Knowledge

Computer security

Source 📝

550: 1254:. Attackers can use creative ways to gain access to real accounts. A common scam is for attackers to send fake electronic invoices to individuals showing that they recently purchased music, apps, or others, and instructing them to click on a link if the purchases were not authorized. A more strategic type of phishing is spear-phishing which leverages personal or organization-specific details to make the attacker appear like a trusted source. Spear-phishing attacks target specific individuals, rather than the broad net cast by phishing attempts. 999:, direct-access attacks, or other forms of cyber attacks, eavesdropping attacks are unlikely to negatively affect the performance of networks or devices, making them difficult to notice. In fact, "the attacker does not need to have any ongoing connection to the software at all. The attacker can insert the software onto a compromised device, perhaps by direct insertion or perhaps by a virus or other malware, and then come back some time later to retrieve any data that is found or trigger the software to send the data at some determined time." 3185:
Incident response planning allows an organization to establish a series of best practices to stop an intrusion before it causes damage. Typical incident response plans contain a set of written instructions that outline the organization's response to a cyberattack. Without a documented plan in place, an organization may not successfully detect an intrusion or compromise and stakeholders may not understand their roles, processes and procedures during an escalation, slowing the organization's response and resolution.
3529:, he believes that the "industry only responds when you threaten regulation. If the industry doesn't respond (to the threat), you have to follow through." On the other hand, executives from the private sector agree that improvements are necessary, but think that government intervention would affect their ability to innovate efficiently. Daniel R. McCarthy analyzed this public-private partnership in cybersecurity and reflected on the role of cybersecurity in the broader constitution of political order. 4515: 1513:
discovered 30% of cybersecurity incidents involved internal actors within a company. Research shows information security culture needs to be improved continuously. In "Information Security Culture from Analysis to Change", authors commented, "It's a never-ending process, a cycle of evaluation and change or maintenance." To manage the information security culture, five steps should be taken: pre-evaluation, strategic planning, operative planning, implementation, and post-evaluation.
3686:(CCIRC) is responsible for mitigating and responding to threats to Canada's critical infrastructure and cyber systems. It provides support to mitigate cyber threats, technical support to respond & recover from targeted cyber attacks, and provides online tools for members of Canada's critical infrastructure sectors. It posts regular cybersecurity bulletins & operates an online reporting tool where individuals and organizations can report a cyber incident. 15872: 2192:
containing sensitive data and attachments to the wrong recipient, the inability to recognize misleading URLs and to identify fake websites and dangerous email attachments. A common mistake that users make is saving their user id/password in their browsers to make it easier to log in to banking sites. This is a gift to attackers who have obtained access to a machine by some means. The risk may be mitigated by the use of two-factor authentication.
14431: 1188: 15882: 647: 15892: 2974:
virtual) threat. If a front door's lock is connected to the Internet, and can be locked/unlocked from a phone, then a criminal could enter the home at the press of a button from a stolen or hacked phone. People could stand to lose much more than their credit card numbers in a world controlled by IoT-enabled devices. Thieves have also used electronic means to circumvent non-Internet-connected hotel door locks.
2938:, all utilize secure controlled access technology for any of their buildings. However, the use of this form of technology is spreading into the entrepreneurial world. More and more companies are taking advantage of the development of digitally secure controlled access technology. GE's ACUVision, for example, offers a single panel platform for access control, alarm monitoring and digital recording. 3035:. An attack could cause a loss of power in a large area for a long period of time, and such an attack could have just as severe consequences as a natural disaster. The District of Columbia is considering creating a Distributed Energy Resources (DER) Authority within the city, with the goal being for customers to have more insight into their own energy use and giving the local electric utility, 919:(DoS) are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim's account to be locked, or they may overload the capabilities of a machine or network and block all users at once. While a network attack from a single 3952:. In 2017, CCIPS published A Framework for a Vulnerability Disclosure Program for Online Systems to help organizations "clearly describe authorized vulnerability disclosure and discovery conduct, thereby substantially reducing the likelihood that such described activities will result in a civil or criminal violation of law under the Computer Fraud and Abuse Act (18 U.S.C. § 1030)." 3426:
company's CEO, to prove their point, and threatened to dump customer data unless the website was taken down permanently. When Avid Life Media did not take the site offline the group released two more compressed files, one 9.7GB and the second 20GB. After the second data dump, Avid Life Media CEO Noel Biderman resigned; but the website remained to function.
4683:'s arrival and with the digital transformation initiated in recent years, the notion of cybersecurity has become a familiar subject in both our professional and personal lives. Cybersecurity and cyber threats have been consistently present for the last 60 years of technological change. In the 1970s and 1980s, computer security was mainly limited to 1053:) is any software code or computer program "intentionally written to harm a computer system or its users." Once present on a computer, it can leak sensitive details such as personal information, business information and passwords, can give control of the system to the attacker, and can corrupt or delete data permanently. Another type of malware is 833:
or attacks from the last 12 months." These figures were much higher for "medium businesses (59%), large businesses (69%), and high-income charities with £500,000 or more in annual income (56%)." Yet, although medium or large businesses are more often the victims, since larger companies have generally improved their security over the last decade,
1179:
applications." However, they are also multi-staged, meaning that “they can infiltrate networks and move laterally inside the network.” The attacks can be polymorphic, meaning that the cyberattacks used such as viruses, worms or trojans “constantly change (“morph”) making it nearly impossible to detect them using signature-based defences.”
3160:
environments that are deemed as vital to operations. All critical targeted environments are susceptible to compromise and this has led to a series of proactive studies on how to migrate the risk by taking into consideration motivations by these types of actors. Several stark differences exist between the hacker motivation and that of
3786:
strong domestic innovation; Peace and safety should be kept by making it easier for the US to stop people from using computer tools for bad things, working with friends and partners to do this; and increase the United States' impact around the world to support the main ideas behind an open, safe, reliable, and compatible Internet.
939:(DRDoS), where innocent systems are fooled into sending traffic to the victim. With such attacks, the amplification factor makes the attack easier for the attacker because they have to use little bandwidth themselves. To understand why attackers may carry out these attacks, see the 'attacker motivation' section. 2229:
simple to implement and mostly dependent on discipline or education. It can be thought of as an abstract list of tips or measures that have been demonstrated as having a positive effect on personal or collective digital security. As such, these measures can be performed by laypeople, not just security experts.
1995:(TPMs) secure devices by integrating cryptographic capabilities onto access devices, through the use of microprocessors, or so-called computers-on-a-chip. TPMs used in conjunction with server-side software offer a way to detect and authenticate hardware devices, preventing unauthorized network and data access. 3997:
in an effort to ensure that all DoD personnel involved in network infrastructure defense have minimum levels of IT industry recognized knowledge, skills and abilities (KSA). Andersson and Reimers (2019) report these certifications range from CompTIA's A+ and Security+ through the ICS2.org's CISSP, etc.
1332:, in the context of computer security, aims to convince a user to disclose secrets such as passwords, card numbers, etc. or grant physical access by, for example, impersonating a senior executive, bank, a contractor, or a customer. This generally involves exploiting people's trust, and relying on their 4175:
Analyzes and assesses vulnerabilities in the infrastructure (software, hardware, networks), investigates using available tools and countermeasures to remedy the detected vulnerabilities and recommends solutions and best practices. Analyzes and assesses damage to the data/infrastructure as a result of
3797:(OPM), which compromised the records of about 4.2 million current and former government employees. And the strategy calls for the U.S. to continue to name and shame bad cyber actors, calling them out publicly for attacks when possible, along with the use of economic sanctions and diplomatic pressure. 3235:
In 1988, 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On 2 November 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first
3179:
is an organized approach to addressing and managing the aftermath of a computer security incident or compromise with the goal of preventing a breach or thwarting a cyberattack. An incident that is not identified and managed at the time of intrusion typically escalates to a more damaging event such as
1980:
are typically used in software licensing schemes to unlock software capabilities, but they can also be seen as a way to prevent unauthorized access to a computer or other device's software. The dongle, or key, essentially creates a secure encrypted tunnel between the software application and the key.
1942:
Protecting against social engineering and direct computer access (physical) attacks can only happen by non-computer means, which can be difficult to enforce, relative to the sensitivity of the information. Training is often involved to help mitigate this risk by improving people's knowledge of how to
1320:
possible, to hardware implementation faults that allow for access or guessing of other values that normally should be inaccessible. In Side-channel attack scenarios, the attacker would gather such information about a system or network to guess its internal state and as a result access the information
1178:
Multi-vector polymorphic attacks, as the name describes, are both multi-vectored and polymorphic. Firstly, they are a singular attack that involves multiple methods of attack. In this sense, they are “multi-vectored (i.e. the attack can use multiple means of propagation such as via the Web, email and
832:
Department for Science, Innovation & Technology released a report on cyber attacks over the last 12 months. They surveyed 2,263 UK businesses, 1,174 UK registered charities, and 554 education institutions. The research found that "32% of businesses and 24% of charities overall recall any breaches
3996:
The US Department of Defense (DoD) issued DoD Directive 8570 in 2004, supplemented by DoD Directive 8140, requiring all DoD employees and all DoD contract personnel involved in information assurance roles and activities to earn and maintain various industry Information Technology (IT) certifications
3425:
In July 2015, a hacker group is known as The Impact Team successfully breached the extramarital relationship website Ashley Madison, created by Avid Life Media. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the
3167:
A key aspect of threat modeling for any system is identifying the motivations behind potential attacks and the individuals or groups likely to carry them out. The level and detail of security measures will differ based on the specific system being protected. For instance, a home personal computer, a
991:
is the act of surreptitiously listening to a private computer conversation (communication), usually between hosts on a network. It typically occurs when a user connects to a network where traffic is not secured or encrypted and sends sensitive business data to a colleague, which, when listened to by
4805:
attack tools to US agencies and close allies, but eventually, the tools made their way to foreign adversaries. In 2016, NSAs own hacking tools were hacked, and they have been used by Russia and North Korea. NSA's employees and contractors have been recruited at high salaries by adversaries, anxious
3402:
more than a year earlier in a data breach, resulting in the theft of approximately 21.5 million personnel records handled by the office. The Office of Personnel Management hack has been described by federal officials as among the largest breaches of government data in the history of the United
2228:
The most common acts of digital hygiene can include updating malware protection, cloud back-ups, passwords, and ensuring restricted admin rights and network firewalls. As opposed to a purely technology-based defense against threats, cyber hygiene mostly regards routine measures that are technically
2199:
The focus on the end-user represents a profound cultural change for many security practitioners, who have traditionally approached cybersecurity exclusively from a technical perspective, and moves along the lines suggested by major security centers to develop a culture of cyber awareness within the
1832:
In order to ensure adequate security, the confidentiality, integrity and availability of a network, better known as the CIA triad, must be protected and is considered the foundation to information security. To achieve those objectives, administrative, physical and technical security measures should
1148:
WiFi SSID spoofing is where the attacker simulates a WIFI base station SSID to capture and modify internet traffic and transactions. The attacker can also use local network addressing and reduced network defenses to penetrate the target's firewall by breaching known vulnerabilities. Sometimes known
4186:
Performs security monitoring, security and data/logs analysis, and forensic analysis, to detect security incidents, and mount the incident response. Investigates and utilizes new technologies and processes to enhance security capabilities and implement improvements. May also review code or perform
4120:
In the future, wars will not just be fought by soldiers with guns or with planes that drop bombs. They will also be fought with the click of a mouse a half a world away that unleashes carefully weaponized computer programs that disrupt or destroy critical industries like utilities, transportation,
3465:
switch from one country to another, from one jurisdiction to another – moving around the world, using the fact that we don't have the capability to globally police operations like this. So the Internet is as if someone given free plane tickets to all the online criminals of the world." The use of
2590:
Implementing fixes in aerospace systems poses a unique challenge because efficient air transportation is heavily affected by weight and volume. Improving security by adding physical devices to airplanes could increase their unloaded weight, and could potentially reduce cargo or passenger capacity.
2195:
As the human component of cyber risk is particularly relevant in determining the global cyber risk an organization is facing, security awareness training, at all levels, not only provides formal compliance with regulatory and industry mandates but is considered essential in reducing cyber risk and
2008:
Disabling USB ports is a security option for preventing unauthorized and malicious access to an otherwise secure computer. Infected USB dongles connected to a network from a computer inside the firewall are considered by the magazine Network World as the most common hardware threat facing computer
1912:
It is possible to reduce an attacker's chances by keeping systems up to date with security patches and updates and by hiring people with expertise in security. Large companies with significant threats can hire Security Operations Centre (SOC) Analysts. These are specialists in cyber defences, with
1508:
in organizations. Cultural concepts can help different segments of the organization work effectively or work against effectiveness toward information security within an organization. Information security culture is the "...totality of patterns of behavior in an organization that contributes to the
1295:
Horizontal escalation (or account takeover) is where an attacker gains access to a normal user account that has relatively low-level privileges. This may be through stealing the user's username and password. Once they have access, they have gained a “foothold,” and using this foothold the attacker
4725:
However, in the 1970s and 1980s, there were no grave computer threats because computers and the internet were still developing, and security threats were easily identifiable. More often, threats came from malicious insiders who gained unauthorized access to sensitive documents and files. Although
3767:
Following cyberattacks in the first half of 2013, when the government, news media, television stations, and bank websites were compromised, the national government committed to the training of 5,000 new cybersecurity experts by 2017. The South Korean government blamed its northern counterpart for
4250:
Student programs are also available for people interested in beginning a career in cybersecurity. Meanwhile, a flexible and effective option for information security professionals of all experience levels to keep studying is online security training, including webcasts. A wide range of certified
3785:
has its first fully formed cyber plan in 15 years, as a result of the release of this National Cyber plan. In this policy, the US says it will: Protect the country by keeping networks, systems, functions, and data safe; Promote American wealth by building a strong digital economy and encouraging
2586:
industry is very reliant on a series of complex systems which could be attacked. A simple power outage at one airport can cause repercussions worldwide, much of the system relies on radio transmissions which could be disrupted, and controlling aircraft over oceans is especially dangerous because
1512:
Andersson and Reimers (2014) found that employees often do not see themselves as part of their organization's information security effort and often take actions that impede organizational changes. Indeed, the Verizon Data Breach Investigations Report 2020, which examined 3,950 security breaches,
4245:
Broad titles that encompass any one or all of the other roles or titles tasked with protecting computers, networks, software, data or information systems against viruses, worms, spyware, malware, intrusion detection, unauthorized access, denial-of-service attacks, and an ever-increasing list of
3678:
Since 2010, Canada has had a cybersecurity strategy. This functions as a counterpart document to the National Strategy and Action Plan for Critical Infrastructure. The strategy has three main pillars: securing government systems, securing vital private cyber systems, and helping Canadians to be
2220:
shows, is the equivalent of establishing simple routine measures to minimize the risks from cyber threats. The assumption is that good cyber hygiene practices can give networked users another layer of protection, reducing the risk that one vulnerable node will be used to either mount attacks or
1735:
are by far the most common prevention systems from a network security perspective as they can (if properly configured) shield access to internal network services and block certain kinds of attacks through packet filtering. Firewalls can be both hardware and software-based. Firewalls monitor and
1690:
Similarly, Techopedia defines security architecture as "a unified security design that addresses the necessities and potential risks involved in a certain scenario or environment. It also specifies when and where to apply security controls. The design process is generally reproducible." The key
3742:
is a policy framework by the Ministry of Electronics and Information Technology (MeitY) which aims to protect the public and private infrastructure from cyberattacks, and safeguard "information, such as personal information (of web users), financial and banking information and sovereign data".
3184:
or system failure. The intended outcome of a computer security incident response plan is to contain the incident, limit damage and assist recovery to business as usual. Responding to compromises quickly can mitigate exploited vulnerabilities, restore services and processes and minimize losses.
844:
Normal internet users are most likely to be affected by untargeted cyberattacks. These are where attackers indiscriminately target as many devices, services, or users as possible. They do this using techniques that take advantage of the openness of the Internet. These strategies mostly include
3689:
To inform the general public on how to protect themselves online, Public Safety Canada has partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations, and launched the Cyber Security Cooperation Program. They also run the GetCyberSafe portal for
2973:
While the IoT creates opportunities for more direct integration of the physical world into computer-based systems, it also provides opportunities for misuse. In particular, as the Internet of Things spreads widely, cyberattacks are likely to become an increasingly physical (rather than simply
2767:
Medical records have been targeted in general identify theft, health insurance fraud, and impersonating patients to obtain prescription drugs for recreational purposes or resale. Although cyber threats continue to increase, 62% of all organizations did not increase security training for their
2191:
The end-user is widely recognized as the weakest link in the security chain and it is estimated that more than 90% of security incidents and breaches involve some kind of human error. Among the most commonly recorded forms of errors and misjudgment are poor password management, sending emails
3159:
Additionally, recent attacker motivations can be traced back to extremist organizations seeking to gain political advantage or disrupt social agendas. The growth of the internet, mobile technologies, and inexpensive computing devices have led to a rise in capabilities but also to the risk to
3097:
and worm attacks and to hostile digital acts in general. The 2003 loss estimates by these firms range from $ 13 billion (worms and viruses only) to $ 226 billion (for all forms of covert attacks). The reliability of these estimates is often challenged; the underlying methodology is basically
1686:
Security architecture can be defined as the "practice of designing computer systems to achieve security goals." These goals have overlap with the principles of "security by design" explored above, including to "make initial compromise of the system difficult," and to "limit the impact of any
1599:
Although systems can be created which are safe against a multitude of attacks, that does not mean that attacks will not be attempted. Despite one's security, all companies' systems should aim to be able to detect and spot attacks as soon as they occur to ensure the most effective response to
4158:
concerned with reducing organizations' risk of hack or data breaches. According to research from the Enterprise Strategy Group, 46% of organizations say that they have a "problematic shortage" of cybersecurity skills in 2016, up from 28% in 2015. Commercial, government and non-governmental
3966:'s role in cybersecurity is to strengthen the protection of critical communications infrastructure, to assist in maintaining the reliability of networks during disasters, to aid in swift recovery after, and to ensure that first responders have access to effective communications services. 3147:
Attackers motivations can vary for all types of attacks from pleasure to political goals. For example, "hacktivists" may target a company or organization that carries out activities they do not agree with. This would be to create bad publicity for the company by having its website crash.
3448:
International legal issues of cyber attacks are complicated in nature. There is no global base of common rules to judge, and eventually punish, cybercrimes and cybercriminals - and where security firms or agencies do locate the cybercriminal behind the creation of a particular piece of
1144:
Message spoofing (via email, SMS or OTT messaging) is where the attacker spoofs the identity or carrier service while the target is using messaging protocols like email, SMS or OTT (IP-based) messaging apps. The attacker can then monitor conversations, launch social attacks or trigger
4782:, shortly after the National Center for Supercomputing Applications (NCSA) launched Mosaic 1.0, the first web browser, in 1993. Netscape had SSL version 1.0 ready in 1994, but it was never released to the public due to many serious security vulnerabilities. These weaknesses included 4759:
Between September 1986 and June 1987, a group of German hackers performed the first documented case of cyber espionage. The group hacked into American defense contractors, universities, and military base networks and sold gathered information to the Soviet KGB. The group was led by
1985:(AES) provides a stronger measure of security since it is harder to hack and replicate the dongle than to simply copy the native software to another machine and use it. Another security application for dongles is to use them for accessing web-based content such as cloud software or 3712:, slated for release within the current week. A substantial allocation of $ 7.2 million is earmarked for the establishment of a voluntary cyber health check program, facilitating businesses in conducting a comprehensive and tailored self-assessment of their cybersecurity upskill. 3382:
are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing
3586:
The purpose of the Messaging Anti-Abuse Working Group (MAAWG) is to bring the messaging industry together to work collaboratively and to successfully address the various forms of messaging abuse, such as spam, viruses, denial-of-service attacks and other messaging exploitations.
3859:
signed Executive Order 14028 on May 12, 2021, to increase software security standards for sales to the government, tighten detection and security on existing systems, improve information sharing and training, establish a Cyber Safety Review Board, and improve incident response.
4503:
is an Internet-based conflict that involves politically motivated attacks on information and information systems. Such attacks can, for example, disable official websites and networks, disrupt or disable essential services, steal or alter classified data, and cripple financial
3959:, also known as USCYBERCOM, "has the mission to direct, synchronize, and coordinate cyberspace planning and operations to defend and advance national interests in collaboration with domestic and international partners." It has no role in the protection of civilian networks. 3198:
Containment, eradication and recovery: Isolating affected systems to prevent escalation and limit impact, pinpointing the genesis of the incident, removing malware, affected systems and bad actors from the environment and restoring systems and data when a threat no longer
2178:
has been mostly restricted to research operating systems. Capabilities can, however, also be implemented at the language level, leading to a style of programming that is essentially a refinement of standard object-oriented design. An open-source project in the area is the
3093:, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attributable to 2680:
which could be exploited, and may collect personal information, including sensitive health information. WiFi, Bluetooth, and cell phone networks on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach.
979:
which allow an attacker to gain direct access to a computer's memory. The attacks "take advantage of a feature of modern computers that allows certain devices, such as external hard drives, graphics cards, or network cards, to access the computer's memory directly."
3264:, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtain classified files, such as air tasking order systems data and furthermore able to penetrate connected networks of 4615:
is an approach to operating system design which has only the near-minimum amount of code running at the most privileged level – and runs other elements of the operating system such as device drivers, protocol stacks and file systems, in the safer, less privileged
3903:. The division is home to US-CERT operations and the National Cyber Alert System. The National Cybersecurity and Communications Integration Center brings together government organizations responsible for protecting computer networks and networked infrastructure. 3719:. Furthermore, it affords them access to a repository of educational resources and materials, fostering the acquisition of skills necessary for an elevated cybersecurity posture. This groundbreaking initiative was jointly disclosed by Minister for Cyber Security 2290:
often lack the skills, interest or budget to pursue attackers. Furthermore, identifying attackers across a network may necessitate collecting logs from multiple locations within the network and across various countries, a process that can be both difficult and
1972:, intrusion-aware cases, drive locks, disabling USB ports, and mobile-enabled access may be considered more secure due to the physical access (or sophisticated backdoor access) required in order to be compromised. Each of these is covered in more detail below. 13378: 3039:, the chance to better estimate energy demand. The D.C. proposal, however, would "allow third-party vendors to create numerous points of energy distribution, which could potentially create more opportunities for cyber attackers to threaten the electric grid." 947:
A direct-access attack is when an unauthorized user (an attacker) gains physical access to a computer, most likely to directly copy data from it or steal information. Attackers may also compromise security by making operating system modifications, installing
3876:
service as a pre-vetted support service, to rapidly address potential vulnerabilities, and stop adversaries before they impact US federal, state and local governments. These services are commonly referred to as Highly Adaptive Cybersecurity Services (HACS).
3758:
The Indian Companies Act 2013 has also introduced cyber law and cybersecurity obligations on the part of Indian directors. Some provisions for cybersecurity have been incorporated into rules framed under the Information Technology Act 2000 Update in 2013.
1383:
Spoofing is an act of pretending to be a valid entity through the falsification of data (such as an IP address or username), in order to gain access to information or resources that one is otherwise unauthorized to obtain. Spoofing is closely related to
8313: 4797:
of U.S. information systems and also for collecting foreign intelligence. The agency analyzes commonly used software and system configurations to find security flaws, which it can use for offensive purposes against competitors of the United States.
1162:
SSL hijacking, typically coupled with another media-level MITM attack, is where the attacker spoofs the SSL authentication and encryption protocol by way of Certificate Authority injection in order to decrypt, surveil and modify traffic. See also
4687:
until the conception of the Internet, where, with increased connectivity, computer viruses and network intrusions began to take off. After the spread of viruses in the 1990s, the 2000s marked the institutionalization of organized attacks such as
4159:
organizations all employ cybersecurity professionals. The fastest increases in demand for cybersecurity workers are in industries managing increasing volumes of consumer data such as finance, health care, and retail. However, the use of the term
12840: 1088:
are programs that pretend to be helpful or hide themselves within desired or legitimate software to "trick users into installing them." Once installed, a RAT (remote access trojan) can create a secret backdoor on the affected device to cause
2977:
An attack aimed at physical infrastructure or human lives is often called a cyber-kinetic attack. As IoT devices and appliances become more widespread, the prevalence and potential damage of cyber-kinetic attacks can increase substantially.
3151:
High capability hackers, often with larger backing or state sponsorship, may attack based on the demands of their financial backers. These attacks are more likely to attempt more serious attack. An example of a more serious attack was the
1246:
are almost identical to the legitimate one. The fake website often asks for personal information, such as login details and passwords. This information can then be used to gain access to the individual's real account on the real website.
4274:(IMDA). It outlines the different OT cybersecurity job positions as well as the technical skills and core competencies necessary. It also depicts the many career paths available, including vertical and lateral advancement opportunities. 2731:
to enable its members to access their health care records, as well as to provide an overview of health care plans. Patient records are increasingly being placed on secure in-house networks, alleviating the need for extra storage space.
2160:(ACL), with respect to a computer file system, is a list of permissions associated with an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. 1713:
A state of computer security is the conceptual ideal, attained by the use of three processes: threat prevention, detection, and response. These processes are based on various policies and system components, which include the following:
7050: 4176:
security incidents, examines available recovery tools and processes, and recommends solutions. Tests for compliance with security policies and procedures. May assist in the creation, implementation, or management of security solutions.
2272:
Identifying attackers is difficult, as they may operate through proxies, temporary anonymous dial-up accounts, wireless connections, and other anonymizing procedures which make back-tracing difficult – and are often located in another
1299:
Vertical escalation however targets people higher up in a company and often with more administrative power, such as an employee in IT with a higher privilege. Using this privileged account will then enable the attacker to invade other
900:
to install backdoors, giving them remote administrative access to a system. Once they have access, cybercriminals can "modify files, steal personal information, install unwanted software, and even take control of the entire computer."
3411:, names, dates and places of birth, addresses, and fingerprints of current and former government employees as well as anyone who had undergone a government background check. It is believed the hack was perpetrated by Chinese hackers. 3516:
Many government officials and experts think that the government should do more and that there is a crucial need for improved regulation, mainly due to the failure of the private sector to solve efficiently the cybersecurity problem.
9547: 888:
or security controls. These weaknesses may exist for many reasons, including original design or poor configuration. Due to the nature of backdoors, they are of greater concern to companies and databases as opposed to individuals.
1687:
compromise." In practice, the role of a security architect would be to ensure the structure of a system reinforces the security of the system, and that new changes are safe and meet the security requirements of the organization.
793:
A vulnerability refers to a flaw in the structure, execution, functioning, or internal oversight of a computer or system that compromises its security. Most of the vulnerabilities that have been discovered are documented in the
9916: 2035:
reader software designed for mobile devices, offer new, secure ways for mobile phones to connect to access control systems. These control systems provide computer security and can also be used for controlling access to secure
3793:, urging nations to adhere to a set of norms, both through international law and voluntary standards. It also calls for specific measures to harden U.S. government networks from attacks, like the June 2015 intrusion into the 1666:
track system activity so that when a security breach occurs, the mechanism and extent of the breach can be determined. Storing audit trails remotely, where they can only be appended to, can keep intruders from covering their
3062:. Tests are being conducted to secure OTA ("over-the-air") payment and credit card information from and to a mobile phone. Combination SIM/DVD devices are being developed through Smart Video Card technology which embeds a 1943:
protect themselves and by increasing people's awareness of threats. However, even in highly disciplined environments (e.g. military organizations), social engineering attacks can still be difficult to foresee and prevent.
