The Cyberwar Frontier In Korea

In one college major at Seoul's elite Korea University, the courses are known only by number, and students keep their identities a secret from outsiders. 

The Cyber Defense curriculum, funded by the defense ministry, trains young keyboard warriors who get a free education in exchange for a seven-year commitment as officers in the army's cyber warfare unit - and its ongoing conflict with North Korea. 

North and South Korea remain in a technical state of war since the 1950-53 Korean War ended in an armed truce. Besides Pyongyang's nuclear and rocket programmes, South Korea says the North has a strong cyber army which it has blamed for a series of attacks in the past three years. 

The cyber defense programme at the university in Seoul was founded in 2011, with the first students enrolled the following year. 

One 21-year-old student, who allowed himself to be identified only by his surname Noh, said he had long been interested in computing and cyber security and was urged by his father to join the programme. All South Korean males are required to serve in the military, usually for up to two years. 

"It's not a time burden but part of a process to build my career," Noh said. "Becoming a cyber warrior means devoting myself to serve my country," he said in a war room packed with computers and wall-mounted flat screens at the school's science library.

South Korea, a key US ally, is one of the world's most technologically advanced countries. That makes its networks that control everything from electrical power grids to the banking system vulnerable against an enemy that has relatively primitive infrastructure and thus few targets against which the South can retaliate. 

"In relative terms, it looks unfavorable because our country has more places to defend, while North Korea barely uses or provides internet," said Noh. 

Last year, South Korea estimated that the North's "cyber army" has doubled in size over the last two years to 6,000 troops and the South has been scrambling to ramp up its capability to meet what it considers to be a rising threat. 

The United States and South Korea announced efforts to strengthen cooperation on cyber security, including "deepening military-to-military cyber cooperation," the White House said during President Park Geun-hye's visit to Washington in October. 

In addition to the course at Korea University, the national police have been expanding its cyber defence capabilities, while the Ministry of Science, ICT and Future Planning started a one-year programme in 2012 to train so-called "white hat" - or ethical - computer hacker.

Still, the North appears to have notched up successes in the cyber war against both the South and the United States. 

Recently, South Korean police said the North hacked into more than 140,000 computers at 160 South Korean companies and government agencies, planting malicious code under a long-term plan laying groundwork for a massive cyber-attack against its rival. 

In 2013, Seoul blamed the North for a cyber-attack on banks and broadcasters that froze computer systems for over a week. And North Korea denied responsibility. 

The US Federal Bureau of Investigation has blamed Pyongyang for a 2014 cyber-attack on Sony Pictures' network as the company prepared to release "The Interview," a comedy about a fictional plot to assassinate North Korean leader Kim Jong Un. The attack was followed by online leaks of unreleased movies and emails that caused embarrassment to executives and Hollywood personalities. 

North Korea described the accusation as "groundless slander." 

South Korea's university cyber defense programme selects a maximum of 30 students each year, almost all of them men. On top of free tuition, the school provides 500,000 won ($427) per month support for each student for living expenses, according to Korea University Professor Jeong Ik-rae. 

The course trains pupils in disciplines including hacking, mathematics, law and cryptography, with students staging mock hacking attacks or playing defense, using simulation programs donated by security firms, he said. 

The admission to the selective programme entails three days of interviews including physical examinations, attended by military officials along with the school's professors, he said.

While North Korea's cyber army outnumbers the South's roughly 500-strong force, Jeong said a small group of talented and well-trained cadets can be groomed to beat the enemy.

Jeong, an information security expert who has taught in the cyber defense curriculum since 2012, said the school benchmarks itself on Israel's elite Talpiot programme, which trains gifted students in areas like technology and applied sciences as well as combat. After graduating, they focus on areas like Cybersecurity and missile defence.

"It's very important to have skills to respond when attacks happen - not only to defend," Jeong said.

Ein News:

« For Sale: Access to 70,000 Hacked Computer Networks
Russian Cyber Gangs Linked To Bank Robberies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

authen2cate

authen2cate

Authen2cate offers a simple way to provide application access with our Identity and Access Management (IAM) solutions for enterprise, small business, and individual customers alike.

XBOSoft

XBOSoft

XBOSoft is a software QA and testing company. We cover the entire QA and testing life cycle including software and application security.

National Center for Manufacturing Sciences (NCMS)

National Center for Manufacturing Sciences (NCMS)

NCMS is a cross-industry technology development consortium, dedicated to improving the competitiveness of the US industrial base. Strategic initiatives include industrial cyber security.

QuillAudits

QuillAudits

QuillAudits offers advanced Ethereum, EOS, TRON smart contract audit, blockchain protocol security and formal verification to ensure your platform’s integrity.

Energia Ventures

Energia Ventures

Energia Ventures is a three-month intensive accelerator for entrepreneurs with an innovative business in the energy, smart grid, cleantech, and cybersecurity sectors.

OISTE Foundation

OISTE Foundation

OISTE foundation allows users to control their digital identities using well-understood and secure algorithms that ensure the continued validity of an identity and its claims.

CRI Group

CRI Group

CRI Group excels at deterring, detecting and investigating crimes against businesses using a global network of professionals specially trained in Anti-Corruption, Risk Management and Compliance.

Phished

Phished

Phished is an AI-driven platform that focuses on the human side of cybersecurity. By combining fully automated training software with personalised, realistic simulations of cyberattacks.

Celera Networks

Celera Networks

Celera Networks is a managed services provider specializing in cybersecurity, cloud and managed IT services.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

Babble

Babble

Babble is a Unified Comms, Contact Centre and Cyber Solutions provider. We believe in making next-generation technology simple to use, deploy and manage.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.

CovertSwarm

CovertSwarm

Since 2020 CovertSwarm have been radically redefining how enterprise security risks are discovered. We outpace the cyber threats faced by our clients using a constant cyber attack methodology.

Compugen Systems Inc (CSI)

Compugen Systems Inc (CSI)

Compugen Systems is an IT service delivery company that focuses on enabling your business outcomes.

INT3L

INT3L

The INT3L group (formerly Defentek) is a provider of national security and intelligence solutions, systems and services.