- Home
- About Us & Project Introduction
- What Are "Cyber Security" and "Cyber Attack"?
- Why Does Cyber Security Matter?
- International and Local Cooperation on Cyber Attacks
- Simple Steps Towards Enhanced Cyber Security
- Educating the Public
- Video Reviews & Useful Resources
- Bibliography
- Acknowledgements
Bibliography
Cole, E. (n.d.) The importance of cybersecurity. Retrieved from http://drericcole.blogspot.com/2011/02/importance-of-cyber-security.html
Krebs, A. (2009, November 6). The importance of cybersecurity. Retrieved from http://learning.allcovered.com/backup/the-importance-of-cyber-security/
Beal, V. (2010, June 29). The difference between a computer virus, worm and trojan horse. Retrieved from http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp
Acohido, B. (2010, September 27). Facebook, twitter see more spam attack. The USA Today. Retrieved from http://www.usatoday.com/tech/news/2010-09-27-socialnetspam27_ST_N.htm
Estes, A. C. (2011, November 15). The dirty details of facebook’s porn attack. The Atlantic Wire. Retrieved from http://www.theatlanticwire.com/technology/2011/11/dirty-details-facebooks-porn-attack/45029/
Webopedia Computer Dictionary. (n.d.). What is phishing?. Retrieved from http://www.webopedia.com/TERM/P/phishing.html
Wilson, T. V. (n.d.). How phishing works? Retrieved from http://computer.howstuffworks.com/phishing.htm
McDowell, M. (2009, November 4). National cyber alert system: understanding denial-of-service attack. Retrieved from http://www.us-cert.gov/cas/tips/ST04-015.html
Kelion, L. (2012, January 20). Hackers retaliate over megaupload website shutdown. BBC. Retreived from http://www.bbc.co.uk/news/technology-16646023
Kelly. M. (2011, November 9). FBI cracks longest botnet scheme in history, affecting over 4 million people. VentureBeat. Retrieved from http://venturebeat.com/2011/11/09/fbi-operation-ghost-click/
Rubin, C. (2010, January 29). The high cost of cyber attacks. The Inc.com. Retrieved from http://www.inc.com/news/articles/2010/01/reports-warns-of-growing-cyberattack-threat.html
Clayton, M. (2010, January 25). US oil industry hit by cyberattacks: Was China involved? The Christian Monitor. Retrieved from http://www.csmonitor.com/USA/2010/0125/US-oil-industry-hit-by-cyberattacks-Was-China-involved
Sony says 25m more users hit in second cyber attack (2011, May 3). The Telegraph. Retrieved from http://www.telegraph.co.uk/technology/sony/8489147/Sony-says-25m-more-users-hit-in-second-cyber-attack.html
Traynor, I. (2007, May 17). Russia accused of unleashing cyberwar to disable Estonia. The Guardian. Retreived from http://www.guardian.co.uk/world/2007/may/17/topstories3.russia
Coalson, R. (2002, March 6). Behind the estonian cyberattacks. Radio Free Europe/Radio Liberty. Retrieved from http://www.rferl.org/content/Behind_The_Estonia_Cyberattacks/1505613.html
Schneier, B. (2010, December 2). It will soon be too late to stop the cyberwars. Schneier.com. Retrieved from http://www.schneier.com/essay-334.html. [Original Article from the Financial Times]
Wikipedia Foundation. (n.d.). July 2009 cyber attacks. Retrieved from http://en.wikipedia.org/wiki/July_2009_cyber_attacks
Wikipedia Foundation. (n.d.). Stuxnet. Retrieved from http://en.wikipedia.org/wiki/Stuxnet
Eddy, M. (2011, October 11). German government fesses up to spying on citizens with trojan, says it’s legal. Retrieved from http://www.geekosystem.com/german-gov-trojan/
TEDtalks. (Producer). (2011). Three types of online attack. [Web Video]. Retrieved from http://blog.ted.com/2012/01/18/three-types-of-online-attack-mikko-hypponen-on-ted-com/