1137:(MITM) involve a malicious attacker trying to intercept, surveil or modify communications between two parties by spoofing one or both party's identities and injecting themselves in-between. Types of MITM attacks include: 10838: 10335: 13371: 1265:
describes a situation where an attacker with some level of restricted access is able to, without authorization, elevate their privileges or access level. For example, a standard computer user may be able to exploit a
1006:(VPN), which encrypts data between two points, is one of the most common forms of protection against eavesdropping. Using the best form of encryption possible for wireless networks is best practice, as well as using 11857: 2866:
Additionally, e-Drivers' licenses are being developed using the same technology. For example, Mexico's licensing authority (ICV) has used a smart card platform to issue the first e-Drivers' licenses to the city of
2473:
Internet Report: Surveying the Digital Future (2000) found that the privacy of personal data created barriers to online sales and that more than nine out of 10 internet users were somewhat or very concerned about
1071:
are a specific type of malware, and are normally a malicious code that hijacks software with the intention to "do damage and spread copies of itself." Copies are made with the aim to spread to other programs on a
4818:
operating system to attack and damage equipment used in Iran to refine nuclear materials. Iran responded by heavily investing in their own cyberwarfare capability, which it began using against the United States.
2537:
where banks give customers hand-held card readers to perform online secure transactions. Other developments in this arena include the development of technology such as Instant Issuance which has enabled shopping
7607: 2637:(e-tickets). These have been made possible by advances in online credit card transactions in partnership with the airlines. Long-distance bus companies are also switching over to e-ticketing transactions today. 2079:. Using secure operating systems is a good way of ensuring computer security. These are systems that have achieved certification from an external security-auditing organization, the most popular evaluations are 1874:. In order for these tools to be effective, they must be kept up to date with every new update the vendor release. Typically, these updates will scan for the new vulnerabilities that were introduced recently. 8539: 7369: 3651:. The regulation requires that any entity that processes personal data incorporate data protection by design and by default. It also requires that certain organizations appoint a Data Protection Officer (DPO). 3051:(Subscriber Identity Module) card, a device that is embedded in most of the world's cellular devices before any service can be obtained. The SIM card is just the beginning of this digitally secure environment. 4563:
software aids networks in preventing malware infection and data theft at network entry points made vulnerable by the prevalence of potentially infected devices such as laptops, mobile devices, and USB drives.
3105:
analyzing the optimal investment level in information security, one can conclude that the amount a firm spends to protect information should generally be only a small fraction of the expected loss (i.e., the
2497:
services allow companies and consumers to engage in secure communications and commerce. Several versions of SSL and TLS are commonly used today in applications such as web browsing, e-mail, internet faxing,
9640: 9313: 8743: 2001:
refers to a device, typically a push-button switch, which detects when a computer case is opened. The firmware or BIOS is programmed to show an alert to the operator when the computer is booted up the next
13227: 12850: 1590:
Before a secure system is created or updated, companies should ensure they understand the fundamentals and the context around the system they are trying to create and identify any weaknesses in the system.
1315:
Any computational system affects its environment in some form. This effect it has on its environment can range from electromagnetic radiation, to residual effect on RAM cells which as a consequence make a
4365:
For example, programs can be installed into an individual user's account, which limits the program's potential access, as well as being a means control which users have specific exceptions to policy. In
7553: 4269:
has issued a Singapore Operational Technology (OT) Cybersecurity Competency Framework (OTCCF). The framework defines emerging cybersecurity roles in Operational Technology. The OTCCF was endorsed by the
10002: 9743: 2430:
The growth in the number of computer systems and the increasing reliance upon them by individuals, businesses, industries, and governments means that there are an increasing number of systems at risk.
1916:
Whilst no measures can completely guarantee the prevention of an attack, these measures can help mitigate the damage of possible attacks. The effects of data loss/damage can be also reduced by careful
6472: 10033: 1764:
authorities, counter-attacks, and the like. In some special cases, the complete destruction of the compromised system is favored, as it may happen that not all the compromised resources are detected.
1336:. A common scam involves emails sent to accounting and finance department personnel, impersonating their CEO and urgently requesting some action. One of the main techniques of social engineering are 7425: 4346:
to install them; to install them only when there is a demonstrated need (e.g. software needed to perform assignments); to install only those which are known to be reputable (preferably with access
2621:. The introduction of the ePassport has assisted border officials in verifying the identity of the passport holder, thus allowing for quick passenger processing. Plans are under way in the US, the 10123: 9099: 3130:, some are activists, others are criminals looking for financial gain. State-sponsored attackers are now common and well resourced but started with amateurs such as Markus Hess who hacked for the 5408: 12189: 10418: 9187: 6259: 2056:(PUFs) can be used as a digital fingerprint or a unique identifier to integrated circuits and hardware, providing users the ability to secure the hardware supply chains going into their systems. 3202:
Post incident activity: Post mortem analysis of the incident, its root cause and the organization's response with the intent of improving the incident response plan and future response efforts.
3195:
Detection and analysis: Identifying and investigating suspicious activity to confirm a security incident, prioritizing the response based on impact and coordinating notification of the incident
11609: 9343: 13061: 10094: 9033: 3316:(PLCs) in a targeted attack. This is generally believed to have been launched by Israel and the United States to disrupt Iran's nuclear program – although neither has publicly admitted this. 4447:
are one or more copies kept of important computer files. Typically, multiple copies will be kept at different locations so that if a copy is stolen or damaged, other copies will still exist.
3490:
to force companies and organizations to protect their systems, infrastructure and information from any cyberattacks, but also to protect its own national infrastructure such as the national
1195:
from a (fictional) bank. The sender is attempting to trick the recipient into revealing confidential information by confirming it at the phisher's website. Note the misspelling of the words
9539: 927:(DDoS) attacks are possible, where the attack comes from a large number of points. In this case, defending against these attacks is much more difficult. Such attacks can originate from the 13421: 11208: 6446: 3708:
resilience of small and medium enterprises (SMEs) and enhance their capabilities in responding to cyber threats. This financial backing is an integral component of the soon-to-be-unveiled
1078:
are similar to viruses, however viruses can only function when a user runs (opens) a compromised program. Worms are self-replicating malware that spread between programs, apps and devices
8517: 4521:
techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
1095:
is a type of malware that secretly gathers information from an infected computer and transmits the sensitive information back to the attacker. One of the most common forms of spyware are
10361: 11987: 9972: 9217: 4722:
of confidentiality, integrity, and availability as a clear and simple way to describe key security goals. While still relevant, many more elaborate frameworks have since been proposed.
1226:
is the attempt of acquiring sensitive information such as usernames, passwords, and credit card details directly from users by deceiving the users. Phishing is typically carried out by
837:(SMBs) have also become increasingly vulnerable as they often "do not have advanced tools to defend the business." SMBs are most likely to be affected by malware, ransomware, phishing, 9909: 3387:
had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing.
10909: 14061: 10453: 9850: 9006: 9154: 1583:
Security by design, or alternately secure by design, means that the software has been designed from the ground up to be secure. In this case, security is considered a main feature.
14293:
Sztyber-Betley, A., Syfert, M., Kościelny, J. M., & Górecka, Z. (2023). Controller Cyber-Attack Detection and Isolation †: Sensors (14248220). Sensors (14248220), 23(5), 2778.
12639: 11124: 9609: 7926: 2454:
information are also prominent hacking targets, because of the potential for immediate financial gain from transferring money, making purchases, or selling the information on the
11277: 11223: 9698: 4121:
communications, and energy. Such attacks could also disable military networks that control the movement of troops, the path of jet fighters, the command and control of warships.
2101:
aims to guard against the accidental introduction of security vulnerabilities. It is also possible to create software designed from the ground up to be secure. Such systems are
8570: 2163:
Role-based access control is an approach to restricting system access to authorized users, used by the majority of enterprises with more than 500 employees, and can implement
10835: 10327: 2999:
have either been successfully attacked or had potentially deadly vulnerabilities demonstrated, including both in-hospital diagnostic equipment and implanted devices including
1950:, seeks to prevent social engineering and other fraudulent tricks and traps by instilling a resistance to persuasion attempts through exposure to similar or related attempts. 5143: – part of information security that focuses on raising consciousness regarding potential risks of the rapidly evolving forms of information and the accompanying threats 2970:
that enables them to collect and exchange data. Concerns have been raised that this is being developed without appropriate consideration of the security challenges involved.
11384: 10387: 10183: 1466:
or alteration of data. It is an intentional but unauthorized act resulting in the modification of a system, components of systems, its intended behavior, or data. So-called
10245: 4711:, were foundational moments in the history of the field of computer security. Ware's work straddled the intersection of material, cultural, political, and social concerns. 3268:'s Goddard Space Flight Center, Wright-Patterson Air Force Base, some Defense contractors, and other private sector organizations, by posing as a trusted Rome center user. 11849: 11707: 8948: 8413:
Cole, Jeffrey I.; Suman, Michael; Schramm, Phoebe; van Bel, Daniel; Lunn, B.; Maguire, Phyllisane; Hanson, Koran; Singh, Rajesh; Aquino, Jedrix-Sean; Lebo, Harlan (2000).
1175:
Surfacing in 2017, a new class of multi-vector, polymorphic cyber threats combine several types of attacks and change form to avoid cybersecurity controls as they spread.
1496:
When a target user opens the HTML, the malicious code is activated; the web browser then "decodes" the script, which then unleashes the malware onto the target's device.
10863: 6603: 4670:
means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network.
960:
or using wireless microphones. Even when the system is protected by standard security measures, these may be bypassed by booting another operating system or tool from a
8531: 8143: 7600: 7395: 4726:
malware and network breaches existed during the early years, they did not use them for financial gain. By the second half of the 1970s, established computer firms like
2005:
Drive locks are essentially software tools to encrypt hard drives, making them inaccessible to thieves. Tools exist specifically for encrypting external drives as well.
13149: 13127: 7365: 4258:, were established supported by the Government's cybersecurity strategy in order to encourage start-ups and innovation and to address the skills gap identified by the 3378:
computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using
1660:). Ideally, a secure system should require a deliberate, conscious, knowledgeable and free decision on the part of legitimate authorities in order to make it insecure. 10063: 9721: 9403: 3101:
However, reasonable estimates of the financial cost of security breaches can actually help organizations make rational investment decisions. According to the classic
1593:
Companies should design and centre their security around techniques and defences which make attacking their data or systems inherently more challenging for attackers.
1141:
IP address spoofing is where the attacker hijacks routing protocols to reroute the targets traffic to a vulnerable network node for traffic interception or injection.
6412: 10479: 9632: 9305: 8735: 6225: 2284:
The sheer number of attempted attacks, often by automated vulnerability scanners and computer worms, is so large that organizations cannot spend time pursuing each.
12230: 1760:
is necessarily defined by the assessed security requirements of an individual system and may cover the range from simple upgrade of protections to notification of
11254: 9374: 5933: 3716: 1520:
Strategic planning: To come up with a better awareness program, clear targets need to be set. Assembling a team of skilled professionals is helpful to achieve it.
1159:
is where attackers hijack domain name assignments to redirect traffic to systems under the attackers control, in order to surveil traffic or launch other attacks.
740:
and the societies they support. Security is of especially high importance for systems that govern large-scale systems with far-reaching physical effects, such as
5312: 4479:
techniques can be used to defend data in transit between systems, reducing the probability that the data exchange between systems can be intercepted or modified.
3986: 11426: 11000: 9671: 7545: 4441:
and other verification tools can be used to enable critical algorithms and code used in secure systems to be mathematically proven to meet their specifications.
3647:(GDPR). The GDPR, which came into force on 25 May 2018, grants individuals within the European Union (EU) and the European Economic Area (EEA) the right to the 12055: 11041: 9994: 4010:
is a name given to expert groups that handle computer security incidents. In the US, two distinct organizations exist, although they do work closely together.
992:
an attacker, could be exploited. Data transmitted across an "open network" allows an attacker to exploit a vulnerability and intercept it via various methods.
12744: 11962: 4427:
which can even provide their own set of system libraries, limiting the software's, or anyone controlling it, access to the server's versions of the libraries.
3709: 11917: 11887: 11737: 11677: 11348: 10936: 3933: 1523:
Operative planning: A good security culture can be established based on internal communication, management buy-in, security awareness and a training program.
13092: 11642: 10025: 8979: 3354:
standard for encryption. This standard was later withdrawn due to widespread criticism. The NSA additionally were revealed to have tapped the links between
2652:
Desktop computers and laptops are commonly targeted to gather passwords or financial account information or to construct a botnet to attack another target.
1125:. These attacks often begin with a "sudden pop-up with an urgent message, usually warning the user that they've broken the law or their device has a virus." 11551: 8886: 7418: 3748: 825:
Various people or parties are vulnerable to cyber attacks; however, different groups are likely to experience different types of attacks more than others.
12498: 11381:"Ensuring the Security of Federal Information Systems and Cyber Critical Infrastructure and Protecting the Privacy of Personally Identifiable Information" 9883: 6794: 10119: 9089: 8641: 13630: 10959: 10410: 6255: 5383: 2848:, the danger is much greater – and in a widely publicized 2015 test, hackers remotely carjacked a vehicle from 10 miles away and drove it into a ditch. 1810:, which consists of a separate machine filtering network traffic. Firewalls are common amongst machines that are permanently connected to the Internet. 13249: 11767: 11177: 9179: 6950: 3325: 13656: 12556: 9335: 9029: 4786:
and a vulnerability that allowed hackers to alter unencrypted communications sent by users. However, in February 1995, Netscape launched Version 2.0.
904:
Backdoors can be very hard to detect and are usually discovered by someone who has access to the application source code or intimate knowledge of the
13524: 12817: 12211: 11601: 11155: 10086: 8623: 1959: 245: 13069: 12578: 7978: 1641:, where the design is such that more than one subsystem needs to be violated to compromise the integrity of the system and the information it holds. 1099:, which record all of a user's keyboard inputs/keystrokes, to "allow hackers to harvest usernames, passwords, bank account and credit card numbers." 11319: 9066: 8834: 8459: 8164: 8060: 7275: 5556: 3929: 3615: 2481:
The most common web technologies for improving security between browsers and websites are named SSL (Secure Sockets Layer), and its successor TLS (
1913:
their role ranging from "conducting threat analysis to investigating reports of any new issues and preparing and testing disaster recovery plans."
13790: 13723: 11200: 6438: 6074: 4221:
A high-level management position responsible for the entire security division/staff. A newer position is now deemed needed as security risks grow.
4211:
A high-level management position responsible for the entire information security division/staff. The position may include hands-on technical work.
3906:
The third priority of the FBI is to: "Protect the United States against cyber-based attacks and high-technology crimes", and they, along with the
13937: 13429: 2844:
being used as an attack vector, and the car's onboard microphones being used for eavesdropping. However, if access is gained to a car's internal
2613:
that stores a digitized photograph and personal information such as name, gender, and date of birth. In addition, more countries are introducing
1939:: a card, dongle, cellphone, or another piece of hardware. This increases security as an unauthorized person needs both of these to gain access. 1566:
by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken.
11827: 9518:. Proceedings of the 2010 International Conference on Industrial Engineering and Operations Management Dhaka, Bangladesh, January 9 – 10, 2010. 8513: 4602:
are computers that are intentionally left vulnerable to attack by crackers. They can be used to catch crackers and to identify their techniques.
4096:, which mandates robust protection of digital computers and equipment and communications systems at nuclear power plants against cyber threats. 1705:
Practicing security architecture provides the right foundation to systematically address business, IT and security concerns in an organization.
1033:. Even machines that operate as a closed system (i.e., with no contact with the outside world) can be eavesdropped upon by monitoring the faint 14325: 14109: 10357: 9964: 9283: 3974: 1362: 1057:, which is when "malware installs itself onto a victim's machine, encrypts their files, and then turns around and demands a ransom (usually in 13476: 12520: 11983: 9209: 8758: 1964:
Hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as
13319: 11797: 9002: 8917: 8655: 6920: 6199: 4022: 3892: 3265: 2562:, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the 14042: 10901: 10153: 9842: 8190: 7454: 7250: 5972: 11106: 11072: 10440: 6854: 3396: 2791:
with the apparent dual motive of embarrassing the company through data leaks and crippling the company by wiping workstations and servers.
9950: 9147: 8856: 8030: 5722: 14126: 12631: 10886: 8222: 6048: 4093: 4057: 11269: 11132: 9617: 9453: 7205: 6125: 14915: 12469: 11231: 6741: 4510:
is the accuracy and consistency of stored data, indicated by an absence of any alteration in data between two updates of a data record.
4201:
Designs a security system or major components of a security system, and may head a security design team building a new security system.
3679:
secure online. There is also a Cyber Incident Management Framework to provide a coordinated response in the event of a cyber incident.
3399: 2920: 2860: 1890: 1736:
control incoming and outgoing traffic of a computer network and establish a barrier between a trusted network and an untrusted network.
1276:
and have full unrestricted access to a system. The severity of attacks can range from attacks simply sending an unsolicited email to a
525: 12243: 10676:
Chermick, Steven; Freilich, Joshua; Holt, Thomas (April 2017). "Exploring the Subculture of Ideologically Motivated Cyber-Attackers".
9694: 9133: 6312: 1596:
Companies should ensure that their core services that rely on technology are protected so that the systems are essentially never down.
14869: 5119: 5084: 4032: 3990: 3881: 2407: 13842: 13502: 10814: 9777: 5188: 4696: 2232:
Cyber hygiene relates to personal hygiene as computer viruses relate to biological viruses (or pathogens). However, while the term
2015:
Mobile-enabled access devices are growing in popularity due to the ubiquitous nature of cell phones. Built-in capabilities such as
11380: 10383: 10237: 10175: 2837:
are expected to be even more complex. All of these systems carry some security risks, and such issues have gained wide attention.
13293: 12078: 11407: 9471: 8940: 8085: 7575: 7480: 6289: 3744: 3683: 3156:, which reportedly utilised the spear-phising, destruction of files, and denial-of-service attacks to carry out the full attack. 2439: 12424:. Cybersecurity Unit, Computer Crime & Intellectual Property Section Criminal Division U.S. Department of Justice. July 2017 11699: 10305: 10275: 9257: 8247: 1774:
solutions can prevent the client to visit malicious web pages and inspect the content before downloading to the client machines.
1517:
Pre-evaluation: To identify the awareness of information security within employees and to analyze the current security policies.
736:(IoT). Cybersecurity is one of the most significant new challenges facing the contemporary world, due to both the complexity of 15625: 15597: 8414: 6998: 6724: 4467:
techniques can be used to attempt to ensure that all software loaded has been certified as authentic by the system's designers.
3532:
On 22 May 2020, the UN Security Council held its second ever informal meeting on cybersecurity to focus on cyber challenges to
13816: 13341: 12373: 11446:"Privatizing Political Authority: Cybersecurity, Public-Private Partnerships, and the Reproduction of Liberal Political Order" 10855: 8487:. International Conference on Aviation Safety and Security in the 21st Century, White House Commission on Safety and Security. 7391: 6592: 555: 15650: 14846: 14287:
Cybersecurity Best Practices | Cybersecurity and Infrastructure Security Agency CISA. (n.d.). Retrieved April 24, 2024, from
12711: 12669: 10214: 7232: 7033: 6568: 6018: 5788: 5234: 4569:
serve as a gatekeeper system between networks, allowing only traffic that matches defined rules. They often include detailed
3176: 2915:
computer systems are commonly attacked by activists and foreign powers. Local and regional government infrastructure such as
355: 13153: 13123: 5467: 4578: 2566:
worm demonstrated that even equipment controlled by computers not connected to the Internet can be vulnerable. In 2014, the
1786:. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the 1296:
then may move around the network of users at this same lower level, gaining access to information of this similar privilege.
15501: 13908: 10055: 9713: 9496: 9396: 8562: 7952: 7495: 6693: 4271: 3440:
In June 2021, the cyber attack took down the largest fuel pipeline in the U.S. and led to shortages across the East Coast.
795: 11939: 8759:"Humana Web Site Named Best Interactive Site by eHealthcare Strategy & Trends; re LOUISVILLE, Ky., Nov. 15 PRNewswire" 6233: 2277:. If they successfully breach security, they have also often gained enough administrative access to enable them to delete 15655: 14934: 14877: 14073: 11366: 9256:. SEC'11 Proceedings of the 20th USENIX conference on Security. Berkeley, California, US: USENIX Association. p. 6. 8338: 7300: 5953: 3852: 3794: 3739: 3435: 3404: 2804: 2076: 2066: 1670: 650:
An example of a physical security measure: a metal lock on the back of a personal computer to prevent hardware tampering.
8314:"Analysis | The Cybersecurity 202: Agencies struggling with basic cybersecurity despite Trump's pledge to prioritize it" 4146:
There are a few critical voices that question whether cybersecurity is as significant a threat as it is made out to be.
15167: 14318: 14278: 14259: 14156: 14134: 14055: 13267: 13044: 10765:
Wilcox, S. and Brown, B. (2005) 'Responding to Security Incidents – Sooner or Later Your Systems Will Be Compromised',
10720: 7882: 7156: 7121: 7085: 7060: 6372: 6332: 5498: 5048: 4914: 4049: 3907: 3823: 3806: 3752: 3644: 2826: 2587:
radar surveillance only extends 175 to 225 miles offshore. There is also potential for attack from within an aircraft.
2221:
compromise another node or network, especially from common cyberattacks. Cyber hygiene should also not be mistaken for
1549:
Post-evaluation: To assess the success of the planning and implementation, and to identify unresolved areas of concern.
892:
Backdoors may be added by an authorized party to allow some legitimate access or by an attacker for malicious reasons.
834: 554: 49: 12605:
Air Traffic Control: FAA Needs a More Comprehensive Approach to Address Cybersecurity As Agency Transitions to NextGen
12311: 11477: 10992: 5810: 3735:
Some provisions for cybersecurity have been incorporated into rules framed under the Information Technology Act 2000.
1897:
of the correctness of computer systems is possible, it is not yet common. Operating systems formally verified include
15807: 15635: 15172: 14809: 12096: 12047: 9663: 7172: 4266: 3963: 2567: 2296: 17: 12608: 11427:"Former White House aide backs some Net regulation / Clarke says government, industry deserve 'F' in cyber security" 11033: 8706: 8514:"Air Traffic Control Systems Vulnerabilities Could Make for Unfriendly Skies [Black Hat] – SecurityWeek.Com" 3715:
This avant-garde health assessment serves as a diagnostic tool, enabling enterprises to ascertain the robustness of
1164: 936: 15895: 14996: 14605: 12982:
Maness, Ryan C.; Valeriano, Brandon (25 March 2015). "The Impact of Cyber Conflict on International Interactions".
12736: 9569: 5043: 4764:, who was arrested on 29 June 1987. He was convicted of espionage (along with two co-conspirators) on 15 Feb 1990. 4704: 4259: 4018: 4006: 3978: 3900: 3665: 3168:
bank, and a classified military network each face distinct threats, despite using similar underlying technologies.
924: 13867: 12276: 11909: 11879: 11729: 11669: 11344: 10932: 10576: 9366: 4608:
are devices or software applications that monitor networks or systems for malicious activity or policy violations.
2200:
organization, recognizing that a security-aware user provides an important line of defense against cyber attacks.
15936: 15283: 14859: 13974: 13885: 13100: 11634: 11445: 10811:"The TJX Companies, Inc. Victimized by Computer System Intrusion; Provides Information to Help Protect Customers" 10793: 8971: 8593: 7907: 3982: 3915: 3869: 3768:
these attacks, as well as incidents that occurred in 2009, 2011, and 2012, but Pyongyang denies the accusations.
2599: 2571: 2402: 1026: 66: 11547: 9596: 8878: 6769: 1586:
The UK government's National Cyber Security Centre separates secure cyber design principles into five sections:
15574: 15536: 15200: 14908: 12506: 11587: 9872: 6473:"HTML smuggling surges: Highly evasive loader technique increasingly used in banking malware, targeted attacks" 5140: 4664:
is a type of malware added to a legitimate program that lies dormant until it is triggered by a specific event.
4036: 2708:
to potentially offer better quality and access to healthcare, or fitness trackers to lower insurance premiums.
2463: 2108: 2012:
Disconnecting or disabling peripheral devices (like camera, GPS, removable storage, etc.), that are not in use.
1615:, where each part of the system has only the privileges that are needed for its function. That way, even if an 572: 556: 518: 13619: 13403: 11569: 8637: 5528: 3015:
exploits, viruses, and data breaches of sensitive data stored on hospital servers. On 28 December 2016 the US
1443:
with a different host's IP address. This causes data to be sent to the attacker rather than the intended host.
860:
To secure a computer system, it is important to understand the attacks that can be made against it, and these
15716: 15693: 15423: 15413: 14672: 14311: 14217:"Enterprise information security, a review of architectures and frameworks from interoperability perspective" 13993: 12329: 11246: 11169: 10966: 10878: 10504: 5216: 4689: 4655: 4112: 4085: 4053: 3701: 3640: 3313: 3192:
Preparation: Preparing stakeholders on the procedures for handling computer security incidents or compromises
2614: 2360: 1603:
Companies should create secure systems designed so that any attack that is "successful" has minimal severity.
1329: 1281: 1251: 1110: 458: 255: 138: 128: 13245: 11759: 8500:
Aviation security : terrorist acts demonstrate urgent need to improve security at the nation's airports
5669: 4557:
can provide a practical solution for the problem of securely communicating when no key is shared in advance.
15797: 15385: 15293: 15205: 14981: 14966: 13201: 12551: 12546: 11147: 10448: 8004: 6946: 6498:"Obfuscated Files or Information: HTML Smuggling, Sub-technique T1027.006 – Enterprise | MITRE ATT&CK®" 5204: 5193: 5101: 5031: 3970: 3911: 3845: 3814: 3619: 3153: 3020: 3016: 2595: 2168: 2053: 1982: 1638: 1612: 1420: 1150: 1122: 633: 165: 153: 12809: 12582: 8619: 4748:
in 1971. The program was purely experimental in nature and carried no malicious payload. A later program,
15885: 15620: 15125: 14864: 14785: 14585: 8451: 7340: 7151:. Proceeding DAC '83 Proceedings of the 20th Design Automation Conference. IEEE Press. pp. 221–227. 5776: 4652:
is spyware that silently captures and stores each keystroke that a user types on the computer's keyboard.
4387: 4136: 2534: 2397: 2376: 2043: 1833:
be employed. The amount of security afforded to an asset can only be determined when its value is known.
1432: 1291:
Privilege escalation can be separated into two strategies, horizontal and vertical privilege escalation:
808: 741: 240: 12407: 12149: 9056: 8826: 6973: 6100: 3921:
In addition to its own specific duties, the FBI participates alongside non-profit organizations such as
2640:
The consequences of a successful attack range from loss of confidentiality to loss of system integrity,
2633:
technology. The airline industry is moving from the use of traditional paper tickets towards the use of
15916: 15857: 15506: 14841: 14799: 14455: 13948: 13708: 12351: 12001: 7787: 5240: 5228: 4642: 4605: 4574: 4110:
There is growing concern that cyberspace will become the next theater of warfare. As Mark Clayton from
3789:
The new U.S. cyber strategy seeks to allay some of those concerns by promoting responsible behavior in
3457:, often the local authorities cannot take action due to lack of laws under which to prosecute. Proving 3420: 3281: 3126:, the motivations for breaches of computer security vary between attackers. Some are thrill-seekers or 3048: 2800: 2370: 1881:
against their systems to identify vulnerabilities. In some sectors, this is a contractual requirement.
1826: 1739: 1616: 1463: 814: 713: 477: 215: 8273: 6633:
Schlienger, Thomas; Teufel, Stephanie (2003). "Information security culture-from analysis to change".
6162: 5297: 4140: 15875: 15802: 15777: 15640: 15288: 14901: 14702: 14420: 11819: 5060: 4627: 4623: 4450: 4438: 3583:
helps protect societies worldwide from the threat of cybercrime through the Convention on Cybercrime.
3487: 2175: 2150: 2136: 2132: 1928: 1803: 1622: 1559: 1361:
team was the victim of this type of cyber scam with a perpetrator impersonating the team's president
1348: 1267: 1030: 916: 829: 788: 511: 260: 11850:"Government of Canada Launches Cyber Security Awareness Month With New Public Awareness Partnership" 10540:
Gordon, Lawrence; Loeb, Martin (November 2002). "The Economics of Information Security Investment".
