메뉴 건너뛰기




Volumn 17, Issue 5-6, 2008, Pages 247-252

Anatomy of a data breach

Author keywords

Data breach; Hacking; Identity theft; Malware; Phishing

Indexed keywords


EID: 85006574073     PISSN: 19393555     EISSN: 19393547     Source Type: Journal    
DOI: 10.1080/19393550802529734     Document Type: Article
Times cited : (10)

References (7)
  • 1
    • 85023898740 scopus 로고    scopus 로고
    • July 15
    • Identity Theft Resource Center. (2008, July 15). IRTC 2008 Breach List.
    • (2008) IRTC 2008 Breach List
  • 2
    • 2042472664 scopus 로고    scopus 로고
    • Online fraud report 2008 edition
    • Cyber Source. (2008). Executive summary. Online fraud report 2008 edition, pp. 4-5.
    • (2008) Executive Summary , pp. 4-5
    • Source, C.1
  • 6
    • 85023840430 scopus 로고    scopus 로고
    • Think your protected think again
    • March
    • Panda Security U.S. Blog (2008, March). Think your protected think again. Study reveals hidden cybercrime breaches. http://pandasecu- rityus.wordpress.com.
    • (2008) Study Reveals Hidden Cybercrime Breaches
  • 7
    • 85023845212 scopus 로고    scopus 로고
    • Hundreds of servers compromised in hannaford breach
    • March 28
    • Murray-Conry, A. (2008, March 28). Hundreds of servers compromised in Hannaford breach. Information Week. www.information- week.com.
    • (2008) Information Week
    • Murray-Conry, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.