-
1
-
-
84876045112
-
Cyber Threats to Energy Security, as Experienced by Saudi Arabia
-
note
-
John Roberts, 'Cyber Threats to Energy Security, as Experienced by Saudi Arabia', Platts, 27 November 2012, http://blogs.platts. com/2012/11/27/virus_threats/.
-
(2012)
Platts
-
-
Roberts, J.1
-
3
-
-
80052333860
-
A Crude Threat: The Limits of an Iranian Missile Campaign against Saudi Arabian Oil
-
note
-
Joshua R. Itzkowitz Shifrinson and Miranda Priebe, 'A Crude Threat: The Limits of an Iranian Missile Campaign against Saudi Arabian Oil', International Security, vol. 36, no. 1, Summer 2011, pp. 167-201.
-
(2011)
International Security
, vol.36
, Issue.1
, pp. 167-201
-
-
Joshua, R.1
Shifrinson, I.2
Priebe, M.3
-
8
-
-
84876046044
-
Barack Obama "Ordered Stuxnet Cyber Attack on Iran"
-
note
-
Christopher Williams, 'Barack Obama "Ordered Stuxnet Cyber Attack on Iran"', Daily Telegraph, 1 June 2012.
-
(2012)
Daily Telegraph
-
-
Williams, C.1
-
10
-
-
79251638534
-
Stuxnet Malware is "Weapon" Out to Destroy... Iran's Bushehr Nuclear Plant?
-
note
-
Mark Clayton, 'Stuxnet Malware is "Weapon" Out to Destroy... Iran's Bushehr Nuclear Plant?', Christian Science Monitor, 21 September 2010, http://www. csmonitor.com/USA/2010/0921/ Stuxnet-malware-is-weapon-out-todestroy-Iran-s-Bushehr-nuclear-plant. See also Ralph Langner, Robust Control System Networks: How to Achieve Reliable Control After Stuxnet (New York: Momentum Press, 2011).
-
(2010)
Christian Science Monitor
-
-
Clayton, M.1
-
12
-
-
84867287800
-
Mutually Assured Cyberdestruction?
-
note
-
David E. Sanger, 'Mutually Assured Cyberdestruction?', New York Times, 2 June 2012, http://www.nytimes. com/2012/06/03/sunday-review/mutually-assured-cyberdestruction.html.
-
(2012)
New York Times
-
-
Sanger, D.E.1
-
13
-
-
84867287800
-
Mutually Assured Cyberdestruction?
-
note
-
David E. Sanger, 'Mutually Assured Cyberdestruction?', New York Times, 2 June 2012, http://www.nytimes. com/2012/06/03/sunday-review/mutually-assured-cyberdestruction.html.
-
(2012)
New York Times
-
-
Sanger, D.E.1
-
14
-
-
84867287800
-
Mutually Assured Cyberdestruction?
-
note
-
David E. Sanger, 'Mutually Assured Cyberdestruction?', New York Times, 2 June 2012, http://www.nytimes. com/2012/06/03/sunday-review/mutually-assured-cyberdestruction.html.
-
(2012)
New York Times
-
-
Sanger, D.E.1
-
15
-
-
84876048751
-
-
note
-
Flame's discovery was jointly announced by Kaspersky, CrySyS and the Iran Computer Emergency Response Team; the International Telecommunications Union apparently having facilitated Iranian cooperation with European malware analysis experts. sKyWIper Analysis Team, sKyWIper (a.k.a. Flame a.k.a. Flamer): A Complex Malware for Targeted Attacks (v. 1.05), Laboratory of Cryptography and System Security, Budapest University of Technology and Economics, 31 May 2012.
-
(2012)
SKyWIper (a.k.a. Flame a.k.a. Flamer): A Complex Malware for Targeted Attacks
-
-
-
16
-
-
85050525488
-
Iran's Discovery of Flame Malware Turning into Political Hot Potato
-
note
-
See Ellen Messmer, 'Iran's Discovery of Flame Malware Turning into Political Hot Potato', Network World, 30 May 2012, http://www. networkworld.com/news/2012/053012-iran-flame-malware-259708.html.
-
(2012)
Network World
-
-
Messmer, E.1
-
17
-
-
84876066496
-
Iran CERT Fingers Flame for Oil Refinery Attacks
-
note
-
Darren Pauli, 'Iran CERT Fingers Flame for Oil Refinery Attacks', SC Magazine, 30 May 2012, http://www. scmagazine.com.au/Tools/Print. aspx?CIID=302718.
-
(2012)
SC Magazine
-
-
Pauli, D.1
-
18
-
-
84876043077
-
-
note
-
'Neuer Angriff mit Stuxnet', Neue Zürcher Zeitung, 25 December 2012, http://www. nzz.ch/aktuell/international/ iran-meldet-neuen-angriff-mit-computervirus-stuxnet-1.17909054.
