메뉴 건너뛰기




Volumn 22, Issue 3, 2009, Pages 261-271

Cybercrimes against critical infrastructures: A study of online criminal organization and techniques

Author keywords

Critical infrastructure; Cybercrime typology; Cyberterrorism; DDoS; Hacker taxonomy; SCADA systems

Indexed keywords


EID: 75249091463     PISSN: 1478601X     EISSN: 14786028     Source Type: Journal    
DOI: 10.1080/14786010903166965     Document Type: Article
Times cited : (21)

References (39)
  • 1
    • 75249095435 scopus 로고    scopus 로고
    • Retrieved November 20, 2008, from
    • Baker, G. (2008). Schoolboy hacks into city's tram system. Retrieved November 20, 2008, from http://www.telegraph.co.uk/news/worldnews/1575293/Schoolboy-hacks-into-city's-tram-system.html.
    • (2008) Schoolboy Hacks into City's Tram System
    • Baker, G.1
  • 5
    • 75249088213 scopus 로고    scopus 로고
    • Retrieved February 2, 2009, from
    • Bradbury, D. (2009). The fog of cyberwar. Retrieved February 2, 2009, from http://www.guardian.co.uk/technology/2009/feb/05/kyrgyzstan-cyberattack-internet-access.
    • (2009) The Fog of Cyberwar
    • Bradbury, D.1
  • 7
    • 35348847240 scopus 로고    scopus 로고
    • Organized cybercrime? How cyberspace may affect the structure of criminal relationships
    • Brenner, S.W. (2002). Organized cybercrime? How cyberspace may affect the structure of criminal relationships. North Carolina Journal of Law & Technology, 4(1), 1-41.
    • (2002) North Carolina Journal of Law & Technology , vol.4 , Issue.1 , pp. 1-41
    • Brenner, S.W.1
  • 9
    • 75249107085 scopus 로고    scopus 로고
    • Council of Europe, Retrieved October 15, 2005, from
    • Council of Europe. (2004). Summary of the Organized Crime Situation Report 2004: Focus on the threat of cybercrime. Retrieved October 15, 2005, from http://www.coe.int/T/E/Legal_affairs/Legal_cooperation/Combating_economic_crime/Organised_crime/Documents/OrgCrimeRep2004Summ.pdf.
    • (2004) Summary of the Organized Crime Situation Report 2004: Focus On The Threat of Cybercrime
  • 10
    • 75249104831 scopus 로고    scopus 로고
    • Retrieved November 20, 2008, from
    • Crawford, M. (2006). Utility hack led to security overhaul. Retrieved November 20, 2008, from http://www.computerworld.com/securitytopics/security/story/0,10801,108735,00.html.
    • (2006) Utility Hack Led to Security Overhaul
    • Crawford, M.1
  • 11
    • 75249107885 scopus 로고    scopus 로고
    • DarkAge, Retrieved March 23, 2008, from
    • DarkAge. (n.d). Toolkit. Retrieved March 23, 2008, from http://www.darkage.co.uk/rpg/computers/toolkit.htm.
    • Toolkit
  • 13
    • 63349101242 scopus 로고    scopus 로고
    • Battling botnets and online mobs: Estonia's defense efforts during the Internet war
    • Evron, G. (2008, Winter/Spring). Battling botnets and online mobs: Estonia's defense efforts during the Internet war. Science & Technology, 121-126.
    • (2008) Science & Technology , Issue.Winter-Spring , pp. 121-126
    • Evron, G.1
  • 14
    • 3943076566 scopus 로고    scopus 로고
    • Cyberterrorism, computer crime, and reality
    • Foltz, C.B. (2004). Cyberterrorism, computer crime, and reality. Information Management & Computer Security, 12(2), 154-166.
    • (2004) Information Management & Computer Security , vol.12 , Issue.2 , pp. 154-166
    • Foltz, C.B.1
  • 15
    • 84937344840 scopus 로고    scopus 로고
    • Transnational organized crime: A European perspective
    • Jamieson, A. (2001). Transnational organized crime: A European perspective. Studies in Conflict and Terrorism, 24(5), 377-387.
    • (2001) Studies in Conflict and Terrorism , vol.24 , Issue.5 , pp. 377-387
    • Jamieson, A.1
  • 16
    • 75249106370 scopus 로고    scopus 로고
    • Retrieved February 8, 2009, from
    • Keizer, G. (2009). Russian 'cybermilitia' knocks Kyrgyzstan offline. Retrieved February 8, 2009, from http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9126947&intsrc=news_ts_head.
    • (2009) Russian 'cybermilitia' Knocks Kyrgyzstan Offline
    • Keizer, G.1
  • 17
    • 75249086744 scopus 로고    scopus 로고
    • Cyber terror: Missing in action
    • In D. Clarke (Ed.), New Brunswick, NJ: Transaction
