Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

How North Korea Conducts Cyber Operations

Автор: Cyberspatial

Загружено: 2020-09-24

Просмотров: 54520

Описание:

How could a nation like North Korea conduct an elaborate hack against Sony over "The Interview"? What about the $100 million dollar bank heist against the Central Bank of Bangladesh? In this video we cover North Korea's cyber operations and overall strategy.

Ever since the 90's, North Korea has viewed cyber warfare and a network military as a power projection tool. For years, they've sent dozens of their soldiers abroad to learn computer science and hacking. Partner countries like China or Russia, have aided them.

Additionally, North Korea organizes political structure to strategically maximize resources geared towards cyber. It's estimated that they currently have about 7,000 soldiers working in their cyber operations.

Many people have the idea that building a cyber operations group is as simple as assembling a few talented penetration testers. The truth is that it takes a lot more than this. Some key positions include:

1. Developer (engineer tool chains)
2. Operator (execute tool chains)
3. Operations System Administrator (maintain systems and networks)
4. Administrative Assistant
5. Senior Analysts (sort and analyze hacked data)
6. Junior Analysts and Translators
7. Analysis System Administrator
8. Support Engineers (write software)
9. Leadership Personnel

Approximate Cost: $2,000,000

While this may seem like a lot of money, it's a drop in the bucket for the GDP of a developed national government.

These hacking groups create shell companies and websites to recon and then attack their objectives. Kim Jung Un and his army of cyber operators, are able to achieve high-reward results with fairly low-sophisticated techniques.

00:00 Intro
00:48 Operation Blockbuster
01:17 Kim Jung Un's Hacker Army
03:57 Funding a Cyber War
05:01 Build Your Hacking Team
08:18 North Korean Spies and Hackers
10:52 Counteroffensive Cybersecurity

Resources
The All Purpose Sword: https://ccdcoe.org/uploads/2019/06/Ar...
Ignore the Penetration Testers:   / cyber-ignore-the-penetration-testers  

#Hacking #NorthKorea #Cyberspatial

How North Korea Conducts Cyber Operations

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Real Hacking: Learn The Cyber Kill Chain

Real Hacking: Learn The Cyber Kill Chain

Северная Корея и триады: гангстеры, корабли-призраки и шпионы | FT Film

Северная Корея и триады: гангстеры, корабли-призраки и шпионы | FT Film

Сигналы трейдинг📊

Сигналы трейдинг📊

Was North Korea Behind Sony’s Cyber Attack? | Cyberwar | Vice News

Was North Korea Behind Sony’s Cyber Attack? | Cyberwar | Vice News

North Korea's hackers take on cryptocurrency - The Lazarus Heist S2, Ep8 - BBC World Service podcast

North Korea's hackers take on cryptocurrency - The Lazarus Heist S2, Ep8 - BBC World Service podcast

Life Inside North Korea’s Hacker Army

Life Inside North Korea’s Hacker Army

Inside North Korea: The Cyber State | SPECIAL | National Geographic

Inside North Korea: The Cyber State | SPECIAL | National Geographic

The Geopolitics of Cybersecurity: A Conversation With Chris Inglis

The Geopolitics of Cybersecurity: A Conversation With Chris Inglis

Cyber Defense Tips to Rival the NSA

Cyber Defense Tips to Rival the NSA

Что делает Израиль таким успешным в хакерстве?

Что делает Израиль таким успешным в хакерстве?

How hackers threaten everything from your bank account to national security (2016) | Four Corners

How hackers threaten everything from your bank account to national security (2016) | Four Corners

OSINT: Sharpen Your Cyber Skills With Open-source Intelligence

OSINT: Sharpen Your Cyber Skills With Open-source Intelligence

7 самых элитных государственных хакеров

7 самых элитных государственных хакеров

i bought a DDoS attack on the DARK WEB (don't do this)

i bought a DDoS attack on the DARK WEB (don't do this)

Cyber Attacks | 60 Minutes Full Episodes

Cyber Attacks | 60 Minutes Full Episodes

Offensive Cyber Operations: Understanding Intangible Warfare, with Daniel Moore

Offensive Cyber Operations: Understanding Intangible Warfare, with Daniel Moore

Traveling through North Korea | DW Documentary

Traveling through North Korea | DW Documentary

How to Learn Cyber Security Faster In 5 Simple Steps

How to Learn Cyber Security Faster In 5 Simple Steps

The Password Manager Security Experts Use

The Password Manager Security Experts Use

Nmap Tutorial to find Network Vulnerabilities

Nmap Tutorial to find Network Vulnerabilities

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]