-
1
-
-
85145637313
-
2008 Update of HIPAA enforcement indicates importance of compliance to reduce risks to covered entities
-
Undated. Retrieved August 31
-
2008 Update of HIPAA enforcement indicates importance of compliance to reduce risks to covered entities undated. Retrieved August 31, 2010, from. http://www.hipaasolutions.org/documents/HIPAAEnforcementUp-Date-2008.pdf.
-
(2010)
-
-
-
2
-
-
84878869057
-
About the PCI Data Security Standard (PCI DSS)
-
Undated. Retrieved August 17
-
About the PCI Data Security Standard (PCI DSS) undated. Retrieved August 17, 2010, from. https://www.pcisecuritystandards.org/security_standards/pci_dss.shtml.
-
(2010)
-
-
-
3
-
-
78650166809
-
Information privacy-Wikipedia, the free encyclopedia
-
Retrieved September 20
-
Information privacy-Wikipedia, the free encyclopedia Retrieved September 20, 2010, from. http://www.en.wikipedia.org/wiki/Information_privacy.
-
(2010)
-
-
-
4
-
-
67649573353
-
-
Retrieved August 30
-
Office of the Secretary U.S. Department of Health and Human Services Retrieved August 30, 2010, from. http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/securityrulepdf.pdf.
-
(2010)
U.S. Department of Health and Human Services
-
-
-
6
-
-
84886140496
-
Safe Harbor Privacy Principles
-
Retrieved September 20
-
Safe Harbor Privacy Principles Retrieved September 20, 2010, from. http://www.export.gov/safeharbor/eu/eg_main_018475.asp.
-
(2010)
-
-
-
7
-
-
84882222819
-
Standard CIP-005-2, Cyber Security-Electronic Security Perimeter(s)
-
2009, Retrieved July 12, 2010
-
Standard CIP-005-2, Cyber Security-Electronic Security Perimeter(s). North American Electric Reliability Corporation™ (NERC) 2009, 2009, Retrieved July 12, 2010, from. http://www.nerc.com/files/CIP-005-2.pdf.
-
(2009)
North American Electric Reliability Corporation™ (NERC)
-
-
-
8
-
-
85145641164
-
§ 1030: Fraud and related activity in connection with computers
-
Retrieved September 20, from, February 8
-
§ 1030: Fraud and related activity in connection with computers United States Department of Justice Retrieved September 20, 2010, from, February 8. http://www.justice.gov/criminal/cybercrime/1030NEW.htm.
-
(2010)
United States Department of Justice
-
-
-
9
-
-
85145628089
-
-
Retrieved September 20, from, undated
-
Coercion Texas computer crime law. Steve Jackson Games Retrieved September 20, 2010, from, undated. http://www.sjgames.com/SS/texaslaw.html.
-
(2010)
Texas computer crime law. Steve Jackson Games
-
-
-
15
-
-
85145629974
-
Incompatible Browser | Facebook
-
Retrieved August 31
-
Incompatible Browser | Facebook Retrieved August 31, 2010, from. http://www.facebook.com/terms.php?ref.
-
(2010)
-
-
-
16
-
-
84882191460
-
-
Retrieved August 31
-
Mackenzie K. Cyber attacks on oil majors FT.com Retrieved August 31, 2010, from. http://blogs.ft.com/energy-source/2010/01/26/cyber-attacks-on-oil-majors/.
-
(2010)
Cyber attacks on oil majors FT.com
-
-
Mackenzie, K.1
-
17
-
-
84882113404
-
-
Retrieved August 31, 2010
-
Online Fraud Chase Bank 2010, Retrieved August 31, 2010, from. http://www.chase.com/index.jsp?pg_name=ccpmapp/privacy_security/fraud/page/fraud_examples.
-
(2010)
Chase Bank
-
-
-
19
-
-
85145633388
-
Twitter Terms of Service
-
Retrieved August 31
-
Twitter Terms of Service Twitter Retrieved August 31, 2010, from. http://twitter.com/tos.
-
(2010)
Twitter
-
-
-
20
-
-
84882100563
-
K. Honker Union of China to launch network attacks against Japan is a rumor
-
Retrieved October 5, 2010
-
K. Honker Union of China to launch network attacks against Japan is a rumor. China Hush 2010, Retrieved October 5, 2010, from. http://www.chinahush.com/2010/09/15/honker-union-of-china-to-launch-network-attack-against-japan-is-a-rumor/.
-
(2010)
China Hush
-
-
-
21
-
-
84902032782
-
Hezbollah's cyber warfare program
-
Retrieved October 5, 2010
-
Coleman K. Hezbollah's cyber warfare program. Defense Tech 2008, Retrieved October 5, 2010, from. http://defensetech.org/2008/06/02/hezbollahs-cyber-warfare-program/.
-
(2008)
Defense Tech
-
-
Coleman, K.1
-
22
-
-
84882087931
-
Considerations about the Chinese Intelligence Services (II)
-
Retrieved October 5, 2010
-
Dumitrescu O. Considerations about the Chinese Intelligence Services (II). Conflict Resolutions and World Security Solutions 2010, Retrieved October 5, 2010, from. http://www.worldsecuritynetwork.com/showArticle3.cfm?article_id=18347&topicID=66.
-
(2010)
Conflict Resolutions and World Security Solutions
-
-
Dumitrescu, O.1
-
23
-
-
84882094901
-
Inside the Aurora (Google attack) malware
-
undated, Retrieved October 5, 2010
-
Fisher D. Inside the Aurora (Google attack) malware. Threatpost 2010, undated, Retrieved October 5, 2010, from. http://www.threatpost.com/en_us/blogs/inside-aurora-malware-011910.
