메뉴 건너뛰기




Volumn 30, Issue 1, 2011, Pages 28-38

Dimensions of cyber-attacks: Cultural, social, economic, and political

Author keywords

[No Author keywords available]

Indexed keywords

CYBER-ATTACKS; INFORMATION EXCHANGES; TRAUMATIC EVENTS;

EID: 79952640822     PISSN: 02780097     EISSN: None     Source Type: Journal    
DOI: 10.1109/MTS.2011.940293     Document Type: Article
Times cited : (122)

References (46)
  • 1
    • 79952639454 scopus 로고    scopus 로고
    • Security sleuths work overtime to confound Conficker
    • Mar. 30
    • R. Adhikari, "Security sleuths work overtime to confound Conficker," TechNews- World, Mar. 30, 2009; http://www.technewsworld. com/story/66666.html.
    • (2009) TechNews- World
    • Adhikari, R.1
  • 2
    • 79952653893 scopus 로고    scopus 로고
    • Belarus: A telling cyberattack
    • A. Amirzai, "Belarus: A telling cyberattack," Stratfor Global Intelligence, 2008; http://www.stratfor.com/analysis/belarus-telling- cyberattack.
    • (2008) Stratfor Global Intelligence
    • Amirzai, A.1
  • 3
    • 79952666973 scopus 로고    scopus 로고
    • Jan. 4 http://cyberstrategies.wordpress. com/2009/01/14/cyberwar-emerges- amid-theisraeli- palestinian-conflict-in-gaza/
    • M. Amona, "Cyberwar emerges amid the Israeli-Palestinian conflict in Gaza," h t t p : / /cyberstrategies.wordpress.com/, Jan. 4, 2009; http://cyberstrategies.wordpress. com/2009/01/14/cyberwar-emerges-amid- theisraeli- palestinian-conflict-in-gaza/.
    • (2009) Cyberwar Emerges Amid the Israeli-Palestinian Conflict in Gaza
    • Amona, M.1
  • 5
    • 84979212021 scopus 로고    scopus 로고
    • Cross-cultural conf lict (Conflict Resolution)
    • Oxford, U.K.: Eolss
    • K. Avruch, "Cross-cultural conf lict" (Conflict Resolution), in Encyclopedia of Life Support Systems (EOLSS). Oxford, U.K.: Eolss, 2002.
    • (2002) Encyclopedia of Life Support Systems (EOLSS)
    • Avruch, K.1
  • 6
    • 65249178821 scopus 로고    scopus 로고
    • Forensics is so 'yesterday'
    • M.A. Caloyannides, "Forensics is so 'yesterday'," IEEE Security & Privacy, vol. 7, no. 2, pp. 18-25, 2009.
    • (2009) IEEE Security & Privacy , vol.7 , Issue.2 , pp. 18-25
    • Caloyannides, M.A.1
  • 7
    • 79952684374 scopus 로고    scopus 로고
    • Japanese textbook dispute sparks cyber-attack
    • CNN, Mar. 31
    • CNN, "Japanese textbook dispute sparks cyber-attack," CNN.com, Mar. 31, 2001; http://edition.cnn.com/2001/WORLD/asiapcf/ east/03/31/japan. korea.website/index.html.
    • (2001) CNN.com
  • 8
    • 79952673264 scopus 로고    scopus 로고
    • China analysts dismiss cyberespionage claims
    • CNN
    • CNN, "China analysts dismiss cyberespionage claims," CNN.com, 2009, http:// www.cnn.com/2009/TECH/03/30/ghostnet. cyber.espionage/.
    • (2009) CNN.com
  • 9
    • 79952661393 scopus 로고    scopus 로고
    • Japan declared a cyberwar against S. Korea
    • CCRC staff, Mar. 22
    • CCRC staff, "Japan declared a cyberwar against S. Korea," Computer Crime Research Center, Mar. 22, 2005; http://www.crimeresearch. org/news/22.03.2005/1067/.
    • (2005) Computer Crime Research Center
  • 11
    • 78651111678 scopus 로고    scopus 로고
    • Coordinated Russia vs Georgia cyber-attack in progress
    • Aug. 11
    • D. Danchev, "Coordinated Russia vs Georgia cyber-attack in progress," Zero Day, Aug. 11, 2008; http://blogs.zdnet.com/ security/?p=1670.
    • (2008) Zero Day
    • Danchev, D.1
  • 13
    • 48349094169 scopus 로고    scopus 로고
    • Active Cyber-attack model for network system's vulnerability assessment
    • J. Eom, Y. Han, et al. "Active Cyber-attack model for network system's vulnerability assessment," in Proc. Int. Conf. Information Science and Security, 2008, pp. 153-158.