9524: 9428: 9275: 7701:"A Survey on Supply Chain Security: Application Areas, Security Threats, and Solution Architectures" 2833:
may use WiFi and Bluetooth to communicate with onboard consumer devices and the cell phone network.
2446:
interested in manipulating markets and making illicit gains. Websites and apps that accept or store
1877:
Beyond vulnerability scanning, many organizations contract outside security auditors to run regular
15931: 15726: 15559: 15152: 15021: 14687: 14565: 14460: 13472: 13315: 12524: 12421: 10609: 10529:(Report). Washington DC: Congressional Research Service, Government, and Finance Division. RL32331. 8659: 7829: 5037: 4790: 4779: 4069: 4028: 3838: 3693:
Public Safety Canada aims to begin an evaluation of Canada's cybersecurity strategy in early 2015.
3552:
The Forum of Incident Response and Security Teams (FIRST) is the global association of CSIRTs. The
3261: 2482: 2459: 2418: 2329: 2236:
was coined almost simultaneously with the creation of the first working computer viruses, the term
2164: 2024: 1986: 1842: 1526:
Implementation: Four stages should be used to implement the information security culture. They are:
1134: 1085: 838: 553: 436: 395: 365: 315: 13451: 11789: 8909: 8199: 6188: 3505:
that was to remain free of government intervention, as can be seen in many of today's libertarian
15787: 15721: 15612: 15428: 15095: 14775: 14727: 14390: 14167: 13026: 10145: 8707:"The Australian ePassport. Australian Government Department of Foreign Affairs and Trade website" 7450: 7207:
Ingredients of Operating System Correctness? Lessons Learned in the Formal Verification of PikeOS
5750: 5134: 5054: 4542: 4424: 4255: 2863:
announced some initial safety standards, and called for states to come up with uniform policies.
2845: 2740:
Large corporations are common targets. In many cases attacks are aimed at financial gain through
2724: 2704:
companies use the internet to provide enhanced products and services, for example through use of
2630: 2382: 2354: 2287: 2222: 2142: 1998: 1992: 1969: 1931:
is a method for mitigating unauthorized access to a system or sensitive information. It requires
1485:
smuggling allows an attacker to "smuggle" a malicious code inside a particular HTML or web page.
1003: 969: 957: 175: 11201:"U.S. Suspects Hackers in China Breached About four (4) Million People's Records, Officials Say" 11103: 7746: 6846: 5997: 3350:
global surveillance. There were also indications that the NSA may have inserted a backdoor in a
1698:
determination of controls based on risk assessment, good practices, finances, and legal matters.
15852: 15683: 15564: 15331: 15321: 15316: 13682: 12177: 12173: 9942: 9800: 9519: 9180:"Cybersecurity expert: It will take a 'major event' for companies to take this issue seriously" 8848: 8301: 8297: 7859: 7824: 6052: 4596:
is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.
4299: 4155: 4081: 3408: 3023:
should maintain the security of Internet-connected devices – but no structure for enforcement.
2349: 2245: 2180: 2116: 1893:. They aim to assess systems for risk and to predict and test for their vulnerabilities. While 1848: 1121:, or suggest the perception of a threat in order to manipulate users into buying or installing 430: 14207: 9910:"Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems" 8399: 8376: 7699:
Hassija, Vikas; Chamola, Vinay; Gupta, Vatsal; Jain, Sarthak; Guizani, Nadra (15 April 2021).
7108:. 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings. pp. 45–54. 7092:
network vulnerability scans at least quarterly and after any significant change in the network
6530:. Perth. Security Research Institute (SRI), Edith Cowan University: 1st to 3rd December 2009. 5122: – Academic discipline studying the relationship between computer systems and their users 4585:
and the Internet, but can also be used internally to impose traffic rules between networks if
4246:
attacks by hackers acting as individuals or as part of organized crime or foreign governments.
3985:
has devoted funding to securing systems on board the planes of private manufacturers, and the
1889:
The act of assessing and reducing vulnerabilities to cyber attacks is commonly referred to as
15926: 15921: 15822: 15792: 15782: 15678: 15592: 15468: 15408: 15375: 15365: 15255: 15220: 15210: 15147: 15016: 14991: 14986: 14951: 14816: 14550: 13549: 10856:"The Stuxnet Attack On Iran's Nuclear Plant Was 'Far More Dangerous' Than Previously Thought" 7214: 6999:"Knowing Value of Data Assets is Crucial to Cybersecurity Risk Management | SecurityWeek.Com" 6133: 5584: 5173: 4566: 4550: 4294:
systems. These systems can protect either the whole computer, such as through an interactive
3941: 3221:
Some illustrative examples of different types of computer security breaches are given below.
3216: 3212: 2987: 2900: 2295:
Where an attack succeeds and a breach occurs, many jurisdictions now have in place mandatory
1863: 1732: 1114: 13947: 12475: 12123: 9595: (House of Lords 16 June 2008) ("15. ... alleged to total over $ 700,000"), 9125: 7329:. NYS Cyber Security Conference, Empire State Plaza Convention Center, Albany, NY, 3–4 June. 6820: 6524:"Exploring the Relationship between Organizational Culture and Information Security Culture" 4730:
started offering commercial access control systems and computer security software products.
3670:
Most countries have their own computer emergency response team to protect network security.
1742:(IDS) products are designed to detect network attacks in-progress and assist in post-attack 1607:
These design principles of security by design can include some of the following techniques:
15582: 15554: 15526: 15521: 15350: 15326: 15278: 15263: 15245: 15235: 15230: 15192: 15142: 15137: 15054: 15000: 14836: 14748: 14697: 14642: 14510: 14483: 14465: 14363: 14334: 14288: 12885: 12247: 11408:"The Venn diagram between libertarians and crypto bros is so close it's basically a circle" 7645: 7549: 6676: 6324: 4964: 4599: 4586: 4417: 4347: 4335: 4188: 3245: 3078: 3007:. There are many reports of hospitals and hospital organizations getting hacked, including 2950:(IoT) is the network of physical objects such as devices, vehicles, and buildings that are 2859:
into its cars' computer systems. In the area of autonomous vehicles, in September 2016 the
2365: 2334: 2249: 2047: 2020: 1779: 1562:
is an action, device, procedure or technique that reduces a threat, a vulnerability, or an
1505: 1262: 873: 854: 776: 772: 448: 390: 310: 14430: 1635:, approaches to make modules more secure where formal correctness proofs are not possible. 8: 15847: 15772: 15688: 15673: 15438: 15225: 15182: 15177: 15074: 15064: 15036: 14620: 14395: 14353: 13498: 12845: 10810: 10744: 9769: 9497:"The Cutting Edge of RFID Technology and Applications for Manufacturing and Distribution" 8118: 7861: 5694: 5128: 4989: 4844: 4667: 4582: 4554: 4454: 4435:
techniques can be used to ensure that communication end-points are who they say they are.
4321: 4307: 3648: 3636: 3588: 3475: 3336: 3140: 2991: 2748:. Examples include the loss of millions of clients' credit card and financial details by 2641: 2559: 2486: 2157: 2146: 2128: 1894: 1402: 1310: 771:
are still used to prevent unauthorized tampering. IT security is not a perfect subset of
737: 698: 425: 250: 160: 13988: 12889: 7869:. 2017 IEEE International Conference on Communications (ICC). IEEE Press. pp. 1–6. 7649: 3537: 1451:
published research on the life-threatening risk of spoofing in the healthcare industry.
15812: 15711: 15587: 15544: 15453: 15395: 15380: 15370: 15162: 14961: 14804: 14732: 14637: 14195: 14029: 13942: 13772: 13600: 13289: 13007: 10693: 10557: 9823: 9090:"Sony Hackers Have Over 100 Terabytes Of Documents. Only Released 200 Gigabytes So Far" 8802: 8777: 7888: 7842: 7728: 7676: 7633: 7476: 7127: 6394: 6024: 5072: 4909: 4869: 4749: 4737: 3384: 3371: 3309: 3241: 2947: 2808: 2788: 2757: 2720: 2610: 2606: 2551: 2447: 2392: 2344: 1947: 1657: 1563: 1436: 1038: 733: 12766: 11304: 10297: 10267: 9540:"Gary McKinnon profile: Autistic 'hacker' who started writing computer programs at 14" 9238: 8093: 6552:
Post-secondary Education Network Security: the End User Challenge and Evolving Threats
6281: 5905: 5890: 5873: 5057: – Computer security standard to prevent cross-site scripting and related attacks 4771:, was distributed via the Internet. It gained significant mainstream media attention. 3827: 1927:
Outside of formal assessments, there are various methods of reducing vulnerabilities.
15832: 15762: 15741: 15703: 15511: 15458: 15157: 15069: 14943: 14852: 14610: 14545: 14495: 14442: 14400: 14274: 14255: 14238: 14203: 14199: 14187: 14152: 14130: 14096: 14051: 14033: 14021: 14004:
Branch, Jordan (24 September 2020). "What's in a Name? Metaphors and Cybersecurity".
13764: 13040: 13011: 12999: 12964: 12913: 12717: 12707: 12443: 10726: 10716: 10697: 10658: 10584: 9248: 8807: 8395: 8372: 7878: 7732: 7720: 7681: 7663: 7634:"Reconfigurable Security Architecture (RESA) Based on PUF for FPGA-Based IoT Devices" 7152: 7117: 7081: 7056: 7029: 6902: 6574: 6564: 6386: 6378: 6368: 6328: 6028: 6014: 5784: 5451: 5364: 5275: 5161: 5113: 4815: 4560: 4486: 4482: 3981:, and following successful attacks on airports and claimed attacks on airplanes, the 3580: 3518: 3458: 3123: 3102: 3090: 2780: 2634: 2542:
acting on behalf of banks to issue on-the-spot credit cards to interested customers.
2510:
implementations of these technologies, including at least one implementation that is
2499: 2413: 2265: 2216:
is a fundamental principle relating to information security and, as the analogy with
1806:) to provide real-time filtering and blocking. Another implementation is a so-called 1459: 1429:
spoofing, where an attacker produces a fake biometric sample to pose as another user.
1231: 1096: 953: 861: 764: 745: 686: 682: 670: 582: 420: 350: 13776: 13657:"How NIST can protect the CIA triad, including the often overlooked 'I' – integrity" 13604: 13372:"The UK Cyber Security Strategy: Report on Progress and Forward Plans December 2014" 10206: 8425: 7131: 6717: 6398: 5292: 5243: – Approach to computer security from the US Defense Information Systems Agency 4457:
techniques can be used to ensure privilege separation and mandatory access control.
4420:
can have their access to other applications controlled at the virtual machine level.
4382:-like operating systems there is an option to further restrict an application using 3031:
In distributed generation systems, the risk of a cyber attack is real, according to
818:. Vulnerabilities can be researched, reverse-engineered, hunted, or exploited using 755:
While many aspects of computer security involve digital security such as electronic
15941: 15665: 15549: 15516: 15311: 15240: 15129: 15115: 15110: 15059: 15046: 14971: 14924: 14821: 14761: 14525: 14515: 14410: 14294: 14228: 14179: 14088: 14013: 13756: 13715: 13592: 13349: 13032: 12991: 12954: 12944: 12903: 12893: 12767:
10 CFR 73.54, Protection of digital computer and communication systems and networks
12699: 12579:"Automotive Cybersecurity – National Highway Traffic Safety Administration (NHTSA)" 12547:"Cybersecurity for Medical Devices and Hospital Networks: FDA Safety Communication" 12381: 11457: 11300: 11086: 10685: 10648: 10561: 10549: 9827: 9815: 9094: 8797: 8789: 7892: 7870: 7846: 7834: 7712: 7671: 7653: 7523: 7503: 7109: 6892: 6666: 6642: 6556: 6531: 6360: 6320: 6006: 5885: 5398: 5354: 5344: 5222: 5182: 5149: 5078: 4954: 4919: 4904: 4874: 4829: 4741: 4630:
can be used to test if an IP address is in use. If it is, attackers may then try a
4391: 4325: 3949: 3945: 3462: 3074: 2834: 2818: 2701: 2673: 2507: 2387: 2217: 2103: 1878: 1856: 1822: 1578: 1467: 1435:(ARP) spoofing, where an attacker sends spoofed address resolution protocol onto a 1317: 1034: 905: 819: 705: 694: 678: 626: 597: 541: 400: 101: 13909:"Bush Order Expands Network Monitoring: Intelligence Agencies to Track Intrusions" 13745:"The Origin and Early History of the Computer Security Software Products Industry" 12794: 12779: 12662: 11087:"NIST Removes Cryptography Algorithm from Random Number Generator Recommendations" 10480:"D.C. distributed energy proposal draws concerns of increased cybersecurity risks" 7236: 3810: 2442:, SWIFT, investment banks, and commercial banks are prominent hacking targets for 15736: 15630: 15602: 15496: 15448: 15433: 15418: 15273: 15268: 15215: 15105: 15079: 15031: 14976: 14712: 14692: 14590: 14415: 14405: 11110: 10842: 10797: 9799:
Singh, Jatinder; Pasquier, Thomas; Bacon, Jean; Ko, Hajoon; Eyers, David (2015).
6497: 5475: 5155: 5107: 5066: 4969: 4934: 4894: 4593: 4470: 4355: 4302:
server. There are many methods for identifying and authenticating users, such as
3896: 3835: 3747:
is the nodal agency which monitors the cyber threats in the country. The post of
3720: 3257: 3111: 2996: 2967: 2951: 2888: 2689: 2685: 2669: 2657: 2438:
The computer systems of financial regulators and financial institutions like the
2080: 1989:(VPNs). In addition, a USB dongle can be configured to lock or unlock a computer. 1378: 1355: 1022: 1018: 965: 928: 180: 71: 40: 14233: 14216: 12703: 11122: 9148:
Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk
7927:"Studies prove once again that users are the weakest link in the security chain" 6700: 6679: 6660: 6550: 5638: 4282:
The following terms used with regards to computer security are explained below:
3248:
who said "he wanted to count how many machines were connected to the Internet".
2783:
in retaliation for the firm's CEO claiming to have infiltrated their group, and
685:
that may result in unauthorized information disclosure, theft of (or damage to)
15842: 15746: 15645: 15491: 15463: 14882: 14780: 14630: 14580: 14555: 14520: 14500: 14380: 14368: 13744: 13629:. US Department of Commerce, National Bureau of Standards. pp. 11–3–11–4. 12898: 12873: 12374:"Robert S. Mueller, III – InfraGard Interview at the 2005 InfraGard Conference" 11931: 11064: 9336:"Tesla fixes software bug that allowed Chinese hackers to control car remotely" 7700: 7146: 6535: 5263: 5019: 4974: 4929: 4889: 4692:. This led to the formalization of cybersecurity as a professional discipline. 4507: 4464: 4432: 4413: 4359: 4351: 4291: 4131: 3937: 3623: 3522: 3331: 3256:
In 1994, over a hundred intrusions were made by unidentified crackers into the
3135: 3107: 3094: 3047:
Perhaps the most widely known digitally secure telecommunication device is the
2887:(Radio Frequency Identification) technology as an efficient, digitally secure, 2814: 2772: 2741: 2677: 2665: 2618: 2490: 2314: 2309: 2253: 2196:
protecting individuals and companies from the great majority of cyber threats.
1866:, which analyzes a computer system in search of known vulnerabilities, such as 1790:. They can be implemented as software running on the machine, hooking into the 1783: 1722: 1490: 1406: 1392: 1333: 1239: 1235: 1227: 1068: 885: 489: 320: 273: 203: 84: 61: 14017: 13579: 13036: 11362: 10730: 10713:
Security engineering : a guide to building dependable distributed systems
9819: 8793: 8223:"From AI to Russia, Here's How Estonia's President Is Planning for the Future" 7860:
Abreu, Vilmar; Santin, Altair O.; Viegas, Eduardo K.; Stihler, Maicon (2017).
7716: 7508: 7113: 6364: 6357:
Handbook of Biometric Anti-Spoofing: Trusted Biometrics under Spoofing Attacks
6010: 5016: – Conceptual diagrams showing how an asset, or target, might be attacked 4324:
consists of computer programs that attempt to identify, thwart, and eliminate
4254:
In the United Kingdom, a nationwide set of cybersecurity forums, known as the
4231:
A DPO is tasked with monitoring compliance with data protection laws (such as
3054:
The Smart Card Web Servers draft standard (SCWS) defines the interfaces to an
15910: 15731: 15026: 14792: 14753: 14722: 14717: 14570: 14560: 14530: 14242: 14191: 14100: 14025: 13768: 13719: 13263: 13003: 12995: 12968: 12917: 12721: 10689: 10662: 10653: 10636: 10588: 9244: 7874: 7724: 7667: 6906: 6578: 6560: 6382: 5368: 5279: 5198: 5095: 4984: 4949: 4944: 4924: 4884: 4879: 4864: 4854: 4783: 4753: 4734: 4538: 4287: 4077: 3782: 3724: 3705: 3608: 3526: 3502: 3454: 3379: 3277: 3237: 3188:
There are four key components of a computer security incident response plan:
2916: 2830: 2784: 2098: 2092: 1818: 1791: 1619:
gains access to that part, they only have limited access to the whole system.
1351:(BEC) scams had cost US businesses more than $ 2 billion in about two years. 1243: 1075: 988: 949: 592: 325: 220: 117: 12696:
CYBER SECURITY EMPLOYMENT POLICY AND WORKPLACE DEMAND IN THE U.S. GOVERNMENT
9801:"Twenty Cloud Security Considerations for Supporting the Internet of Things" 9276:"Hackers Remotely Kill a Jeep on the Highway – With Me in It" 9030:"How one man tracked down Anonymous – and paid a heavy price" 8482: 6528:
Proceedings of the 7th Australian Information Security Management Conference
5609: 4684: 4358:, with a robust process in place to identify, test and install any released 3831:. Although various other measures have been proposed – none have succeeded. 2872: 1489:
files can carry payloads concealed as benign, inert data in order to defeat
15827: 15486: 14826: 14682: 14385: 12949: 12932: 12307: 12212:"Biden Adviser On Cyber Threats And The New Executive Order To Combat Them" 11462: 11018: 10523: 10146:"Hospitals keep getting attacked by ransomware – Here's why" 9247:; Karl Koscher; Alexei Czeskis; Franziska Roesner; Tadayoshi Kohno (2011). 9240: 8811: 8499: 7685: 5934:"What is a man-in-the-middle attack and how can I protect my organization?" 5403: 5089: 4939: 4899: 4859: 4807: 4530: 4518: 4500: 4476: 4105: 3899:
program and requirements for cybersecurity in the United States called the
3342: 3161: 3067: 3004: 2935: 2852: 2841: 2753: 2455: 2451: 2324: 2319: 2278: 2274: 1847:
Vulnerability management is the cycle of identifying, fixing or mitigating
1771: 1751: 1726: 1719: 1695:
the relationship of different components and how they depend on each other.
1632: 1471: 1412: 1156: 877: 768: 717: 607: 413: 280: 233: 88: 27:
Protection of computer systems from information disclosure, theft or damage
13422:"Singapore Operational Technology (OT) Cybersecurity Competency Framework" 13175: 10577:"U.S. and Britain Help Ukraine Prepare for Potential Russian Cyberassault" 10553: 10411:"New cybersecurity guidelines for medical devices tackle evolving threats" 10358:"Former New Hampshire Psychiatric Hospital Patient Accused Of Data Breach" 7496:"Guidelines for Managing the Security of Mobile Devices in the Enterprise" 7179: 6897: 6880: 6646: 4514: 3977:
is concerned with automotive cybersecurity. After being criticized by the
2462:
have also been tampered with in order to gather customer account data and
729: 15817: 15443: 15355: 14766: 14600: 14575: 14540: 14375: 14183: 13760: 13617: 13596: 13124:"Government vs. Commerce: The Cyber Security Industry and You (Part One)" 12908: 12604: 11960:"Australian federal government announces cybersecurity support for SMBs", 11291:
Mansfield-Devine, Steve (1 September 2015). "The Ashley Madison affair".
9561: 8710: 7809: 7204:
Baumann, Christoph; Beckert, Bernhard; Blasum, Holger; Bormer, Thorsten.
6359:. Advances in Computer Vision and Pattern Recognition. London: Springer. 5359: 5013: 4994: 4959: 4834: 4768: 4761: 4708: 4700: 4612: 4494: 4063: 3882:
Penetration test § Standardized government penetration test services
3533: 3467: 3285: 3230: 3181: 3055: 2955: 2745: 2676:
have sensors such as cameras, microphones, GPS receivers, compasses, and
2661: 2550:
Computers control functions at many utilities, including coordination of
2533:
chip which is embedded in credit cards. Further developments include the
2515: 2511: 2494: 2475: 1767:
Cyber security awareness training to cope with cyber threats and attacks.
1747: 1663: 1628: 1440: 1416: 803: 619: 587: 483: 370: 107: 14092: 11984:"Need for proper structure of PPPs to address specific cyberspace risks" 11629: 11627: 11247:"Estimate of Americans hit by government personnel data hack skyrockets" 11123:
Michael Riley; Ben Elgin; Dune Lawrence; Carol Matlack (17 March 2014).
8248:"Professor Len Adleman explains how he coined the term "computer virus"" 5349: 5332: 4733:
One of the earliest examples of an attack on a computer network was the
4473:
is the nondisclosure of information except to another authorized person.
3073:
Other telecommunication developments involving digital security include
1219:
appears to be legitimate, the hyperlink points at the phisher's webpage.
15837: 15767: 15360: 15100: 14956: 14831: 14647: 14595: 14478: 14358: 14303: 14144: 12959: 12422:"A Framework for a Vulnerability Disclosure Program for Online Systems" 12272: 11503: 10790: 9633:"Massive Data Breach Puts 4 Million Federal Employees' Records at Risk" 4849: 4794: 4661: 4649: 4617: 4546: 4526: 4490: 4339: 4311: 3956: 3790: 3600: 3561: 3506: 3498: 3491: 3375: 3289: 3059: 3012: 3008: 2776: 2749: 2705: 2653: 2555: 2539: 2526: 2522: 2443: 2339: 2240:
is a much later invention, perhaps as late as 2000 by Internet pioneer
2112: 2028: 1493:. These payloads can be reconstructed on the other side of the filter. 1426: 1277: 1242:
call. They often direct users to enter details at a fake website whose
1054: 976: 920: 893: 850: 760: 725: 721: 340: 335: 112: 14298: 12933:"How We Stopped Worrying about Cyber Doom and Started Collecting Data" 11017:
to hand over all call data shows scale of domestic surveillance under
8532:"Hacker Says He Can Break into Airplane Systems Using In-Flight Wi-Fi" 8144:"President of the Republic at the Aftenposten's Technology Conference" 7658: 6439:"Photos of an NSA "upgrade" factory show Cisco router getting implant" 4290:
restricts access to a computer to a group of users through the use of
3817:
is the key legislation. It prohibits unauthorized access or damage of
3690:
Canadian citizens, and Cyber Security Awareness Month during October.
3622:
with the objective to improve network and information security in the
3374:
computers in 2013, stealing roughly 40 million credit cards, and then
1778:
Today, computer security consists mainly of preventive measures, like
1187: 15342: 15303: 14707: 14662: 14657: 14505: 14473: 13843:"The Morris Worm - 30 Years Since First Major Attack on the Internet" 11624: 10993:"NSA collecting phone records of millions of Verizon customers daily" 9061: 7838: 6671: 5846: 5425: 5131: – Technical and Policy systems to give users appropriate access 4999: 4979: 4839: 4658:
is the use of deception to manipulate individuals to breach security.
4638: 4631: 4398:
to further restrict the access of an application to system resources.
4343: 4315: 4303: 4235:), data protection policies, awareness-raising, training, and audits. 3922: 3856: 3573: 3471: 3127: 3000: 2868: 2728: 2626: 2241: 2016: 1921: 1867: 1743: 1653: 1272: 1250:
Preying on a victim's trust, phishing can be classified as a form of
1102: 881: 756: 577: 360: 210: 190: 95: 56: 12874:"The geopolitics of renewable energy: Debunking four emerging myths" 12190:"Home | Homeland Security & Governmental Affairs Committee" 11583: 10781:
Jonathan Zittrain, 'The Future of The Internet', Penguin Books, 2008
10238:"Zombie OS lurches through Royal Melbourne Hospital spreading virus" 9965:"Hotel room burglars exploit critical flaw in electronic door locks" 8941:"Exclusive: FBI warns healthcare sector vulnerable to cyber attacks" 6311:
Butterfield, Andrew; Ngondi, Gerard Ekembe, eds. (21 January 2016).
5152: – Right or mandate of personal privacy concerning the internet 15403: 14893: 14667: 14625: 14488: 14110:"Ex-IDF cyber intel. official reveals secrets behind cyber offense" 13318:. MS-ISAC (Multi-State Information Sharing & Analysis Center). 12499:"Military's Cyber Commander Swears: "No Role" in Civilian Networks" 12325: 11565: 8830: 6413:"80 to 0 in Under 5 Seconds: Falsifying a Medical Patient's Vitals" 6256:"Bucks leak tax info of players, employees as result of email scam" 4775: 4680: 4406: 4089: 3592: 3367: 2959: 2912: 2583: 1852: 1814: 1787: 1385: 1366: 1337: 1285: 1280:
on large amounts of data. Privilege escalation usually starts with
1223: 846: 709: 690: 454: 185: 133: 12698:. EDULEARN19 Proceedings. Vol. 1. IATED. pp. 7858–7866. 8736:"Is Your Watch Or Thermostat A Spy? Cybersecurity Firms Are On It" 8681: 8484:
Computer Security in Aviation: Vulnerabilities, Threats, and Risks
6390: 2941: 2771:
Not all attacks are financially motivated, however: security firm
1981:
The principle is that an encryption scheme on the dongle, such as
1569:
Some common countermeasures are listed in the following sections:
864:
can typically be classified into one of the following categories:
646: 14677: 14652: 14615: 13791:"A Brief History of Computer Viruses & What the Future Holds" 12607:(Report). U. S. Government Accountability Office. 14 April 2015. 11525: 11014: 10902:"Cyberwar Issues Likely to Be Addressed Only After a Catastrophe" 9610:"Fresh Leak on US Spying: NSA Accessed Mexican President's Email" 9592:
Mckinnon V Government of The United States of America and Another
9250:
Comprehensive Experimental Analyses of Automotive Attack Surfaces
8849:"Staples: Breach may have affected 1.16 million customers' cards" 8776:
Kruse, CB; Smith, B; Vanderlinden, H; Nealand, A (21 July 2017).
8061:"Risky business: why security awareness is crucial for employees" 7979:"90% of security incidents trace back to PEBKAC and ID10T errors" 6555:. ICERI2017 Proceedings. Vol. 1. IATED. pp. 1787–1796. 5938: 5231: – Reliance on design or implementation secrecy for security 5167: 5025: 4745: 4570: 4402: 4395: 4375: 4371: 4329: 4014: 3596: 3557: 3553: 3510: 3450: 3305: 2892: 2761: 2563: 2032: 1871: 1448: 1216: 1118: 1106: 1092: 1058: 1050: 996: 897: 749: 442: 330: 305: 298: 170: 12471:
Remarks at the Defense Information Technology Acquisition Summit
12297:
AFP-JiJi, "U.S. boots up cybersecurity center", 31 October 2009.
11602:"Government of Canada Launches Canada's Cyber Security Strategy" 7632:
Babaei, Armin; Schiele, Gregor; Zohner, Michael (26 July 2022).
6522:
Lim, Joo S.; Chang, Shanton; Maynard, Sean; Ahmad, Atif (2009).
