메뉴 건너뛰기




Volumn 55, Issue 2, 2013, Pages 81-96

The Cyber Attack on Saudi Aramco

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84876029693     PISSN: 00396338     EISSN: 14682699     Source Type: Journal    
DOI: 10.1080/00396338.2013.784468     Document Type: Article
Times cited : (102)

References (55)
  • 1
    • 84876045112 scopus 로고    scopus 로고
    • Cyber Threats to Energy Security, as Experienced by Saudi Arabia
    • note
    • John Roberts, 'Cyber Threats to Energy Security, as Experienced by Saudi Arabia', Platts, 27 November 2012, http://blogs.platts. com/2012/11/27/virus_threats/.
    • (2012) Platts
    • Roberts, J.1
  • 3
    • 80052333860 scopus 로고    scopus 로고
    • A Crude Threat: The Limits of an Iranian Missile Campaign against Saudi Arabian Oil
    • note
    • Joshua R. Itzkowitz Shifrinson and Miranda Priebe, 'A Crude Threat: The Limits of an Iranian Missile Campaign against Saudi Arabian Oil', International Security, vol. 36, no. 1, Summer 2011, pp. 167-201.
    • (2011) International Security , vol.36 , Issue.1 , pp. 167-201
    • Joshua, R.1    Shifrinson, I.2    Priebe, M.3
  • 8
    • 84876046044 scopus 로고    scopus 로고
    • Barack Obama "Ordered Stuxnet Cyber Attack on Iran"
    • note
    • Christopher Williams, 'Barack Obama "Ordered Stuxnet Cyber Attack on Iran"', Daily Telegraph, 1 June 2012.
    • (2012) Daily Telegraph
    • Williams, C.1
  • 10
    • 79251638534 scopus 로고    scopus 로고
    • Stuxnet Malware is "Weapon" Out to Destroy... Iran's Bushehr Nuclear Plant?
    • note
    • Mark Clayton, 'Stuxnet Malware is "Weapon" Out to Destroy... Iran's Bushehr Nuclear Plant?', Christian Science Monitor, 21 September 2010, http://www. csmonitor.com/USA/2010/0921/ Stuxnet-malware-is-weapon-out-todestroy-Iran-s-Bushehr-nuclear-plant. See also Ralph Langner, Robust Control System Networks: How to Achieve Reliable Control After Stuxnet (New York: Momentum Press, 2011).
    • (2010) Christian Science Monitor
    • Clayton, M.1
  • 12
    • 84867287800 scopus 로고    scopus 로고
    • Mutually Assured Cyberdestruction?
    • note
    • David E. Sanger, 'Mutually Assured Cyberdestruction?', New York Times, 2 June 2012, http://www.nytimes. com/2012/06/03/sunday-review/mutually-assured-cyberdestruction.html.
    • (2012) New York Times
    • Sanger, D.E.1
  • 13
    • 84867287800 scopus 로고    scopus 로고
    • Mutually Assured Cyberdestruction?
    • note
    • David E. Sanger, 'Mutually Assured Cyberdestruction?', New York Times, 2 June 2012, http://www.nytimes. com/2012/06/03/sunday-review/mutually-assured-cyberdestruction.html.
    • (2012) New York Times
    • Sanger, D.E.1
  • 14
    • 84867287800 scopus 로고    scopus 로고
    • Mutually Assured Cyberdestruction?
    • note
    • David E. Sanger, 'Mutually Assured Cyberdestruction?', New York Times, 2 June 2012, http://www.nytimes. com/2012/06/03/sunday-review/mutually-assured-cyberdestruction.html.
    • (2012) New York Times
    • Sanger, D.E.1
  • 15
    • 84876048751 scopus 로고    scopus 로고
    • note
    • Flame's discovery was jointly announced by Kaspersky, CrySyS and the Iran Computer Emergency Response Team; the International Telecommunications Union apparently having facilitated Iranian cooperation with European malware analysis experts. sKyWIper Analysis Team, sKyWIper (a.k.a. Flame a.k.a. Flamer): A Complex Malware for Targeted Attacks (v. 1.05), Laboratory of Cryptography and System Security, Budapest University of Technology and Economics, 31 May 2012.
