Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet127/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   123   124   125   126   127   128   129   130   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

119
 
References
Calce, M., 2008. Mafiaboy: How I Cracked the Internet and why it's Still Broken. Penguin 
Group, Toronto.
Cherry, S., 2010. How Stuxnet is rewriting the terrorism playbook. IEEE Spectrum. [online], 
http://
spectrum.ieee.org/podcast/telecom/security/how-stuxnet-is-rewriting-the-cyberterrorism-
playbook
(accessed 13.12.13).
Federal Bureau of Investigation, 2013. FBI Cyber Division advisory: Syrian Electronic Army 
targeting social media. 5th September 2013. [online], 
http://publicintelligence.net/fbi-sea/
(accessed 12.01.14).
Fildes, J., 2010. Stuxnet worm ‘targeted high value Iranian assets’ 23rd September 2010. 
BBC. [online], 
http://www.bbc.co.uk/news/technology-11388018
(accessed 02.02.14).
Genosko, G., 2006. The case of ‘Mafiaboy’ and the rhetorical limits of hacktivism. The fibrecul-
ture J. (Issue 9). [online], 
http://nine.fibreculturejournal.org/fcj-057/
 (accessed 13.12.13).
Government of Canada, 2010. Canada's cyber security strategy: for a stronger and more pros-
perous Canada. [online], 
http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/
cbr-scrt-strtgy-eng.pdf
 (accessed 02.02.14).
Halliday, J., 2010. Stuxnet worm is the ‘work of a national government agency’ 24th September 
2010. The Guardian. [online], 
http://www.theguardian.com/technology/2010/sep/24/stux-
net-worm-national-agency
 (accessed 13.12.13).
Hanley Frank, B., 2014. Syrian Electronic Army may have stolen government data requests 
Microsoft says. 26th January 2014 Geekwire. [online], 
http://www.geekwire.com/2014/
syrian-electronic-army-may-stolen-govt-data-requests-microsoft-says/
(accessed 
27.01.14).
Howard, J.D., Longstaff, T.A., 1998. A common language for computer security incidents. 
Technical report, Sandia National Laboratories.
Infosecurity, 2013. A Q&A with MafiaBoy. 3rd September 2013, Infosecurity magazine. [online], 
http://www.infosecurity-magazine.com/view/34309/a-qa-with-mafiaboy/
 (accessed 13.12.13).
Internet Crime Complaint Centre, 2012. Internet crime report. [online], 
http://www.ic3.gov/
media/annualreport/2012_IC3Report.pdf
 (accessed 03.01.14).
Kaplan, D., 2008. DDoS hack attack targets church of scientology. 25th January 2008 SC 
magazine. [online], 
http://www.scmagazine.com/ddos-hack-attack-targets-church-of-sci-
entology/article/104588/
 (accessed 13.12.13).
Kelly, B., 2009. Investing in a centralized cybersecurity infrastructure: why “hacktivism” 
can and should influence cybersecurity reform. PhD Boston University School of Law. 
[online], 
http://www.bu.edu/law/central/jd/organizations/journals/bulr/volume92n4/docu-
ments/KELLY.pdf
 (accessed 12.02.14).
Keys, M., 2013. A live conversation with the Syrian Electronic Army. 11th December 2013 
The Desk: Journalism and Social Media by Matthew Keys. [online], 
http://thedesk.mat-
thewkeys.net/2013/12/11/a-live-conversation-with-the-syrian-electronic-army/
 (accessed 
14.01.14).
Langner, R., 2011. Cracking Stuxnet, a 21st Century Cyber Weapon. Ted. [online], 
http://
www.ted.com/talks/ralph_langner_cracking_stuxnet_a_21st_century_cyberweapon.html
.
Lough, D.L., 2001. A taxonomy of computer attacks with applications to wireless networks. 
PhD thesis Virginia Polytechnic Institute and State University.
Marcus, D., Sherstobitoff, R., 2012. Dissecting Operation High Roller. White Paper. [online],
http://www.mcafee.com/uk/resources/reports/rp-operation-high-roller.pdf
 (accessed 13.12.13).
Markoff, J., 2010. A silent attack but not a subtle one. 26th September 2010 New York Times. 
[online], 
http://www.nytimes.com/2010/09/27/technology/27virus.html?_r=2&
 (accessed 
13.12.13).



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   123   124   125   126   127   128   129   130   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish