메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1-254

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

(2)  Gragido, Will a   Pirc, John a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85145638183     PISSN: None     EISSN: None     Source Type: Book    
DOI: None     Document Type: Book
Times cited : (11)

References (47)
  • 1
    • 85145637313 scopus 로고    scopus 로고
    • 2008 Update of HIPAA enforcement indicates importance of compliance to reduce risks to covered entities
    • Undated. Retrieved August 31
    • 2008 Update of HIPAA enforcement indicates importance of compliance to reduce risks to covered entities undated. Retrieved August 31, 2010, from. http://www.hipaasolutions.org/documents/HIPAAEnforcementUp-Date-2008.pdf.
    • (2010)
  • 2
    • 84878869057 scopus 로고    scopus 로고
    • About the PCI Data Security Standard (PCI DSS)
    • Undated. Retrieved August 17
    • About the PCI Data Security Standard (PCI DSS) undated. Retrieved August 17, 2010, from. https://www.pcisecuritystandards.org/security_standards/pci_dss.shtml.
    • (2010)
  • 3
    • 78650166809 scopus 로고    scopus 로고
    • Information privacy-Wikipedia, the free encyclopedia
    • Retrieved September 20
    • Information privacy-Wikipedia, the free encyclopedia Retrieved September 20, 2010, from. http://www.en.wikipedia.org/wiki/Information_privacy.
    • (2010)
  • 4
    • 67649573353 scopus 로고    scopus 로고
    • Retrieved August 30
    • Office of the Secretary U.S. Department of Health and Human Services Retrieved August 30, 2010, from. http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/securityrulepdf.pdf.
    • (2010) U.S. Department of Health and Human Services
  • 6
    • 84886140496 scopus 로고    scopus 로고
    • Safe Harbor Privacy Principles
    • Retrieved September 20
    • Safe Harbor Privacy Principles Retrieved September 20, 2010, from. http://www.export.gov/safeharbor/eu/eg_main_018475.asp.
    • (2010)
  • 7
    • 84882222819 scopus 로고    scopus 로고
    • Standard CIP-005-2, Cyber Security-Electronic Security Perimeter(s)
    • 2009, Retrieved July 12, 2010
    • Standard CIP-005-2, Cyber Security-Electronic Security Perimeter(s). North American Electric Reliability Corporation™ (NERC) 2009, 2009, Retrieved July 12, 2010, from. http://www.nerc.com/files/CIP-005-2.pdf.
    • (2009) North American Electric Reliability Corporation™ (NERC)
  • 8
    • 85145641164 scopus 로고    scopus 로고
    • § 1030: Fraud and related activity in connection with computers
    • Retrieved September 20, from, February 8
    • § 1030: Fraud and related activity in connection with computers United States Department of Justice Retrieved September 20, 2010, from, February 8. http://www.justice.gov/criminal/cybercrime/1030NEW.htm.
    • (2010) United States Department of Justice
  • 9
    • 85145628089 scopus 로고    scopus 로고
    • Retrieved September 20, from, undated
    • Coercion Texas computer crime law. Steve Jackson Games Retrieved September 20, 2010, from, undated. http://www.sjgames.com/SS/texaslaw.html.
    • (2010) Texas computer crime law. Steve Jackson Games
  • 15
    • 85145629974 scopus 로고    scopus 로고
    • Incompatible Browser | Facebook
    • Retrieved August 31
    • Incompatible Browser | Facebook Retrieved August 31, 2010, from. http://www.facebook.com/terms.php?ref.
    • (2010)
  • 16
    • 84882191460 scopus 로고    scopus 로고
    • Retrieved August 31
    • Mackenzie K. Cyber attacks on oil majors FT.com Retrieved August 31, 2010, from. http://blogs.ft.com/energy-source/2010/01/26/cyber-attacks-on-oil-majors/.
    • (2010) Cyber attacks on oil majors FT.com
    • Mackenzie, K.1
  • 17
    • 84882113404 scopus 로고    scopus 로고
    • Retrieved August 31, 2010
    • Online Fraud Chase Bank 2010, Retrieved August 31, 2010, from. http://www.chase.com/index.jsp?pg_name=ccpmapp/privacy_security/fraud/page/fraud_examples.
