The Cyberwar Frontier In Korea

In one college major at Seoul's elite Korea University, the courses are known only by number, and students keep their identities a secret from outsiders. 

The Cyber Defense curriculum, funded by the defense ministry, trains young keyboard warriors who get a free education in exchange for a seven-year commitment as officers in the army's cyber warfare unit - and its ongoing conflict with North Korea. 

North and South Korea remain in a technical state of war since the 1950-53 Korean War ended in an armed truce. Besides Pyongyang's nuclear and rocket programmes, South Korea says the North has a strong cyber army which it has blamed for a series of attacks in the past three years. 

The cyber defense programme at the university in Seoul was founded in 2011, with the first students enrolled the following year. 

One 21-year-old student, who allowed himself to be identified only by his surname Noh, said he had long been interested in computing and cyber security and was urged by his father to join the programme. All South Korean males are required to serve in the military, usually for up to two years. 

"It's not a time burden but part of a process to build my career," Noh said. "Becoming a cyber warrior means devoting myself to serve my country," he said in a war room packed with computers and wall-mounted flat screens at the school's science library.

South Korea, a key US ally, is one of the world's most technologically advanced countries. That makes its networks that control everything from electrical power grids to the banking system vulnerable against an enemy that has relatively primitive infrastructure and thus few targets against which the South can retaliate. 

"In relative terms, it looks unfavorable because our country has more places to defend, while North Korea barely uses or provides internet," said Noh. 

Last year, South Korea estimated that the North's "cyber army" has doubled in size over the last two years to 6,000 troops and the South has been scrambling to ramp up its capability to meet what it considers to be a rising threat. 

The United States and South Korea announced efforts to strengthen cooperation on cyber security, including "deepening military-to-military cyber cooperation," the White House said during President Park Geun-hye's visit to Washington in October. 

In addition to the course at Korea University, the national police have been expanding its cyber defence capabilities, while the Ministry of Science, ICT and Future Planning started a one-year programme in 2012 to train so-called "white hat" - or ethical - computer hacker.

Still, the North appears to have notched up successes in the cyber war against both the South and the United States. 

Recently, South Korean police said the North hacked into more than 140,000 computers at 160 South Korean companies and government agencies, planting malicious code under a long-term plan laying groundwork for a massive cyber-attack against its rival. 

In 2013, Seoul blamed the North for a cyber-attack on banks and broadcasters that froze computer systems for over a week. And North Korea denied responsibility. 

The US Federal Bureau of Investigation has blamed Pyongyang for a 2014 cyber-attack on Sony Pictures' network as the company prepared to release "The Interview," a comedy about a fictional plot to assassinate North Korean leader Kim Jong Un. The attack was followed by online leaks of unreleased movies and emails that caused embarrassment to executives and Hollywood personalities. 

North Korea described the accusation as "groundless slander." 

South Korea's university cyber defense programme selects a maximum of 30 students each year, almost all of them men. On top of free tuition, the school provides 500,000 won ($427) per month support for each student for living expenses, according to Korea University Professor Jeong Ik-rae. 

The course trains pupils in disciplines including hacking, mathematics, law and cryptography, with students staging mock hacking attacks or playing defense, using simulation programs donated by security firms, he said. 

The admission to the selective programme entails three days of interviews including physical examinations, attended by military officials along with the school's professors, he said.

While North Korea's cyber army outnumbers the South's roughly 500-strong force, Jeong said a small group of talented and well-trained cadets can be groomed to beat the enemy.

Jeong, an information security expert who has taught in the cyber defense curriculum since 2012, said the school benchmarks itself on Israel's elite Talpiot programme, which trains gifted students in areas like technology and applied sciences as well as combat. After graduating, they focus on areas like Cybersecurity and missile defence.

"It's very important to have skills to respond when attacks happen - not only to defend," Jeong said.

Ein News:

« For Sale: Access to 70,000 Hacked Computer Networks
Russian Cyber Gangs Linked To Bank Robberies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

Cysec Resource Co (CRC)

Cysec Resource Co (CRC)

We offer expertise in information and cyber security, sourcing individuals and teams who provide information security expertise to the public and private sector.

Council of Europe - Cybercrime Programme Office (C-PROC)

Council of Europe - Cybercrime Programme Office (C-PROC)

The Cybercrime Programme Office of the Council of Europe is responsible for assisting countries worldwide in strengthening their legal systems capacity to respond to cybercrime

Odix

Odix

Odix security software neutralizes file embedded targeted cyber attacks before they enter your organization’s network.

RazorSecure

RazorSecure

RazorSecure offers products and services to enhance railway cyber security, by protecting and monitoring networks and key systems.

ComCERT

ComCERT

ComCERT SA is an independent, private consulting company focusing in the assistance of its customers facing the dangers of cyber threats and security incidents.

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau is the national accreditation body for Lithuania. The directory of members provides details of organisations offering certification services for ISO 27001.

Trustonic

Trustonic

Trustonic is a leader in the device security market. Our mission is to protect apps, secure devices & enable trust.

SafeHouse Technologies

SafeHouse Technologies

SafeHouse is a cloud-based, high-end cybersecurity platform that can secure and insure any device that is connected to it.

Flix11

Flix11

Flix11 is a Cyber Security & ICT Solutions focused company. We provide a range of products and services in Cyber Security, Internet of Things (IoT) and infrastructure solutions.

DartPoints

DartPoints

DartPoints helps bridge the digital divide by delivering cloud, colocation, managed services + edge infrastructure.

Performance Technologies

Performance Technologies

As a leading IT Solutions Provider in Greece, Performance Technologies delivers reliable, long life solutions, ensuring continuous availability of business-critical services and information.

Qeros

Qeros

Qeros is a next-generation distributed system enables secure data and transaction processing at the velocity of thought.

CIP Cyber

CIP Cyber

CIP Cyber is an online learning community with a mission of connecting, training, and certifying cybersecurity professionals to protect critical infrastructure.

Hughes Network Systems

Hughes Network Systems

Hughes are industry leaders in networking technologies and services, innovating constantly to deliver the global solutions that power a connected future for people, enterprises and things everywhere.

Forthright Technology Partners

Forthright Technology Partners

Forthright Technology Partners (Forthright) is a next-generation cloud and managed IT services provider serving a global clientele.