    • (2008) Proc. Int. Conf. Information Science and Security , pp. 153-158
    • Eom, J.1    Han, Y.2
  • 14
    • 79952682272 scopus 로고    scopus 로고
    • The art of cyber warfare, Part 1: The digital battlefield
    • J. Germain, "The art of cyber warfare, Part 1: The digital battlefield," TechNews- World, 2008; http://www.technewsworld.com/ rsstory/62779.html.
    • (2008) TechNews- World
    • Germain, J.1
  • 15
    • 79952684225 scopus 로고    scopus 로고
    • Navy aircraft not a 'spy plane,' DoD says
    • G. Gilmore, "Navy aircraft not a 'spy plane,' DoD says," American Forces Press Service, 2001, http://www.defenselink.mil/news/ newsarticle.aspx?id=45042.
    • (2001) American Forces Press Service
    • Gilmore, G.1
  • 16
    • 70549106029 scopus 로고    scopus 로고
    • Electricity grid in U.S. penetrated by spies
    • Apr. 8
    • S. Gorman, "Electricity grid in U.S. penetrated by spies," Wall Street J., Apr. 8, 2009; http://online.wsj.com/article/ SB123914805204099085. html.
    • (2009) Wall Street J
    • Gorman, S.1
  • 17
    • 0029491415 scopus 로고    scopus 로고
    • Emerging challenge: Security and safety in cyberspace
    • R. Hundley and R. Anderson, "Emerging challenge: Security and safety in cyberspace," IEEE Technology & Society Mag., vol. 14, no. 4, pp. 19-28, 1996.
    • (1996) IEEE Technology & Society Mag. , vol.14 , Issue.4 , pp. 19-28
    • Hundley, R.1    Anderson, R.2
  • 19
    • 79952671451 scopus 로고    scopus 로고
    • Globalsecurity.org
    • S. Herman, "VOA's Steve Herman reports from Tokyo," Globalsecurity.org, 2005; http:// www.globalsecurity.org/security/ library/ news/2005/01/sec-050106-3f7c3184.htm.
    • (2005) VOA's Steve Herman Reports from Tokyo
    • Herman, S.1
  • 20
    • 79952681622 scopus 로고    scopus 로고
    • Cyber-espionage moves into B2B
    • Jan. 15
    • M. Hines, "Cyber-espionage moves into B2B," InfoWorld, Jan. 15, 2008; http://www.infoworld. com/t/business/cyber-espionage-movesb2b- 546?page=0,0.
    • (2008) InfoWorld
    • Hines, M.1
  • 22
    • 79952652212 scopus 로고    scopus 로고
    • HSdailyWire.com, May 8
    • HSdailyWire.com, "Virginia medical records hijacking;" May 8, 2009; http:// homelandsecuritynewswire.com/virginiamedical- records-hijacking- update.
    • (2009) Virginia Medical Records Hijacking
  • 24
    • 49749101200 scopus 로고    scopus 로고
    • Cyberattack modeling and simulation for network security analysis
    • M.E. Kuhl, J. Kistner, et al. "Cyberattack modeling and simulation for network security analysis," in Proc. Winter Simulation Conf., 2007, pp. 1180 -1188.
    • (2007) Proc. Winter Simulation Conf , pp. 1180-1188
    • Kuhl, M.E.1    Kistner, J.2
  • 25
    • 60049085301 scopus 로고    scopus 로고
    • Cyberpandemics: History, inevitability, response
    • P. Laplante, B. Michael, and J. Voas, "Cyberpandemics: History, inevitability, response," IEEE Security & Privacy, vol. 7, no. 1, pp. 63-67, 2009.
    • (2009) IEEE Security & Privacy , vol.7 , Issue.1 , pp. 63-67
    • Laplante, P.1    Michael, B.2    Voas, J.3
  • 26
    • 79952638506 scopus 로고    scopus 로고
    • Cyber warfare seen through a mariner's spyglass
    • J. Laprise, "Cyber warfare seen through a mariner's spyglass," IEEE Technology & Society Mag., 2005.
    • (2005) IEEE Technology & Society Mag
    • Laprise, J.1
  • 27
    • 51349107350 scopus 로고    scopus 로고
    • Correlating multi-step attack and constructing attack scenarios based on attack pattern modeling
    • Z. Liu, C. Wang, and S. Chen; "Correlating multi-step attack and constructing attack scenarios based on attack pattern modeling," in Proc. Int. Conf. Information Security and Assurance, 2008, pp. 214-219.