    • (2010) Chase Bank
  • 19
    • 85145633388 scopus 로고    scopus 로고
    • Twitter Terms of Service
    • Retrieved August 31
    • Twitter Terms of Service Twitter Retrieved August 31, 2010, from. http://twitter.com/tos.
    • (2010) Twitter
  • 20
    • 84882100563 scopus 로고    scopus 로고
    • K. Honker Union of China to launch network attacks against Japan is a rumor
    • Retrieved October 5, 2010
    • K. Honker Union of China to launch network attacks against Japan is a rumor. China Hush 2010, Retrieved October 5, 2010, from. http://www.chinahush.com/2010/09/15/honker-union-of-china-to-launch-network-attack-against-japan-is-a-rumor/.
    • (2010) China Hush
  • 21
    • 84902032782 scopus 로고    scopus 로고
    • Hezbollah's cyber warfare program
    • Retrieved October 5, 2010
    • Coleman K. Hezbollah's cyber warfare program. Defense Tech 2008, Retrieved October 5, 2010, from. http://defensetech.org/2008/06/02/hezbollahs-cyber-warfare-program/.
    • (2008) Defense Tech
    • Coleman, K.1
  • 22
    • 84882087931 scopus 로고    scopus 로고
    • Considerations about the Chinese Intelligence Services (II)
    • Retrieved October 5, 2010
    • Dumitrescu O. Considerations about the Chinese Intelligence Services (II). Conflict Resolutions and World Security Solutions 2010, Retrieved October 5, 2010, from. http://www.worldsecuritynetwork.com/showArticle3.cfm?article_id=18347&topicID=66.
    • (2010) Conflict Resolutions and World Security Solutions
    • Dumitrescu, O.1
  • 23
    • 84882094901 scopus 로고    scopus 로고
    • Inside the Aurora (Google attack) malware
    • undated, Retrieved October 5, 2010
    • Fisher D. Inside the Aurora (Google attack) malware. Threatpost 2010, undated, Retrieved October 5, 2010, from. http://www.threatpost.com/en_us/blogs/inside-aurora-malware-011910.
    • (2010) Threatpost
    • Fisher, D.1
  • 24
    • 84882191409 scopus 로고    scopus 로고
    • Cyber-attack turns physical
    • Retrieved September 28, 2010
    • Fulghum D. Cyber-attack turns physical. Aviation Week 2010, Retrieved September 28, 2010, from. http://www.aviationweek.com/aw/generic/story_channel.jsp?channel=defense&id=news/asd/2010/09/27/05.xml&headline=Cyber-Attack%20Turns%20Physical.
    • (2010) Aviation Week
    • Fulghum, D.1
  • 25
    • 84902032785 scopus 로고    scopus 로고
    • Would you have spotted the fraud?
    • Retrieved October 5, 2010
    • Krebs B. Would you have spotted the fraud?. Krebs on Security 2010, Retrieved October 5, 2010, from. http://www.krebsonsecurity.com/2010/01/would-you-have-spotted-the-fraud/.
    • (2010) Krebs on Security
    • Krebs, B.1
  • 26
    • 84882184685 scopus 로고    scopus 로고
    • Beijing beefs up cyber-warfare capacity
    • Retrieved October 5, 2010
    • Lam W. Beijing beefs up cyber-warfare capacity. Asia Times Online: 2010, Retrieved October 5, 2010, from. http://www.atimes.com/atimes/China/LB09Ad01.html.
    • (2010) Asia Times Online:
    • Lam, W.1
  • 27
    • 84882189975 scopus 로고    scopus 로고
    • Stuxnet logbook
    • Retrieved January 5, 2010
    • Langner R. Stuxnet logbook. Langner 2010, Retrieved January 5, 2010, from. http://www.langner.com/en/.