    • (2012) SKyWIper (a.k.a. Flame a.k.a. Flamer): A Complex Malware for Targeted Attacks
  • 16
    • 85050525488 scopus 로고    scopus 로고
    • Iran's Discovery of Flame Malware Turning into Political Hot Potato
    • note
    • See Ellen Messmer, 'Iran's Discovery of Flame Malware Turning into Political Hot Potato', Network World, 30 May 2012, http://www. networkworld.com/news/2012/053012-iran-flame-malware-259708.html.
    • (2012) Network World
    • Messmer, E.1
  • 17
    • 84876066496 scopus 로고    scopus 로고
    • Iran CERT Fingers Flame for Oil Refinery Attacks
    • note
    • Darren Pauli, 'Iran CERT Fingers Flame for Oil Refinery Attacks', SC Magazine, 30 May 2012, http://www. scmagazine.com.au/Tools/Print. aspx?CIID=302718.
    • (2012) SC Magazine
    • Pauli, D.1
  • 18
    • 84876043077 scopus 로고    scopus 로고
    • note
    • 'Neuer Angriff mit Stuxnet', Neue Zürcher Zeitung, 25 December 2012, http://www. nzz.ch/aktuell/international/ iran-meldet-neuen-angriff-mit-computervirus-stuxnet-1.17909054.
    • (2012) Neuer Angriff mit Stuxnet
  • 19
    • 84876035561 scopus 로고    scopus 로고
    • Stuxnet Shut Down by Its Own Kill Switch
    • note
    • William Jackson, 'Stuxnet Shut Down by Its Own Kill Switch', GCN, 26 June 2012, http://gcn.com/ articles/2012/06/26/stuxnet-demiseexpiration-date.aspx
    • (2012) GCN
    • Jackson, W.1
  • 20
    • 84876031501 scopus 로고    scopus 로고
    • Strategic Comments
    • note
    • 'Stuxnet: Targeting Iran's Nuclear Programme', Strategic Comments, vol. 17, comment 6, February 2011.
    • (2011) , vol.17
  • 21
    • 84876018237 scopus 로고    scopus 로고
    • Oil and Gas Giant Considers Petascale Supercomputer
    • note
    • 'Oil and Gas Giant Considers Petascale Supercomputer', HPCwire, 11 July 2011, http://www.hpcwire. com/hpcwire/2011-07-11/ oil_and_gas_giant_considers_petascale_ supercomputer.html. Tiffany Trader, 'Cloudnumbers Expedites Cloud-Based Supercomputing', HPC in the Cloud, 14 February 2012, http://www.hpcinthecloud. com/hpccloud/2012-02-14/ cloudnumbers_expedites_cloudbased_ supercomputing.html.
    • (2011) HPCwire
  • 24
    • 84876060933 scopus 로고    scopus 로고
    • Cybersecurity Issues and Policy Options for the U.S. Energy Industry
    • note
    • Cyber security issues of greatest concern to the oil and gas industry are likely to be: theft of intellectual property; cyber espionage aimed at short-term decision-making; and deletion of production and refinement data. See Chris Bronk and Adam Pridgen, Cybersecurity Issues and Policy Options for the U.S. Energy Industry, Baker Institute Policy Report #53, Baker Institute for Public Policy, September 2012.
    • (2012) Baker Institute Policy Report #53
  • 26
    • 84876042688 scopus 로고    scopus 로고
    • Connecting the Dots After Cyber attack on Saudi Aramco
    • note
    • Nicole Perlroth, 'Connecting the Dots After Cyber attack on Saudi Aramco', New York Times, 27 August 2012, http:// bits.blogs.nytimes.com/2012/08/27/ connecting-the-dots-after-cyber attack-on-saudi-aramco/.
    • (2012) New York Times
    • Perlroth, N.1
  • 27
    • 84876029722 scopus 로고    scopus 로고
    • Was Iran Responsible for Saudi Aramco's Network Attack?
    • note
    • 'Was Iran Responsible for Saudi Aramco's Network Attack?', Digital Dao, 22 August 2012, http://jeffreycarr. blogspot.com/2012/08/was-iranresponsible-for-saudi-aramcos.html.
