-
1
-
-
84876732141
-
Six more data discs ' are missing '
-
24 November, accessed 1 August 2011
-
BBC. (2007) Six more data discs ' are missing '. B BC News Online, 24 November, http://news.bbc.co.uk/1/hi/7111056.stm, accessed 1 August 2011.
-
(2007)
B BC News Online
-
-
-
2
-
-
84876736031
-
Pension data was on stolen laptop
-
10 October, accessed 1 August 2011
-
BBC. (2008) Pension data was on stolen laptop. B BC News Online, 10 October, http://news.bbc.co.uk/1/hi/uk/7664274.stm, accessed 1 August 2011.
-
(2008)
B BC News Online
-
-
-
3
-
-
84876732277
-
US and Israel were behind Stuxnet claims researcher
-
4 March, accessed 1 August 2011
-
BBC. (2011) US and Israel were behind Stuxnet claims researcher. BBC News Online, 4 March, http://www.bbc.co.uk/news/technology-12633240, accessed 1 August 2011.
-
(2011)
BBC News Online
-
-
-
4
-
-
62849104685
-
Position: Insider is relative
-
C.F. Hempelmann and V. Raskin (eds.), New York: ACM Press
-
Bishop, M. (2005) Position: Insider is relative. In: C.F. Hempelmann and V. Raskin (eds.), Proceedings of the New Security Paradigms Workshop. New York: ACM Press.
-
(2005)
Proceedings of the New Security Paradigms Workshop
-
-
Bishop, M.1
-
5
-
-
84876711104
-
-
Hannover, Germany: Dartmouth College. Institute for Information Infrastructure Protection (I3P) research program Research Report no. 16, July 2009, accessed 1 August 2011
-
Caputo, D., Stephens, G., Stephenson, B. and Kim, M. (2009) Human Behavior, Insider Threat, and Awareness: An Empirical Study of Insider Threat Behavior. Hannover, Germany: Dartmouth College. Institute for Information Infrastructure Protection (I3P) research program Research Report no. 16, July 2009, http://www.thei3p.org/docs/publications/134.pdf, accessed 1 August 2011.
-
(2009)
Human Behavior, Insider Threat, and Awareness: An Empirical Study of Insider Threat Behavior
-
-
Caputo, D.1
Stephens, G.2
Stephenson, B.3
Kim, M.4
-
8
-
-
84876699273
-
-
CERT Insider Threat Team, Pittsburgh: Carnegie Mellon University, Software Engineering Institute, accessed 1 August 2011. (Summaries also available for 2004 - 2009)
-
CERT. (2010) 2010 CyberSecurity Watch Survey: Cybercrime increasing faster than some company defenses. CERT Insider Threat Team, Pittsburgh: Carnegie Mellon University, Software Engineering Institute, http://www.cert.org/ archive/pdf/ecrimesummary10.pdf, accessed 1 August 2011. (Summaries also available for 2004 - 2009).
-
(2010)
2010 CyberSecurity Watch Survey: Cybercrime Increasing Faster Than Some Company Defenses
-
-
-
9
-
-
84867672691
-
-
CERT Insider Threat Team, Pittsburgh: Carnegie Mellon University, Software Engineering Institute, accessed 1 August 2011. (Summaries also available for years 2004 - 2010)
-
CERT. (2011) 2011 CyberSecurity Watch Survey: How bad is the insider threat? CERT Insider Threat Team, Pittsburgh: Carnegie Mellon University, Software Engineering Institute, http://www.cert.org/archive/pdf/ CyberSecuritySurvey2011Data.pdf, accessed 1 August 2011. (Summaries also available for years 2004 - 2010).
-
(2011)
2011 CyberSecurity Watch Survey: How Bad Is the Insider Threat?
-
-
-
10
-
-
84876737412
-
2010 CyberSecurity Watch Survey: Cybercrime increasing faster than some company defenses
-
25 January, accessed 1 August 2011
-
EON. (2010) 2010 CyberSecurity Watch Survey: Cybercrime increasing faster than some company defenses. Enhanced Online News (EON), 25 January, http://eon.businesswire.com/news/eon/20100125006500/en/CSO/Cybercrime/ cybersecurity, accessed 1 August 2011.