    • (2010) Langner
    • Langner, R.1
  • 28
    • 84882153318 scopus 로고    scopus 로고
    • Chinese police arrest six as hacker training website is closed down
    • Retrieved October 5, 2010
    • Macartney J. Chinese police arrest six as hacker training website is closed down. The Times 2010, Retrieved October 5, 2010, from. http://www.timesonline.co.uk/tol/news/world/asia/article7019850.ece.
    • (2010) The Times
    • Macartney, J.1
  • 29
    • 84882116598 scopus 로고    scopus 로고
    • Hezbollah (a.k.a. Hizbollah, Hizbu'llah)
    • Retrieved October 5, 2010
    • Staff C. Hezbollah (a.k.a. Hizbollah, Hizbu'llah). Council on Foreign Relations 2010, Retrieved October 5, 2010, from. http://www.cfr.org/publication/9155/hezbollah_aka_hizbollah_hizbullah.html.
    • (2010) Council on Foreign Relations
    • Staff, C.1
  • 30
    • 84882199508 scopus 로고    scopus 로고
    • Zeus Trojan bust reveals sophisticated "money mules" operation in U.S
    • Retrieved October 5, 2010
    • Vijayan J. Zeus Trojan bust reveals sophisticated "money mules" operation in U.S. Computerworld 2010, Retrieved October 5, 2010, from. http://www.computerworld.com/s/article/9189038/Zeus_Trojan_bust_reveals_sophisticated_money_mules_operation_in_U.S.?taxonomyId=82&pageNumber=2.
    • (2010) Computerworld
    • Vijayan, J.1
  • 32
    • 84882235932 scopus 로고    scopus 로고
    • New clues point to Israel as author of Blockbuster worm, or not
    • Retrieved October 5, 2010
    • Zetter K. New clues point to Israel as author of Blockbuster worm, or not. Wired News 2010, Retrieved October 5, 2010, from. http://www.wired.com/threatlevel/2010/10/stuxnet-deconstructed/#ixzz11Eh1Y5vc.
    • (2010) Wired News
    • Zetter, K.1
  • 33
    • 84882088118 scopus 로고    scopus 로고
    • The rise of Mafia-like cyber crime syndicates
    • Retrieved October 5, 2010
    • Zorz Z. The rise of Mafia-like cyber crime syndicates. Help Net Security 2010, Retrieved October 5, 2010, from. http://www.net-security.org/secworld.php?id=9060.
    • (2010) Help Net Security
    • Zorz, Z.1
  • 35
    • 51849136680 scopus 로고    scopus 로고
    • Retrieved August 31
    • Greenberg A. America's hackable backbone. Forbes.com Retrieved August 31, 2010, from. http://www.forbes.com/2007/08/22/scada-hackers-infrastructure-tech-security-cx_ag_0822hack.html.
    • (2010) America's hackable backbone. Forbes.com
    • Greenberg, A.1
  • 36
    • 84921555517 scopus 로고    scopus 로고
    • Computing Research Association. Retrieved August 31
    • Hensel C. Security Computing Research Association. Retrieved August 31, 2010, from. http://www.cra.org/govaffairs/blog/archives/cat_security.html.
    • (2010) Security
    • Hensel, C.1
  • 40
    • 85145617744 scopus 로고    scopus 로고
    • Man-in-the-middle attack-OWASP
    • Retrieved October 8
    • Man-in-the-middle attack-OWASP OWASP Retrieved October 8, 2010, from. http://www.owasp.org/index.php/Man-in-the-middle_attack.
    • (2010) OWASP
  • 41
    • 85145638720 scopus 로고    scopus 로고
    • Manpage of NEMESIS
    • Retrieved October 8
    • Manpage of NEMESIS nemesis.sourceforge.net-Packet injection tool suite Retrieved October 8, 2010, from. http://nemesis.sourceforge.net/manpages/nemesis.1.html.
    • (2010) nemesis.sourceforge.net-Packet injection tool suite
  • 43
    • 85145639685 scopus 로고    scopus 로고
    • Tor: Overview
    • Retrieved October 8
    • Tor: Overview Tor: anonymity online Retrieved October 8, 2010, from. http://www.torproject.org/overview.html.en#thesolution.
    • (2010) Tor: anonymity online


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.