5610:"What is a backdoor attack? Definition and prevention | NordVPN" 5333:"Systematically Understanding Cybersecurity Economics: A Survey" 5158: – Being aware of safety and security risks on the Internet 3077:, which use the embedded SIM card to generate a legally binding 1855:. Vulnerability management is integral to computer security and 1270:
in the system to gain access to restricted data; or even become
812:
exists. Actors maliciously seeking vulnerabilities are known as
14535: 14450: 14149:
Counterterrorism and Cybersecurity: Total Information Awareness
13580:"Computer Security Discourse at RAND, SDC, and NSA (1958-1970)" 13248:. NICCS (US National Initiative for Cybercareers and Studies). 12197: 11320:"Hackers Breached Colonial Pipeline Using Compromised Password" 11170:"Millions more Americans hit by government personnel data hack" 10610:"Cyber-Attack Against Ukrainian Critical Infrastructure | CISA" 10087:"Hacking Hospitals And Holding Hostages: Cybersecurity In 2016" 8910:"2.5 Million More People Potentially Exposed in Equifax Breach" 8638:"Centralised Services: NewPENS moves forward – Eurocontrol.int" 7808:
Sandhu, R; Coyne, EJ; Feinstein, HL; Youman, CE (August 1996).
7213:. Embedded World Conference, Nuremberg, Germany. Archived from 5874:"Cyber-Attacks – Trends, Patterns and Security Countermeasures" 4811: 4534: 4444: 4383: 3569: 3355: 3293: 3284:
and that the hackers had accessed a system that stored data on
3260:, the US Air Force's main command and research facility. Using 2963: 2822: 2712: 1977: 1965: 1917: 1906: 1409:
to hide their identity or impersonate another computing system.
961: 932: 674: 496: 345: 285: 123: 12403: 11113:, 31 October 2013, Lorenzo Franceschi-Bicchierai, mashable.com 10384:"Texas Hospital hacked, affects nearly 30,000 patient records" 10328:"Legion cyber-attack: Next dump is sansad.nic.in, say hackers" 9695:"Encryption "would not have helped" at OPM, says DHS official" 9514:
Rahman, Mohammad Anwar; Khadem, Mohammad Miftaur; Sarder, MD.
8031:"IBM Security Services 2014 Cyber Security Intelligence Index" 7771:
Sanghavi, Alok (21 May 2010). "What is formal verification?".
6523: 5973:"New polymorphic malware evades three-quarters of AV scanners" 5529:"Cyber attacks on SMBs: Current Stats and How to Prevent Them" 4354:
by installing as few as possible. They are typically run with
4239: 3895:
has a dedicated division responsible for the response system,
1365:, resulting in the handover of all the team's employees' 2015 14215:
Shariati, Marzieh; Bahmani, Faezeh; Shams, Fereidoon (2011).
10522:
Cashell, B.; Jackson, W. D.; Jickling, M.; Webel, B. (2004).
8775: 8363:
Lin, Tom C. W. (3 July 2017). "The New Market Manipulation".
8191:"Security execs call on companies to improve 'cyber hygiene'" 5331:
Kianpour, Mazaher; Kowalski, Stewart; Øverby, Harald (2021).
5210: 5110: – Resilience of systems to component failures or errors 4367: 4295: 3604: 3565: 3390: 3164:
actors seeking to attack based on an ideological preference.
3036: 2896: 2716: 2268:
is often very difficult for a variety of reasons, including:
2039: 1902: 1799: 1761: 1192: 1007: 13202:"How to become a Chief Information Security Officer (CISO)?" 12343: 12275:. U.S. Department of Homeland Security S&T Directorate. 12009: 11730:"Action Plan 2010–2015 for Canada's Cyber Security Strategy" 11670:"Action Plan 2010–2015 for Canada's Cyber Security Strategy" 10120:"Cyber-Angriffe: Krankenhäuser rücken ins Visier der Hacker" 9454:"Thales supplies smart driver license to 4 states in Mexico" 9210:"The problem with self-driving cars: who controls the code?" 8563:"Hacker says to show passenger jets at risk of cyber attack" 7905: 5384:"Global Cybersecurity: New Directions in Theory and Methods" 5264:"Towards a More Representative Definition of Cyber Security" 4205: 3224: 2813:
Vehicles are increasingly computerized, with engine timing,
923:
can be blocked by adding a new firewall rule, many forms of
14123:
The Hacker Playbook: Practical Guide To Penetration Testing
10521: 10441:"Postmarket Management of Cybersecurity in Medical Devices" 8090:
CPNI – Centre for the Protection of National Infrastructure
5998:"What is Cyber Threat Intelligence and How is it Evolving?" 4715: 4379: 4232: 4166:
Typical cybersecurity job titles and descriptions include:
3863: 3461:
is also a major problem for all law enforcement agencies. "
3351: 2884: 2503: 2470: 2046:
of components in mobile and desktop computers by utilizing
1909:– but these make up a very small percentage of the market. 1898: 1795: 1486: 1482: 1149:
as a Pineapple attack thanks to a popular device. See also
1011: 14166:
Montagnani, Maria Lillà; Cavallo, Mirta Antonella (2018).
13732:
Note: this document has been superseded by later versions.
13709:
Engineering Principles for Information Technology Security
12150:"Do You Know About Biggest Cybersecurity Threats In 2023?" 12097:"Do You Know About Biggest Cybersecurity Threats In 2023?" 12031:"South Korea seeks global support in cyber attack probe". 12002:"National Cyber Safety and Security Standards(NCSSS)-Home" 11478:"It's Time to Treat Cybersecurity as a Human Rights Issue" 11270:"Hacking Linked to China Exposes Millions of U.S. Workers" 10813:(Press release). The TJX Companies, Inc. 17 January 2007. 9995:"Hospital Medical Devices Used As Weapons in Cyberattacks" 8972:"Lack of Employee Security Training Plagues US Businesses" 8600:. Purdue University School of Aeronautics and Astronautics 8452:"Hackers attacked the U.S. energy grid 79 times this year" 7807: 6628: 6626: 6624: 5811:"What Are Eavesdropping Attacks & How To Prevent Them" 5219: – Common ground of physical and information security 5207: – Overview of and topical guide to computer security 4116:
wrote in a 2015 article titled "The New Cyber Arms Race":
1041:
is a specification by the NSA referring to these attacks.
13062:"Cybersecurity Skills Shortage Impact on Cloud Computing" 12216: 12124:"National Cyber Strategy of the United States of America" 11125:"Target Missed Warnings in Epic Hack of Credit Card Data" 11104:"New Snowden Leak: NSA Tapped Google, Yahoo Data Centers" 10715:(3rd ed.). Indianapolis, IN: John Wiley & Sons. 10268:"Hacked Lincolnshire hospital computer systems 'back up'" 9664:"U.S. government hacked; feds think China is the culprit" 7785: 4727: 4645:
to identify accessible network services and applications.
3548:
Many different teams and organizations exist, including:
3540:, new technologies are too often used to violate rights. 3347: 3131: 3063: 2931: 2927: 2919:
controls, police and intelligence agency communications,
2574:, investigated 79 hacking incidents at energy companies. 2530: 1870:, insecure software configuration, and susceptibility to 1358: 1344: 1212: 1191:
An example of a phishing email, disguised as an official
704:
The field is significant due to the expanded reliance on
14289:
https://www.cisa.gov/topics/cybersecurity-best-practices
13706: 11664: 11662: 11660: 11365:. Hack in the Box Security Conference. 9 December 2012. 10575:
Sanger, David E.; Barnes, Julian E. (20 December 2021).
10298:"Lincolnshire operations cancelled after network attack" 8620:"Pan-European Network Services (PENS) – Eurocontrol.int" 7953:"The Role of Human Error in Successful Security Attacks" 7301:"NCSC's cyber security training for staff now available" 3478:
add to the difficulty of investigation and enforcement.
3171: 2122: 1625:
to prove the correctness of crucial software subsystems.
1553: 935:
or from a range of other possible techniques, including
697:, as well as from the disruption or misdirection of the 14252:
Cybersecurity and Cyberwar: What Everyone Needs to Know
12231:
Executive Order on Improving the Nation's Cybersecurity
9907: 9873:"Internet of Things: Science Fiction or Business Fact?" 9003:"Anonymous speaks: the inside story of the HBGary hack" 8778:"Security Techniques for the Electronic Health Records" 8412: 7698: 6621: 6355:
Marcel, Sébastien; Nixon, Mark; Li, Stan, eds. (2014).
6157: 6155: 6153: 6151: 5178:
Pages displaying short descriptions of redirect targets
5124:
Pages displaying short descriptions of redirect targets
5034: – Nonprofit organization focused on cybersecurity 4043: 3987:
Aircraft Communications Addressing and Reporting System
3276:
In early 2007, American apparel and home goods company
3084: 2895:, RFID can be read up to 20 feet away. RFID is used by 2622: 2598:) and NewPENS, and in the US with the NextGen program, 2259: 12841:"Obama to be urged to split cyberwar command from NSA" 12246:. U.S. Department of Homeland Security. Archived from 12174:
International Cybercrime Reporting and Cooperation Act
11317: 11224:"China Suspected in Theft of Federal Employee Records" 10176:"MedStar Hospitals Recovering After 'Ransomware' Hack" 9744:"GE's Introduces ACUVision as a Single Panel Solution" 9367:"Self-Driving Cars Gain Powerful Ally: The Government" 8415:
The UCLA Internet report: Surveying the digital future
7747:"The Most Secure OS: What is the Safest OS Available?" 7203: 7028:. Boca Raton, Fla.: Auerbach Publications. p. 1. 5551: 5549: 5499:"Syzbot: Google Continuously Fuzzing The Linux Kernel" 5330: 5262:
Schatz, Daniel; Bashroush, Rabih; Wall, Julie (2017).
4064:
NEI 08-09: Cybersecurity Plan for Nuclear Power Plants
3944:
crime and is specialized in the search and seizure of
3704:
announced an $ 18.2 million investment to fortify the
3429: 2514:. Open source allows anyone to view the application's 1677:
is kept as short as possible when bugs are discovered.
1405:, where an attacker alters the source IP address in a 1145:
zero-day-vulnerabilities to allow for further attacks.
13316:"Cyber Security Awareness Free Training and Webcasts" 13292:. U.S. Department of Homeland Security. 12 May 2010. 12632:"FAA Working on New Guidelines for Hack-Proof Planes" 11657: 11345:"Mikko Hypponen: Fighting viruses, defending the net" 7173:"Abstract Formal Specification of the seL4/ARMv6 API" 6947:"Why ONI May Be Our Best Hope for Cyber Security Now" 6764: 6762: 5954:"Multi-Vector Attacks Demand Multi-Vector Protection" 5116: – Security architecture implemented in hardware 4767:
In 1988, one of the first computer worms, called the
4529:
is used to protect the confidentiality of a message.
3934:
United States Department of Justice Criminal Division
3443: 2805:
Automated driving system § Risks and liabilities
2545: 2107:. Beyond this, formal verification aims to prove the 14214: 14074:"The Roots of the United States' Cyber (In)Security" 13093:"Why is a Degree in Cyber Security one of the Best?" 12931:
Maness, Ryan C.; Valeriano, Brandon (11 June 2018).
12467: 10675: 9798: 9562:"Gary McKinnon extradition ruling due by 16 October" 9472:"4 Companies Using RFID for Supply Chain Management" 9306:"Hackers take control of car, drive it into a ditch" 7576:"Direct memory access protections for Mac computers" 6521: 6466: 6464: 6148: 6075:"Protect yourself from phishing – Microsoft Support" 5145:
Pages displaying wikidata descriptions as a fallback
4000: 3659: 1170: 802:
vulnerability is one for which at least one working
14271:
Introduction to Computer Networks and Cybersecurity
10542:
ACM Transactions on Information and System Security
9843:"Why The FTC Can't Regulate The Internet Of Things" 8502:(Report). United States. General Accounting Office. 8390:Lin, Tom C. W. (2016). "Financial Weapons of War". 7631: 7502:. Special Publication (NIST SP). Gaithersburg, MD. 7251:"Everything you need for a career as a SOC analyst" 6471:Intelligence, Microsoft Threat (11 November 2021). 5546: 5261: 4350:used to create the application,- and to reduce the 3914:(BJA) are part of the multi-agency task force, The 3501:is complicated. For some, cyberspace was seen as a 3271: 2629:to introduce SmartGate kiosks with both retina and 2602:are moving to create their own dedicated networks. 975:Direct service attackers are related in concept to 13618:A. J. Neumann, N. Statland and R. D. Webb (1977). 13578: 8594:"Online course bolsters cybersecurity in aviation" 8198: 7524:"Access Control Statistics: Trends & Insights" 7148:Formal verification of a real-time hardware design 6759: 5996: 5523: 5521: 5519: 5311: 5170: – Any risk related to information technology 5040: – Methods used to protect cloud based assets 4581:features. They are near-universal between company 4163:is more prevalent in government job descriptions. 3989:. Concerns have also been raised about the future 3319: 2851:Manufacturers are reacting in numerous ways, with 2644:outages, loss of aircraft, and even loss of life. 2031:validation such as thumbprint readers, as well as 1388:. There are several types of spoofing, including: 14168:"Cybersecurity and Liability in a Big Data World" 14165: 13707:Stoneburner, G.; Hayden, C.; Feringa, A. (2004). 13525:"A Brief History of the Cybersecurity Profession" 13028:Style and Statistics: The Art of Retail Analytics 10879:"Stuxnet Worm a U.S. Cyber-Attack on Iran Nukes?" 10026:"Pacemaker hack can deliver deadly 830-volt jolt" 8137: 8135: 7899: 7786:Ferraiolo, D.F. & Kuhn, D.R. (October 1992). 7601:"Using IOMMU for DMA Protection in UEFI Firmware" 7419:"Intel Trusted Execution Technology: White Paper" 7144: 6770:"How the NCSC thinks about security architecture" 6461: 6310: 5723:"What Is a DMA Attack? Analysis & Mitigation" 5456:. Tech Security Conference At: San Francisco, CA. 5201: – Open source approach to computer security 5104: – Concept to reduce computer security risks 5028: – Test to determine whether a user is human 3973:has issued guidance for medical devices, and the 3361: 1960:Computer security compromised by hardware failure 1953: 1729:can protect systems files and data, respectively. 1499: 1423:to obscure their identity, or to pose as another. 15908: 14040: 13572: 13570: 12838: 12629: 11700:"Cyber Incident Management Framework For Canada" 11290: 9943:"Rethinking Security for the Internet of Things" 9770:"Internet of Things Global Standards Initiative" 8827:"Home Depot: 56 million cards exposed in breach" 8113: 8111: 7493: 6874: 6872: 6632: 6548: 6282:"What is Spoofing? – Definition from Techopedia" 5995:Tounsi, Wiem (15 May 2019), Tounsi, Wiem (ed.), 5579: 5577: 5453:Computer Security and Mobile Security Challenges 4388:restricting the application to its own 'sandbox' 4225: 3930:Computer Crime and Intellectual Property Section 3616:European Network and Information Security Agency 2302: 1754:serve a similar function for individual systems. 1064:Types of malware include some of the following: 972:standard are designed to prevent these attacks. 13935: 13868:"1993: Mosaic Launches and the Web is Set Free" 13428:(Press release). 8 October 2021. Archived from 12981: 12930: 12693: 11034:"Transcript: ARD interview with Edward Snowden" 7494:Souppaya, Murugiah P.; Scarfone, Karen (2013). 7145:Umrigar, Zerksis D.; Pitchumani, Vijay (1983). 5928: 5926: 5664: 5662: 5660: 5516: 4545:ciphers are suitable for bulk encryption using 4215: 3844:was signed, which prompted the creation of the 3842:Improving Critical Infrastructure Cybersecurity 3206: 3110:of the loss resulting from a cyber/information 2942:Internet of things and physical vulnerabilities 2075:refers to technology that is used to implement 552: 14269:Wu, Chwan-Hwa (John); Irwin, J. David (2013). 14249: 14012:(1). Cambridge University Press (CUP): 39–70. 12780:Cyber Security Plan for Nuclear Power Reactors 12326:"Internet Crime Complaint Center (IC3) – Home" 12308:"Federal Bureau of Investigation – Priorities" 11963:"2023-2030 Australian Cyber Security Strategy" 11091:National Institute of Standards and Technology 10957: 9714:"Schools Learn Lessons From Security Breaches" 9513: 9123: 8824: 8132: 7909:Economic Analysis of Role-Based Access Control 7500:National Institute of Standards and Technology 7075: 6593:Verizon Data Breach Investigations Report 2020 5990: 5988: 5986: 5841: 5839: 5837: 5835: 5833: 5831: 5781:Seven Deadliest Unified Communications Attacks 5633: 5631: 5313:"Reliance spells end of road for ICT amateurs" 5268:Journal of Digital Forensics, Security and Law 4537:are designed to make any practical attempt of 4074:Cyber Security Plan for Nuclear Power Reactors 3975:National Highway Traffic Safety Administration 3326:Global surveillance disclosures (2013–present) 3240:. The software was traced back to 23-year-old 2145:capable of enforcing privilege separation are 782: 716:. It is also significant due to the growth of 14933:Note: This template roughly follows the 2012 14909: 14319: 14087:(1). Oxford University Press (OUP): 157–185. 14044:Cybersecurity: A Generic Reference Curriculum 13567: 12663:"Protecting Civil Aviation from Cyberattacks" 12267: 12265: 10933:"Cone of silence surrounds U.S. cyberwarfare" 10930: 10505:"Current Releases - The Open Mobile Alliance" 9661: 8879:"Target: 40 million credit cards compromised" 8730: 8728: 8108: 7052:CCNA Cybersecurity Operations Companion Guide 6869: 6354: 6163:"What is Privilege Escalation? – CrowdStrike" 5775:York, Dan (1 January 2010), York, Dan (ed.), 5574: 5185: – Process of carrying out a cyberattack 5069: – Information technology risk insurance 5022: – Method of discovering password length 4139:was created in 2009 and many other countries 4023:United States Department of Homeland Security 3403:States. Data targeted in the breach included 3308:reportedly ruined almost one-fifth of Iran's 3266:National Aeronautics and Space Administration 3019:released its recommendations for how medical 2801:Autonomous car § Potential disadvantages 2775:had a serious series of attacks in 2011 from 1321:which is assumed by the victim to be secure. 1029:(FBI) and NSA to eavesdrop on the systems of 627: 519: 13931: 13929: 13886:"Web Design Museum - Netscape Navigator 2.0" 13620:"Post-processing audit tools and techniques" 11013:Exclusive: Top secret court order requiring 10777: 10775: 10574: 9840: 9630: 7416: 7324: 6470: 5923: 5777:"Chapter 3 – Eavesdropping and Modification" 5657: 3710:2023-2030 Australian Cyber Security Strategy 3459:attribution for cybercrimes and cyberattacks 3089:Serious financial damage has been caused by 2840:Simple examples of risk include a malicious 1129: 14127:CreateSpace Independent Publishing Platform 13342:"DoD Approved 8570 Baseline Certifications" 12734: 12084:. No. March 2032. white house. US gov. 12045: 11856:. Government of Canada. 27 September 2012. 11339: 11337: 10800:. United States Department of Defense, 1986 10207:"US hospitals hacked with ancient exploits" 10023: 8756: 8498:Dillingham, Gerald L. (20 September 2001). 7915:. Research Triangle Institute. p. 145. 7546:"Forget IDs, use your phone as credentials" 6232:. No. 25 February 2016. Archived from 5983: 5828: 5745: 5743: 5628: 5176: – Technology standards and techniques 5081: – Emerging field of computer security 5063: – Process to reduce a security threat 5051: – Policy-based removal of components 4240:Security Consultant/Specialist/Intelligence 4088:, this guideline is instrumental in aiding 3576:are all members of this international team. 2518:, and look for and report vulnerabilities. 2060: 1891:information technology security assessments 1884: 1836: 1673:of all vulnerabilities, to ensure that the 1504:Employee behavior can have a big impact on 1395:, is where an attacker forges the sending ( 911: 14916: 14902: 14326: 14312: 14041:Costigan, Sean; Hennessy, Michael (2016). 13404:"Cyber skills for a vibrant and secure UK" 12737:"DHS launches national cyber alert system" 12660: 12262: 11148:"Home Depot says 53 million emails stolen" 11145: 10899: 10637:"Q&A. What Motivates Cyber-Attackers?" 10539: 9940: 9692: 9516:Application of RFID in Supply Chain System 9087: 8938: 8725: 8560: 8497: 7795:15th National Computer Security Conference 5871: 5137: – Access control by authenticated ID 4458: 4412:Java and other languages which compile to 4298:screen, or individual services, such as a 4076:, outlines a comprehensive framework for 4056:outlines cybersecurity requirements under 3936:. The CCIPS is in charge of investigating 3391:Office of Personnel Management data breach 3070:into the card body of a regular SIM card. 2861:United States Department of Transportation 634: 620: 526: 512: 14870:Security information and event management 14232: 13926: 13906: 12958: 12948: 12907: 12897: 12496: 12468:William J. Lynn, III (12 November 2009). 11760:"Canadian Cyber Incident Response Centre" 11461: 10990: 10772: 10652: 10634: 10114: 10112: 9523: 9273: 9057:"What caused Sony hack: What we know now" 8801: 8141: 7828: 7675: 7657: 7507: 7477:"Secure Hard Drives: Lock Down Your Data" 6971: 6921:"How to Increase Cybersecurity Awareness" 6896: 6881:"Internet security: firewalls and beyond" 6821:"security architecture – Glossary | CSRC" 6670: 6436: 5889: 5402: 5358: 5348: 5237: – Mechanism v. policy design choice 5085:Cybersecurity information technology list 4206:Chief Information Security Officer (CISO) 4154:Cybersecurity is a fast-growing field of 4033:Defense Advanced Research Projects Agency 3991:Next Generation Air Transportation System 3225:Robert Morris and the first computer worm 2408:Security information and event management 2186: 2141:Within computer systems, two of the main 1862:Vulnerabilities can be discovered with a 1718:Limiting the access of individuals using 1691:attributes of security architecture are: 1536:Communication with organizational members 1509:protection of information of all kinds." 1037:transmissions generated by the hardware. 884:is any secret method of bypassing normal 14333: 13840: 13290:"Cybersecurity Training & Exercises" 13266:. U.S. Department of Homeland Security. 13121: 13090: 12871: 12474:(Speech). Washington D.C. Archived from 12378:Infragard (Official Site) – "Media Room" 12154:University Libraries UNT Digital Library 12128:University Libraries UNT Digital Library 11443: 11334: 11318:Turton, W.; Mehrotra, K. (4 June 2021). 11244: 10710: 10678:Journal of Contemporary Criminal Justice 10062:. Kaiser Health News. 17 November 2014. 9126:"The next frontier of hacking: your car" 9054: 9027: 8449: 8298:Promoting Good Cyber Hygiene Act of 2017 8058: 7906:A.C. O'Connor & R.J. Loomis (2002). 7770: 7394:. TheWindowsClub.com. 10 February 2010. 7103: 7076:Calder, Alan; Williams, Geraint (2014). 6878: 6549:Reimers, Karl; Andersson, David (2017). 6223: 6186: 5740: 5717: 5715: 5449: 5189:List of computer security certifications 5092: – Users' disregard for IT security 5075: – Self-defense against cyberattack 4513: 4401:Generalized security frameworks such as 4054:U.S. Nuclear Regulatory Commission (NRC) 3864:Standardized government testing services 3543: 3414: 2855:in 2016 pushing out some security fixes 1681: 1186: 942: 937:distributed reflective denial-of-service 775:, thus does not fit completely into the 645: 14268: 14250:Singer, P. W.; Friedman, Allan (2014). 