    • (2012) Digital Dao
  • 29
    • 84876029850 scopus 로고    scopus 로고
    • Shamoon, a Two-stage Targeted Attack
    • note
    • 'Shamoon, a Two-stage Targeted Attack', Seculert Blog, 16 August 2012, http://blog.seculert.com/2012/08/shamoon-two-stage-targeted-attack.html.
    • (2012) Seculert Blog
  • 31
    • 84876015738 scopus 로고    scopus 로고
    • Saudi Aramco Repairs Damage from computer attack
    • note
    • 'Saudi Aramco Repairs Damage from computer attack', Al Arabiya News, 26 August 2012, available at http://english.alarabiya.net/articles/ 2012/08/26/234372.html.
    • (2012) Al Arabiya News
  • 32
    • 84876065853 scopus 로고    scopus 로고
    • Saudi Aramco Investigating Origins of "Shamoon" Virus Following Attack
    • note
    • 'Saudi Aramco Investigating Origins of "Shamoon" Virus Following Attack', Al Arabiya News, 26 August 2012, http://english.alarabiya.net/ articles/2012/09/12/237530.html.
    • (2012) Al Arabiya News
  • 36
    • 84876062226 scopus 로고    scopus 로고
    • The Shamoon Attacks
    • note
    • 'The Shamoon Attacks', Symantec, 16 August 2012, http://www.symantec. com/connect/blogs/shamoon-attacks.
    • (2012) Symantec
  • 37
    • 84876062467 scopus 로고    scopus 로고
    • note
    • The Cutting Sword of Justice's full attribution is available at http://pastebin. com/HqAgaQRj.
  • 38
    • 84876050859 scopus 로고    scopus 로고
    • Daily Report: How Aramco Got Hacked
    • note
    • 'Daily Report: How Aramco Got Hacked', New York Times, 24 October 2012, http://bits. blogs.nytimes.com/2012/10/24/ daily-report-how-aramco-got-hacked/.
    • (2012) New York Times
  • 39
    • 84876058378 scopus 로고    scopus 로고
    • Clapper Sounds Alarm on Cyber Capabilities of Iran, China and Russia
    • note
    • David Perera, 'Clapper Sounds Alarm on Cyber Capabilities of Iran, China and Russia', FierceGovernmentIT, 1 February 2012, http://www. fiercegovernmentit.com/story/ clapper-sounds-alarm-cyber-capabilities-iran-china-and-russia/2012-02-01; 'US General Warns Over Iranian Cyber-Soldiers', BBC News, 18 January 2013, http://www.bbc.co.uk/ news/technology-21075781.
    • (2012) FierceGovernmentIT
    • Perera, D.1
  • 40
    • 84876046243 scopus 로고    scopus 로고
    • US General Warns Over Iranian Cyber-Soldiers
    • note
    • 'US General Warns Over Iranian Cyber-Soldiers', BBC News, 18 January 2013, http://www.bbc.co.uk/ news/technology-21075781.
    • (2013) BBC News
  • 41
    • 84876044544 scopus 로고    scopus 로고
    • US says Iran Behind Cyber Attack in Saudi Arabia
    • note
    • 'US says Iran Behind Cyber Attack in Saudi Arabia', Al Arabiya News, 13 October 2012, http://english.alarabiya. net/articles/2012/10/13/243475.html.
    • (2012) Al Arabiya News
  • 42
    • 84876037504 scopus 로고    scopus 로고
    • The Oil and Gas Industry
    • note
    • Fareed Mohamedi, 'The Oil and Gas Industry', Iran Primer, United States Institute for Peace, 2010, http://iranprimer.usip.org/resource/ oil-and-gas-industry.
    • (2010) Iran Primer
    • Mohamedi, F.1
  • 44
    • 84876034320 scopus 로고    scopus 로고
    • Iran Denies U.S. Claims it was Behind Persian Gulf Cyber Attacks
    • note
    • 'Iran Denies U.S. Claims it was Behind Persian Gulf Cyber Attacks', Tehran Times, 14 October 2012, http://www. tehrantimes.com/politics/102372-irandenies-us-claims-it-was-behind-persian-gulf-cyber-attacks.
