Have a personal or library account? Click to login
Study Regarding the Cyber Threats to the National Security Cover

Study Regarding the Cyber Threats to the National Security

Open Access
|Sep 2020

References

  1. Agrafiotis, A., Nurse, J., Goldsmith, M., Creese, S., & Upton, D. (2018). A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, Vol. 4, Issue 1.10.1093/cybsec/tyy006
  2. Carnegie Endowment for International Peace. (2020). Timeline of Cyber Incidents Involving Financial Institutions. Washington.
  3. Dearden, L. (2017). Ukraine cyber attack: Chaos as national bank, state power provider and airport hit by hackers. The Independent, available at: https://www.independent.co.uk/news/world/europe/ukraine-cyber-attack-hackers-national-bank-state-power-company-airportrozenko-pavlo-cabinet-a7810471.html, accessed on 09 April 2020.
  4. Gandhi, R. et al. (2011). Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political. IEEE Technology and Society Magazine.10.1109/MTS.2011.940293
  5. Gunaratna, R. et al. (2017). Cyber Terrorism: Assessment of the Threat to Insurance. United Kingdom: Cambridge Centre for Risk Studies.
  6. Hopper, T. (2015). Ashley Madison aftermath: Confessions, suicide reports and hot on the hacker’s trail. The National Post, available at: https://nationalpost.com/news/canada/ashley-madison-aftermath-confessions-suicide-reports-and-hot-on-the-hackers-trail, accessed on 09 April 2020.
  7. Maxat, A., Vassilakis, V.G., & Logothetis, M.D. (2019). WannaCry Ransomware: Analysis of Infection, Persistence, Recovery Prevention and Propagation Mechanisms. Journal of Telecommunications and Information Technology, Vol. 1, Issue 1.
  8. McGuire, M. (2012). Organised Crime in the Digital Age. London: John Grieve Centre for Policing and Security.
  9. McQuade, M. (2018). The Untold Story of NotPetya, the Most Devastating Cyberattack in History. The Wired Magazine.
  10. Mills, C. (2017). Nuclear Weapons – Country Comparisons. London: House of Commons Library.
  11. Perez, E. (2016). U.S. official blames Russia for power grid attack in Ukraine. CNN, available at: https://edition.cnn.com/2016/02/11/politics/ukraine-power-grid-attack-russiaus/index.html, accessed on 07 May 2020.
  12. Romanian National Computer Security Incident Response Team. (2018). Threats evolution in the Romanian cyberspace 2018. Bucharest.
  13. Roscini, M. (2014). Cyber Operations and the Use of Force in International Law. Oxford: Oxford University Press.10.1093/acprof:oso/9780199655014.001.0001
  14. Satter, R., Stubbs, J., & Bing, C. (2020). Hackers tried to infiltrate the World Health Organization, the latest in a string of cyberattacks aimed at health officials during the coronavirus pandemic. Reuters, available at: https://www.businessinsider.com/world-healthorganization-hack-tried-steal-passwords-with-fake-website-2020-3?r=US&IR=T, accessed on 12 April 2020.
  15. Trend Micro. (2015). US OPM Hack Exposes Data of 4 Million Federal Employees, available at: https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/us-opm-hackexposes-data-of-4-million-federal-employees, accessed on 09 April 2020.
  16. Whitehead, D. E, Owens, K., Gammel, D., & Smith, J. (2017). Ukraine Cyber-Induced Power Outage: Analysis and Practical Mitigation Strategies. 70th Annual Conference for Protective Relay Engineers, Washington.10.1109/CPRE.2017.8090056
DOI: https://doi.org/10.2478/bsaft-2020-0003 | Journal eISSN: 3100-5098 | Journal ISSN: 3100-508X
Language: English
Page range: 18 - 25
Published on: Sep 23, 2020
Published by: Nicolae Balcescu Land Forces Academy
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2020 George-Daniel Bobric, published by Nicolae Balcescu Land Forces Academy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.