13749:IEEE Annals of the History of Computing 13585:IEEE Annals of the History of Computing 13024: 12807: 12694:Anderson, David; Reimers, Karl (2019). 11572:from the original on 23 September 2014. 11198: 10745:"The Leading Cloud Recruiting Software" 10641:Technology Innovation Management Review 10386:. Healthcare IT News. 4 November 2016. 9953:from the original on 20 September 2013. 9119: 9117: 8480: 8188: 7080:(3rd ed.). IT Governance Limited. 7048: 7023: 6795:"Secure System Architecture and Design" 6098: 5970: 5496: 5381: 5225: – Layer to protect users' privacy 4814:began exploiting security flaws in the 3684:Canadian Cyber Incident Response Centre 3296:, and merchandise return transactions. 3282:unauthorized computer systems intrusion 3280:announced that it was the victim of an 2440:U.S. Securities and Exchange Commission 1644:Default secure settings, and design to 1257: 841:, and Denial-of Service (DoS) Attacks. 14: 15909: 15626:Knowledge representation and reasoning 14072:Fuller, Christopher J (11 June 2018). 14071: 14003: 13680: 13550:"One step ahead in computing security" 13059: 12839:Nakashima, Ellen (13 September 2016). 12332:from the original on 20 November 2011. 12058:from the original on 25 September 2013 11990:from the original on 13 November 2017. 11369:from the original on 25 November 2016. 11267: 11062: 10817:from the original on 27 September 2012 10477: 10408: 10364:from the original on 29 September 2017 10122:. Wirtschafts Woche. 7 December 2016. 10109: 9712:Davis, Michelle R. (19 October 2015). 9263:from the original on 21 February 2015. 9000: 8907: 8837:from the original on 18 December 2014. 8746:from the original on 11 February 2015. 8626:from the original on 12 December 2016. 8005:"Protect your online banking with 2FA" 6944: 6730:from the original on 20 November 2014. 6226:"CEO email scam costs companies $ 2bn" 5994: 5414:from the original on 4 September 2019. 5213: – Computer security organization 4342:, so general corporate practice is to 3717:Australia's cyber security regulations 3521:said during a panel discussion at the 3486:The role of the government is to make 3117: 2414:Software and operating system updating 1539:Courses for all organizational members 1474:capability into routers are examples. 1304: 15651:Philosophy of artificial intelligence 14897: 14847:Host-based intrusion detection system 14307: 13729:from the original on 12 October 2004. 13654: 13252:from the original on 5 November 2020. 13122:de Silva, Richard (11 October 2011). 12497:Shachtman, Noah (23 September 2010). 12354:from the original on 9 September 2010 12076: 11942:from the original on 11 November 2014 11920:from the original on 2 November 2014. 11830:from the original on 11 November 2014 11590:from the original on 17 October 2014. 11554:from the original on 3 December 2014. 11424: 11387:from the original on 19 November 2015 11363:"Mikko Hypponen – Behind Enemy Lines" 11351:from the original on 16 January 2013. 11221: 11180:from the original on 28 February 2017 11158:from the original on 9 December 2014. 11075:from the original on 1 February 2016. 10912:from the original on 18 February 2011 10889:from the original on 16 October 2013. 10876: 10459:from the original on 29 December 2016 10421:from the original on 28 December 2016 10390:from the original on 29 December 2016 10338:from the original on 29 December 2016 10308:from the original on 29 December 2016 10278:from the original on 29 December 2016 10248:from the original on 29 December 2016 10217:from the original on 16 November 2016 10186:from the original on 29 December 2016 10156:from the original on 29 December 2016 10126:from the original on 29 December 2016 10097:from the original on 29 December 2016 9750:. Security Info Watch. 11 August 2005 9711: 9572:from the original on 6 September 2012 9377:from the original on 14 February 2017 9102:from the original on 17 December 2014 8969: 8859:from the original on 21 December 2014 8591: 8520:from the original on 8 February 2015. 8462:from the original on 18 February 2015 8165:"Cyber security breaches survey 2023" 8142:Kaljulaid, Kersti (16 October 2017). 8059:Caldwell, Tracey (12 February 2013). 5712: 5557:"Cyber security breaches survey 2023" 5497:Larabel, Michael (28 December 2017). 5235:Separation of protection and security 5120:Human–computer interaction (security) 4756:in 1972 and used to destroy Creeper. 4634:to detect which services are exposed. 4195: 3611:are some of the members of the MAAWG. 3481: 3330:In early 2013, documents provided by 3312:. It did so by disrupting industrial 3177:Computer security incident management 3172:Computer security incident management 3042: 2735: 2123:Capabilities and access control lists 1572: 1554:Computer protection (countermeasures) 1324: 1105:, as the name suggests, is a form of 14977:Energy consumption (Green computing) 14923: 14108:Bob, Yonah Jeremy (21 August 2021). 13907:Nakashima, Ellen (26 January 2008). 13742: 13636:from the original on 10 October 2016 13576: 13479:from the original on 6 November 2011 12878:Energy Research & Social Science 12675:from the original on 17 October 2016 12410:from the original on 23 August 2006. 12273:"FAQ: Cyber Security R&D Center" 12147: 12121: 12094: 12048:"Seoul Puts a Price on Cyberdefense" 11910:"Cyber Security Cooperation Program" 11890:from the original on 2 November 2014 11880:"Cyber Security Cooperation Program" 11860:from the original on 3 November 2014 11740:from the original on 2 November 2014 11710:from the original on 2 November 2014 11680:from the original on 2 November 2014 11645:from the original on 2 November 2014 11612:from the original on 2 November 2014 11405: 11383:. Government Accountability Office. 11146:Rosenblatt, Seth (6 November 2014). 10524:The Economic Impact of Cyber-Attacks 10056:"How Your Pacemaker Will Get Hacked" 9922:from the original on 12 October 2016 9409:from the original on 21 January 2017 9364: 9346:from the original on 2 February 2017 9316:from the original on 2 February 2017 9286:from the original on 19 January 2017 9190:from the original on 20 January 2017 9160:from the original on 9 November 2016 9114: 8982:from the original on 9 November 2017 8920:from the original on 1 December 2017 8889:from the original on 1 December 2017 8825:Melvin Backman (18 September 2014). 8573:from the original on 13 October 2015 8542:from the original on 8 February 2015 7863:A multi-domain role activation model 7613:from the original on 9 December 2021 6325:10.1093/acref/9780199688975.001.0001 6205:from the original on 3 December 2013 6005:(1 ed.), Wiley, pp. 1–49, 5783:, Boston: Syngress, pp. 41–69, 5774: 5450:Zlatanov, Nikola (3 December 2015). 5309: 4272:Infocomm Media Development Authority 4180: 4044:U.S. NRC, 10 CFR 73.54 Cybersecurity 3536:. According to UN Secretary-General 3497:The government's regulatory role in 3304:In 2010, the computer worm known as 3085:Cost and impact of security breaches 2821:, seat belt tensioners, door locks, 2700:Today many healthcare providers and 2433: 2260:Difficulty of responding to breaches 1708: 1061:) to return that data to the user." 796:Common Vulnerabilities and Exposures 667:information technology (IT) security 15656:Distributed artificial intelligence 14935:ACM Computing Classification System 14878:Runtime application self-protection 14143: 14120: 14107: 14067:from the original on 10 March 2017. 13936:Nicole Perlroth (7 February 2021). 13817:"First incident of cyber-espionage" 13322:from the original on 6 January 2015 13296:from the original on 7 January 2015 12747:from the original on 31 August 2005 12310:. Federal Bureau of Investigation. 12279:from the original on 6 October 2008 11800:from the original on 8 October 2014 11770:from the original on 8 October 2014 11245:Zengerle, Patricia (19 July 2015). 11063:Newman, Lily Hay (9 October 2013). 11003:from the original on 16 August 2013 10877:Reals, Tucker (24 September 2010). 10845:. MyFox Twin Cities, 29 March 2007. 10409:Becker, Rachel (27 December 2016). 10084: 9397:"Federal Automated Vehicles Policy" 9365:Kang, Cecilia (19 September 2016). 9136:from the original on 17 March 2017. 9069:from the original on 4 January 2015 9055:Palilery, Jose (24 December 2014). 8644:from the original on 19 March 2017. 8450:Pagliery, Jose (18 November 2014). 8389: 8362: 7276:"Turn on 2-step verification (2SV)" 7230: 6953:from the original on 20 August 2016 6857:from the original on 3 October 2014 6844: 6224:Scannell, Kara (24 February 2016). 5971:Millman, Renee (15 December 2017). 5164: – Branch of computer security 5049:Content Disarm & Reconstruction 4822: 4707:, and the later publication of the 4641:is used to probe an IP address for 4409:help administrators control access. 4169: 3853:Colonial Pipeline ransomware attack 3795:U.S. Office of Personnel Management 3749:National Cyber Security Coordinator 3740:National Cyber Security Policy 2013 3654: 3436:Colonial Pipeline ransomware attack 3430:Colonial Pipeline ransomware attack 3405:personally identifiable information 2647: 2506:(voice-over-IP). There are various 2244:. It has since been adopted by the 2115:underlying a system; important for 2067:Security-evaluated operating system 1821:, to extend data accessibility and 246:forensics-focused operating systems 24: 15168:Integrated development environment 14429: 13968: 13505:from the original on 16 March 2014 13384:from the original on 18 April 2018 13264:"Current Job Opportunities at DHS" 13130:from the original on 24 April 2014 12820:from the original on 16 April 2015 12314:from the original on 11 July 2016. 12244:"National Cyber Security Division" 11820:"Report a Cyber Security Incident" 11635:"Canada's Cyber Security Strategy" 11257:from the original on 10 July 2015. 11031: 10836:Largest Customer Info Breach Grows 10635:Han, Chen; Dongre, Rituja (2014). 9941:Clearfield, Chris (20 June 2013). 9889:from the original on 17 March 2015 9701:from the original on 24 June 2017. 9220:from the original on 16 March 2017 9124:Timothy B. Lee (18 January 2015). 9036:from the original on 29 March 2011 9028:Anderson, Nate (9 February 2011). 9009:from the original on 27 March 2011 9001:Bright, Peter (15 February 2011). 7810:"Role-Based Access Control Models" 7556:from the original on 20 March 2014 7483:from the original on 21 June 2017. 7457:from the original on 20 March 2014 7453:. SCMagazine.com. 4 October 2008. 7398:from the original on 20 March 2014 7392:"Lock and protect your Windows PC" 7372:from the original on 20 March 2014 6742:"Cyber security design principles" 6449:from the original on 4 August 2014 6118: 5670:"Denial of Service (DoS) guidance" 5098: – Protection of digital data 4493:, i.e., finding who perpetrated a 4125:This has led to new terms such as 3908:National White Collar Crime Center 3645:General Data Protection Regulation 3444:Legal issues and global regulation 3251: 2981: 2827:advanced driver-assistance systems 2546:Utilities and industrial equipment 2425: 2203: 1813:Some organizations are turning to 1802:, built into the operating system 1470:and security services planting of 1417:Media Access Control (MAC) address 548: 25: 15953: 15636:Automated planning and scheduling 15173:Software configuration management 14810:Security-focused operating system 14172:Market and Competition Law Review 13377:. United Kingdom Cabinet Office. 13246:"Student Cybersecurity Resources" 12630:Aliya Sternstein (4 March 2016). 12611:from the original on 13 June 2016 12046:Kwanwoo Jun (23 September 2013). 11444:McCarthy, Daniel (11 June 2018). 11280:from the original on 5 June 2015. 11211:from the original on 4 June 2015. 11044:from the original on 14 July 2014 10939:from the original on 7 March 2012 10931:Chris Carroll (18 October 2011). 10767:Journal of Health Care Compliance 10235: 10204: 9853:from the original on 27 June 2015 9780:from the original on 26 June 2015 9724:from the original on 10 June 2016 9616:. 20 October 2013. Archived from 9550:from the original on 2 June 2010. 9243:; Danny Anderson; Hovav Shacham; 8682:"e-Passports | Homeland Security" 8274:"Statement of Dr. Vinton G. Cerf" 8189:Kuchler, Hannah (27 April 2015). 7431:from the original on 11 June 2014 6972:Walkowski, Debbie (9 July 2019). 6292:from the original on 30 June 2016 6258:. Associated Press. 20 May 2016. 6099:Lazarus, Ari (23 February 2018). 6003:Cyber-Vigilance and Digital Trust 5751:"What Are Eavesdropping Attacks?" 5255: 4810:. In 2007, the United States and 4801:NSA contractors created and sold 4344:restrict or block users the power 4099: 4094:Code of Federal Regulations (CFR) 4001:Computer emergency readiness team 3964:Federal Communications Commission 3660:Computer emergency response teams 3299: 2568:Computer Emergency Readiness Team 2529:cooperated to develop the secure 2297:security breach notification laws 2256:institutions and heads of state. 1999:Computer case intrusion detection 1798:-based operating systems such as 1477: 1415:, where an attacker modifies the 1399:, or source) address of an email. 1171:Multi-vector, polymorphic attacks 15890: 15880: 15871: 15870: 14606:Insecure direct object reference 13900: 13878: 13860: 13834: 13809: 13783: 13736: 13700: 13674: 13648: 13611: 13542: 13517: 13491: 13465: 13444: 13414: 13396: 13364: 13334: 13308: 13282: 13256: 13238: 13220: 13194: 13176:"About Cyber Security architect" 13168: 13150:"Department of Computer Science" 13142: 13115: 13084: 13053: 13018: 12975: 12924: 12872:Overland, Indra (1 March 2019). 12865: 12832: 12801: 12786: 12772: 12759: 12728: 12687: 12654: 12642:from the original on 19 May 2016 12623: 12597: 12571: 12559:from the original on 28 May 2016 12539: 12513: 12490: 12461: 12436: 12414: 12396: 12366: 12336: 12318: 12300: 12291: 12236: 12224: 12204: 12182: 12167: 12141: 12115: 12088: 12070: 12054:. Dow Jones & Company, Inc. 12039: 12024: 11994: 11976: 11954: 11924: 11902: 11872: 11842: 11812: 11782: 11752: 11722: 11692: 11594: 11576: 11558: 11540: 11518: 11496: 11470: 11437: 11418: 11399: 11373: 11355: 11311: 11284: 11261: 11238: 11215: 11192: 11162: 11139: 11116: 11097: 11079: 11056: 11025: 10991:Greenwald, Glenn (6 June 2013). 10984: 10958:John Bumgarner (27 April 2010). 10951: 10924: 10893: 10870: 10866:from the original on 9 May 2014. 10848: 10829: 10803: 10784: 10759: 10737: 10704: 10669: 10628: 10602: 10568: 10533: 10515: 10497: 10471: 10433: 10402: 10376: 10360:. CBS Boston. 27 December 2016. 10350: 10320: 10290: 10260: 10229: 10198: 10168: 10138: 10078: 10066:from the original on 20 May 2016 10048: 10036:from the original on 4 June 2016 10017: 10005:from the original on 29 May 2016 9987: 9975:from the original on 14 May 2016 9957: 9934: 9901: 9865: 9834: 9792: 9762: 9736: 9705: 9686: 9674:from the original on 6 June 2015 9655: 9643:from the original on 5 June 2015 9624: 9602: 9584: 9554: 9532: 9507: 9489: 9464: 9446: 9421: 9389: 9358: 9328: 9298: 9274:Greenberg, Andy (21 July 2015). 9267: 9239:Stephen Checkoway; Damon McCoy; 9232: 9202: 9172: 9140: 9081: 9048: 9021: 8994: 8963: 8951:from the original on 4 June 2016 8932: 8908:Cowley, Stacy (2 October 2017). 8901: 8871: 8841: 8818: 8769: 8757:Humana Inc. (15 November 2000). 8750: 8699: 8674: 8648: 8630: 8612: 8592:Cesar, Alan (15 December 2023). 8585: 8554: 8524: 8506: 8491: 8474: 8443: 8406: 8383: 8356: 8331: 8306: 8291: 8266: 8240: 8215: 8182: 8157: 6609:from the original on 19 May 2020 6317:A Dictionary of Computer Science 6262:from the original on 20 May 2016 5044:Comparison of antivirus software 4778:started developing the protocol 4705:Spring Joint Computer Conference 4019:National Cyber Security Division 4007:Computer emergency response team 3979:Government Accountability Office 3901:National Cyber Security Division 3771: 3723:and Minister for Small Business 3666:Computer emergency response team 3272:TJX customer credit card details 3026: 2883:Shipping companies have adopted 2600:air navigation service providers 2086: 1701:the standardization of controls. 1447:In 2018, the cybersecurity firm 1211:ncy, respectively. Although the 983: 15881: 15284:Computational complexity theory 14860:Information security management 13743:Yost, Jeffrey R. (April 2015). 13270:from the original on 2 May 2013 13091:Robinson, Terry (30 May 2018). 12735:Verton, Dan (28 January 2004). 12095:Adil, Sajid (16 October 2023). 11199:Barrett, Devlin (4 June 2015). 10900:Kim Zetter (17 February 2011). 10478:Brandt, Jaclyn (18 June 2018). 10024:Jeremy Kirk (17 October 2012). 9908:Ovidiu Vermesan; Peter Friess. 9808:IEEE Internet of Things Journal 9088:James Cook (16 December 2014). 8970:Seals, Tara (6 November 2015). 8343:Federal Bureau of Investigation 8086:"Developing a Security Culture" 8078: 8052: 8023: 7997: 7971: 7945: 7919: 7853: 7801: 7779: 7764: 7739: 7705:IEEE Internet of Things Journal 7692: 7625: 7593: 7568: 7538: 7516: 7487: 7469: 7443: 7410: 7384: 7358: 7333: 7325:Treglia, J.; Delia, M. (2017). 7318: 7293: 7268: 7243: 7224: 7197: 7165: 7138: 7097: 7069: 7042: 7017: 6991: 6965: 6938: 6913: 6838: 6813: 6787: 6734: 6710: 6699:. 26 April 2010. Archived from 6686: 6653: 6585: 6542: 6515: 6490: 6437:Gallagher, Sean (14 May 2014). 6430: 6405: 6348: 6304: 6274: 6248: 6217: 6180: 6092: 6067: 6049:"Identifying Phishing Attempts" 6041: 5964: 5946: 5898: 5865: 5803: 5768: 5687: 5602: 5474:. 1 August 2018. Archived from 4744:, which propagated through the 4390:. For example. Linux provides 3983:Federal Aviation Administration 3916:Internet Crime Complaint Center 3893:Department of Homeland Security 3870:General Services Administration 3320:Global surveillance disclosures 2572:Department of Homeland Security 2458:. In-store payment systems and 2403:Security information management 2252:of the United States, the FBI, 1082:the need for human interaction. 1027:Federal Bureau of Investigation 67:Hacking of consumer electronics 15075:Network performance evaluation 13938:"How the U.S. Lost to Hackers" 12808:Clayton, Mark (7 March 2011). 12148:Adil, Sajid (September 2018). 12122:Adil, Sajid (September 2018). 11425:Kirby, Carrie (24 June 2011). 6635:South African Computer Journal 5878:Procedia Economics and Finance 5490: 5460: 5443: 5418: 5375: 5324: 5303: 5286: 5141:Information security awareness 4328:and other malicious software ( 4277: 4084:. Drafted with input from the 4037:Software Engineering Institute 3800: 3762: 3397:Office of Personnel Management 3362:Target and Home Depot breaches 3346:exposing the massive scale of 3314:programmable logic controllers 2923:, as well as student records. 2829:on many models. Additionally, 2794: 2605:Many modern passports are now 2208:Related to end-user training, 1954:Hardware protection mechanisms 1500:Information security practices 13: 1: 15439:Multimedia information system 15424:Geographic information system 15414:Enterprise information system 15010:Computer systems organization 13681:Perrin, Chad (30 June 2008). 13060:Oltsik, Jon (18 March 2016). 12814:The Christian Science Monitor 11406:King, Georgia (23 May 2018). 11305:10.1016/S1353-4858(15)30080-5 11268:Sanger, David (5 June 2015). 10960:"Computers as Weapons of War" 9662:Liptak, Kevin (4 June 2015). 6879:Oppliger, Rolf (1 May 1997). 6132:. 17 May 2022. Archived from 6101:"Phishers send fake invoices" 5891:10.1016/S2212-5671(15)01077-1 5382:Stevens, Tim (11 June 2018). 5248: 5217:Physical information security 4793:(NSA) is responsible for the 4690:distributed denial of service 4226:Data Protection Officer (DPO) 4113:The Christian Science Monitor 3776: 3753:Prime Minister's Office (PMO) 3751:has also been created in the 3702:Australian federal government 3641:Council of the European Union 3400:discovered it had been hacked 2906: 2695: 2615:facial recognition technology 2361:Data loss prevention software 2303:Types of security and privacy 2054:Physical Unclonable Functions 2027:(NFC) on non-iOS devices and 1851:, especially in software and 925:distributed denial-of-service 15798:Computational social science 15386:Theoretical computer science 15206:Software development process 14982:Electronic design automation 14967:Very Large Scale Integration 13994:Resources in other libraries 13841:FBI News (2 November 2018). 13655:Irwin, Luke (5 April 2018). 12552:Food and Drug Administration 12079:"National security strategy" 11228:U.S. News & World Report 10965:. IO Journal. Archived from 10449:Food and Drug Administration 9631:Sanders, Sam (4 June 2015). 8939:Jim Finkle (23 April 2014). 8656:"NextGen Data Communication" 8561:Jim Finkle (4 August 2014). 7366:"Token-based authentication" 7255:www.cybersecurityjobsite.com 7106:Formal verification at Intel 5872:Bendovschi, Andreea (2015). 5639:"What is a backdoor attack?" 5205:Outline of computer security 5194:List of cyber warfare forces 5102:Defense strategy (computing) 5032:Center for Internet Security 4423:Some software can be run in 4251:courses are also available. 4216:Chief Security Officer (CSO) 3971:Food and Drug Administration 3912:Bureau of Justice Assistance 3846:NIST Cybersecurity Framework 3815:Computer Fraud and Abuse Act 3696: 3620:agency of the European Union 3366:A Ukrainian hacker known as 3207:Notable attacks and breaches 3154:2015 Ukraine power grid hack 3017:Food and Drug Administration 2692:are also potential targets. 2596:Pan-European Network Service 2169:discretionary access control 1983:Advanced Encryption Standard 1613:principle of least privilege 1533:Commitment of the management 1454: 1441:Media Access Control address 1421:network interface controller 835:small and midsize businesses 166:Chaos Communication Congress 7: 15621:Natural language processing 15409:Information storage systems 14865:Information risk management 14786:Multi-factor authentication 14342:Related security categories 14254:. Oxford University Press. 14234:10.1016/j.procs.2010.12.089 12704:10.21125/edulearn.2019.1914 12661:Bart Elias (18 June 2015). 12077:White, House (March 2023). 12033:BBC Monitoring Asia Pacific 11431:The San Francisco Chronicle 9546:. London. 23 January 2009. 9153:(Report). 6 February 2015. 7788:"Role-Based Access Control" 7341:"What is a license dongle?" 6945:Woodie, Alex (9 May 2016). 6853:. Janalta Interactive Inc. 6694:"CNSS Instruction No. 4009" 6319:. Oxford University Press. 5006: 4718:publication introduced the 4606:Intrusion-detection systems 4137:United States Cyber Command 3957:United States Cyber Command 3886: 3872:(GSA) has standardized the 3649:protection of personal data 2878: 2577: 2535:Chip Authentication Program 2377:Intrusion prevention system 1827:advanced persistent threats 1542:Commitment of the employees 1433:Address Resolution Protocol 1372: 1182: 867: 783:Vulnerabilities and attacks 10: 15958: 15537:Human–computer interaction 15507:Intrusion detection system 15419:Social information systems 15404:Database management system 14842:Intrusion detection system 14800:Computer security software 14456:Advanced persistent threat 14151:(2nd ed.). Springer. 