Have a personal or library account? Click to login
Zero Identity — The New Cybersecurity Paradigm Cover

References

  1. 1. AP (June 2, 2021). Getting Back online After Cyberattack. https://www.cnbc.com/2021/06/02/jbs-worlds-largest-meat-producer-getting-back-online-after-cyberattack.html
  2. 2. Cohen-Almagor (April 2011). Internet History. International Journal of Techno ethics. https://ieeexplore.ieee.org/abstract/document/5622061
  3. 3. Jang-Jaccard, J. and Nepal, S. (August 2014). A survey of emerging threats in cybersecurity. Journal of Computer and Systems Sciences, 80, 5, pp. 973–993. https://doi.org/10.1016/j.jcss.2014.02.00510.1016/j.jcss.2014.02.005
  4. 4. Krigman, A. (October 22, 2020). Cyber Autopsy Series: Ukraine Power Grid Attack Makes History. https://www.globalsign.com/en/blog/cyber-autopsy-series-ukranian-power-grid-attack-makes-history
  5. 5. Morgan, S. (November 13, 2020). Cybercrime to Cost the World $10.5 Trillion Annually by 2025. Cybersecurity Ventures. https://cybersecurityventures.com/cybercrime-will-cost-the-world-16-4-billion-a-day-in-2021
  6. 6. Nield, D. (December 10, 2015). Google’s Quantum Computer is 100 million Times Faster Than Your Laptop. Science Alert. https://www.sciencealert.com/google-s-quantum-computer-is-100-million-times-faster-than-your-laptop
  7. 7. Norton (2020). Norton Cyber Security Insights Report: Global Results, Symantec. https://www.nortonlifelock.com/us/en/newsroom/press-kits/2021-norton-cyber-safety-insights-report/
  8. 8. Okereafor, K. and Adelaiye, O. (July 2020). Randomized Cyber Attacks Simulation Model: A Cyber Security Mitigation Proposal for Post Covid-19 Digital Era. International Journal of Recent Engineering Research and Development, 5, 7, pp. 61–72.
  9. 9. Pagliery, J. (August 5, 2015). The Inside Story of the Biggest Hack in History. https://money.cnn.com/2015/08/05/technology/aramco-hack/index.html
  10. 10. Perlroth, N. (June 6, 2021). Are We Waiting for Everyone to Get Hacked? New York Times.
  11. 11. Riley, T. (December 7, 2020). Cybersecurity 202: Global Losses from Cybercrime Skyrocketed to nearly $1 Trillion in 2020. The Washington Post.
  12. 12. Stewart, T. and Strausbaugh, S. (September 26, 2017). The 8 Character Password is Dead. Protiviti, https://tcblog.protiviti.com/2017/09/26/the-8-character-password-is-dead
  13. 13. Turton, W. and Mehrotra, K. (June 4, 2021). Hackers Breach Colonial Pipeline Using Compromised Password. Bloomberg, https://www.bloomberg.com/news/articles/2021-06-04/hackers-breached-colonial-pipeline-using-compromised-password
  14. 14. So, H.K., Kwok, S.H.M., Lam, E.Y., and Lui, K. (2010). Zero-Configuration Identity-Based Signcryption Scheme for Smart Grid. 2010 First IEEE International Conference on Smart Grid Communications, pp. 321–326. Doi: 10.1109/SMARTGRID.2010.5622061.10.1109/SMARTGRID.2010.5622061
  15. 15. Vailshery, L. (January 22, 2021). Average Number of Devices in the Typical American Home. Statista, https://www.statista.com/statistics/1107206/average-number-of-connected-devices-us-house
DOI: https://doi.org/10.2478/minib-2021-0023 | Journal eISSN: 2353-8414 | Journal ISSN: 2353-8503
Language: English
Page range: 97 - 109
Published on: Feb 2, 2022
Published by: ŁUKASIEWICZ RESEARCH NETWORK – INSTITUTE OF AVIATION
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2022 Wayne Ronhaar, William Bradley Zehner, Robert Langhorne, published by ŁUKASIEWICZ RESEARCH NETWORK – INSTITUTE OF AVIATION
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.