메뉴 건너뛰기




Volumn 11, Issue 3, 2009, Pages 14-21

Cyberattacks: Why, what, who, and how

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK PATTERNS; BUSINESS OPERATION; CYBER SECURITY; CYBER-ATTACKS;

EID: 67649651686     PISSN: 15209202     EISSN: None     Source Type: Journal    
DOI: 10.1109/MITP.2009.46     Document Type: Article
Times cited : (21)

References (15)
  • 3
    • 84869333054 scopus 로고    scopus 로고
    • SANS Inst
    • M. Poulin, Hacking: The Basics, SANS Inst., 2006; www.sans.org/reading-room/whitepapers/hackers/955.php.
    • (2006) Hacking: The Basics
    • Poulin, M.1
  • 5
    • 84869284523 scopus 로고    scopus 로고
    • National Information Assurance Glossary, June 2006;
    • National Information Assurance Glossary, CNSSI-4009, Committee on Nat'l Security Systems, June 2006; www.cnss.gov/Assets/pdf/cnssi-4009.pdf.
    • CNSSI-4009, Committee on Nat'l Security Systems
  • 7
    • 67649640510 scopus 로고    scopus 로고
    • US Nat'l Inst. Standards and Tech
    • R. Kissel, Glossary of Key Information Security Terms, N I S T IR 7298, US Nat'l Inst. Standards and Tech., 2006; http://csrc.nist.gov/ publications/nistir/NISTIR-298-Glossary-Key-Infor-Security-Terms.pdf.
    • (2006) Glossary of Key Information Security Terms, N I S T IR , pp. 7298
    • Kissel, R.1
  • 11
    • 77957029225 scopus 로고    scopus 로고
    • Technology Assessment: Cybersecurity for Critical Infrastructure Protection
    • GAO-04-0321, US Government Accountability Office, 2004;
    • Technology Assessment: Cybersecurity for Critical Infrastructure Protection, tech. report GAO-04-0321, US Government Accountability Office, 2004; www.gao. gov/new.items/d04321.pdf.
    • tech. report
  • 12
    • 84869284606 scopus 로고    scopus 로고
    • Eight Faces of a Hacker,
    • 29 Mar. 2007;
    • T. Wilson, "Eight Faces of a Hacker, " Information Week, 29 Mar. 2007; www.darkreading.com/document.asp?doc-id=120800&page-number=1, 29.
    • Information Week , pp. 29
    • Wilson, T.1
  • 13
    • 67649648787 scopus 로고    scopus 로고
    • M. Shepherd, Windows Security Patch Management Case Study: Using Software Update Services to Deploy Critical Windows Updates, SANS Inst., 2005; www.sans.org/reading-room/whitepapers/windows/windows-security- patch-management-case-study-using-software-update-services-to-deploy-critical- windows-updates-1588.
    • M. Shepherd, "Windows Security Patch Management Case Study: Using Software Update Services to Deploy Critical Windows Updates, " SANS Inst., 2005; www.sans.org/reading-room/whitepapers/windows/windows-security- patch-management-case-study-using-software-update-services-to-deploy-critical- windows-updates-1588.
  • 14
    • 0041347756 scopus 로고    scopus 로고
    • Specifying and Enforcing Application-Level Web Security Policies
    • D. Scott and R. Sharp, "Specifying and Enforcing Application-Level Web Security Policies, " IEEE Trans. Knowledge and Data Eng., vol. 15, no. 4, 2003, pp. 771-783.
    • (2003) IEEE Trans. Knowledge and Data Eng , vol.15 , Issue.4 , pp. 771-783
    • Scott, D.1    Sharp, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.