[현안분석] The Evolution of North Korean Cyber Threats
...including theft, denial of service (DDoS), espionage and sabotage. These types of operations have proved to be very useful as part of North Korea’s
asymmetric strategy towards the ROK-U.S. Combined Forces Command. Cyber operations are low-cost and low-risk, allowing North Korea to counter countries which have highly computer-dependent infrastructure, with...