The Cyberwar Frontier In Korea

In one college major at Seoul's elite Korea University, the courses are known only by number, and students keep their identities a secret from outsiders. 

The Cyber Defense curriculum, funded by the defense ministry, trains young keyboard warriors who get a free education in exchange for a seven-year commitment as officers in the army's cyber warfare unit - and its ongoing conflict with North Korea. 

North and South Korea remain in a technical state of war since the 1950-53 Korean War ended in an armed truce. Besides Pyongyang's nuclear and rocket programmes, South Korea says the North has a strong cyber army which it has blamed for a series of attacks in the past three years. 

The cyber defense programme at the university in Seoul was founded in 2011, with the first students enrolled the following year. 

One 21-year-old student, who allowed himself to be identified only by his surname Noh, said he had long been interested in computing and cyber security and was urged by his father to join the programme. All South Korean males are required to serve in the military, usually for up to two years. 

"It's not a time burden but part of a process to build my career," Noh said. "Becoming a cyber warrior means devoting myself to serve my country," he said in a war room packed with computers and wall-mounted flat screens at the school's science library.

South Korea, a key US ally, is one of the world's most technologically advanced countries. That makes its networks that control everything from electrical power grids to the banking system vulnerable against an enemy that has relatively primitive infrastructure and thus few targets against which the South can retaliate. 

"In relative terms, it looks unfavorable because our country has more places to defend, while North Korea barely uses or provides internet," said Noh. 

Last year, South Korea estimated that the North's "cyber army" has doubled in size over the last two years to 6,000 troops and the South has been scrambling to ramp up its capability to meet what it considers to be a rising threat. 

The United States and South Korea announced efforts to strengthen cooperation on cyber security, including "deepening military-to-military cyber cooperation," the White House said during President Park Geun-hye's visit to Washington in October. 

In addition to the course at Korea University, the national police have been expanding its cyber defence capabilities, while the Ministry of Science, ICT and Future Planning started a one-year programme in 2012 to train so-called "white hat" - or ethical - computer hacker.

Still, the North appears to have notched up successes in the cyber war against both the South and the United States. 

Recently, South Korean police said the North hacked into more than 140,000 computers at 160 South Korean companies and government agencies, planting malicious code under a long-term plan laying groundwork for a massive cyber-attack against its rival. 

In 2013, Seoul blamed the North for a cyber-attack on banks and broadcasters that froze computer systems for over a week. And North Korea denied responsibility. 

The US Federal Bureau of Investigation has blamed Pyongyang for a 2014 cyber-attack on Sony Pictures' network as the company prepared to release "The Interview," a comedy about a fictional plot to assassinate North Korean leader Kim Jong Un. The attack was followed by online leaks of unreleased movies and emails that caused embarrassment to executives and Hollywood personalities. 

North Korea described the accusation as "groundless slander." 

South Korea's university cyber defense programme selects a maximum of 30 students each year, almost all of them men. On top of free tuition, the school provides 500,000 won ($427) per month support for each student for living expenses, according to Korea University Professor Jeong Ik-rae. 

The course trains pupils in disciplines including hacking, mathematics, law and cryptography, with students staging mock hacking attacks or playing defense, using simulation programs donated by security firms, he said. 

The admission to the selective programme entails three days of interviews including physical examinations, attended by military officials along with the school's professors, he said.

While North Korea's cyber army outnumbers the South's roughly 500-strong force, Jeong said a small group of talented and well-trained cadets can be groomed to beat the enemy.

Jeong, an information security expert who has taught in the cyber defense curriculum since 2012, said the school benchmarks itself on Israel's elite Talpiot programme, which trains gifted students in areas like technology and applied sciences as well as combat. After graduating, they focus on areas like Cybersecurity and missile defence.

"It's very important to have skills to respond when attacks happen - not only to defend," Jeong said.

Ein News:

« For Sale: Access to 70,000 Hacked Computer Networks
Russian Cyber Gangs Linked To Bank Robberies »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CERT-UA

CERT-UA

CERT-UA is the national Computer Emergency Response Team for Ukraine.

Progress Flowmon

Progress Flowmon

Progress Flowmon (formerly Flowmon Networks) provide high performance network monitoring technology and behavior analytics to enhance network performance and deal with cyber threats.

Latvian Information & Communications Technology Association (LIKTA)

Latvian Information & Communications Technology Association (LIKTA)

LIKTA brings together leading Latvian companies, organizations and professionals in the field of Information & Communications Technology

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

Private Internet Access

Private Internet Access

Private Internet Access is a Virtual Private Network services provider offering secure encrypted access to the internet.

Viscount Systems

Viscount Systems

Viscount Systems is a global security software solutions company that is changing the way access control is deployed and managed in the enterprise.

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID) is the first platform in Indonesia to collect and validate reports from hackers (referred to as Bug Hunter) regarding vulnerabilities that exist in an organization.

FireCompass

FireCompass

FireCompass SAAS platform helps CISOs & Security Teams in continuous risk assessment by mapping your attack surface and knowing the “unknown unknowns”.

CYRISMA

CYRISMA

CYRISMA is a revolutionary cybersecurity platform that helps organizations manage risk without the usual headaches associated with enterprise cybersecurity tools.

SAFECode

SAFECode

SAFECode is a global industry forum where business leaders and technical experts come together to exchange insights on creating, improving, and promoting effective software security programs.

Xopero Software

Xopero Software

Xopero Software develops a comprehensive range of professional tools for protecting and restoring critical business data.

MyKRIS Asia

MyKRIS Asia

MyKRIS specialise in providing and managing Internet network services and cyber security services to enterprises.

Collabera Digital

Collabera Digital

Collabera Digital engineer the next generation of solutions that power tech-forward organizations and create an impact on people and communities.

Securin

Securin

Securin offers a comprehensive portfolio of solutions including Attack Surface Management, Vulnerability Intelligence, Penetration Testing, and Vulnerability Management.

Pvotal Technologies

Pvotal Technologies

Pvotal Technologies engineer complex, automated processes aligned with best AIOps, BizDevOps, DevSecOps, CloudOps, and ITOps practices.

Black Belt Secure

Black Belt Secure

We provide critical cybersecurity services such as managed security, ransomware mitigation, penetration testing, system auditing and compliance services to your organization.