Artene Diana. (2011, October 25). International cyber security through co-operation. economics, managemnet, and financial markets.. Retrieved from http://www.iccs.fordham.edu/
Clawson, P. (2009, October 8). A page from singapore’s cybersecurity playbook. Retrieved from
http://blog.lumension.com/2249/a-page-from-singapores-cybersecurity-playbook/
Council of Europe. (n.d.). Convention on cybercrime. Retrieved from
http://conventions.coe.int/treaty/en/reports/html/185.htm
Council of Europe's Official Website. (n.d.). Cybercrime. Retrieved from
http://www.coe.int/t/DGHL/cooperation/economiccrime/cybercrime/default_en.asp
McGee, J. (2011, July 08). Nato and cyber defense: A brief overview and recent events. Retrieved from http://csis.org/blog/nato-and-cyber-defense-brief-overview-and-recent-events
MYRLI, S. (2009). 173 dscfc 09 e bis - nato and cyber defence. Retrieved from http://www.nato-pa.int/default.Asp?SHORTCUT=1782
Infocomm Development Authority Singapore. (2010, April 05). Infocomm Security Masterplan 2 (MP2). Retrieved from http://www.ida.gov.sg/Programmes/20060925100740.aspx?getPage [Additional resource: http://www.ida.gov.sg/doc/News%20and%20Events/News_and_Events_Level2/20080417090044/MR17Apr08MP2.pdf]
SingCERT. (n.d.) About SingCERT. Retrived from http://www.singcert.org.sg/index.php?option=com_content&view=article&id=16&Itemid=43
Singapore Global Dialogue. (2011, September 11). DPM Teo Chee Hean Opens the Singapore Global Dialogue. Retrieved from http://www.singaporeglobaldialogue.com/2011/Newsroom/MediaReleases-Sub.jsp?pressReleaseID=7
Clawson, P. (2009, October 20). Taking a Page From Singapore's Cybersecurity Playbook. Retrieved from http://threatpost.com/en_us/blogs/taking-page-singapores-cybersecurity-playbook-102009
Photo Credits
Photo of Bruce Schenier (top left of the website) - http://www.flickr.com/photos/pnnl/4295162815/sizes/m/in/photostream/
Sources to other photos can be found in the captions below each photo.
Krebs, A. (2009, November 6). The importance of cybersecurity. Retrieved from http://learning.allcovered.com/backup/the-importance-of-cyber-security/
Beal, V. (2010, June 29). The difference between a computer virus, worm and trojan horse. Retrieved from http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp
Acohido, B. (2010, September 27). Facebook, twitter see more spam attack. The USA Today. Retrieved from http://www.usatoday.com/tech/news/2010-09-27-socialnetspam27_ST_N.htm
Estes, A. C. (2011, November 15). The dirty details of facebook’s porn attack. The Atlantic Wire. Retrieved from http://www.theatlanticwire.com/technology/2011/11/dirty-details-facebooks-porn-attack/45029/
Webopedia Computer Dictionary. (n.d.). What is phishing?. Retrieved from http://www.webopedia.com/TERM/P/phishing.html
Wilson, T. V. (n.d.). How phishing works? Retrieved from http://computer.howstuffworks.com/phishing.htm
McDowell, M. (2009, November 4). National cyber alert system: understanding denial-of-service attack. Retrieved from http://www.us-cert.gov/cas/tips/ST04-015.html
Kelion, L. (2012, January 20). Hackers retaliate over megaupload website shutdown. BBC. Retreived from http://www.bbc.co.uk/news/technology-16646023
Kelly. M. (2011, November 9). FBI cracks longest botnet scheme in history, affecting over 4 million people. VentureBeat. Retrieved from http://venturebeat.com/2011/11/09/fbi-operation-ghost-click/
Rubin, C. (2010, January 29). The high cost of cyber attacks. The Inc.com. Retrieved from http://www.inc.com/news/articles/2010/01/reports-warns-of-growing-cyberattack-threat.html