14006:International Organization 13228:"Data Protection Officers" 13025:Bullard, Brittany (2016). 12984:Armed Forces & Society 12899:10.1016/j.erss.2018.10.018 12783:- Nuclear Energy Institute 12344:"Infragard, Official Site" 11790:"Cyber Security Bulletins" 11222:Risen, Tom (5 June 2015). 8782:Journal of Medical Systems 7479:. PCMag.com. 11 May 2009. 7451:"SafeNet ProtectDrive 8.4" 7327:Cyber Security Inoculation 6662:Internet Security Glossary 5241:Software-defined perimeter 5229:Security through obscurity 4674: 4149: 4103: 4060:, specifically in §73.54. 3879: 3663: 3433: 3421:Ashley Madison Data Breach 3418: 3323: 3228: 3210: 2985: 2798: 2521:The credit card companies 2450:, brokerage accounts, and 2371:Intrusion detection system 2126: 2090: 2064: 1957: 1946:Inoculation, derived from 1840: 1740:Intrusion Detection System 1576: 1376: 1308: 1044: 1031:internet service providers 1010:instead of an unencrypted 786: 714:wireless network standards 478:2600: The Hacker Quarterly 216:List of computer criminals 15866: 15803:Computational engineering 15778:Computational mathematics 15755: 15702: 15664: 15611: 15573: 15535: 15477: 15394: 15340: 15302: 15254: 15191: 15124: 15088: 15045: 15009: 14942: 14931: 14741: 14441: 14427: 14421:Digital rights management 14341: 14273:. Boca Raton: CRC Press. 14221:Procedia Computer Science 14178:(2). Elsevier BV: 71–98. 14018:10.1017/s002081832000051x 13989:Resources in your library 13714:(Report). csrc.nist.gov. 13037:10.1002/9781119271260.ch8 12810:"The new cyber arms race" 10841:28 September 2007 at the 9820:10.1109/JIOT.2015.2460333 9748:www.securityinfowatch.com 8794:10.1007/s10916-017-0778-4 7957:IBM Security Intelligence 7717:10.1109/JIOT.2020.3025775 7509:10.6028/NIST.SP.800-124r1 7114:10.1109/LICS.2003.1210044 6885:Communications of the ACM 6799:UK Cyber Security Council 6365:10.1007/978-1-4471-6524-8 6011:10.1002/9781119618393.ch1 5310:Tate, Nick (7 May 2013). 5061:Countermeasure (computer) 4740:written by Bob Thomas at 4439:Automated theorem proving 4050:U.S. nuclear power plants 3673: 3630: 2684:The increasing number of 2609:, containing an embedded 2176:capability-based security 2151:role-based access control 2137:Capability-based security 2133:Role-based access control 2097:In software engineering, 2042:allow for hardware-based 1929:Two factor authentication 1794:(or, in the case of most 1623:Automated theorem proving 1349:business email compromise 1135:Man-in-the-middle attacks 1130:Man-in-the-middle attacks 1113:(manipulation) to scare, 964:or other bootable media. 917:Denial-of-service attacks 839:man-in-the-middle attacks 789:Vulnerability (computing) 15813:Computational healthcare 15808:Differentiable computing 15727:Graphics processing unit 15153:Domain-specific language 15022:Computational complexity 14566:Denial-of-service attack 14461:Arbitrary code execution 14227:. Elsevier BV: 537–543. 13720:10.6028/NIST.SP.800-27rA 13577:Misa, Thomas J. (2016). 12996:10.1177/0095327x15572997 12765:Details can be found in 11938:. Government of Canada. 11826:. Government of Canada. 11736:. Government of Canada. 11706:. Government of Canada. 11676:. Government of Canada. 11641:. Government of Canada. 10690:10.1177/1043986217699100 8424:(Report). Archived from 7875:10.1109/ICC.2017.7997247 7026:Vulnerability Management 6974:"What Is The CIA Triad?" 6561:10.21125/iceri.2017.0554 6536:10.4225/75/57B4065130DEF 5847:"What is Malware? | IBM" 5585:"How cyber attacks work" 5038:Cloud computing security 4791:National Security Agency 4256:U.K Cyber Security Forum 4070:Nuclear Energy Institute 3932:(CCIPS) operates in the 3730: 2711:The health care company 2483:Transport Layer Security 2419:Vulnerability Management 2330:Anti-subversion software 2288:Law enforcement officers 2264:Responding to attempted 2165:mandatory access control 2077:secure operating systems 2061:Secure operating systems 2025:near-field communication 1993:Trusted platform modules 1987:Virtual Private Networks 1970:trusted platform modules 1885:Reducing vulnerabilities 1843:Vulnerability management 1837:Vulnerability management 1558:In computer security, a 958:covert listening devices 912:Denial-of-service attack 876:in a computer system, a 396:Cloud computing security 15788:Computational chemistry 15722:Photograph manipulation 15613:Artificial intelligence 15429:Decision support system 14776:Computer access control 14728:Rogue security software 14391:Electromagnetic warfare 13872:Web Development History 13661:www.itgovernanceusa.com 13206:cybersecuritycareer.org 12937:Politics and Governance 12052:The Wall Street Journal 11450:Politics and Governance 11205:The Wall Street Journal 10711:Anderson, Ross (2020). 9947:Harvard Business Review 9880:Harvard Business Review 9429:"Vehicle Cybersecurity" 8481:Neumann, P. G. (1997). 8119:"Cyber Hygiene – ENISA" 7078:PCI DSS: A Pocket Guide 6847:"Security Architecture" 6718:"InfosecToday Glossary" 6477:Microsoft Security Blog 5699:www.interelectronix.com 5426:"About the CVE Program" 5391:Politics and Governance 5298:Encyclopædia Britannica 5135:Identity-based security 5055:Content Security Policy 4072:'s NEI 08-09 document, 4035:(DARPA) and run by the 3523:RSA Security Conference 3409:Social Security numbers 2846:controller area network 2631:fingerprint recognition 2383:Log management software 2355:Computer-aided dispatch 2223:proactive cyber defence 2117:cryptographic protocols 1935:a password or PIN, and 1675:window of vulnerability 1004:virtual private network 970:Trusted Platform Module 822:or customized scripts. 669:) is the protection of 176:Hackers on Planet Earth 15937:Information governance 15853:Educational technology 15684:Reinforcement learning 15434:Process control system 15332:Computational geometry 15322:Algorithmic efficiency 15317:Analysis of algorithms 14972:Systems on Chip (SoCs) 14822:Obfuscation (software) 14551:Browser Helper Objects 14435: 13821:Guinness World Records 12950:10.17645/pag.v6i2.1368 11463:10.17645/pag.v6i2.1335 10654:10.22215/timreview/838 10509:openmobilealliance.org 8458:. Cable News Network. 8009:NZ Bankers Association 7024:Foreman, Park (2009). 6051:. Case. Archived from 5404:10.17645/pag.v6i2.1569 4522: 4123: 4082:nuclear power industry 3635:On 14 April 2016, the 3380:self checkout machines 2619:identity-related fraud 2350:Cryptographic software 2281:to cover their tracks. 2187:User security training 1656:for the equivalent in 1464:malicious modification 1220: 1025:have been used by the 651: 559: 431:Homebrew Computer Club 15823:Electronic publishing 15793:Computational biology 15783:Computational physics 15679:Unsupervised learning 15593:Distributed computing 15469:Information retrieval 15376:Mathematical analysis 15366:Mathematical software 15256:Theory of computation 15221:Software construction 15211:Requirements analysis 15089:Software organization 15017:Computer architecture 14987:Hardware acceleration 14952:Printed circuit board 14817:Data-centric security 14698:Remote access trojans 14433: 13426:Cyber Security Agency 12523:. FCC. Archived from 11065:"Can You Trust NIST?" 11038:La Foundation Courage 10935:. Stars and Stripes. 10554:10.1145/581271.581274 9342:. 21 September 2016. 8976:Infosecurity Magazine 8658:. FAA. Archived from 7606:. Intel Corporation. 7424:. Intel Corporation. 7417:James Greene (2012). 7104:Harrison, J. (2003). 6898:10.1145/253769.253802 6079:support.microsoft.com 5174:IT security standards 4551:public-key encryption 4517: 4459:Capabilities vs. ACLs 4362:or updates for them. 4267:Cyber Security Agency 4118: 3942:intellectual property 3918:, also known as IC3. 3880:Further information: 3544:International actions 3415:Ashley Madison breach 3217:List of data breaches 3213:List of cyber-attacks 3211:Further information: 2988:Medical device hijack 2594:In Europe, with the ( 1864:vulnerability scanner 1682:Security architecture 1190: 1151:Malicious association 977:direct memory attacks 943:Direct-access attacks 649: 558: 15583:Concurrent computing 15555:Ubiquitous computing 15527:Application security 15522:Information security 15351:Discrete mathematics 15327:Randomized algorithm 15279:Computability theory 15264:Model of computation 15236:Software maintenance 15231:Software engineering 15193:Software development 15143:Programming language 15138:Programming paradigm 15055:Network architecture 14749:Application security 14643:Privilege escalation 14511:Cross-site scripting 14364:Cybersex trafficking 14335:Information security 14184:10.2139/ssrn.3220475 13761:10.1109/MAHC.2015.21 13597:10.1109/MAHC.2016.48 13501:. 10 November 2010. 12444:"Mission and Vision" 12194:www.hsgac.senate.gov 11916:. 16 December 2015. 11914:Public Safety Canada 11884:Public Safety Canada 11824:Public Safety Canada 11794:Public Safety Canada 11764:Public Safety Canada 11734:Public Safety Canada 11704:Public Safety Canada 11674:Public Safety Canada 11639:Public Safety Canada 10862:. 20 November 2013. 10796:6 March 2016 at the 10791:Information Security 10484:Daily Energy Insider 10452:. 28 December 2016. 10334:. 12 December 2016. 9971:. 26 November 2012. 9915:. River Publishers. 9568:. 6 September 2012. 9216:. 23 December 2015. 8885:. 19 December 2013. 8855:. 19 December 2014. 8392:Minnesota Law Review 7550:Fox Business Network 7049:Johnson, A. (2018). 7003:www.securityweek.com 6706:on 27 February 2012. 6189:"Social Engineering" 6105:Consumer Information 6055:on 13 September 2015 4965:Paul C. van Oorschot 4587:network segmentation 4579:intrusion prevention 4555:digital certificates 4461:discusses their use. 4418:Java virtual machine 4348:to the computer code 4308:identification cards 4189:security engineering 3476:bullet proof servers 3246:Robert Tappan Morris 3079:electronic signature 3033:Daily Energy Insider 3021:device manufacturers 2968:network connectivity 2688:devices such as the 2570:, a division of the 2560:nuclear power plants 2335:Anti-tamper software 2174:A further approach, 2147:access control lists 2071:One use of the term 2048:direct memory access 2021:Bluetooth low energy 1506:information security 1263:Privilege escalation 1258:Privilege escalation 1049:Malicious software ( 777:security convergence 773:information security 732:that constitute the 449:Masters of Deception 391:Application security 15858:Document management 15848:Operations research 15773:Enterprise software 15689:Multi-task learning 15674:Supervised learning 15396:Information systems 15226:Software deployment 15183:Software repository 15037:Real-time computing 14396:Information warfare 14354:Automotive security 14121:Kim, Peter (2014). 13952:on 28 December 2021 13913:The Washington Post 13499:"Endpoint Security" 12890:2019ERSS...49...36O 12846:The Washington Post 12521:"FCC Cybersecurity" 12509:on 6 November 2010. 12200:on 20 January 2012. 12012:on 19 February 2018 11154:. CBS Interactive. 11135:on 27 January 2015. 11109:9 July 2014 at the 10972:on 19 December 2011 10304:. 31 October 2016. 10274:. 2 November 2016. 9620:on 6 November 2015. 9544:The Daily Telegraph 9501:Supply Chain Market 9032:. Arstechnica.com. 9005:. Arstechnica.com. 8640:. 17 January 2016. 8318:The Washington Post 8203:on 10 December 2022 7650:2022Senso..22.5577B 7552:. 4 November 2013. 5695:"Computer Security" 5350:10.3390/su132413677 5129:Identity management 4990:Salvatore J. Stolfo 4845:Daniel J. Bernstein 4668:Zero trust security 4583:local area networks 4575:intrusion detection 4455:access control list 4425:software containers 4322:Anti-virus software 4141:have similar forces 4092:to comply with the 3851:In response to the 3819:protected computers 3637:European Parliament 3534:international peace 3466:techniques such as 3395:In April 2015, the 3337:The Washington Post 3310:nuclear centrifuges 3118:Attacker motivation 2992:Medical data breach 2642:air traffic control 2607:biometric passports 2487:identity management 2448:credit card numbers 2225:, a military term. 2158:access-control list 2129:Access control list 1933:something you know: 1895:formal verification 1817:platforms, such as 1439:to associate their 1403:IP address spoofing 1347:reported that such 1343:In early 2016, the 1311:Side-channel attack 1305:Side-channel attack 828:In April 2023, the 798:(CVE) database. An 738:information systems 426:Chaos Computer Club 161:Black Hat Briefings 35:Part of a series on 15641:Search methodology 15588:Parallel computing 15545:Interaction design 15454:Computing platform 15381:Numerical analysis 15371:Information theory 15163:Software framework 15126:Software notations 15065:Network components 14962:Integrated circuit 14805:Antivirus software 14673:Social engineering 14638:Polymorphic engine 14591:Fraudulent dialers 14496:Hardware backdoors 14436: 14114:The Jerusalem Post 14081:Diplomatic History 13943:The New York Times 13874:. 8 December 2021. 13432:on 16 October 2021 13352:on 21 October 2016 13103:on 10 October 2021 12853:on 12 October 2016 11608:. 3 October 2010. 11548:"European council" 11482:Human Rights Watch 11274:The New York Times 10581:The New York Times 10332:The Indian Express 9841:Chris Clearfield. 9371:The New York Times 9186:. 5 January 2017. 8914:The New York Times 8339:"Protected Voices" 8278:www.jec.senate.gov 7959:. 2 September 2014 7526:. 23 February 2024 7233:"Getting it Right" 5906:"What is malware?" 5815:Verizon Enterprise 5616:. 30 November 2023 5073:Cyber self-defense 4910:Lawrence A. Gordon 4870:Dorothy E. Denning 4697:April 1967 session 4656:Social engineering 4573:, and may include 4523: 4386:or other means of 4265:In Singapore, the 4196:Security architect 4048:In the context of 3482:Role of government 3385:antivirus software 3372:Target Corporation 3334:were published by 3242:Cornell University 3134:, as recounted by 3043:Telecommunications 2948:Internet of things 2871:, in the state of 2809:Automotive hacking 2768:business in 2015. 2758:Target Corporation 2736:Large corporations 2721:Oracle Corporation 2635:electronic tickets 2552:telecommunications 2393:Records management 2345:Antivirus software 1948:inoculation theory 1937:something you have 1658:safety engineering 1573:Security by design 1437:local area network 1330:Social engineering 1325:Social engineering 1284:techniques, often 1282:social engineering 1252:social engineering 1221: 1111:social engineering 742:power distribution 734:Internet of things 728:, and the various 652: 573:Process management 560: 256:Social engineering 15917:Computer security 15904: 15903: 15833:Electronic voting 15763:Quantum Computing 15756:Applied computing 15742:Image compression 15512:Hardware security 15502:Security services 15459:Digital marketing 15246:Open-source model 15158:Modeling language 15070:Network scheduler 14891: 14890: 14853:Anomaly detection 14758:Secure by default 14611:Keystroke loggers 14546:Drive-by download 14434:vectorial version 14401:Internet security 14349:Computer security 14299:10.3390/s23052778 14093:10.1093/dh/dhy038 13980:Computer security 13975:Library resources 13795:www.kaspersky.com 13452:"Confidentiality" 12798:for more details. 12713:978-84-09-12031-4 12406:. 25 March 2015. 10769:, 7(2), pp. 41–48 10182:. 31 March 2016. 10001:. 6 August 2015. 8742:. 6 August 2014. 8713:on 9 January 2015 8538:. 4 August 2014. 8365:Emory Law Journal 8254:. 1 November 2017 8096:on 9 October 2018 7933:. 22 January 2014 7659:10.3390/s22155577 7035:978-1-4398-0150-5 7005:. 3 December 2018 6570:978-84-697-6957-7 6020:978-1-78630-448-3 5790:978-1-59749-547-9 5645:. 4 December 2023 5503:www.phoronix.com/ 5478:on 15 August 2020 5293:Computer security 5162:Internet security 5114:Hardware security 4816:Microsoft Windows 4752:, was created by 4561:Endpoint security 4541:them infeasible. 4531:Cryptographically 4483:Cyber attribution 4181:Security engineer 4031:: created by the 3948:in computers and 3828:§ 1030(e)(2) 3614:ENISA : The 3581:Council of Europe 3358:'s data centers. 3244:graduate student 3124:physical security 3103:Gordon-Loeb Model 3091:security breaches 3075:mobile signatures 2921:personnel records 2835:Self-driving cars 2674:activity trackers 2500:instant messaging 2434:Financial systems 2266:security breaches 2073:computer security 1879:penetration tests 1808:physical firewall 1709:Security measures 1468:Evil Maid attacks 1354:In May 2016, the 1278:ransomware attack 1232:instant messaging 1123:unwanted software 1017:Programs such as 908:of the computer. 767:measures such as 765:physical security 671:computer software 655:Computer security 644: 643: 583:Memory management 542:Operating systems 536: 535: 384:Computer security 351:Keystroke logging 18:Computer Security 16:(Redirected from 15949: 15894: 15893: 15884: 15883: 15874: 15873: 15694:Cross-validation 15666:Machine learning 15550:Social computing 15517:Network security 15312:Algorithm design 15241:Programming team 15201:Control variable 15178:Software library 15116:Software quality 15111:Operating system 15060:Network protocol 14925:Computer science 14918: 14911: 14904: 14895: 14894: 14762:Secure by design 14693:Hardware Trojans 14526:History sniffing 14516:Cross-site leaks 14411:Network security 14328: 14321: 14314: 14305: 14304: 14284: 14265: 14246: 14236: 14211: 14162: 14140: 14117: 14104: 14078: 14068: 14066: 14049: 14037: 13962: 13961: 13959: 13957: 13951: 13946:. Archived from 13933: 13924: 13923: 13921: 13919: 13904: 13898: 13897: 13895: 13893: 13882: 13876: 13875: 13864: 13858: 13857: 13855: 13853: 13838: 13832: 13831: 13829: 13827: 13813: 13807: 13806: 13804: 13802: 13787: 13781: 13780: 13740: 13734: 13730: 13728: 13713: 13704: 13698: 13697: 13695: 13693: 13687:techrepublic.com 13678: 13672: 13671: 13669: 13667: 13652: 13646: 13645: 13643: 13641: 13635: 13624: 13615: 13609: 13608: 13582: 13574: 13565: 13564: 13562: 13560: 13546: 13540: 13539: 13537: 13535: 13521: 13515: 13514: 13512: 13510: 13495: 13489: 13488: 13486: 13484: 13473:"Data Integrity" 13469: 13463: 13462: 13460: 13458: 13448: 13442: 13441: 13439: 13437: 13418: 13412: 13411: 13400: 13394: 13393: 13391: 13389: 13383: 13376: 13368: 13362: 13361: 13359: 13357: 13348:. Archived from 13338: 13332: 13331: 13329: 13327: 13312: 13306: 13305: 13303: 13301: 13286: 13280: 13279: 13277: 13275: 13260: 13254: 13253: 13242: 13236: 13235: 13224: 13218: 13217: 13215: 13213: 13198: 13192: 13191: 13189: 13187: 13172: 13166: 13165: 13163: 13161: 13152:. Archived from 13146: 13140: 13139: 13137: 13135: 13119: 13113: 13112: 13110: 13108: 13099:. Archived from 13088: 13082: 13081: 13079: 13077: 13072:on 23 March 2016 13068:. Archived from 13057: 13051: 13050: 13022: 13016: 13015: 12979: 12973: 12972: 12962: 12952: 12928: 12922: 12921: 12911: 12901: 12869: 12863: 12862: 12860: 12858: 12849:. Archived from 12836: 12830: 12829: 12827: 12825: 12805: 12799: 12790: 12784: 12776: 12770: 12763: 12757: 12756: 12754: 12752: 12732: 12726: 12725: 12691: 12685: 12684: 12682: 12680: 12674: 12667: 12658: 12652: 12651: 12649: 12647: 12627: 12621: 12620: 12618: 12616: 12601: 12595: 12594: 12592: 12590: 12581:. Archived from 12575: 12569: 12568: 12566: 12564: 12543: 12537: 12536: 12534: 12532: 12517: 12511: 12510: 12505:. Archived from 12494: 12488: 12487: 12485: 12483: 12478:on 15 April 2010 12465: 12459: 12458: 12456: 12454: 12448:www.cybercom.mil 12440: 12434: 12433: 12431: 12429: 12418: 12412: 12411: 12400: 12394: 12393: 12391: 12389: 12380:. Archived from 12370: 12364: 12363: 12361: 12359: 12340: 12334: 12333: 12322: 12316: 12315: 12304: 12298: 12295: 12289: 12288: 12286: 12284: 12269: 12260: 12259: 12257: 12255: 12240: 12234: 12228: 12222: 12221: 12208: 12202: 12201: 12196:. Archived from 12186: 12180: 12171: 12165: 12164: 12162: 12160: 12145: 12139: 12138: 12136: 12134: 12119: 12113: 12112: 12110: 12108: 12092: 12086: 12085: 12083: 12074: 12068: 12067: 12065: 12063: 12043: 12037: 12036: 12028: 12022: 12021: 12019: 12017: 12008:. Archived from 12006:www.ncdrc.res.in 11998: 11992: 11991: 11980: 11974: 11973: 11971: 11969: 11958: 11952: 11951: 11949: 11947: 11928: 11922: 11921: 11906: 11900: 11899: 11897: 11895: 11876: 11870: 11869: 11867: 11865: 11846: 11840: 11839: 11837: 11835: 11816: 11810: 11809: 11807: 11805: 11786: 11780: 11779: 11777: 11775: 11756: 11750: 11749: 11747: 11745: 11726: 11720: 11719: 11717: 11715: 11696: 11690: 11689: 11687: 11685: 11666: 11655: 11654: 11652: 11650: 11631: 11622: 11621: 11619: 11617: 11598: 11592: 11591: 11580: 11574: 11573: 11562: 11556: 11555: 11544: 11538: 11537: 11535: 11533: 11522: 11516: 11515: 11513: 11511: 11500: 11494: 11493: 11491: 11489: 11474: 11468: 11467: 11465: 11441: 11435: 11434: 11422: 11416: 11415: 11403: 11397: 11396: 11394: 11392: 11377: 11371: 11370: 11359: 11353: 11352: 11341: 11332: 11331: 11329: 11327: 11315: 11309: 11308: 11293:Network Security 11288: 11282: 11281: 11265: 11259: 11258: 11242: 11236: 11235: 11230:. Archived from 11219: 11213: 11212: 11196: 11190: 11189: 11187: 11185: 11166: 11160: 11159: 11143: 11137: 11136: 11131:. Archived from 11120: 11114: 11101: 11095: 11094: 11093:. 21 April 2014. 11083: 11077: 11076: 11060: 11054: 11053: 11051: 11049: 11032:Seipel, Hubert. 11029: 11023: 11022: 11010: 11008: 10988: 10982: 10981: 10979: 10977: 10971: 10964: 10955: 10949: 10948: 10946: 10944: 10928: 10922: 10921: 10919: 10917: 10897: 10891: 10890: 10874: 10868: 10867: 10860:Business Insider 10852: 10846: 10833: 10827: 10826: 10824: 10822: 10807: 10801: 10788: 10782: 10779: 10770: 10763: 10757: 10756: 10754: 10752: 10741: 10735: 10734: 10708: 10702: 10701: 10673: 10667: 10666: 10656: 10632: 10626: 10625: 10623: 10621: 10606: 10600: 10599: 10597: 10595: 10572: 10566: 10565: 10537: 10531: 10530: 10528: 10519: 10513: 10512: 10501: 10495: 10494: 10492: 10490: 10475: 10469: 10468: 10466: 10464: 10458: 10445: 10437: 10431: 10430: 10428: 10426: 10406: 10400: 10399: 10397: 10395: 10380: 10374: 10373: 10371: 10369: 10354: 10348: 10347: 10345: 10343: 10324: 10318: 10317: 10315: 10313: 10294: 10288: 10287: 10285: 10283: 10264: 10258: 10257: 10255: 10253: 10233: 10227: 10226: 10224: 10222: 10202: 10196: 10195: 10193: 10191: 10172: 10166: 10165: 10163: 10161: 10150:Business Insider 10142: 10136: 10135: 10133: 10131: 10116: 10107: 10106: 10104: 10102: 10085:Leetaru, Kalev. 10082: 10076: 10075: 10073: 10071: 10052: 10046: 10045: 10043: 10041: 10021: 10015: 10014: 10012: 10010: 9991: 9985: 9984: 9982: 9980: 9961: 9955: 9954: 9938: 9932: 9931: 9929: 9927: 9921: 9914: 9905: 9899: 9898: 9896: 9894: 9888: 9877: 9869: 9863: 9862: 9860: 9858: 9838: 9832: 9831: 9805: 9796: 9790: 9789: 9787: 9785: 9766: 9760: 9759: 9757: 9755: 9740: 9734: 9733: 9731: 9729: 9709: 9703: 9702: 9693:Sean Gallagher. 