Improvement of the Defense Planning and Management System to Implement ROK’s National Cybersecurity Strategy*

Yeonoh Jeong, Jin Young Choi, Seunghyun Park

    Research output: Contribution to journalArticlepeer-review

    1 Citation (Scopus)

    Abstract

    With the development of the Internet, cyberspace has expanded, which has ushered in several changes. These changes have significantly impacted the defense sector. The defense sector is changing from an existing weapon system-centered operation to a network-centered operation, and cyberspace is now recognized as the fifth strategic space, land, sea, air, and space. However, this expansion of cyberspace paradoxically increases its vulnerability to cyberattacks. Hacking groups have been causing damage through cyberattacks in many countries. Therefore, several countries are preparing countermeasures for cybersecurity at the national level. In 2019, the ROK announced its national cybersecurity strategy. However, in the case of the defense field, there are limitations in implementing the cybersecurity policy of the higher concept because it is closed and has specificity. Accordingly, this paper proposes the secure defense planning and management system (SPPBEES) so that the cybersecurity policy of the high concept is materialized as a strategy and leads to force reinforcement.

    Original languageEnglish
    Pages (from-to)337-360
    Number of pages24
    JournalKorean Journal of Defense Analysis
    Volume35
    Issue number3
    DOIs
    Publication statusPublished - 2023

    Bibliographical note

    Publisher Copyright:
    © 2023 Korea Institute for Defense Analyses.

    Keywords

    • SPPBEES
    • cybersecurity
    • cybersecurity strategy
    • defense planning
    • risk management framework

    ASJC Scopus subject areas

    • Sociology and Political Science
    • Safety Research
    • Political Science and International Relations

    Fingerprint

    Dive into the research topics of 'Improvement of the Defense Planning and Management System to Implement ROK’s National Cybersecurity Strategy*'. Together they form a unique fingerprint.

    Cite this