-
(2010)
Enhanced Online News (EON)
-
-
-
11
-
-
78650062267
-
-
Symantec White Paper, accessed 1 August 2011
-
Falliere, N., Murchu, L. and Chien, E. (2010) W32.Stuxnet Dossier: September 2010, version 1.0., Symantec White Paper, http://www.symantec.com/ content/en/us/enterprise/media/security-response/whitepapers/ w32-stuxnet-dossier.pdf, accessed 1 August 2011.
-
(2010)
W32.Stuxnet Dossier: September 2010, Version 1.0.
-
-
Falliere, N.1
Murchu, L.2
Chien, E.3
-
13
-
-
3242808612
-
-
San Francisco, CA: Computer Security Institute
-
Gordon, L., Loeb, M., Lucyshyn, W. and Richardson, R. (2004) 2004 CSI/FBI Computer Crime and Security Survey. San Francisco, CA: Computer Security Institute.
-
(2004)
2004 CSI/FBI Computer Crime and Security Survey
-
-
Gordon, L.1
Loeb, M.2
Lucyshyn, W.3
Richardson, R.4
-
14
-
-
3242808612
-
-
San Francisco, CA: Computer Security Institute
-
Gordon, L., Loeb, M., Lucyshyn, W. and Richardson, R. (2005) 2005 CSI/FBI Computer Crime and Security Survey. San Francisco, CA: Computer Security Institute.
-
(2005)
2005 CSI/FBI Computer Crime and Security Survey
-
-
Gordon, L.1
Loeb, M.2
Lucyshyn, W.3
Richardson, R.4
-
15
-
-
3242808612
-
-
San Francisco, CA: Computer Security Institute
-
Gordon, L., Loeb, M., Lucyshyn, W. and Richardson, R. (2006) 2006 CSI/FBI Computer Crime and Security Survey. San Francisco, CA: Computer Security Institute.
-
(2006)
2006 CSI/FBI Computer Crime and Security Survey
-
-
Gordon, L.1
Loeb, M.2
Lucyshyn, W.3
Richardson, R.4
-
16
-
-
84876696675
-
The trend of the security research for the insider cyber threat
-
Hong, J., Kim, J. and Cho, J. (2010) The trend of the security research for the insider cyber threat. International Journal of Future Generation Communication and Networking 3 (2): 31 - 40.
-
(2010)
International Journal of Future Generation Communication and Networking
, vol.3
, Issue.2
, pp. 31-40
-
-
Hong, J.1
Kim, J.2
Cho, J.3
-
18
-
-
27844543023
-
-
Pittsburgh, PA: Carnegie Mellon, University Software Engineering Institute/United States Secret Service, accessed 1 August 2011
-
Keeney, M., Cappelli, D., Kowalski, E., Moore, A., Shimeall, T. and Rogers, S. (2005) Insider threat study: Computer system sabotage in critical infrastructure sectors. Pittsburgh, PA: Carnegie Mellon, University Software Engineering Institute/United States Secret Service, http://www.cert.org/archive/ pdf/insidercross051105.pdf, accessed 1 August 2011.
-
(2005)
Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors
-
-
Keeney, M.1
Cappelli, D.2
Kowalski, E.3
Moore, A.4
Shimeall, T.5
Rogers, S.6
-
19
-
-
84876717816
-
-
LMRMC, LM Research & Marketing Consultancy, 20 September (Unpublished)
-
LMRMC. (2010) Online riskiness: Questionnaire results - Overall. LM Research & Marketing Consultancy, 20 September (Unpublished).
-
(2010)
Online Riskiness: Questionnaire Results - Overall
-
-
-
20
-
-
84876727366
-
-
Mail Online, 12 April, accessed 1 August 2011
-
Mail. (2008) Military laptop stolen from McDonald's as ' Army captain eats a Big Mac'. Mail Online, 12 April, http://www.dailymail.co.uk/news/article- 559178/Military-laptop-stolen-McDonalds-Army-captain-eats-Big-Mac. html#ixzz13NxVuGd0, accessed 1 August 2011.