-
(2012)
Neuer Angriff mit Stuxnet
-
-
-
19
-
-
84876035561
-
Stuxnet Shut Down by Its Own Kill Switch
-
note
-
William Jackson, 'Stuxnet Shut Down by Its Own Kill Switch', GCN, 26 June 2012, http://gcn.com/ articles/2012/06/26/stuxnet-demiseexpiration-date.aspx
-
(2012)
GCN
-
-
Jackson, W.1
-
20
-
-
84876031501
-
Strategic Comments
-
note
-
'Stuxnet: Targeting Iran's Nuclear Programme', Strategic Comments, vol. 17, comment 6, February 2011.
-
(2011)
, vol.17
-
-
-
21
-
-
84876018237
-
Oil and Gas Giant Considers Petascale Supercomputer
-
note
-
'Oil and Gas Giant Considers Petascale Supercomputer', HPCwire, 11 July 2011, http://www.hpcwire. com/hpcwire/2011-07-11/ oil_and_gas_giant_considers_petascale_ supercomputer.html. Tiffany Trader, 'Cloudnumbers Expedites Cloud-Based Supercomputing', HPC in the Cloud, 14 February 2012, http://www.hpcinthecloud. com/hpccloud/2012-02-14/ cloudnumbers_expedites_cloudbased_ supercomputing.html.
-
(2011)
HPCwire
-
-
-
24
-
-
84876060933
-
Cybersecurity Issues and Policy Options for the U.S. Energy Industry
-
note
-
Cyber security issues of greatest concern to the oil and gas industry are likely to be: theft of intellectual property; cyber espionage aimed at short-term decision-making; and deletion of production and refinement data. See Chris Bronk and Adam Pridgen, Cybersecurity Issues and Policy Options for the U.S. Energy Industry, Baker Institute Policy Report #53, Baker Institute for Public Policy, September 2012.
-
(2012)
Baker Institute Policy Report #53
-
-
-
26
-
-
84876042688
-
Connecting the Dots After Cyber attack on Saudi Aramco
-
note
-
Nicole Perlroth, 'Connecting the Dots After Cyber attack on Saudi Aramco', New York Times, 27 August 2012, http:// bits.blogs.nytimes.com/2012/08/27/ connecting-the-dots-after-cyber attack-on-saudi-aramco/.
-
(2012)
New York Times
-
-
Perlroth, N.1
-
27
-
-
84876029722
-
Was Iran Responsible for Saudi Aramco's Network Attack?
-
note
-
'Was Iran Responsible for Saudi Aramco's Network Attack?', Digital Dao, 22 August 2012, http://jeffreycarr. blogspot.com/2012/08/was-iranresponsible-for-saudi-aramcos.html.
-
(2012)
Digital Dao
-
-
-
29
-
-
84876029850
-
Shamoon, a Two-stage Targeted Attack
-
note
-
'Shamoon, a Two-stage Targeted Attack', Seculert Blog, 16 August 2012, http://blog.seculert.com/2012/08/shamoon-two-stage-targeted-attack.html.
-
(2012)
Seculert Blog
-
-
-
31
-
-
84876015738
-
Saudi Aramco Repairs Damage from computer attack
-
note
-
'Saudi Aramco Repairs Damage from computer attack', Al Arabiya News, 26 August 2012, available at http://english.alarabiya.net/articles/ 2012/08/26/234372.html.
-
(2012)
Al Arabiya News
-
-
-
32
-
-
84876065853
-
Saudi Aramco Investigating Origins of "Shamoon" Virus Following Attack
-
note
-
'Saudi Aramco Investigating Origins of "Shamoon" Virus Following Attack', Al Arabiya News, 26 August 2012, http://english.alarabiya.net/ articles/2012/09/12/237530.html.
-
(2012)
Al Arabiya News
-
-
-
36
-
-
84876062226
-
The Shamoon Attacks
-
note
-
'The Shamoon Attacks', Symantec, 16 August 2012, http://www.symantec. com/connect/blogs/shamoon-attacks.
-
(2012)
Symantec
-
-
-
37
-
-
84876062467
-
-
note
-
The Cutting Sword of Justice's full attribution is available at http://pastebin. com/HqAgaQRj.
-
-
-
-
38
-
-
84876050859
-
Daily Report: How Aramco Got Hacked
-
note
-
'Daily Report: How Aramco Got Hacked', New York Times, 24 October 2012, http://bits. blogs.nytimes.com/2012/10/24/ daily-report-how-aramco-got-hacked/.
-
(2012)
New York Times
-
-
-
39
-
-
84876058378
-
Clapper Sounds Alarm on Cyber Capabilities of Iran, China and Russia
-
note
-
David Perera, 'Clapper Sounds Alarm on Cyber Capabilities of Iran, China and Russia', FierceGovernmentIT, 1 February 2012, http://www. fiercegovernmentit.com/story/ clapper-sounds-alarm-cyber-capabilities-iran-china-and-russia/2012-02-01; 'US General Warns Over Iranian Cyber-Soldiers', BBC News, 18 January 2013, http://www.bbc.co.uk/ news/technology-21075781.
-
(2012)
FierceGovernmentIT
-
-
Perera, D.1
-
40
-
-
84876046243
-
US General Warns Over Iranian Cyber-Soldiers
-
note
-
'US General Warns Over Iranian Cyber-Soldiers', BBC News, 18 January 2013, http://www.bbc.co.uk/ news/technology-21075781.