    • Lewis, J. (2004). Cyber terror: Missing in action. In D. Clarke (Ed.), Technology and terrorism (pp. 145-153). New Brunswick, NJ: Transaction.
    • (2004) Technology and Terrorism , pp. 145-153
    • Lewis, J.1
  • 18
    • 75249087555 scopus 로고    scopus 로고
    • Retrieved November 21, 2008, from
    • Markoff, J. (2008). Before the gunfire, cyberattacks. Retrieved November 21, 2008, from http://www.nytimes.com/2008/08/13/technology/13cyber.html?_r=1&ref=europe&pagewanted=print.
    • (2008) Before the Gunfire, Cyberattacks
    • Markoff, J.1
  • 20
    • 75249095299 scopus 로고    scopus 로고
    • McAfee, Retrieved November 3, 2007, from
    • McAfee. (2006). Rootkits, Part 1 of 3: The growing threat. Retrieved November 3, 2007, from http://www.mcafee.com/us/local_content/white_papers/threat_center/wp_akapoor_rootkits1_en.pdf.
    • (2006) Rootkits, Part 1 of 3: The Growing Threat
  • 24
    • 75249093767 scopus 로고    scopus 로고
    • Cyberextortion: An overview of distributed denial of service attacks against online gaming companies
    • Paulson, R.A., & Weber, J.E. (2006). Cyberextortion: An overview of distributed denial of service attacks against online gaming companies. Issues in Information Systems, 7(2), 52-56.
    • (2006) Issues in Information Systems , vol.7 , Issue.2 , pp. 52-56
    • Paulson, R.A.1    Weber, J.E.2
  • 25
    • 75149197559 scopus 로고    scopus 로고
    • Bureau of Justice Statistics. Retrieved February 19, 2009, from
    • Rantala, R. (2008). Cybercrimes against businesses, 2005. Bureau of Justice Statistics. Retrieved February 19, 2009, from http://www.ojp.usdoj.gov/bjs/pub/pdf/cb05.pdf.
    • (2008) Cybercrimes Against Businesses, 2005
    • Rantala, R.1
  • 26
    • 12344298391 scopus 로고    scopus 로고
    • Modeling and simulating critical infrastructures and their interdependencies
    • Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 2
    • Rinaldi, S. (2004). Modeling and simulating critical infrastructures and their interdependencies. Hawaii International Conference on System Sciences (Vol. 2, No. 2, p. 20054a), Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 2.
    • (2004) Hawaii International Conference On System Sciences , vol.2 , Issue.2
    • Rinaldi, S.1
  • 30
    • 85044794413 scopus 로고    scopus 로고
    • Transnational terror and organized crime: Blurring the lines
    • Sanderson, T. (2004). Transnational terror and organized crime: Blurring the lines. SAIS Review, 24(1), 49-61.
    • (2004) SAIS Review , vol.24 , Issue.1 , pp. 49-61
    • Sanderson, T.1
  • 31
    • 0040146085 scopus 로고    scopus 로고
    • Links between transnational organized crime and terrorist crimes
    • Schmid, A. (1996). Links between transnational organized crime and terrorist crimes. Transnational Organized Crime, 2(4), 40-82.
    • (1996) Transnational Organized Crime , vol.2 , Issue.4 , pp. 40-82
    • Schmid, A.1
  • 33
    • 75249100844 scopus 로고    scopus 로고
    • Symantec, Retrieved November 3, 2007, from
    • Symantec. (2000). Learn more about viruses and worms. Retrieved November 3, 2007, from http://www.symantec.com/avcenter/reference/worm.vs.virus.pdf.
    • (2000) Learn More About Viruses and Worms
  • 34
    • 51249108585 scopus 로고    scopus 로고
    • Symantec, Retrieved October 31, 2007, from
    • Symantec. (2007a). Symantec Internet Security Threat Report: Trends for January-June 2007. Retrieved October 31, 2007, from http://eval.symantec.com/mktginfo/enterprise/white_papers/ent_whitepaper_internet_security_threat_resport_xii_09_2007.en-us.pdf.
    • (2007) Symantec Internet Security Threat Report: Trends for January-June 2007
  • 35
    • 75249089961 scopus 로고    scopus 로고
    • Symantec, Retrieved July 3, 2007, from
    • Symantec. (2007b). What is cybercrime? Retrieved July 3, 2007, from http://www.symantec.com/avcenter/cybercrime/index_page2.html.
    • (2007) What is Cybercrime?
  • 37
    • 75249085132 scopus 로고    scopus 로고
    • Retrieved November 20, 2008, from
    • Thomson, I. (2008). LA engineers admit traffic-light hack. Retrieved November 20, 2008, from http://uk.news.yahoo.com/16/20081112/ttc-la-engineers-admit-traffic-light-hac-6315470.html.
    • (2008) La Engineers Admit Traffic-light Hack
    • Thomson, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.