119
References
Calce, M., 2008. Mafiaboy: How I Cracked the Internet and why it's Still Broken. Penguin
Group, Toronto.
Cherry, S., 2010. How Stuxnet is rewriting the terrorism playbook. IEEE Spectrum. [online],
http://
spectrum.ieee.org/podcast/telecom/security/how-stuxnet-is-rewriting-the-cyberterrorism-
playbook
(accessed 13.12.13).
Federal Bureau of Investigation, 2013. FBI Cyber Division advisory: Syrian Electronic Army
targeting social media. 5th September 2013. [online],
http://publicintelligence.net/fbi-sea/
(accessed 12.01.14).
Fildes, J., 2010. Stuxnet worm ‘targeted high value Iranian assets’ 23rd September 2010.
BBC. [online],
http://www.bbc.co.uk/news/technology-11388018
(accessed 02.02.14).
Genosko, G., 2006. The case of ‘Mafiaboy’ and the rhetorical limits of hacktivism. The fibrecul-
ture J. (Issue 9). [online],
http://nine.fibreculturejournal.org/fcj-057/
(accessed 13.12.13).
Government of Canada, 2010. Canada's cyber security strategy: for a stronger and more pros-
perous Canada. [online],
http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/
cbr-scrt-strtgy-eng.pdf
(accessed 02.02.14).
Halliday, J., 2010. Stuxnet worm is the ‘work of a national government agency’ 24th September
2010. The Guardian. [online],
http://www.theguardian.com/technology/2010/sep/24/stux-
net-worm-national-agency
(accessed 13.12.13).
Hanley Frank, B., 2014. Syrian Electronic Army may have stolen government data requests
Microsoft says. 26th January 2014 Geekwire. [online],
http://www.geekwire.com/2014/
syrian-electronic-army-may-stolen-govt-data-requests-microsoft-says/
(accessed
27.01.14).
Howard, J.D., Longstaff, T.A., 1998. A common language for computer security incidents.
Technical report, Sandia National Laboratories.
Infosecurity, 2013. A Q&A with MafiaBoy. 3rd September 2013, Infosecurity magazine. [online],
http://www.infosecurity-magazine.com/view/34309/a-qa-with-mafiaboy/
(accessed 13.12.13).
Internet Crime Complaint Centre, 2012. Internet crime report. [online],
http://www.ic3.gov/
media/annualreport/2012_IC3Report.pdf
(accessed 03.01.14).
Kaplan, D., 2008. DDoS hack attack targets church of scientology. 25th January 2008 SC
magazine. [online],
http://www.scmagazine.com/ddos-hack-attack-targets-church-of-sci-
entology/article/104588/
(accessed 13.12.13).
Kelly, B., 2009. Investing in a centralized cybersecurity infrastructure: why “hacktivism”
can and should influence cybersecurity reform. PhD Boston University School of Law.
[online],
http://www.bu.edu/law/central/jd/organizations/journals/bulr/volume92n4/docu-
ments/KELLY.pdf
(accessed 12.02.14).
Keys, M., 2013. A live conversation with the Syrian Electronic Army. 11th December 2013
The Desk: Journalism and Social Media by Matthew Keys. [online],
http://thedesk.mat-
thewkeys.net/2013/12/11/a-live-conversation-with-the-syrian-electronic-army/
(accessed
14.01.14).
Langner, R., 2011. Cracking Stuxnet, a 21st Century Cyber Weapon. Ted. [online],
http://
www.ted.com/talks/ralph_langner_cracking_stuxnet_a_21st_century_cyberweapon.html
.
Lough, D.L., 2001. A taxonomy of computer attacks with applications to wireless networks.
PhD thesis Virginia Polytechnic Institute and State University.
Marcus, D., Sherstobitoff, R., 2012. Dissecting Operation High Roller. White Paper. [online],
http://www.mcafee.com/uk/resources/reports/rp-operation-high-roller.pdf
(accessed 13.12.13).
Markoff, J., 2010. A silent attack but not a subtle one. 26th September 2010 New York Times.
[online],
http://www.nytimes.com/2010/09/27/technology/27virus.html?_r=2&
(accessed
13.12.13).
Do'stlaringiz bilan baham: |