    • (2012) Tehran Times
  • 46
    • 84876032674 scopus 로고    scopus 로고
    • Symantec 2010 Critical Infrastructure Protection Study
    • note
    • 'Symantec 2010 Critical Infrastructure Protection Study', Symantec, October 2010, http://www.symantec.com/ content/en/us/about/presskits/ Symantec_2010_CIP_ Study_Global_Data.pdf.
    • (2010) Symantec
  • 47
    • 84876033366 scopus 로고    scopus 로고
    • note
    • According to Article 2(a) of Directive 2008/114/EC, '"critical infrastructure" means an asset, system or part thereof located in Member States which is essential for the maintenance of vital societal functions, health, safety, security, economic or social wellbeing of people, and the disruption or destruction of which would have a significant impact in a Member State as a result of the failure to maintain those functions'. Http://eur-lex.europa.eu/ LexUriServ/LexUriServ.do?uri=OJ:L:2 008:345:0075:0082:EN:PDF; according to 42 USC 5195c.(e), '"critical infrastructure" means systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters'. http://www.gpo. gov/fdsys/pkg/USCODE-2010-title42/ pdf/USCODE-2010-title42-chap68-subchapIV-B-sec5195c.pdf.
  • 48
    • 84876027228 scopus 로고    scopus 로고
    • A Governance Switchboard: Scalability Issues in International Cyber Policymaking
    • note
    • Christopher Bronk, 'A Governance Switchboard: Scalability Issues in International Cyber Policymaking', Cyber Dialogue 2012: What is Stewardship in Cyberspace? University of Toronto, March 2012, http:// bakerinstitute.org/publications/ITPpub-BronkCyberDialogue2012-031312. pdf.
    • (2012) Cyber Dialogue
    • Bronk, C.1
  • 49
    • 84876051863 scopus 로고    scopus 로고
    • note
    • UN Resolution A/RES/58/199: Creation of a Global Culture of Cybersecurity and the Protection of Critical Information Infrastructures, 30 January 2004, http://www.itu.int/ ITU-D/cyb/cybersecurity/docs/UN_ resolution_58_199.pdf.
    • (2004)
  • 50
    • 84876067991 scopus 로고    scopus 로고
    • note
    • EU Council Directive 2008/114/EC: On the Identification and Designation of European Critical Infrastructures and the Assessment of the Need to Improve their Protection, 23 December 2008, http://eur-lex.europa.eu/ LexUriServ/LexUriServ.do?uri=OJ:L:2 008:345:0075:0082:EN:PDF. See also 162 CDS 07 E rev 1: The Protection Of Critical Infrastructures, NATO Parliamentary Assembly, available at http://www.nato-pa.int/ Default.asp?SHORTCUT=1165.
    • (2008)
  • 51
    • 84876028025 scopus 로고    scopus 로고
    • Saudi Aramco Restores Network After Shamoon Malware Attack
    • note
    • Mathew J. Schwartz, 'Saudi Aramco Restores Network After Shamoon Malware Attack', InformationWeek, 27 August 2012, http://www.informationweek. com/security/attacks/ saudi-aramco-restores-network-aftersham/ 240006278.
    • (2012) InformationWeek
    • Schwartz, M.J.1
  • 52
    • 84876066527 scopus 로고    scopus 로고
    • Banks Seek NSA Help Amid Attacks on their Computer Systems
    • note
    • Ellen Nakashima, 'Banks Seek NSA Help Amid Attacks on their Computer Systems', Washington Post, 11 January 2013, http://articles. washingtonpost.com/2013-01-11/ world/36272281_1_banks-ddos-nsa.
    • (2013) Washington Post
    • Nakashima, E.1
  • 54
    • 84890247486 scopus 로고    scopus 로고
    • note
    • Oona A. Hathaway et al., 'The Law of Cyber Attack', Yale University, 16 November 2011, http://www. law.yale.edu/documents/pdf/cglc/ LawOfCyberattack.pdf.
    • (2011) 'The Law of Cyber Attack
    • Hathaway, O.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.