-
(2008)
Military Laptop Stolen from McDonald's As ' Army Captain Eats A Big Mac'
-
-
-
21
-
-
84876706884
-
Survey: 40 % of hard drives bought on eBay hold personal, corporate data: Buyers found data on everything from corporate spreadsheets to e-mails and photos
-
10 February, accessed 1 August 2011
-
Mearian, L., (2009) Survey: 40 % of hard drives bought on eBay hold personal, corporate data: Buyers found data on everything from corporate spreadsheets to e-mails and photos. Computerworld, 10 February, http://www.computerworld.com/s/article/9127717/Survey-40-of-hard-drives-bought- on-eBay-hold-personal-corporate-data, accessed 1 August 2011.
-
(2009)
Computerworld
-
-
Mearian, L.1
-
23
-
-
78650018175
-
-
Ponemon Institute, accessed 1 August 2011
-
Ponemon, L. (2008) The cost of a lost laptop. Ponemon Institute, http://www.ponemon.org/local/upload/fckjail/generalcontent/18/file/ Cost%20of%20a%20Lost%20Laptop%20White%20Paper%20Final%203.pdf, accessed 1 August 2011.
-
(2008)
The Cost of A Lost Laptop
-
-
Ponemon, L.1
-
25
-
-
84855308630
-
-
Ponemon Institute, accessed 1 August 2011
-
Ponemon, L. (2010a) 2009 annual study: Cost of a data breach. Ponemon Institute, http://www.ponemon.org/local/upload/fckjail/generalcontent/18/file/ US-Ponemon-CODB-09-012209-sec.pdf, accessed 1 August 2011.
-
(2010)
2009 Annual Study: Cost of A Data Breach
-
-
Ponemon, L.1
-
26
-
-
84855308630
-
-
Ponemon Institute, accessed 1 August 2011
-
Ponemon, L. (2010b) 2009 annual study: UK cost of a data breach. Ponemon Institute, http://www.ponemon.org/local/upload/fckjail/generalcontent/18/file/ UK-Ponemon-CODB%202009%20v9.pdf, accessed 1 August 2011.
-
(2010)
2009 Annual Study: UK Cost of A Data Breach
-
-
Ponemon, L.1
-
27
-
-
84855308630
-
-
Ponemon Institute/Symantec, accessed 1 August 2011
-
Ponemon, L. (2011) 2010 annual study: Cost of a data breach. Ponemon Institute/Symantec, http://www.symantec.com/content/en/us/about/media/pdfs/ symantec-cost-of-data-breach-global-2010.pdf, accessed 1 August 2011.
-
(2011)
2010 Annual Study: Cost of A Data Breach
-
-
Ponemon, L.1
-
28
-
-
84995602633
-
-
New York: Elsevier
-
Probst, C., Hunker, J. and Gollmann, D. (eds.) (2010) Insider Threats in Cyber Security, Advances in Information Security, Vol. 49. New York: Elsevier.
-
(2010)
Insider Threats in Cyber Security, Advances in Information Security
, vol.49
-
-
Probst, C.1
Hunker, J.2
Gollmann, D.3
-
29
-
-
32644465248
-
-
Philadelphia: Carnegie Mellon University, Software Engineering Institute, accessed 1 August 2011
-
Randazzo, M., Keeney, M., Kowalski, E., Cappelli, D. and Moore, A. (2005) Insider threat study: Illicit cyber activity in the banking and finance sector. Philadelphia: Carnegie Mellon University, Software Engineering Institute, http://82.138.248.200/hcs-temp/teaching/GA10/lec4extra/certreport.pdf, accessed 1 August 2011.
-
(2005)
Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector
-
-
Randazzo, M.1
Keeney, M.2
Kowalski, E.3
Cappelli, D.4
Moore, A.5
-
30
-
-
84876732413
-
MBNA confirms data loss after laptop containing personal details of thousands of customers was stolen from vendor
-
23 December, accessed 1 August 2011
-
Raywood, D. (2009) MBNA confirms data loss after laptop containing personal details of thousands of customers was stolen from vendor. SC Magazine, 23 December, http://www.scmagazineuk.com/mbna-confirms-data-lossafter-laptop- containing-personal-details-of-thousands-of-customers-was-stolen-from-vendor/ article/160217/, accessed 1 August 2011.