9690: 9684: 9683: 9681: 9679: 9659: 9653: 9652: 9650: 9648: 9628: 9622: 9621: 9606: 9600: 9594: 9588: 9582: 9581: 9579: 9577: 9558: 9552: 9551: 9536: 9530: 9529: 9527: 9511: 9505: 9504: 9493: 9487: 9486: 9484: 9482: 9468: 9462: 9461: 9450: 9444: 9443: 9441: 9439: 9425: 9419: 9418: 9416: 9414: 9408: 9401: 9393: 9387: 9386: 9384: 9382: 9362: 9356: 9355: 9353: 9351: 9332: 9326: 9325: 9323: 9321: 9312:. 22 July 2015. 9302: 9296: 9295: 9293: 9291: 9271: 9265: 9264: 9262: 9255: 9236: 9230: 9229: 9227: 9225: 9206: 9200: 9199: 9197: 9195: 9176: 9170: 9169: 9167: 9165: 9159: 9152: 9144: 9138: 9137: 9121: 9112: 9111: 9109: 9107: 9095:Business Insider 9085: 9079: 9078: 9076: 9074: 9052: 9046: 9045: 9043: 9041: 9025: 9019: 9018: 9016: 9014: 8998: 8992: 8991: 8989: 8987: 8967: 8961: 8960: 8958: 8956: 8936: 8930: 8929: 8927: 8925: 8905: 8899: 8898: 8896: 8894: 8875: 8869: 8868: 8866: 8864: 8845: 8839: 8838: 8822: 8816: 8815: 8805: 8773: 8767: 8766: 8754: 8748: 8747: 8732: 8723: 8722: 8720: 8718: 8709:. Archived from 8703: 8697: 8696: 8694: 8692: 8678: 8672: 8671: 8669: 8667: 8662:on 13 March 2015 8652: 8646: 8645: 8634: 8628: 8627: 8616: 8610: 8609: 8607: 8605: 8589: 8583: 8582: 8580: 8578: 8558: 8552: 8551: 8549: 8547: 8528: 8522: 8521: 8516:. 27 July 2012. 8510: 8504: 8503: 8495: 8489: 8488: 8478: 8472: 8471: 8469: 8467: 8447: 8441: 8440: 8438: 8436: 8431:on 23 April 2003 8430: 8419: 8410: 8404: 8403: 8387: 8381: 8380: 8360: 8354: 8353: 8351: 8349: 8335: 8329: 8328: 8326: 8324: 8310: 8304: 8295: 8289: 8288: 8286: 8284: 8270: 8264: 8263: 8261: 8259: 8244: 8238: 8237: 8235: 8233: 8219: 8213: 8212: 8210: 8208: 8202: 8197:. Archived from 8186: 8180: 8179: 8177: 8175: 8161: 8155: 8154: 8152: 8150: 8139: 8130: 8129: 8127: 8125: 8115: 8106: 8105: 8103: 8101: 8092:. Archived from 8082: 8076: 8075: 8073: 8071: 8056: 8050: 8049: 8047: 8045: 8035: 8027: 8021: 8020: 8018: 8016: 8011:. 7 October 2018 8001: 7995: 7994: 7992: 7990: 7975: 7969: 7968: 7966: 7964: 7949: 7943: 7942: 7940: 7938: 7923: 7917: 7916: 7914: 7903: 7897: 7896: 7868: 7857: 7851: 7850: 7839:10.1109/2.485845 7832: 7814: 7805: 7799: 7798: 7792: 7783: 7777: 7776: 7768: 7762: 7761: 7759: 7757: 7743: 7737: 7736: 7711:(8): 6222–6246. 7696: 7690: 7689: 7679: 7661: 7629: 7623: 7622: 7620: 7618: 7612: 7605: 7597: 7591: 7590: 7588: 7586: 7572: 7566: 7565: 7563: 7561: 7542: 7536: 7535: 7533: 7531: 7520: 7514: 7513: 7511: 7491: 7485: 7484: 7473: 7467: 7466: 7464: 7462: 7447: 7441: 7440: 7438: 7436: 7430: 7423: 7414: 7408: 7407: 7405: 7403: 7388: 7382: 7381: 7379: 7377: 7362: 7356: 7355: 7353: 7351: 7345:www.revenera.com 7337: 7331: 7330: 7322: 7316: 7315: 7313: 7311: 7297: 7291: 7290: 7288: 7286: 7272: 7266: 7265: 7263: 7261: 7247: 7241: 7240: 7235:. Archived from 7228: 7222: 7221: 7220:on 19 July 2011. 7219: 7212: 7201: 7195: 7194: 7192: 7190: 7184: 7178:. Archived from 7177: 7169: 7163: 7162: 7142: 7136: 7135: 7101: 7095: 7094: 7073: 7067: 7066: 7046: 7040: 7039: 7021: 7015: 7014: 7012: 7010: 6995: 6989: 6988: 6986: 6984: 6969: 6963: 6962: 6960: 6958: 6942: 6936: 6935: 6933: 6931: 6917: 6911: 6910: 6900: 6876: 6867: 6866: 6864: 6862: 6842: 6836: 6835: 6833: 6831: 6817: 6811: 6810: 6808: 6806: 6791: 6785: 6784: 6782: 6780: 6766: 6757: 6756: 6754: 6752: 6738: 6732: 6731: 6729: 6722: 6714: 6708: 6707: 6705: 6698: 6690: 6684: 6683: 6674: 6672:10.17487/RFC2828 6657: 6651: 6650: 6630: 6619: 6618: 6616: 6614: 6608: 6597: 6589: 6583: 6582: 6546: 6540: 6539: 6519: 6513: 6512: 6510: 6508: 6502:attack.mitre.org 6494: 6488: 6487: 6485: 6483: 6468: 6459: 6458: 6456: 6454: 6434: 6428: 6427: 6425: 6423: 6409: 6403: 6402: 6352: 6346: 6345: 6343: 6341: 6308: 6302: 6301: 6299: 6297: 6278: 6272: 6271: 6269: 6267: 6252: 6246: 6245: 6243: 6241: 6221: 6215: 6214: 6212: 6210: 6204: 6193: 6184: 6178: 6177: 6175: 6173: 6159: 6146: 6145: 6143: 6141: 6126:"Email Security" 6122: 6116: 6115: 6113: 6111: 6096: 6090: 6089: 6087: 6085: 6071: 6065: 6064: 6062: 6060: 6045: 6039: 6038: 6037: 6035: 6000: 5992: 5981: 5980: 5968: 5962: 5961: 5950: 5944: 5943: 5930: 5921: 5920: 5918: 5916: 5902: 5896: 5895: 5893: 5869: 5863: 5862: 5860: 5858: 5843: 5826: 5825: 5823: 5821: 5807: 5801: 5800: 5799: 5797: 5772: 5766: 5765: 5763: 5761: 5747: 5738: 5737: 5735: 5733: 5719: 5710: 5709: 5707: 5705: 5691: 5685: 5684: 5682: 5680: 5666: 5655: 5654: 5652: 5650: 5635: 5626: 5625: 5623: 5621: 5606: 5600: 5599: 5597: 5595: 5581: 5572: 5571: 5569: 5567: 5553: 5544: 5543: 5541: 5539: 5525: 5514: 5513: 5511: 5509: 5494: 5488: 5487: 5485: 5483: 5464: 5458: 5457: 5447: 5441: 5440: 5438: 5436: 5422: 5416: 5415: 5413: 5406: 5388: 5379: 5373: 5372: 5362: 5352: 5328: 5322: 5321: 5315: 5307: 5301: 5290: 5284: 5283: 5259: 5223:Privacy software 5183:Cyber kill chain 5179: 5150:Internet privacy 5146: 5125: 5079:Cyberbiosecurity 4955:Peter G. Neumann 4905:Shafi Goldwasser 4875:Peter J. Denning 4830:Ross J. Anderson 4823:Notable scholars 4628:ping application 4360:security patches 4326:computer viruses 4170:Security analyst 3946:digital evidence 3910:(NW3C), and the 3874:penetration test 3830: 3655:National actions 3538:António Guterres 3463:Computer viruses 3141:The Cuckoo's Egg 2819:anti-lock brakes 2702:health insurance 2658:tablet computers 2648:Consumer devices 2388:Parental control 2218:personal hygiene 2104:secure by design 1857:network security 1823:machine learning 1639:Defense in depth 1579:Secure by design 1334:cognitive biases 1318:Cold boot attack 1165:TLS interception 929:zombie computers 906:operating system 706:computer systems 663:digital security 636: 629: 622: 551: 538: 537: 528: 521: 514: 401:Network security 102:Hacker Manifesto 41:Computer hacking 32: 31: 21: 15957: 15956: 15952: 15951: 15950: 15948: 15947: 15946: 15932:Data protection 15907: 15906: 15905: 15900: 15891: 15862: 15843:Word processing 15751: 15737:Virtual reality 15698: 15660: 15631:Computer vision 15607: 15603:Multiprocessing 15569: 15531: 15497:Security hacker 15473: 15449:Digital library 15390: 15341:Mathematics of 15336: 15298: 15274:Automata theory 15269:Formal language 15250: 15216:Software design 15187: 15120: 15106:Virtual machine 15084: 15080:Network service 15041: 15032:Embedded system 15005: 14938: 14927: 14922: 14892: 14887: 14737: 14437: 14425: 14416:Copy protection 14406:Mobile security 14337: 14332: 14281: 14262: 14159: 14137: 14076: 14064: 14058: 14047: 14000: 13999: 13998: 13983: 13982: 13978: 13971: 13969:Further reading 13966: 13965: 13955: 13953: 13934: 13927: 13917: 13915: 13905: 13901: 13891: 13889: 13888:. 10 March 2023 13884: 13883: 13879: 13866: 13865: 13861: 13851: 13849: 13839: 13835: 13825: 13823: 13815: 13814: 13810: 13800: 13798: 13797:. 19 April 2023 13789: 13788: 13784: 13741: 13737: 13726: 13711: 13705: 13701: 13691: 13689: 13683:"The CIA Triad" 13679: 13675: 13665: 13663: 13653: 13649: 13639: 13637: 13633: 13622: 13616: 13612: 13575: 13568: 13558: 13556: 13548: 13547: 13543: 13533: 13531: 13523: 13522: 13518: 13508: 13506: 13497: 13496: 13492: 13482: 13480: 13471: 13470: 13466: 13456: 13454: 13450: 13449: 13445: 13435: 13433: 13420: 13419: 13415: 13402: 13401: 13397: 13387: 13385: 13381: 13374: 13370: 13369: 13365: 13355: 13353: 13340: 13339: 13335: 13325: 13323: 13314: 13313: 13309: 13299: 13297: 13288: 13287: 13283: 13273: 13271: 13262: 13261: 13257: 13244: 13243: 13239: 13234:. January 2021. 13226: 13225: 13221: 13211: 13209: 13208:. 1 August 2021 13200: 13199: 13195: 13185: 13183: 13182:. 1 August 2021 13174: 13173: 13169: 13159: 13157: 13148: 13147: 13143: 13133: 13131: 13120: 13116: 13106: 13104: 13097:DegreeQuery.com 13089: 13085: 13075: 13073: 13058: 13054: 13047: 13023: 13019: 12980: 12976: 12929: 12925: 12870: 12866: 12856: 12854: 12837: 12833: 12823: 12821: 12806: 12802: 12791: 12787: 12777: 12773: 12764: 12760: 12750: 12748: 12733: 12729: 12714: 12692: 12688: 12678: 12676: 12672: 12665: 12659: 12655: 12645: 12643: 12628: 12624: 12614: 12612: 12603: 12602: 12598: 12588: 12586: 12577: 12576: 12572: 12562: 12560: 12545: 12544: 12540: 12530: 12528: 12519: 12518: 12514: 12495: 12491: 12481: 12479: 12466: 12462: 12452: 12450: 12442: 12441: 12437: 12427: 12425: 12420: 12419: 12415: 12402: 12401: 12397: 12387: 12385: 12384:on 17 June 2011 12372: 12371: 12367: 12357: 12355: 12342: 12341: 12337: 12324: 12323: 12319: 12306: 12305: 12301: 12296: 12292: 12282: 12280: 12271: 12270: 12263: 12253: 12251: 12250:on 11 June 2008 12242: 12241: 12237: 12229: 12225: 12210: 12209: 12205: 12188: 12187: 12183: 12172: 12168: 12158: 12156: 12146: 12142: 12132: 12130: 12120: 12116: 12106: 12104: 12093: 12089: 12081: 12075: 12071: 12061: 12059: 12044: 12040: 12035:. 7 March 2011. 12030: 12029: 12025: 12015: 12013: 12000: 11999: 11995: 11982: 11981: 11977: 11967: 11965: 11961: 11959: 11955: 11945: 11943: 11930: 11929: 11925: 11908: 11907: 11903: 11893: 11891: 11878: 11877: 11873: 11863: 11861: 11848: 11847: 11843: 11833: 11831: 11818: 11817: 11813: 11803: 11801: 11788: 11787: 11783: 11773: 11771: 11758: 11757: 11753: 11743: 11741: 11728: 11727: 11723: 11713: 11711: 11698: 11697: 11693: 11683: 11681: 11668: 11667: 11658: 11648: 11646: 11633: 11632: 11625: 11615: 11613: 11600: 11599: 11595: 11582: 11581: 11577: 11564: 11563: 11559: 11546: 11545: 11541: 11531: 11529: 11526:"FIRST Members" 11524: 11523: 11519: 11509: 11507: 11504:"FIRST Mission" 11502: 11501: 11497: 11487: 11485: 11476: 11475: 11471: 11442: 11438: 11423: 11419: 11404: 11400: 11390: 11388: 11379: 11378: 11374: 11361: 11360: 11356: 11343: 11342: 11335: 11325: 11323: 11322:. Bloomberg L.P 11316: 11312: 11289: 11285: 11266: 11262: 11243: 11239: 11234:on 6 June 2015. 11220: 11216: 11197: 11193: 11183: 11181: 11176:. 9 July 2017. 11168: 11167: 11163: 11144: 11140: 11121: 11117: 11111:Wayback Machine 11102: 11098: 11085: 11084: 11080: 11061: 11057: 11047: 11045: 11030: 11026: 11006: 11004: 10989: 10985: 10975: 10973: 10969: 10962: 10956: 10952: 10942: 10940: 10929: 10925: 10915: 10913: 10898: 10894: 10875: 10871: 10854: 10853: 10849: 10843:Wayback Machine 10834: 10830: 10820: 10818: 10809: 10808: 10804: 10798:Wayback Machine 10789: 10785: 10780: 10773: 10764: 10760: 10750: 10748: 10743: 10742: 10738: 10723: 10709: 10705: 10674: 10670: 10633: 10629: 10619: 10617: 10608: 10607: 10603: 10593: 10591: 10573: 10569: 10538: 10534: 10526: 10520: 10516: 10503: 10502: 10498: 10488: 10486: 10476: 10472: 10462: 10460: 10456: 10443: 10439: 10438: 10434: 10424: 10422: 10407: 10403: 10393: 10391: 10382: 10381: 10377: 10367: 10365: 10356: 10355: 10351: 10341: 10339: 10326: 10325: 10321: 10311: 10309: 10296: 10295: 10291: 10281: 10279: 10266: 10265: 10261: 10251: 10249: 10236:Pauli, Darren. 10234: 10230: 10220: 10218: 10205:Pauli, Darren. 10203: 10199: 10189: 10187: 10174: 10173: 10169: 10159: 10157: 10144: 10143: 10139: 10129: 10127: 10118: 10117: 10110: 10100: 10098: 10083: 10079: 10069: 10067: 10060:The Daily Beast 10054: 10053: 10049: 10039: 10037: 10022: 10018: 10008: 10006: 9993: 9992: 9988: 9978: 9976: 9963: 9962: 9958: 9939: 9935: 9925: 9923: 9919: 9912: 9906: 9902: 9892: 9890: 9886: 9875: 9871: 9870: 9866: 9856: 9854: 9839: 9835: 9803: 9797: 9793: 9783: 9781: 9768: 9767: 9763: 9753: 9751: 9742: 9741: 9737: 9727: 9725: 9710: 9706: 9691: 9687: 9677: 9675: 9660: 9656: 9646: 9644: 9629: 9625: 9608: 9607: 9603: 9590: 9589: 9585: 9575: 9573: 9560: 9559: 9555: 9538: 9537: 9533: 9525:10.1.1.397.7831 9512: 9508: 9495: 9494: 9490: 9480: 9478: 9470: 9469: 9465: 9452: 9451: 9447: 9437: 9435: 9427: 9426: 9422: 9412: 9410: 9406: 9399: 9395: 9394: 9390: 9380: 9378: 9363: 9359: 9349: 9347: 9334: 9333: 9329: 9319: 9317: 9310:The Independent 9304: 9303: 9299: 9289: 9287: 9272: 9268: 9260: 9253: 9237: 9233: 9223: 9221: 9208: 9207: 9203: 9193: 9191: 9178: 9177: 9173: 9163: 9161: 9157: 9150: 9146: 9145: 9141: 9122: 9115: 9105: 9103: 9086: 9082: 9072: 9070: 9053: 9049: 9039: 9037: 9026: 9022: 9012: 9010: 8999: 8995: 8985: 8983: 8968: 8964: 8954: 8952: 8937: 8933: 8923: 8921: 8906: 8902: 8892: 8890: 8877: 8876: 8872: 8862: 8860: 8847: 8846: 8842: 8823: 8819: 8774: 8770: 8755: 8751: 8734: 8733: 8726: 8716: 8714: 8705: 8704: 8700: 8690: 8688: 8680: 8679: 8675: 8665: 8663: 8654: 8653: 8649: 8636: 8635: 8631: 8618: 8617: 8613: 8603: 8601: 8590: 8586: 8576: 8574: 8559: 8555: 8545: 8543: 8530: 8529: 8525: 8512: 8511: 8507: 8496: 8492: 8479: 8475: 8465: 8463: 8448: 8444: 8434: 8432: 8428: 8417: 8411: 8407: 8388: 8384: 8361: 8357: 8347: 8345: 8337: 8336: 8332: 8322: 8320: 8312: 8311: 8307: 8296: 8292: 8282: 8280: 8272: 8271: 8267: 8257: 8255: 8246: 8245: 8241: 8231: 8229: 8221: 8220: 8216: 8206: 8204: 8195:Financial Times 8187: 8183: 8173: 8171: 8163: 8162: 8158: 8148: 8146: 8140: 8133: 8123: 8121: 8117: 8116: 8109: 8099: 8097: 8084: 8083: 8079: 8069: 8067: 8057: 8053: 8043: 8041: 8033: 8029: 8028: 8024: 8014: 8012: 8003: 8002: 7998: 7988: 7986: 7985:. 15 April 2015 7977: 7976: 7972: 7962: 7960: 7951: 7950: 7946: 7936: 7934: 7925: 7924: 7920: 7912: 7904: 7900: 7885: 7866: 7858: 7854: 7812: 7806: 7802: 7790: 7784: 7780: 7769: 7765: 7755: 7753: 7745: 7744: 7740: 7697: 7693: 7630: 7626: 7616: 7614: 7610: 7603: 7599: 7598: 7594: 7584: 7582: 7574: 7573: 7569: 7559: 7557: 7544: 7543: 7539: 7529: 7527: 7522: 7521: 7517: 7492: 7488: 7475: 7474: 7470: 7460: 7458: 7449: 7448: 7444: 7434: 7432: 7428: 7421: 7415: 7411: 7401: 7399: 7390: 7389: 7385: 7375: 7373: 7368:. SafeNet.com. 7364: 7363: 7359: 7349: 7347: 7339: 7338: 7334: 7323: 7319: 7309: 7307: 7305:www.ncsc.gov.uk 7299: 7298: 7294: 7284: 7282: 7280:www.ncsc.gov.uk 7274: 7273: 7269: 7259: 7257: 7249: 7248: 7244: 7231:Ganssle, Jack. 7229: 7225: 7217: 7210: 7202: 7198: 7188: 7186: 7182: 7175: 7171: 7170: 7166: 7159: 7143: 7139: 7124: 7102: 7098: 7088: 7074: 7070: 7063: 7055:. Cisco Press. 7047: 7043: 7036: 7022: 7018: 7008: 7006: 6997: 6996: 6992: 6982: 6980: 6970: 6966: 6956: 6954: 6943: 6939: 6929: 6927: 6919: 6918: 6914: 6877: 6870: 6860: 6858: 6845:Jannsen, Cory. 6843: 6839: 6829: 6827: 6819: 6818: 6814: 6804: 6802: 6793: 6792: 6788: 6778: 6776: 6774:www.ncsc.gov.uk 6768: 6767: 6760: 6750: 6748: 6746:www.ncsc.gov.uk 6740: 6739: 6735: 6727: 6720: 6716: 6715: 6711: 6703: 6696: 6692: 6691: 6687: 6659: 6658: 6654: 6631: 6622: 6612: 6610: 6606: 6595: 6591: 6590: 6586: 6571: 6547: 6543: 6520: 6516: 6506: 6504: 6496: 6495: 6491: 6481: 6479: 6469: 6462: 6452: 6450: 6435: 6431: 6421: 6419: 6417:www.trellix.com 6411: 6410: 6406: 6375: 6353: 6349: 6339: 6337: 6335: 6309: 6305: 6295: 6293: 6280: 6279: 6275: 6265: 6263: 6254: 6253: 6249: 6239: 6237: 6236:on 23 June 2016 6230:Financial Times 6222: 6218: 6208: 6206: 6202: 6191: 6185: 6181: 6171: 6169: 6167:crowdstrike.com 6161: 6160: 6149: 6139: 6137: 6124: 6123: 6119: 6109: 6107: 6097: 6093: 6083: 6081: 6073: 6072: 6068: 6058: 6056: 6047: 6046: 6042: 6033: 6031: 6021: 5993: 5984: 5969: 5965: 5960:. 24 July 2017. 5952: 5951: 5947: 5932: 5931: 5924: 5914: 5912: 5904: 5903: 5899: 5870: 5866: 5856: 5854: 5853:. 14 April 2022 5845: 5844: 5829: 5819: 5817: 5809: 5808: 5804: 5795: 5793: 5791: 5773: 5769: 5759: 5757: 5749: 5748: 5741: 5731: 5729: 5721: 5720: 5713: 5703: 5701: 5693: 5692: 5688: 5678: 5676: 5674:www.ncsc.gov.uk 5668: 5667: 5658: 5648: 5646: 5637: 5636: 5629: 5619: 5617: 5608: 5607: 5603: 5593: 5591: 5589:www.ncsc.gov.uk 5583: 5582: 5575: 5565: 5563: 5555: 5554: 5547: 5537: 5535: 5533:crowdstrike.com 5527: 5526: 5517: 5507: 5505: 5495: 5491: 5481: 5479: 5466: 5465: 5461: 5448: 5444: 5434: 5432: 5424: 5423: 5419: 5411: 5386: 5380: 5376: 5329: 5325: 5308: 5304: 5291: 5287: 5260: 5256: 5251: 5246: 5177: 5156:Internet safety 5144: 5123: 5108:Fault tolerance 5067:Cyber insurance 5009: 5004: 4970:Roger R. Schell 4935:Brian LaMacchia 4895:Joan Feigenbaum 4825: 4803:click-and-shoot 4677: 4626:. The standard 4471:Confidentiality 4416:and run in the 4356:least privilege 4340:executable code 4280: 4242: 4228: 4218: 4208: 4198: 4183: 4172: 4152: 4108: 4102: 4066: 4046: 4003: 3897:risk management 3889: 3884: 3866: 3836:executive order 3822: 3803: 3779: 3774: 3765: 3733: 3699: 3676: 3668: 3662: 3657: 3633: 3546: 3484: 3446: 3438: 3432: 3423: 3417: 3393: 3364: 3328: 3322: 3302: 3274: 3258:Rome Laboratory 3254: 3252:Rome Laboratory 3233: 3227: 3219: 3209: 3174: 3120: 3112:security breach 3087: 3045: 3029: 2997:Medical devices 2994: 2984: 2982:Medical systems 2944: 2911:Government and 2909: 2889:tracking device 2881: 2811: 2797: 2738: 2698: 2690:Nest thermostat 2686:home automation 2670:quantified self 2650: 2580: 2548: 2436: 2428: 2426:Systems at risk 2423: 2315:Anti-keyloggers 2305: 2291:time-consuming. 2262: 2210:digital hygiene 2206: 2204:Digital hygiene 2189: 2143:security models 2139: 2127:Main articles: 2125: 2095: 2089: 2081:Common Criteria 2069: 2063: 1962: 1956: 1887: 1849:vulnerabilities 1845: 1839: 1723:access controls 1711: 1684: 1671:Full disclosure 1581: 1575: 1556: 1502: 1491:content filters 1480: 1457: 1381: 1379:Spoofing attack 1375: 1356:Milwaukee Bucks 1327: 1313: 1307: 1260: 1207:ved and discrep 1185: 1173: 1132: 1047: 1035:electromagnetic 986: 966:Disk encryption 945: 914: 870: 820:automated tools 791: 785: 640: 565:Common features 557: 549: 532: 503: 502: 472: 464: 463: 416: 406: 405: 386: 376: 375: 301: 291: 290: 276: 266: 265: 236: 226: 225: 206: 196: 195: 181:Security BSides 156: 146: 145: 91: 77: 76: 72:List of hackers 52: 28: 23: 22: 15: 12: 11: 5: 15955: 15945: 15944: 15939: 15934: 15929: 15924: 15919: 15902: 15901: 15899: 15898: 15888: 15878: 15867: 15864: 15863: 15861: 15860: 15855: 15850: 15845: 15840: 15835: 15830: 15825: 15820: 15815: 15810: 15805: 15800: 15795: 15790: 15785: 15780: 15775: 15770: 15765: 15759: 15757: 15753: 15752: 15750: 15749: 15747:Solid modeling 15744: 15739: 15734: 15729: 15724: 15719: 15714: 15708: 15706: 15700: 15699: 15697: 15696: 15691: 15686: 15681: 15676: 15670: 15668: 15662: 15661: 15659: 15658: 15653: 15648: 15646:Control method 15643: 15638: 15633: 15628: 15623: 15617: 15615: 15609: 15608: 15606: 15605: 15600: 15598:Multithreading 15595: 15590: 15585: 15579: 15577: 15571: 15570: 15568: 15567: 15562: 15557: 15552: 15547: 15541: 15539: 15533: 15532: 15530: 15529: 15524: 15519: 15514: 15509: 15504: 15499: 15494: 15492:Formal methods 15489: 15483: 15481: 15475: 15474: 15472: 15471: 15466: 15464:World Wide Web 15461: 15456: 15451: 15446: 15441: 15436: 15431: 15426: 15421: 15416: 15411: 15406: 15400: 15398: 15392: 15391: 15389: 15388: 15383: 15378: 15373: 15368: 15363: 15358: 15353: 15347: 15345: 15338: 15337: 15335: 15334: 15329: 15324: 15319: 15314: 15308: 15306: 15300: 15299: 15297: 15296: 15291: 15286: 15281: 15276: 15271: 15266: 15260: 15258: 15252: 15251: 15249: 15248: 15243: 15238: 15233: 15228: 15223: 15218: 15213: 15208: 15203: 15197: 15195: 15189: 15188: 15186: 15185: 15180: 15175: 15170: 15165: 15160: 15155: 15150: 15145: 15140: 15134: 15132: 15122: 15121: 15119: 15118: 15113: 15108: 15103: 15098: 15092: 15090: 15086: 15085: 15083: 15082: 15077: 15072: 15067: 15062: 15057: 15051: 15049: 15043: 15042: 15040: 15039: 15034: 15029: 15024: 15019: 15013: 15011: 15007: 15006: 15004: 15003: 14994: 14989: 14984: 14979: 14974: 14969: 14964: 14959: 14954: 14948: 14946: 14940: 14939: 14932: 14929: 14928: 14921: 14920: 14913: 14906: 14898: 14889: 14888: 14886: 14885: 14883:Site isolation 14880: 14875: 14874: 14873: 14867: 14857: 14856: 14855: 14850: 14839: 14834: 14829: 14824: 14819: 14814: 14813: 14812: 14807: 14797: 14796: 14795: 14790: 14789: 14788: 14781:Authentication 14773: 14772: 14771: 14770: 14769: 14759: 14756: 14745: 14743: 14739: 14738: 14736: 14735: 14730: 14725: 14720: 14715: 14710: 14705: 14700: 14695: 14690: 14685: 14680: 14675: 14670: 14665: 14660: 14655: 14650: 14645: 14640: 14635: 14634: 14633: 14623: 14618: 14613: 14608: 14603: 14598: 14593: 14588: 14583: 14581:Email spoofing 14578: 14573: 14568: 14563: 14558: 14553: 14548: 14543: 14538: 14533: 14528: 14523: 14521:DOM clobbering 14518: 14513: 14508: 14503: 14501:Code injection 14498: 14493: 14492: 14491: 14486: 14481: 14476: 14468: 14463: 14458: 14453: 14447: 14445: 14439: 14438: 14428: 14426: 14424: 14423: 14418: 14413: 14408: 14403: 14398: 14393: 14388: 14383: 14381:Cyberterrorism 14378: 14373: 14372: 14371: 14369:Computer fraud 14366: 14356: 14351: 14345: 14343: 14339: 14338: 14331: 14330: 14323: 14316: 14308: 14302: 14301: 14291: 14285: 14280:978-1466572133 14279: 14266: 14261:978-0199918119 14260: 14247: 14212: 14163: 14158:978-3319172439 14157: 14141: 14136:978-1494932633 14135: 14118: 14105: 14069: 14057:978-9284501960 14056: 14038: 13997: 13996: 13991: 13985: 13984: 13973: 13972: 13970: 13967: 13964: 13963: 13925: 13899: 13877: 13859: 13833: 13808: 13782: 13735: 13699: 13673: 13647: 13610: 13566: 13541: 13516: 13490: 13464: 13443: 13413: 13395: 13363: 13333: 13307: 13281: 13255: 13237: 13219: 13193: 13167: 13156:on 3 June 2013 13141: 13126:. Defence IQ. 13114: 13083: 13052: 13046:978-1119270317 13045: 13017: 12990:(2): 301–323. 12974: 12923: 12864: 12831: 12800: 12785: 12771: 12758: 12727: 12712: 12686: 12653: 12622: 12596: 12585:on 25 May 2016 12570: 12538: 12527:on 27 May 2010 12512: 12489: 12460: 12435: 12413: 12395: 12365: 12335: 12317: 12299: 12290: 12261: 12235: 12223: 12203: 12181: 12166: 12140: 12114: 12087: 12069: 12038: 12023: 11993: 11975: 11953: 11936:Get Cyber Safe 11932:"GetCyberSafe" 11923: 11901: 11871: 11841: 11811: 11781: 11751: 11721: 11691: 11656: 11623: 11593: 11575: 11557: 11539: 11517: 11495: 11469: 11436: 11417: 11398: 11372: 11354: 11333: 11310: 11283: 11260: 11237: 11214: 11191: 11161: 11138: 11115: 11096: 11078: 11055: 11024: 10983: 10950: 10923: 10892: 10869: 10847: 10828: 10802: 10783: 10771: 10758: 10736: 10722:978-1119642817 10721: 10703: 10684:(3): 212–233. 10668: 10627: 10616:. 20 July 2021 10601: 10567: 10548:(4): 438–457. 10532: 10514: 10496: 10470: 10432: 10401: 10375: 10349: 10319: 10289: 10259: 10228: 10197: 10167: 10137: 10108: 10077: 10047: 10016: 9986: 9956: 9933: 9900: 9864: 9833: 9814:(3): 269–284. 9791: 9761: 9735: 9718:Education Week 9704: 9685: 9654: 9623: 9614:SPIEGEL ONLINE 9601: 9583: 9553: 9531: 9506: 9488: 9476:atlasRFIDstore 9463: 9445: 9420: 9388: 9357: 9327: 9297: 9266: 9231: 9201: 9171: 9139: 9113: 9080: 9047: 9020: 8993: 8962: 8931: 8900: 8870: 8840: 8817: 8768: 8763:prnewswire.com 8749: 8724: 8698: 8673: 8647: 8629: 8611: 8584: 8553: 8523: 8505: 8490: 8473: 8442: 8405: 8382: 8355: 8330: 8305: 8290: 8265: 8252:WeLiveSecurity 8239: 8214: 8181: 8156: 8131: 8107: 8077: 8051: 8022: 7996: 7970: 7944: 7918: 7898: 7884:978-1467389990 7883: 7852: 7830:10.1.1.50.7649 7800: 7778: 7763: 7738: 7691: 7624: 7592: 7567: 7537: 7515: 7486: 7468: 7442: 7409: 7383: 7357: 7332: 7317: 7292: 7267: 7242: 7239:on 4 May 2013. 