Have a personal or library account? Click to login
Cyberattack — Examples of Threats Cover
Open Access
|Dec 2019

References

  1. [1] Białas A., Bezpieczeństwo informacji i usług w nowoczesnej instytucji i firmie, Publ. WNT, Warszawa 2007, pp. 10, 33, 43 [Information and services security within modern organizations and probabilities — available in Polish].
  2. [2] Committee on National Security Systems (CNSS) Glossary, CNSSI No. 4009, April 2015, pp. 50, 61.
  3. [3] Goodman M., Zbrodnie przyszłości. Jak cyberprzestępcy, korporacje i państwa mogą używać technologii przeciwko tobie, Publ. Helion, Gliwice 2016, pp. 208, 222 [Future Crimes: Everything is Connected, Everyone is Vulnerable — available in Polish].
  4. [4] NIST Special Publication 800-39, National Institute of Standard and Technology, Managing Information Security Risk Organization, Mission and Information System View, Information Security, March 2011, pp. B-1.
  5. [5] Ransom.Cryptolocker, [online], https://www.symantec.com/security-center/writeup/2013-091122-3112-99 [access 05.09.2019].
  6. [6] Shirey R., Internet Security Glossary, IETF 2000, RFC 2828, [online], https://www.rfc-editor.org/rfc/rfc2828.txt [access 18.03.2019].
  7. [7] Trend Micro, [online], https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/backdoor.linux.setag.rpb [access 05.09.2019].
Language: English
Page range: 29 - 39
Submitted on: Mar 25, 2019
Accepted on: Dec 9, 2019
Published on: Dec 31, 2019
Published by: Polish Naval Academy
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2019 Adam Stojałowski, published by Polish Naval Academy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.