-
(2013)
BBC News
-
-
-
41
-
-
84876044544
-
US says Iran Behind Cyber Attack in Saudi Arabia
-
note
-
'US says Iran Behind Cyber Attack in Saudi Arabia', Al Arabiya News, 13 October 2012, http://english.alarabiya. net/articles/2012/10/13/243475.html.
-
(2012)
Al Arabiya News
-
-
-
42
-
-
84876037504
-
The Oil and Gas Industry
-
note
-
Fareed Mohamedi, 'The Oil and Gas Industry', Iran Primer, United States Institute for Peace, 2010, http://iranprimer.usip.org/resource/ oil-and-gas-industry.
-
(2010)
Iran Primer
-
-
Mohamedi, F.1
-
44
-
-
84876034320
-
Iran Denies U.S. Claims it was Behind Persian Gulf Cyber Attacks
-
note
-
'Iran Denies U.S. Claims it was Behind Persian Gulf Cyber Attacks', Tehran Times, 14 October 2012, http://www. tehrantimes.com/politics/102372-irandenies-us-claims-it-was-behind-persian-gulf-cyber-attacks.
-
(2012)
Tehran Times
-
-
-
46
-
-
84876032674
-
Symantec 2010 Critical Infrastructure Protection Study
-
note
-
'Symantec 2010 Critical Infrastructure Protection Study', Symantec, October 2010, http://www.symantec.com/ content/en/us/about/presskits/ Symantec_2010_CIP_ Study_Global_Data.pdf.
-
(2010)
Symantec
-
-
-
47
-
-
84876033366
-
-
note
-
According to Article 2(a) of Directive 2008/114/EC, '"critical infrastructure" means an asset, system or part thereof located in Member States which is essential for the maintenance of vital societal functions, health, safety, security, economic or social wellbeing of people, and the disruption or destruction of which would have a significant impact in a Member State as a result of the failure to maintain those functions'. Http://eur-lex.europa.eu/ LexUriServ/LexUriServ.do?uri=OJ:L:2 008:345:0075:0082:EN:PDF; according to 42 USC 5195c.(e), '"critical infrastructure" means systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters'. http://www.gpo. gov/fdsys/pkg/USCODE-2010-title42/ pdf/USCODE-2010-title42-chap68-subchapIV-B-sec5195c.pdf.
-
-
-
-
48
-
-
84876027228
-
A Governance Switchboard: Scalability Issues in International Cyber Policymaking
-
note
-
Christopher Bronk, 'A Governance Switchboard: Scalability Issues in International Cyber Policymaking', Cyber Dialogue 2012: What is Stewardship in Cyberspace? University of Toronto, March 2012, http:// bakerinstitute.org/publications/ITPpub-BronkCyberDialogue2012-031312. pdf.
-
(2012)
Cyber Dialogue
-
-
Bronk, C.1
-
49
-
-
84876051863
-
-
note
-
UN Resolution A/RES/58/199: Creation of a Global Culture of Cybersecurity and the Protection of Critical Information Infrastructures, 30 January 2004, http://www.itu.int/ ITU-D/cyb/cybersecurity/docs/UN_ resolution_58_199.pdf.
-
(2004)
-
-
-
50
-
-
84876067991
-
-
note
-
EU Council Directive 2008/114/EC: On the Identification and Designation of European Critical Infrastructures and the Assessment of the Need to Improve their Protection, 23 December 2008, http://eur-lex.europa.eu/ LexUriServ/LexUriServ.do?uri=OJ:L:2 008:345:0075:0082:EN:PDF. See also 162 CDS 07 E rev 1: The Protection Of Critical Infrastructures, NATO Parliamentary Assembly, available at http://www.nato-pa.int/ Default.asp?SHORTCUT=1165.
-
(2008)
-
-
-
51
-
-
84876028025
-
Saudi Aramco Restores Network After Shamoon Malware Attack
-
note
-
Mathew J. Schwartz, 'Saudi Aramco Restores Network After Shamoon Malware Attack', InformationWeek, 27 August 2012, http://www.informationweek. com/security/attacks/ saudi-aramco-restores-network-aftersham/ 240006278.
-
(2012)
InformationWeek
-
-
Schwartz, M.J.1
-
52
-
-
84876066527
-
Banks Seek NSA Help Amid Attacks on their Computer Systems
-
note
-
Ellen Nakashima, 'Banks Seek NSA Help Amid Attacks on their Computer Systems', Washington Post, 11 January 2013, http://articles. washingtonpost.com/2013-01-11/ world/36272281_1_banks-ddos-nsa.
-
(2013)
Washington Post
-
-
Nakashima, E.1
-
54
-
-
84890247486
-
-
note
-
Oona A. Hathaway et al., 'The Law of Cyber Attack', Yale University, 16 November 2011, http://www. law.yale.edu/documents/pdf/cglc/ LawOfCyberattack.pdf.
-
(2011)
'The Law of Cyber Attack
-
-
Hathaway, O.A.1
|