Page 162 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 162

SECTION II:  CYBER TERRORISM AND SECURITY IMPLICATION FOR CRITICAL INFRASTRUCTURE PROTECTION

        16. Gustav Lindstrom and Thierry Tardy. The EU and NATO essential partners, European Institute for
           Security Studies, Brussels, 2019.
        17. Info Security Magazine. Destructive Cyber-Attacks Blitz Critical Infrastructure – Report. http://
           www.infosecurity-magazine.com/news/destructive-cyber-attacks-critical/, 2015.
        18. Jaap de Hoop Scheffer. Strengthening the EU’s Cyber Defence Capabilities: Report of a CEPS
           Task Force, Centre for European Policy Studies (CEPS), Brussels, November 2018.
        19. James A. Lewis, The “Korean” Cyber Attacks and Their Implications for Cyber Conflict, Centre
           for Strategic and International Studies (CSIS), October 2009.
        20. Jose Nazario. Politically Motivated Denial of Service Attacks, Arbor Networks, 2009.
        21. Kaspersky. Critical Infrastructure Protection, 2015.
        22. Matthew J. Sklerov. Solving the Dilemma of State Responses to Cyberattacks: A Justification
           for the Use of Active Defences Against States Who Neglect Their Duty to Prevent, Military Law
           Review, 2009.
        23. National Cyber Strategy of USA, USA, September 2018.
        24. National Initiative for Cyber Security Careers and Studies. “NICE Cyber Security Workforce
           Framework”, USA, 12 December 2017.
        25. NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manuel Process.
        26. Nick Hopkins. China – “Targets NАТО Chief” in Faceboоk Spying Operation, The Observer, 11
           March 2012.
        27. Nicolas Falliere, Liam O Murchu and Eric Chien. W32 Stuxnet Dossier, Symantec Corporation,
           USA, 2010.
        28. Oliver Bullough. “Russians Wage Cyber War on Chechen Websites”, Reuters, 2002.
        29. Operation Desert Storm: Evaluation of the Air Campaign, U.S. Government Accountability Office,
           Letter Report, GAO/NSIAD-97-134, 12 June 1997, Appendix V.
        30. Recorded Future, Real-Time Threat Intelligence for ICS/SCADA Cyber Security, http://
           go.recordedfuture.com/hubfs/data-sheets/ics-scada.pdf, 2014
        31. Steven Adair. Korean/US DDoS Attacks – Perplexing, Disruptive, and Destructive, 31. Shadow
           Server Founda tion Calendar blog, 10 July 2009.
        32. Timothy L. Thomas. “Information Warfare in the Second Chechen War: Motivator for Military
           Reform?”, Foreign Military Studies Office, Fort Leavenworth, Kansas, 2002.
        33. Tim Maurer. “Proxies” and Cyberspace. Journal of Conflict & Security Law (2016), Oxford
           University Press , Vol. 21 No. 3.
        34. Trend Micro. Report on Cyber security and Critical Infrastructure in the Americas, http://www.
           trendmicro.com/cloud-content/us/pdfs/security-intelligence/ reports/critical-infrastructures-west-
           hemisphere.pdf, 2015
        35. https://resources.infosecinstitute.com/evolution-in-the-world-of-cyber-crime/#gref
        36. https://www.enigmasoftware.com/top-20-countries-the-most-cybercrime/
        37. https://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2019_02/20190208_1902-factsheet -cyber-
           defence-en.pdf
        38. https://niccs.us-cert.gov/workforce-development/cyber-security-force-framework
        39. https://ccdcoe. org/research/Tallinn-manual/
        40. https://eeas.europa.eu/headquarters/headquarters-Homepage/28286/eu-natocooperation-factsheet_en.
        41. https://www.thinkoutcyberbox.com.au/


       162
   157   158   159   160   161   162   163   164   165   166   167