    • (2008) Proc. Int. Conf. Information Security and Assurance , pp. 214-219
    • Liu, Z.1    Wang, C.2    Chen, S.3
  • 29
    • 79952679318 scopus 로고    scopus 로고
    • China becoming the world's malware factory
    • R. McMillan, "China becoming the world's malware factory," Network World, 2009, http:// www.networkworld.com/news /2009/032409- china-becoming-theworlds-malware.html.
    • (2009) Network World
    • McMillan, R.1
  • 32
    • 4143131906 scopus 로고    scopus 로고
    • Terrorism or civil disobedience: Toward a hacktivist ethic
    • M. Manion and A. Goodrum, "Terrorism or civil disobedience: Toward a hacktivist ethic," Computers and Society, 2000.
    • (2000) Computers and Society
    • Manion, M.1    Goodrum, A.2
  • 33
    • 79952637881 scopus 로고    scopus 로고
    • Asian countries looking to bolster cyber defenses
    • J. Miks, "Asian countries looking to bolster cyber defenses," World Politics Rev. Exclusive, 2008, http://www.worldpoliticsreview. com/articlePrint.aspx?ID=2576.
    • (2008) World Politics Rev. Exclusive
    • Miks, J.1
  • 35
    • 38549131427 scopus 로고    scopus 로고
    • A framework of attacker centric cyber attack behavior analysis
    • DOI 10.1109/ICC.2007.243, 4288914, 2007 IEEE International Conference on Communications, ICC'07
    • X. Peng and H. Zhao, "A framework of attacker centric cyber-attack behavior analysis," in Proc. IEEE Int. Conf. on Communications, 2007, pp. 1449 -1454. (Pubitemid 351145739)
    • (2007) IEEE International Conference on Communications , pp. 1449-1454
    • Peng, X.1    Zhao, H.2
  • 38
    • 79952647186 scopus 로고    scopus 로고
    • The invasion of the Chinese cyberspies
    • E. Shannon, "The invasion of the Chinese cyberspies," Time, 2005.
    • (2005) Time
    • Shannon, E.1
  • 39
    • 37249027459 scopus 로고    scopus 로고
    • IS security, trust and culture: A theoretical framework for managing IS security in multicultural settings
    • J. Slay, "IS security, trust and culture: A theoretical framework for managing IS security in multicultural settings," J. Campus-Wide Information Systems, 2003, vol. 20, no. 3, pp. 98-104.
    • (2003) J. Campus-Wide Information Systems , vol.20 , Issue.3 , pp. 98-104
    • Slay, J.1
  • 41
    • 79952680652 scopus 로고    scopus 로고
    • World Health Organization, Centers for Disease Control and Prevention June 11
    • World Health Organization, Centers for Disease Control and Prevention, "Stages of an influenza pandemic," June 11, 2009; https:// www.health.harvard.edu/flu-resource-center/ stages-of-an-influenza-pandemic.htm.
    • (2009) Stages of an influenza pandemic
  • 43
    • 79952641412 scopus 로고    scopus 로고
    • Symantec.com
    • Symantec.com, "Symantec's Internet Security Threat Report," vol. XII, 2007, vol. XIII, 2008; http://www.symantec.com/business/ theme.jsp?themeid=threatreport.
    • (2007) Symantec's Internet Security Threat Report , vol.12-13 , pp. 2008
  • 44
    • 79952645759 scopus 로고    scopus 로고
    • Symantec Security Response W95 CIH accessed Feb.
    • Symantec Security Response, W95 CIH," accessed Feb. 2010; http://www.symantec. com/security-response/writeup. jsp?docid=2000-122010-2655- 99.
    • (2010)
  • 46
    • 84960203883 scopus 로고    scopus 로고
    • Exchange of 'cyberfire' during the Malaysia-Indonesia Ambalat Dispute: A lesson for the future
    • M. Zubir, "Exchange of 'cyberfire' during the Malaysia-Indonesia Ambalat Dispute: A lesson for the future," Centre for Maritime Security and Diplomacy, MIMA, 2005.
    • (2005) Centre for Maritime Security and Diplomacy, MIMA
    • Zubir, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.