120
CHAPTER 9
Understanding the situational awareness in cybercrimes
Marris, T., 2010. A worm in the centrifuge: an unusually sophisticated cyber-weapon is myste-
rious but important. The Economist. [online],
http://www.economist.com/node/17147818
(accessed 13.12.13).
Masi, A., 2013a. My Brief but Intriguing talk with the Syrian Electronic Army. 10th September
2013 Vocativ, [online],
https://www.vocativ.com/09-2013/my-brief-but-intriguing-conver-
sation-with-the-syrian-electronic-army/
(accessed 16.12.13).
Masi, A., 2013b. I think I pissed off a Syrian electronic army leader. Vocativ. [online],
http://
www.vocativ.com/09-2013/i-think-i-pissed-off-a-syrian-electronic-army-leader-by-asking-
him-about-ice-cream/
(accessed 13.12.13).
McAfee Centre for Strategic and International Studies, 2013. The economic impact of cyber
crime and cyber espionage. [online],
http://www.mcafee.com/uk/resources/reports/rp-
economic-impact-cybercrime.pdf
(accessed 02.02.14).
Neal, D., 2014. Syrian Electronic Army Attacks Saudi Websites. 16th January 2014 The
Inquirer. [online],
http://www.theinquirer.net/inquirer/news/2323371/syrian-electronic-
army-attacks-saudi-websites
(accessed 01.02.14).
Niccolai, J., 2000. Analyst puts hacker damage to $1.2 billion and rising. 10th February 2000
Info world. [online],
http://web.archive.org/web/20071112081103/http:/www.infoworld.
com/articles/ic/xml/00/02/10/000210icyankees.html
(accessed 13.12.13).
Rashid, F., 2013. Lessons learned from bank DDoS attacks. 9th September 2013 Bank Info
Security. [online],
http://www.bankinfosecurity.com/3-lessons-learned-from-bank-ddos-
attacks-a-6049/op-1
(accessed 13.12.13).
Rovio, 2014. Rovio does not provide end user data to government surveillance agencies. 30th
January 2014 Rovio. [online],
http://www.rovio.com/en/news/press-releases/450
(ac-
cessed 02.02.14).
Schmitt, M. (Ed.), 2013. Tallin Manual on the International Law Applicable to Cyber Warfare.
In: Cambridge University Press, Cambridge.
Schneier, B., 2013. Schneier on security: Syrian Electronic Army Cyberattacks. 3rd September
2013, [online],
https://www.schneier.com/blog/archives/2013/09/syrian_electron.html
(accessed 12.12.13).
Shoichet, C.E., 2014. Some CNN social media accounts hacked. 24th January 2014 CNN.
[online],
http://edition.cnn.com/2014/01/23/tech/cnn-accounts-hacked/
(accessed 12th
February 2014).
Tadeo, M., 2013. NatWest victim of cyber attack after site crashes for a second time. 6th
February 2013 The Independent. [online],
http://www.independent.co.uk/news/business/
news/natwest-victim-of-cyber-attack-after-site-crashes-for-the-second-time-8988811.
html
.
The EU Cybersecurity – Strategy of the Europe Union: An Open, Safe and Secure Cyberspace,
2013.
http://eeas.europa.eu/policies/eu-cyber-security/cybsec_comm_en.pdf
(accessed
24.01.14).
The UK Cyber security strategy: Protecting and promoting the UK in a digital world, 2011.
[online],
https://www.gov.uk/government/uploads/system/uploads/attachment_data/
file/60961/uk-cyber-security-strategy-final.pdf
(accessed 02.02.14).
The White House, 2009. The comprehensive National cyber security initiative. [online],
Foreign Policy. [online],
http://www.whitehouse.gov/issues/foreign-policy/cybersecurity/
national-initiative
(accessed 02.02.14).
U.S Department of Homeland Security, 2009. A roadmap for Cyber Crime Research. [online],
http://www.dhs.gov/sites/default/files/publications/CSD-DHS-Cybersecurity-Roadmap.
pdf
(accessed 02.02.14).
Do'stlaringiz bilan baham: |