-
(2009)
SC Magazine
-
-
Raywood, D.1
-
31
-
-
84876740718
-
Stolen laptop leads to the loss of details of around 13,000 UK dairy farmers
-
2 July, accessed 1 August 2011
-
Raywood, D. (2010) Stolen laptop leads to the loss of details of around 13,000 UK dairy farmers. S C Magazine, 2 July, http://www.scmagazineuk.com/ stolen-laptop-leads-to-the-loss-of-details-of-around-13000-uk-dairyfarmers/ article/173843/, accessed 1 August 2011.
-
(2010)
S C Magazine
-
-
Raywood, D.1
-
35
-
-
84866114164
-
Malicious insider attacks to rise
-
11 February, accessed 1 August 2011
-
Shiels, M. (2009) Malicious insider attacks to rise. BBC News Online, 11 February, http://news.bbc.co.uk/1/hi/technology/7875904.stm, accessed 1 August 2011.
-
(2009)
BBC News Online
-
-
Shiels, M.1
-
37
-
-
84876740688
-
Anatomy of a data breach: Why breaches happen and what to do about it
-
accessed 1 August 2011
-
Symantec. (2008) Anatomy of a data breach: Why breaches happen and what to do about it. Mountain View: Symantec, http://eval.symantec.com/mktginfo/ enterprise/white-papers/b-anatomy-of-a-data-breach-WP-20049424-1.en-us.pdf, accessed 1 August 2011.
-
(2008)
Mountain View: Symantec
-
-
-
38
-
-
77949394213
-
-
April, 2009, Symantec, accessed 1 August 2011
-
Symantec. (2009a) Internet Security Threat Report, Volume XIV. April, 2009, Symantec, http://www.symantec.com/business/theme.jsp?themeid=threatreport, accessed 1 August 2011.
-
(2009)
Internet Security Threat Report, Volume XIV
-
-
-
40
-
-
84876709109
-
The trojan. Hydraq incident
-
18 January, accessed 1 August 2011
-
Symantec. (2010) The Trojan.Hydraq incident. Symantec Security Response Blog, 18 January, http://www.symantec.com/connect/blogs/trojanhydraq-incident, accessed 1 August 2011.
-
(2010)
Symantec Security Response Blog
-
-
-
41
-
-
77952903083
-
-
Verizon, accessed 1 August 2011
-
Verizon. (2010) 2010 Data Breach Investigations Report. Verizon, http://www.verizonbusiness.com/resources/reports/rp-2010-data-breach-report-en- xg.pdf, accessed 1 August 2011.
-
(2010)
2010 Data Breach Investigations Report
-
-
-
43
-
-
51949117093
-
Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about cybercrime
-
(Revised February 2011) , accessed 1 August 2011
-
Wall, D. S. (2008 / 2011) Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about cybercrime. Information, Communication & Society 11 (6): 861 - 884, (Revised February 2011), http://ssrn.com/abstract=1155155, accessed 1 August 2011.
-
(2008)
Information, Communication & Society
, vol.11
, Issue.6
, pp. 861-884
-
-
Wall, D.S.1
-
46
-
-
0344559509
-
-
White House, White House, February, accessed 1 August 2011
-
White House. (2003) The national strategy to secure cyberspace. White House, February, http://www.dhs.gov/xlibrary/assets/National-Cyberspace- Strategy.pdf, accessed 1 August 2011.
-
(2003)
The National Strategy to Secure Cyberspace
-
-
-
48
-
-
84859371116
-
DHS fears a modified Stuxnet could attack US infrastructure
-
26 July, accessed 1 August 2011
-
Zetter, K. (2011) DHS fears a modified Stuxnet could attack US infrastructure. WIRED, 26 July, http://www.wired.com/threatlevel/2011/07/dhs- fears-stuxnet-attacks/, accessed 1 August 2011.
-
(2011)
WIRED
-
-
Zetter, K.1
|