. This can potentially create significant gaps in the integrity of South Korean systems. This research documents major cyber security decisions in South Korea and dissects its main variables (the actors involved, relation to the international structure and regional security paradigm, and power vs. national security dynamic) and finds correlating evidence involving state and non-state actors. The frequency, scope, origins and method of attack of large-scale cyber incursions are investigated to determine the effectiveness of policy against these attacks as they concern online behavior and norms in South Korea.
This study is unique for several reasons. First, it uses data collected from relevant yet often ignored non-state actors to infer certain deleterious effects of software uniformity in South Korean cyber security strategy. Extensive surveys on individual end-user behavior and individual hacker motives and capabilities were conducted to determine both how individual computer users in South Korea possibly amend their behavior as a result of national public-key policies, and whether weaknesses in cyber security created by these policies could be exploited by hackers. Most importantly, this dissertation offers an original approach to cyber security in that the evidence presented is examined within a framework of intersectionality, and suggests that some of South Korea’s cyber threats are the intersection of policy, behavior, and technology.
The author concludes that past and current cyber strategies in South Korea have effected non-state actors in ways that may put systems at risk. The legislative process is too slow and politically polarized to respond to changes in the cyber environment. As a result, many policies are derived through executive orders and military strategies, which are more proactive and defend well against North Korea. However, they have had the unintended consequences of narrowing the diversity of technology in use and contributing to high-risk online behavior of South Koreans, while potentially attracting a larger range of hacking threats which may go undetected by the nation’s state-centered cybersecurity strategy. These centrally controlled solutions cannot completely or adequately adapt to the entire range of threats and opportunities from non-state actors, and therefore also contribute to vulnerabilities in South Korean cyber defense.
Author(s)
Swanda, John Gustave
Issued Date
2016
Awarded Date
2016. 8
Type
Dissertation
Keyword
South Korea cybersecurity hackers software uniformity cyber attack intersectionality policy public-key
Publisher
부경대학교 대학원
URI
https://repository.pknu.ac.kr:8443/handle/2021.oak/13279
http://pknu.dcollection.net/jsp/common/DcLoOrgPer.jsp?sItemId=000002300718
Alternative Author(s)
스완다, 존 거스텁
Affiliation
부경대학교 대학원
Department
대학원 국제지역학과
Advisor
김동수
Table Of Contents
CHAPTER ONE: Introduction: 1
1.1 Purpose of Research: 5
1.1.1 Research Questions 6
1.1.2 Research Objectives 7
1.1.3 Chronology and Scope of Study 8
1.2 Background: 8
1.2.1 South Korean Policy Formation 8
1.2.2 Regulating Encryption 10
1.2.3 National Public Key System 17
1.3 Literature Review 20
1.4 Taxonomy: 36
1.4.1 Technical Terminology 38
1.4.2 Conceptual Terminology 39
1.4.3 Normative Terminology 41
1.5 Organization of This Dissertation 42
CHAPTER TWO: The Theory of Intersectionality: An Intersection of Theory 44
2.1 The Theory of Intersectionality 50
2.2 Neorealism 59
2.3 Social Constructivism 65
2.4 Cyber Westphalian Theory 77
2.5 The Intersection of Theory: An Integrated Approach 90
CHAPTER THREE: Methodology: A Mixed Approach 99
3.1 Quantitative Methodology: 101
3.1.1 Validity of Online Surveys 101
3.1.2 KISA Survey Methodology 106
3.1.3 South Korean End-user Survey: 108
3.1.3.1 Demographics of Participants 111
3.1.3.2 Operating System 111
3.1.3.3 Browser Software 112
3.1.3.4 Security Software 112
3.1.3.5 Frequency and Location of Internet access 112
3.1.3.6 Response to ActiveX Warnings 112
3.1.3.7 Behavior towards Unknown Websites Links 113
3.1.3.8 Behavior towards E-mail Links 114
3.1.3.9 Occurrence, Location and Mode of Incursions 114
3.1.3.10 Connectivity between Home System and Work/School Network 115
3.1.4 Hacker Survey: 115
3.1.4.1 Question about Orientation 116
3.1.4.2 Questions on Target Acquisition and Motives 117
3.2 Qualitative Study: 117
3.2.1 Dr. Keechang Kim 118
3.2.2 Jim Jackson 118
3.2.3 Dr. Bright Gameli 119
CHAPTER FOUR: A Statistical Analysis 120
4.1 Overview: 120
4.1.1 User Survey: 121
4.1.1.1 The Security of Software: 121
4.1.1.1.1 Operating Systems 122
4.1.1.1.2 Browser Software 125
4.1.1.1.3 Antivirus Software 126
4.1.1.2 Online Behavior 128
4.1.1.3 Occurrence, Location and Mode of Incursions 131
4.1.1.4 Accessibility of Organizational Networks 133
4.1.1.5 Most Vulnerable User Characteristic 134
4.1.2 Hacker Survey: 135
4.1.2.1 Hacker Orientation 136
4.1.2.2 Target Selection 137
4.2 Qualitative Analysis: 139
4.2.1 Dr. Kim Keechang 143
4.2.2 Jim Jackson 147
4.2.3 Dr. Bright Gameli 149
CHAPTER FIVE: Uniformity and Vulnerability 152
5.1 Major Cyber Attacks: 158
5.1.1 July 4-7, 2009 160
5.1.2 June 10th, 2010 165
5.1.3 March 4th, 2011 167
5.1.4 June 11th, 2012 172
5.1.5 March 20th, 2013 174
5.1.6 June 25th, 2013 176
5.2 Cyber Dynamic 180
CHAPTER SIX: Conclusions 189
6.1 Empirical Findings 189
6.2 Theoretical Implications 191
6.3 Policy Implications 194
6.4 Recommendations for Future Research 196
6.5 Limitations of the Research 197
6.6 Closing Remarks 198
REFERNCES 200
Appendix 208
Degree
Doctor
Appears in Collections:
대학원 > 국제지역학과
Authorize & License
  • Authorize공개
Files in This Item:

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.