Clayton, M. (2010, January 25). US oil industry hit by cyberattacks: Was China involved? The Christian Monitor. Retrieved from http://www.csmonitor.com/USA/2010/0125/US-oil-industry-hit-by-cyberattacks-Was-China-involved
Sony says 25m more users hit in second cyber attack (2011, May 3). The Telegraph. Retrieved from http://www.telegraph.co.uk/technology/sony/8489147/Sony-says-25m-more-users-hit-in-second-cyber-attack.html
Traynor, I. (2007, May 17). Russia accused of unleashing cyberwar to disable Estonia. The Guardian. Retreived from http://www.guardian.co.uk/world/2007/may/17/topstories3.russia
Coalson, R. (2002, March 6). Behind the estonian cyberattacks. Radio Free Europe/Radio Liberty. Retrieved from http://www.rferl.org/content/Behind_The_Estonia_Cyberattacks/1505613.html
Schneier, B. (2010, December 2). It will soon be too late to stop the cyberwars. Schneier.com. Retrieved from http://www.schneier.com/essay-334.html. [Original Article from the Financial Times]
Wikipedia Foundation. (n.d.). July 2009 cyber attacks. Retrieved from http://en.wikipedia.org/wiki/July_2009_cyber_attacks
Wikipedia Foundation. (n.d.). Stuxnet. Retrieved from http://en.wikipedia.org/wiki/Stuxnet
Eddy, M. (2011, October 11). German government fesses up to spying on citizens with trojan, says it’s legal. Retrieved from http://www.geekosystem.com/german-gov-trojan/
TEDtalks. (Producer). (2011). Three types of online attack. [Web Video]. Retrieved from http://blog.ted.com/2012/01/18/three-types-of-online-attack-mikko-hypponen-on-ted-com/
Artene Diana. (2011, October 25). International cyber security through co-operation. economics, managemnet, and financial markets.. Retrieved from http://www.iccs.fordham.edu/
Clawson, P. (2009, October 8). A page from singapore’s cybersecurity playbook. Retrieved from
http://blog.lumension.com/2249/a-page-from-singapores-cybersecurity-playbook/
Council of Europe. (n.d.). Convention on cybercrime. Retrieved from
http://conventions.coe.int/treaty/en/reports/html/185.htm
Council of Europe's Official Website. (n.d.). Cybercrime. Retrieved from
http://www.coe.int/t/DGHL/cooperation/economiccrime/cybercrime/default_en.asp
McGee, J. (2011, July 08). Nato and cyber defense: A brief overview and recent events. Retrieved from http://csis.org/blog/nato-and-cyber-defense-brief-overview-and-recent-events
MYRLI, S. (2009). 173 dscfc 09 e bis - nato and cyber defence. Retrieved from http://www.nato-pa.int/default.Asp?SHORTCUT=1782
Infocomm Development Authority Singapore. (2010, April 05). Infocomm Security Masterplan 2 (MP2). Retrieved from http://www.ida.gov.sg/Programmes/20060925100740.aspx?getPage [Additional resource: http://www.ida.gov.sg/doc/News%20and%20Events/News_and_Events_Level2/20080417090044/MR17Apr08MP2.pdf]
SingCERT. (n.d.) About SingCERT. Retrived from http://www.singcert.org.sg/index.php?option=com_content&view=article&id=16&Itemid=43
Singapore Global Dialogue. (2011, September 11). DPM Teo Chee Hean Opens the Singapore Global Dialogue. Retrieved from http://www.singaporeglobaldialogue.com/2011/Newsroom/MediaReleases-Sub.jsp?pressReleaseID=7
Clawson, P. (2009, October 20). Taking a Page From Singapore's Cybersecurity Playbook. Retrieved from http://threatpost.com/en_us/blogs/taking-page-singapores-cybersecurity-playbook-102009
Photo Credits
Photo of Bruce Schenier (top left of the website) - http://www.flickr.com/photos/pnnl/4295162815/sizes/m/in/photostream/
Sources to other photos can be found in the captions below each photo.