-
(2010)
Threatpost
-
-
Fisher, D.1
-
24
-
-
84882191409
-
Cyber-attack turns physical
-
Retrieved September 28, 2010
-
Fulghum D. Cyber-attack turns physical. Aviation Week 2010, Retrieved September 28, 2010, from. http://www.aviationweek.com/aw/generic/story_channel.jsp?channel=defense&id=news/asd/2010/09/27/05.xml&headline=Cyber-Attack%20Turns%20Physical.
-
(2010)
Aviation Week
-
-
Fulghum, D.1
-
25
-
-
84902032785
-
Would you have spotted the fraud?
-
Retrieved October 5, 2010
-
Krebs B. Would you have spotted the fraud?. Krebs on Security 2010, Retrieved October 5, 2010, from. http://www.krebsonsecurity.com/2010/01/would-you-have-spotted-the-fraud/.
-
(2010)
Krebs on Security
-
-
Krebs, B.1
-
26
-
-
84882184685
-
Beijing beefs up cyber-warfare capacity
-
Retrieved October 5, 2010
-
Lam W. Beijing beefs up cyber-warfare capacity. Asia Times Online: 2010, Retrieved October 5, 2010, from. http://www.atimes.com/atimes/China/LB09Ad01.html.
-
(2010)
Asia Times Online:
-
-
Lam, W.1
-
27
-
-
84882189975
-
Stuxnet logbook
-
Retrieved January 5, 2010
-
Langner R. Stuxnet logbook. Langner 2010, Retrieved January 5, 2010, from. http://www.langner.com/en/.
-
(2010)
Langner
-
-
Langner, R.1
-
28
-
-
84882153318
-
Chinese police arrest six as hacker training website is closed down
-
Retrieved October 5, 2010
-
Macartney J. Chinese police arrest six as hacker training website is closed down. The Times 2010, Retrieved October 5, 2010, from. http://www.timesonline.co.uk/tol/news/world/asia/article7019850.ece.
-
(2010)
The Times
-
-
Macartney, J.1
-
29
-
-
84882116598
-
Hezbollah (a.k.a. Hizbollah, Hizbu'llah)
-
Retrieved October 5, 2010
-
Staff C. Hezbollah (a.k.a. Hizbollah, Hizbu'llah). Council on Foreign Relations 2010, Retrieved October 5, 2010, from. http://www.cfr.org/publication/9155/hezbollah_aka_hizbollah_hizbullah.html.
-
(2010)
Council on Foreign Relations
-
-
Staff, C.1
-
30
-
-
84882199508
-
Zeus Trojan bust reveals sophisticated "money mules" operation in U.S
-
Retrieved October 5, 2010
-
Vijayan J. Zeus Trojan bust reveals sophisticated "money mules" operation in U.S. Computerworld 2010, Retrieved October 5, 2010, from. http://www.computerworld.com/s/article/9189038/Zeus_Trojan_bust_reveals_sophisticated_money_mules_operation_in_U.S.?taxonomyId=82&pageNumber=2.
-
(2010)
Computerworld
-
-
Vijayan, J.1
-
32
-
-
84882235932
-
New clues point to Israel as author of Blockbuster worm, or not
-
Retrieved October 5, 2010
-
Zetter K. New clues point to Israel as author of Blockbuster worm, or not. Wired News 2010, Retrieved October 5, 2010, from. http://www.wired.com/threatlevel/2010/10/stuxnet-deconstructed/#ixzz11Eh1Y5vc.
-
(2010)
Wired News
-
-
Zetter, K.1
-
33
-
-
84882088118
-
The rise of Mafia-like cyber crime syndicates
-
Retrieved October 5, 2010
-
Zorz Z. The rise of Mafia-like cyber crime syndicates. Help Net Security 2010, Retrieved October 5, 2010, from. http://www.net-security.org/secworld.php?id=9060.
-
(2010)
Help Net Security
-
-
Zorz, Z.1
-
35
-
-
51849136680
-
-
Retrieved August 31
-
Greenberg A. America's hackable backbone. Forbes.com Retrieved August 31, 2010, from. http://www.forbes.com/2007/08/22/scada-hackers-infrastructure-tech-security-cx_ag_0822hack.html.
-
(2010)
America's hackable backbone. Forbes.com
-
-
Greenberg, A.1
-
36
-
-
84921555517
-
-
Computing Research Association. Retrieved August 31
-
Hensel C. Security Computing Research Association. Retrieved August 31, 2010, from. http://www.cra.org/govaffairs/blog/archives/cat_security.html.
-
(2010)
Security
-
-
Hensel, C.1
-
40
-
-
85145617744
-
Man-in-the-middle attack-OWASP
-
Retrieved October 8
-
Man-in-the-middle attack-OWASP OWASP Retrieved October 8, 2010, from. http://www.owasp.org/index.php/Man-in-the-middle_attack.
-
(2010)
OWASP
-
-
-
41
-
-
85145638720
-
Manpage of NEMESIS
-
Retrieved October 8
-
Manpage of NEMESIS nemesis.sourceforge.net-Packet injection tool suite Retrieved October 8, 2010, from. http://nemesis.sourceforge.net/manpages/nemesis.1.html.
-
(2010)
nemesis.sourceforge.net-Packet injection tool suite
-
-
-
43
-
-
85145639685
-
Tor: Overview
-
Retrieved October 8
-
Tor: Overview Tor: anonymity online Retrieved October 8, 2010, from. http://www.torproject.org/overview.html.en#thesolution.
-
(2010)
Tor: anonymity online
-
-
|