Page 162 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 162
SECTION II: CYBER TERRORISM AND SECURITY IMPLICATION FOR CRITICAL INFRASTRUCTURE PROTECTION
16. Gustav Lindstrom and Thierry Tardy. The EU and NATO essential partners, European Institute for
Security Studies, Brussels, 2019.
17. Info Security Magazine. Destructive Cyber-Attacks Blitz Critical Infrastructure – Report. http://
www.infosecurity-magazine.com/news/destructive-cyber-attacks-critical/, 2015.
18. Jaap de Hoop Scheffer. Strengthening the EU’s Cyber Defence Capabilities: Report of a CEPS
Task Force, Centre for European Policy Studies (CEPS), Brussels, November 2018.
19. James A. Lewis, The “Korean” Cyber Attacks and Their Implications for Cyber Conflict, Centre
for Strategic and International Studies (CSIS), October 2009.
20. Jose Nazario. Politically Motivated Denial of Service Attacks, Arbor Networks, 2009.
21. Kaspersky. Critical Infrastructure Protection, 2015.
22. Matthew J. Sklerov. Solving the Dilemma of State Responses to Cyberattacks: A Justification
for the Use of Active Defences Against States Who Neglect Their Duty to Prevent, Military Law
Review, 2009.
23. National Cyber Strategy of USA, USA, September 2018.
24. National Initiative for Cyber Security Careers and Studies. “NICE Cyber Security Workforce
Framework”, USA, 12 December 2017.
25. NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manuel Process.
26. Nick Hopkins. China – “Targets NАТО Chief” in Faceboоk Spying Operation, The Observer, 11
March 2012.
27. Nicolas Falliere, Liam O Murchu and Eric Chien. W32 Stuxnet Dossier, Symantec Corporation,
USA, 2010.
28. Oliver Bullough. “Russians Wage Cyber War on Chechen Websites”, Reuters, 2002.
29. Operation Desert Storm: Evaluation of the Air Campaign, U.S. Government Accountability Office,
Letter Report, GAO/NSIAD-97-134, 12 June 1997, Appendix V.
30. Recorded Future, Real-Time Threat Intelligence for ICS/SCADA Cyber Security, http://
go.recordedfuture.com/hubfs/data-sheets/ics-scada.pdf, 2014
31. Steven Adair. Korean/US DDoS Attacks – Perplexing, Disruptive, and Destructive, 31. Shadow
Server Founda tion Calendar blog, 10 July 2009.
32. Timothy L. Thomas. “Information Warfare in the Second Chechen War: Motivator for Military
Reform?”, Foreign Military Studies Office, Fort Leavenworth, Kansas, 2002.
33. Tim Maurer. “Proxies” and Cyberspace. Journal of Conflict & Security Law (2016), Oxford
University Press , Vol. 21 No. 3.
34. Trend Micro. Report on Cyber security and Critical Infrastructure in the Americas, http://www.
trendmicro.com/cloud-content/us/pdfs/security-intelligence/ reports/critical-infrastructures-west-
hemisphere.pdf, 2015
35. https://resources.infosecinstitute.com/evolution-in-the-world-of-cyber-crime/#gref
36. https://www.enigmasoftware.com/top-20-countries-the-most-cybercrime/
37. https://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2019_02/20190208_1902-factsheet -cyber-
defence-en.pdf
38. https://niccs.us-cert.gov/workforce-development/cyber-security-force-framework
39. https://ccdcoe. org/research/Tallinn-manual/
40. https://eeas.europa.eu/headquarters/headquarters-Homepage/28286/eu-natocooperation-factsheet_en.
41. https://www.thinkoutcyberbox.com.au/
162