7223: 7196: 7185:on 21 May 2015 7164: 7158:978-0818600265 7157: 7137: 7123:978-0769518848 7122: 7096: 7087:978-1849285544 7086: 7068: 7062:978-0135166246 7061: 7041: 7034: 7016: 6990: 6964: 6937: 6912: 6868: 6837: 6812: 6786: 6758: 6733: 6709: 6685: 6652: 6647:10520/EJC27949 6620: 6584: 6569: 6541: 6514: 6489: 6460: 6429: 6404: 6374:978-1447165248 6373: 6347: 6334:978-0199688975 6333: 6303: 6286:techopedia.com 6273: 6247: 6216: 6187:Arcos Sergio. 6179: 6147: 6136:on 22 May 2022 6117: 6091: 6066: 6040: 6019: 5982: 5977:SC Magazine UK 5963: 5945: 5922: 5897: 5864: 5827: 5802: 5789: 5767: 5739: 5711: 5686: 5656: 5627: 5601: 5573: 5545: 5515: 5489: 5459: 5442: 5417: 5374: 5337:Sustainability 5323: 5318:The Australian 5302: 5285: 5253: 5252: 5250: 5247: 5245: 5244: 5238: 5232: 5226: 5220: 5214: 5208: 5202: 5196: 5191: 5186: 5180: 5171: 5165: 5159: 5153: 5147: 5138: 5132: 5126: 5117: 5111: 5105: 5099: 5093: 5087: 5082: 5076: 5070: 5064: 5058: 5052: 5046: 5041: 5035: 5029: 5023: 5020:Bicycle attack 5017: 5010: 5008: 5005: 5003: 5002: 4997: 4992: 4987: 4982: 4977: 4975:Bruce Schneier 4972: 4967: 4962: 4957: 4952: 4947: 4942: 4937: 4932: 4930:Butler Lampson 4927: 4922: 4917: 4912: 4907: 4902: 4897: 4892: 4890:Deborah Estrin 4887: 4882: 4877: 4872: 4867: 4862: 4857: 4852: 4847: 4842: 4837: 4832: 4826: 4824: 4821: 4806:to compete in 4784:replay attacks 4676: 4673: 4672: 4671: 4665: 4659: 4653: 4646: 4635: 4621: 4609: 4603: 4597: 4590: 4589:is configured. 4564: 4558: 4512: 4511: 4508:Data integrity 4505: 4498: 4480: 4474: 4468: 4465:Chain of trust 4462: 4448: 4442: 4436: 4433:Authentication 4430: 4429: 4428: 4421: 4414:Java byte code 4410: 4399: 4352:attack surface 4333: 4319: 4292:authentication 4279: 4276: 4260:U.K Government 4248: 4247: 4241: 4238: 4237: 4236: 4227: 4224: 4223: 4222: 4217: 4214: 4213: 4212: 4207: 4204: 4203: 4202: 4197: 4194: 4193: 4192: 4191:methodologies. 4182: 4179: 4178: 4177: 4171: 4168: 4151: 4148: 4132:cyberterrorism 4104:Main article: 4101: 4100:Modern warfare 4098: 4065: 4062: 4058:10 CFR Part 73 4045: 4042: 4041: 4040: 4026: 4017:: part of the 4002: 3999: 3938:computer crime 3888: 3885: 3865: 3862: 3821:as defined in 3807:18 U.S.C. 3802: 3799: 3778: 3775: 3773: 3770: 3764: 3761: 3732: 3729: 3698: 3695: 3675: 3672: 3664:Main article: 3661: 3658: 3656: 3653: 3632: 3629: 3628: 3627: 3624:European Union 3618:(ENISA) is an 3612: 3589:France Telecom 3584: 3577: 3545: 3542: 3483: 3480: 3445: 3442: 3434:Main article: 3431: 3428: 3419:Main article: 3416: 3413: 3392: 3389: 3363: 3360: 3332:Edward Snowden 3324:Main article: 3321: 3318: 3301: 3300:Stuxnet attack 3298: 3273: 3270: 3253: 3250: 3229:Main article: 3226: 3223: 3208: 3205: 3204: 3203: 3200: 3196: 3193: 3173: 3170: 3136:Clifford Stoll 3119: 3116: 3108:expected value 3086: 3083: 3044: 3041: 3028: 3025: 2983: 2980: 2943: 2940: 2908: 2905: 2880: 2877: 2831:connected cars 2815:cruise control 2796: 2793: 2789:hacked in 2014 2773:HBGary Federal 2742:identity theft 2737: 2734: 2715:partners with 2697: 2694: 2678:accelerometers 2666:mobile devices 2649: 2646: 2579: 2576: 2547: 2544: 2493:services, and 2491:authentication 2444:cybercriminals 2435: 2432: 2427: 2424: 2422: 2421: 2416: 2411: 2405: 2400: 2395: 2390: 2385: 2380: 2374: 2368: 2363: 2358: 2352: 2347: 2342: 2337: 2332: 2327: 2322: 2317: 2312: 2310:Access control 2306: 2304: 2301: 2293: 2292: 2285: 2282: 2261: 2258: 2234:computer virus 2205: 2202: 2188: 2185: 2124: 2121: 2091:Main article: 2088: 2085: 2065:Main article: 2062: 2059: 2058: 2057: 2051: 2037: 2013: 2010: 2006: 2003: 1996: 1990: 1955: 1952: 1886: 1883: 1841:Main article: 1838: 1835: 1784:exit procedure 1776: 1775: 1768: 1765: 1755: 1737: 1730: 1710: 1707: 1703: 1702: 1699: 1696: 1683: 1680: 1679: 1678: 1668: 1661: 1642: 1636: 1626: 1620: 1605: 1604: 1601: 1597: 1594: 1591: 1577:Main article: 1574: 1571: 1560:countermeasure 1555: 1552: 1551: 1550: 1546: 1545: 1544: 1543: 1540: 1537: 1534: 1528: 1527: 1524: 1521: 1518: 1501: 1498: 1479: 1478:HTML smuggling 1476: 1456: 1453: 1445: 1444: 1430: 1424: 1410: 1407:network packet 1400: 1393:Email spoofing 1377:Main article: 1374: 1371: 1326: 1323: 1309:Main article: 1306: 1303: 1302: 1301: 1297: 1259: 1256: 1228:email spoofing 1215:of the bank's 1184: 1181: 1172: 1169: 1168: 1167: 1160: 1154: 1146: 1142: 1131: 1128: 1127: 1126: 1100: 1090: 1083: 1073: 1046: 1043: 985: 982: 950:software worms 944: 941: 913: 910: 886:authentication 869: 866: 857:and scanning. 830:United Kingdom 787:Main article: 784: 781: 701:they provide. 642: 641: 639: 638: 631: 624: 616: 613: 612: 611: 610: 605: 600: 595: 593:Device drivers 590: 585: 580: 575: 567: 566: 562: 561: 545: 544: 534: 533: 531: 530: 523: 516: 508: 505: 504: 501: 500: 493: 490:Nuts and Volts 486: 481: 473: 470: 469: 466: 465: 462: 461: 452: 446: 440: 437:Legion of Doom 434: 428: 423: 417: 412: 411: 408: 407: 404: 403: 398: 393: 387: 382: 381: 378: 377: 374: 373: 368: 363: 358: 353: 348: 343: 338: 333: 328: 323: 318: 313: 308: 302: 297: 296: 293: 292: 289: 288: 283: 277: 274:Practice sites 272: 271: 268: 267: 264: 263: 258: 253: 248: 243: 237: 232: 231: 228: 227: 224: 223: 218: 213: 207: 204:Computer crime 202: 201: 198: 197: 194: 193: 188: 183: 178: 173: 168: 163: 157: 152: 151: 148: 147: 144: 143: 142: 141: 136: 131: 120: 115: 110: 105: 98: 92: 85:Hacker culture 83: 82: 79: 78: 75: 74: 69: 64: 62:Cryptovirology 59: 53: 48: 47: 44: 43: 37: 36: 26: 9: 6: 4: 3: 2: 15954: 15943: 15940: 15938: 15935: 15933: 15930: 15928: 15925: 15923: 15920: 15918: 15915: 15914: 15912: 15897: 15889: 15887: 15879: 15877: 15869: 15868: 15865: 15859: 15856: 15854: 15851: 15849: 15846: 15844: 15841: 15839: 15836: 15834: 15831: 15829: 15826: 15824: 15821: 15819: 15816: 15814: 15811: 15809: 15806: 15804: 15801: 15799: 15796: 15794: 15791: 15789: 15786: 15784: 15781: 15779: 15776: 15774: 15771: 15769: 15766: 15764: 15761: 15760: 15758: 15754: 15748: 15745: 15743: 15740: 15738: 15735: 15733: 15732:Mixed reality 15730: 15728: 15725: 15723: 15720: 15718: 15715: 15713: 15710: 15709: 15707: 15705: 15701: 15695: 15692: 15690: 15687: 15685: 15682: 15680: 15677: 15675: 15672: 15671: 15669: 15667: 15663: 15657: 15654: 15652: 15649: 15647: 15644: 15642: 15639: 15637: 15634: 15632: 15629: 15627: 15624: 15622: 15619: 15618: 15616: 15614: 15610: 15604: 15601: 15599: 15596: 15594: 15591: 15589: 15586: 15584: 15581: 15580: 15578: 15576: 15572: 15566: 15565:Accessibility 15563: 15561: 15560:Visualization 15558: 15556: 15553: 15551: 15548: 15546: 15543: 15542: 15540: 15538: 15534: 15528: 15525: 15523: 15520: 15518: 15515: 15513: 15510: 15508: 15505: 15503: 15500: 15498: 15495: 15493: 15490: 15488: 15485: 15484: 15482: 15480: 15476: 15470: 15467: 15465: 15462: 15460: 15457: 15455: 15452: 15450: 15447: 15445: 15442: 15440: 15437: 15435: 15432: 15430: 15427: 15425: 15422: 15420: 15417: 15415: 15412: 15410: 15407: 15405: 15402: 15401: 15399: 15397: 15393: 15387: 15384: 15382: 15379: 15377: 15374: 15372: 15369: 15367: 15364: 15362: 15359: 15357: 15354: 15352: 15349: 15348: 15346: 15344: 15339: 15333: 15330: 15328: 15325: 15323: 15320: 15318: 15315: 15313: 15310: 15309: 15307: 15305: 15301: 15295: 15292: 15290: 15287: 15285: 15282: 15280: 15277: 15275: 15272: 15270: 15267: 15265: 15262: 15261: 15259: 15257: 15253: 15247: 15244: 15242: 15239: 15237: 15234: 15232: 15229: 15227: 15224: 15222: 15219: 15217: 15214: 15212: 15209: 15207: 15204: 15202: 15199: 15198: 15196: 15194: 15190: 15184: 15181: 15179: 15176: 15174: 15171: 15169: 15166: 15164: 15161: 15159: 15156: 15154: 15151: 15149: 15146: 15144: 15141: 15139: 15136: 15135: 15133: 15131: 15127: 15123: 15117: 15114: 15112: 15109: 15107: 15104: 15102: 15099: 15097: 15094: 15093: 15091: 15087: 15081: 15078: 15076: 15073: 15071: 15068: 15066: 15063: 15061: 15058: 15056: 15053: 15052: 15050: 15048: 15044: 15038: 15035: 15033: 15030: 15028: 15027:Dependability 15025: 15023: 15020: 15018: 15015: 15014: 15012: 15008: 15002: 14998: 14995: 14993: 14990: 14988: 14985: 14983: 14980: 14978: 14975: 14973: 14970: 14968: 14965: 14963: 14960: 14958: 14955: 14953: 14950: 14949: 14947: 14945: 14941: 14936: 14930: 14926: 14919: 14914: 14912: 14907: 14905: 14900: 14899: 14896: 14884: 14881: 14879: 14876: 14871: 14868: 14866: 14863: 14862: 14861: 14858: 14854: 14851: 14848: 14845: 14844: 14843: 14840: 14838: 14835: 14833: 14830: 14828: 14825: 14823: 14820: 14818: 14815: 14811: 14808: 14806: 14803: 14802: 14801: 14798: 14794: 14793:Authorization 14791: 14787: 14784: 14783: 14782: 14779: 14778: 14777: 14774: 14768: 14765: 14764: 14763: 14760: 14757: 14755: 14754:Secure coding 14752: 14751: 14750: 14747: 14746: 14744: 14740: 14734: 14731: 14729: 14726: 14724: 14723:SQL injection 14721: 14719: 14716: 14714: 14711: 14709: 14706: 14704: 14703:Vulnerability 14701: 14699: 14696: 14694: 14691: 14689: 14688:Trojan horses 14686: 14684: 14683:Software bugs 14681: 14679: 14676: 14674: 14671: 14669: 14666: 14664: 14661: 14659: 14656: 14654: 14651: 14649: 14646: 14644: 14641: 14639: 14636: 14632: 14629: 14628: 14627: 14624: 14622: 14619: 14617: 14614: 14612: 14609: 14607: 14604: 14602: 14599: 14597: 14594: 14592: 14589: 14587: 14584: 14582: 14579: 14577: 14574: 14572: 14571:Eavesdropping 14569: 14567: 14564: 14562: 14561:Data scraping 14559: 14557: 14554: 14552: 14549: 14547: 14544: 14542: 14539: 14537: 14534: 14532: 14531:Cryptojacking 14529: 14527: 14524: 14522: 14519: 14517: 14514: 14512: 14509: 14507: 14504: 14502: 14499: 14497: 14494: 14490: 14487: 14485: 14482: 14480: 14477: 14475: 14472: 14471: 14469: 14467: 14464: 14462: 14459: 14457: 14454: 14452: 14449: 14448: 14446: 14444: 14440: 14432: 14422: 14419: 14417: 14414: 14412: 14409: 14407: 14404: 14402: 14399: 14397: 14394: 14392: 14389: 14387: 14384: 14382: 14379: 14377: 14374: 14370: 14367: 14365: 14362: 14361: 14360: 14357: 14355: 14352: 14350: 14347: 14346: 14344: 14340: 14336: 14329: 14324: 14322: 14317: 14315: 14310: 14309: 14306: 14300: 14296: 14292: 14290: 14286: 14282: 14276: 14272: 14267: 14263: 14257: 14253: 14248: 14244: 14240: 14235: 14230: 14226: 14222: 14218: 14213: 14209: 14205: 14201: 14197: 14193: 14189: 14185: 14181: 14177: 14173: 14169: 14164: 14160: 14154: 14150: 14146: 14142: 14138: 14132: 14128: 14124: 14119: 14115: 14111: 14106: 14102: 14098: 14094: 14090: 14086: 14082: 14075: 14070: 14063: 14059: 14053: 14046: 14045: 14039: 14035: 14031: 14027: 14023: 14019: 14015: 14011: 14007: 14002: 14001: 13995: 13992: 13990: 13987: 13986: 13981: 13976: 13950: 13945: 13944: 13939: 13932: 13930: 13914: 13910: 13903: 13887: 13881: 13873: 13869: 13863: 13848: 13844: 13837: 13822: 13818: 13812: 13796: 13792: 13786: 13778: 13774: 13770: 13766: 13762: 13758: 13754: 13750: 13746: 13739: 13733: 13725: 13721: 13717: 13710: 13703: 13688: 13684: 13677: 13662: 13658: 13651: 13632: 13628: 13621: 13614: 13606: 13602: 13598: 13594: 13590: 13586: 13581: 13573: 13571: 13555: 13551: 13545: 13530: 13526: 13520: 13504: 13500: 13494: 13478: 13474: 13468: 13453: 13447: 13431: 13427: 13423: 13417: 13409: 13405: 13399: 13380: 13373: 13367: 13351: 13347: 13346:iase.disa.mil 13343: 13337: 13321: 13317: 13311: 13295: 13291: 13285: 13269: 13265: 13259: 13251: 13247: 13241: 13233: 13229: 13223: 13207: 13203: 13197: 13181: 13177: 13171: 13155: 13151: 13145: 13129: 13125: 13118: 13102: 13098: 13094: 13087: 13071: 13067: 13066:Network World 13063: 13056: 13048: 13042: 13038: 13034: 13030: 13029: 13021: 13013: 13009: 13005: 13001: 12997: 12993: 12989: 12985: 12978: 12970: 12966: 12961: 12956: 12951: 12946: 12942: 12938: 12934: 12927: 12919: 12915: 12910: 12909:11250/2579292 12905: 12900: 12895: 12891: 12887: 12883: 12879: 12875: 12868: 12852: 12848: 12847: 12842: 12835: 12819: 12815: 12811: 12804: 12797: 12796: 12789: 12782: 12781: 12775: 12768: 12762: 12746: 12742: 12741:Computerworld 12738: 12731: 12723: 12719: 12715: 12709: 12705: 12701: 12697: 12690: 12671: 12664: 12657: 12641: 12637: 12633: 12626: 12610: 12606: 12600: 12584: 12580: 12574: 12558: 12554: 12553: 12548: 12542: 12526: 12522: 12516: 12508: 12504: 12503:brookings.edu 12500: 12493: 12477: 12473: 12472: 12464: 12449: 12445: 12439: 12423: 12417: 12409: 12405: 12399: 12383: 12379: 12375: 12369: 12353: 12349: 12345: 12339: 12331: 12327: 12321: 12313: 12309: 12303: 12294: 12278: 12274: 12268: 12266: 12249: 12245: 12239: 12232: 12227: 12219: 12218: 12213: 12207: 12199: 12195: 12191: 12185: 12179: 12175: 12170: 12155: 12151: 12144: 12129: 12125: 12118: 12102: 12101:Cybernexguard 12098: 12091: 12080: 12073: 12057: 12053: 12049: 12042: 12034: 12027: 12011: 12007: 12003: 11997: 11989: 11985: 11979: 11964: 11957: 11941: 11937: 11933: 11927: 11919: 11915: 11911: 11905: 11889: 11885: 11881: 11875: 11859: 11855: 11851: 11845: 11829: 11825: 11821: 11815: 11799: 11795: 11791: 11785: 11769: 11765: 11761: 11755: 11739: 11735: 11731: 11725: 11709: 11705: 11701: 11695: 11679: 11675: 11671: 11665: 11663: 11661: 11644: 11640: 11636: 11630: 11628: 11611: 11607: 11603: 11597: 11589: 11585: 11579: 11571: 11567: 11561: 11553: 11549: 11543: 11527: 11521: 11505: 11499: 11484:. 26 May 2020 11483: 11479: 11473: 11464: 11459: 11455: 11451: 11447: 11440: 11432: 11428: 11421: 11413: 11409: 11402: 11386: 11382: 11376: 11368: 11364: 11358: 11350: 11346: 11340: 11338: 11321: 11314: 11306: 11302: 11298: 11294: 11287: 11279: 11275: 11271: 11264: 11256: 11252: 11248: 11241: 11233: 11229: 11225: 11218: 11210: 11206: 11202: 11195: 11179: 11175: 11171: 11165: 11157: 11153: 11149: 11142: 11134: 11130: 11126: 11119: 11112: 11108: 11105: 11100: 11092: 11088: 11082: 11074: 11070: 11069:IEEE Spectrum 11066: 11059: 11043: 11039: 11035: 11028: 11021: 11020: 11016: 11002: 10998: 10994: 10987: 10968: 10961: 10954: 10938: 10934: 10927: 10911: 10907: 10903: 10896: 10888: 10884: 10880: 10873: 10865: 10861: 10857: 10851: 10844: 10840: 10837: 10832: 10816: 10812: 10806: 10799: 10795: 10792: 10787: 10778: 10776: 10768: 10762: 10746: 10740: 10732: 10728: 10724: 10718: 10714: 10707: 10699: 10695: 10691: 10687: 10683: 10679: 10672: 10664: 10660: 10655: 10650: 10647:(10): 40–42. 10646: 10642: 10638: 10631: 10615: 10611: 10605: 10590: 10586: 10582: 10578: 10571: 10563: 10559: 10555: 10551: 10547: 10543: 10536: 10525: 10518: 10510: 10506: 10500: 10485: 10481: 10474: 10455: 10451: 10450: 10442: 10436: 10420: 10416: 10412: 10405: 10389: 10385: 10379: 10363: 10359: 10353: 10337: 10333: 10329: 10323: 10307: 10303: 10299: 10293: 10277: 10273: 10269: 10263: 10247: 10243: 10239: 10232: 10216: 10212: 10208: 10201: 10185: 10181: 10177: 10171: 10155: 10151: 10147: 10141: 10125: 10121: 10115: 10113: 10096: 10092: 10088: 10081: 10065: 10061: 10057: 10051: 10035: 10031: 10030:Computerworld 10027: 10020: 10004: 10000: 9996: 9990: 9974: 9970: 9966: 9960: 9952: 9948: 9944: 9937: 9918: 9911: 9904: 9885: 9881: 9874: 9868: 9852: 9848: 9844: 9837: 9829: 9825: 9821: 9817: 9813: 9809: 9802: 9795: 9779: 9775: 9771: 9765: 9749: 9745: 9739: 9723: 9719: 9715: 9708: 9700: 9696: 9689: 9673: 9669: 9665: 9658: 9642: 9638: 9634: 9627: 9619: 9615: 9611: 9605: 9598: 9593: 9587: 9571: 9567: 9563: 9557: 9549: 9545: 9541: 9535: 9526: 9521: 9517: 9510: 9502: 9498: 9492: 9477: 9473: 9467: 9459: 9455: 9449: 9434: 9430: 9424: 9405: 9398: 9392: 9376: 9372: 9368: 9361: 9345: 9341: 9340:The Telegraph 9337: 9331: 9315: 9311: 9307: 9301: 9285: 9281: 9277: 9270: 9259: 9252: 9251: 9246: 9245:Stefan Savage 9242: 9235: 9219: 9215: 9211: 9205: 9189: 9185: 9181: 9175: 9156: 9149: 9143: 9135: 9131: 9127: 9120: 9118: 9101: 9097: 9096: 9091: 9084: 9068: 9064: 9063: 9058: 9051: 9035: 9031: 9024: 9008: 9004: 8997: 8981: 8977: 8973: 8966: 8950: 8946: 8942: 8935: 8919: 8915: 8911: 8904: 8888: 8884: 8880: 8874: 8858: 8854: 8850: 8844: 8836: 8832: 8828: 8821: 8813: 8809: 8804: 8799: 8795: 8791: 8787: 8783: 8779: 8772: 8764: 8760: 8753: 8745: 8741: 8737: 8731: 8729: 8712: 8708: 8702: 8687: 8683: 8677: 8661: 8657: 8651: 8643: 8639: 8633: 8625: 8621: 8615: 8599: 8595: 8588: 8572: 8568: 8564: 8557: 8541: 8537: 8533: 8527: 8519: 8515: 8509: 8501: 8494: 8486: 8485: 8477: 8461: 8457: 8453: 8446: 8427: 8423: 8416: 8409: 8401: 8397: 8393: 8386: 8378: 8374: 8370: 8366: 8359: 8344: 8340: 8334: 8319: 8315: 8309: 8303: 8299: 8294: 8279: 8275: 8269: 8253: 8249: 8243: 8228: 8224: 8218: 8201: 8196: 8192: 8185: 8170: 8166: 8160: 8145: 8138: 8136: 8120: 8114: 8112: 8095: 8091: 8087: 8081: 8066: 8062: 8055: 8039: 8032: 8026: 8010: 8006: 8000: 7984: 7983:Computerworld 7980: 7974: 7958: 7954: 7948: 7932: 7928: 7922: 7911: 7910: 7902: 7894: 7890: 7886: 7880: 7876: 7872: 7865: 7864: 7856: 7848: 7844: 7840: 7836: 7831: 7826: 7822: 7818: 7817:IEEE Computer 7811: 7804: 7796: 7789: 7782: 7774: 7773:EE Times_Asia 7767: 7752: 7748: 7742: 7734: 7730: 7726: 7722: 7718: 7714: 7710: 7706: 7702: 7695: 7687: 7683: 7678: 7673: 7669: 7665: 7660: 7655: 7651: 7647: 7643: 7639: 7635: 7628: 7609: 7602: 7596: 7581: 7577: 7571: 7555: 7551: 7547: 7541: 7525: 7519: 7510: 7505: 7501: 7497: 7490: 7482: 7478: 7472: 7456: 7452: 7446: 7427: 7420: 7413: 7397: 7393: 7387: 7371: 7367: 7361: 7346: 7342: 7336: 7328: 7321: 7306: 7302: 7296: 7281: 7277: 7271: 7256: 7252: 7246: 7238: 7234: 7227: 7216: 7209: 7208: 7200: 7181: 7174: 7168: 7160: 7154: 7150: 7149: 7141: 7133: 7129: 7125: 7119: 7115: 7111: 7107: 7100: 7093: 7089: 7083: 7079: 7072: 7064: 7058: 7054: 7053: 7045: 7037: 7031: 7027: 7020: 7004: 7000: 6994: 6979: 6975: 6968: 6952: 6948: 6941: 6926: 6922: 6916: 6908: 6904: 6899: 6894: 6891:(5): 92–102. 6890: 6886: 6882: 6875: 6873: 6856: 6852: 6848: 6841: 6826: 6825:csrc.nist.gov 6822: 6816: 6800: 6796: 6790: 6775: 6771: 6765: 6763: 6747: 6743: 6737: 6726: 6719: 6713: 6702: 6695: 6689: 6681: 6678: 6673: 6668: 6664: 6663: 6656: 6648: 6644: 6640: 6636: 6629: 6627: 6625: 6605: 6601: 6594: 6588: 6580: 6576: 6572: 6566: 6562: 6558: 6554: 6553: 6545: 6537: 6533: 6529: 6525: 6518: 6503: 6499: 6493: 6478: 6474: 6467: 6465: 6448: 6444: 6440: 6433: 6418: 6414: 6408: 6400: 6396: 6392: 6388: 6384: 6380: 6376: 6370: 6366: 6362: 6358: 6351: 6336: 6330: 6326: 6322: 6318: 6314: 6307: 6291: 6287: 6283: 6277: 6261: 6257: 6251: 6235: 6231: 6227: 6220: 6201: 6197: 6190: 6183: 6168: 6164: 6158: 6156: 6154: 6152: 6135: 6131: 6127: 6121: 6106: 6102: 6095: 6080: 6076: 6070: 6054: 6050: 6044: 6030: 6026: 6022: 6016: 6012: 6008: 6004: 5999: 5991: 5989: 5987: 5978: 5974: 5967: 5959: 5955: 5949: 5941: 5940: 5935: 5929: 5927: 5911: 5907: 5901: 5892: 5887: 5883: 5879: 5875: 5868: 5852: 5848: 5842: 5840: 5838: 5836: 5834: 5832: 5816: 5812: 5806: 5792: 5786: 5782: 5778: 5771: 5756: 5752: 5746: 5744: 5728: 5724: 5718: 5716: 5700: 5696: 5690: 5675: 5671: 5665: 5663: 5661: 5644: 5640: 5634: 5632: 5615: 5611: 5605: 5590: 5586: 5580: 5578: 5562: 5558: 5552: 5550: 5534: 5530: 5524: 5522: 5520: 5504: 5500: 5493: 5477: 5473: 5469: 5463: 5455: 5454: 5446: 5431: 5427: 5421: 5410: 5405: 5400: 5396: 5392: 5385: 5378: 5370: 5366: 5361: 5360:11250/2978306 5356: 5351: 5346: 5343:(24): 13677. 5342: 5338: 5334: 5327: 5319: 5314: 5306: 5300: 5299: 5294: 5289: 5281: 5277: 5273: 5269: 5265: 5258: 5254: 5242: 5239: 5236: 5233: 5230: 5227: 5224: 5221: 5218: 5215: 5212: 5209: 5206: 5203: 5200: 5199:Open security 5197: 5195: 5192: 5190: 5187: 5184: 5181: 5175: 5172: 5169: 5166: 5163: 5160: 5157: 5154: 5151: 5148: 5142: 5139: 5136: 5133: 5130: 5127: 5121: 5118: 5115: 5112: 5109: 5106: 5103: 5100: 5097: 5096:Data security 5094: 5091: 5088: 5086: 5083: 5080: 5077: 5074: 5071: 5068: 5065: 5062: 5059: 5056: 5053: 5050: 5047: 5045: 5042: 5039: 5036: 5033: 5030: 5027: 5024: 5021: 5018: 5015: 5012: 5011: 5001: 4998: 4996: 4993: 4991: 4988: 4986: 4985:Gene Spafford 4983: 4981: 4978: 4976: 4973: 4971: 4968: 4966: 4963: 4961: 4958: 4956: 4953: 4951: 4950:Kevin Mitnick 4948: 4946: 4945:Carl Landwehr 4943: 4941: 4938: 4936: 4933: 4931: 4928: 4926: 4925:Monica S. Lam 4923: 4921: 4918: 4916: 4915:Peter Gutmann 4913: 4911: 4908: 4906: 4903: 4901: 4898: 4896: 4893: 4891: 4888: 4886: 4885:Chuck Easttom 4883: 4881: 4880:Cynthia Dwork 4878: 4876: 4873: 4871: 4868: 4866: 4865:Lorrie Cranor 4863: 4861: 4858: 4856: 4855:Stefan Brands 4853: 4851: 4848: 4846: 4843: 4841: 4838: 4836: 4833: 4831: 4828: 4827: 4820: 4817: 4813: 4809: 4804: 4799: 4796: 4792: 4787: 4785: 4781: 4777: 4772: 4770: 4765: 4763: 4757: 4755: 4754:Ray Tomlinson 4751: 4747: 4743: 4739: 4736: 4735:computer worm 4731: 4729: 4723: 4721: 4717: 4712: 4710: 4706: 4702: 4699:organized by 4698: 4693: 4691: 4686: 4682: 4669: 4666: 4663: 4660: 4657: 4654: 4651: 4647: 4644: 4640: 4636: 4633: 4629: 4625: 4622: 4619: 4614: 4610: 4607: 4604: 4601: 4598: 4595: 4591: 4588: 4584: 4580: 4576: 4572: 4568: 4565: 4562: 4559: 4556: 4552: 4548: 4544: 4543:Symmetric-key 4540: 4536: 4532: 4528: 4525: 4524: 4520: 4519:Cryptographic 4516: 4509: 4506: 4502: 4499: 4496: 4492: 4488: 4484: 4481: 4478: 4477:Cryptographic 4475: 4472: 4469: 4466: 4463: 4460: 4456: 4452: 4449: 4446: 4443: 4440: 4437: 4434: 4431: 4426: 4422: 4419: 4415: 4411: 4408: 4404: 4400: 4397: 4393: 4389: 4385: 4381: 4377: 4373: 4369: 4364: 4363: 4361: 4357: 4353: 4349: 4345: 4341: 4337: 4334: 4331: 4327: 4323: 4320: 4317: 4313: 4309: 4305: 4301: 4297: 4293: 4289: 4288:authorization 4285: 4284: 4283: 4275: 4273: 4268: 4263: 4261: 4257: 4252: 4244: 4243: 4234: 4230: 4229: 4220: 4219: 4210: 4209: 4200: 4199: 4190: 4185: 4184: 4174: 4173: 4167: 4164: 4162: 4161:cybersecurity 4157: 4147: 4144: 4142: 4138: 4134: 4133: 4128: 4122: 4117: 4115: 4114: 4107: 4097: 4095: 4091: 4087: 4083: 4079: 4078:cybersecurity 4075: 4071: 4061: 4059: 4055: 4051: 4038: 4034: 4030: 4027: 4024: 4020: 4016: 4013: 4012: 4011: 4009: 4008: 3998: 3994: 3992: 3988: 3984: 3980: 3976: 3972: 3967: 3965: 3960: 3958: 3953: 3951: 3947: 3943: 3939: 3935: 3931: 3926: 3924: 3919: 3917: 3913: 3909: 3904: 3902: 3898: 3894: 3883: 3878: 3875: 3871: 3861: 3858: 3854: 3849: 3847: 3843: 3840: 3837: 3832: 3829: 3825: 3820: 3816: 3812: 3808: 3798: 3796: 3792: 3787: 3784: 3783:United States 3772:United States 3769: 3760: 3756: 3754: 3750: 3746: 3741: 3736: 3728: 3726: 3725:Julie Collins 3722: 3718: 3713: 3711: 3707: 3706:cybersecurity 3703: 3694: 3691: 3687: 3685: 3680: 3671: 3667: 3652: 3650: 3646: 3642: 3638: 3625: 3621: 3617: 3613: 3610: 3606: 3602: 3598: 3594: 3590: 3585: 3582: 3578: 3575: 3571: 3567: 3563: 3559: 3555: 3551: 3550: 3549: 3541: 3539: 3535: 3530: 3528: 3527:San Francisco 3524: 3520: 3514: 3513:discussions. 3512: 3508: 3504: 3503:virtual space 3500: 3495: 3493: 3489: 3479: 3477: 3473: 3469: 3464: 3460: 3456: 3452: 3441: 3437: 3427: 3422: 3412: 3410: 3406: 3401: 3398: 3388: 3386: 3381: 3377: 3373: 3369: 3359: 3357: 3353: 3349: 3345: 3344: 3339: 3338: 3333: 3327: 3317: 3315: 3311: 3307: 3297: 3295: 3291: 3287: 3283: 3279: 3269: 3267: 3263: 3262:trojan horses 3259: 3249: 3247: 3243: 3239: 3238:computer worm 3232: 3222: 3218: 3214: 3201: 3197: 3194: 3191: 3190: 3189: 3186: 3183: 3178: 3169: 3165: 3163: 3157: 3155: 3149: 3145: 3143: 3142: 3137: 3133: 3129: 3125: 3115: 3113: 3109: 3104: 3099: 3096: 3092: 3082: 3080: 3076: 3071: 3069: 3065: 3061: 3057: 3052: 3050: 3040: 3038: 3034: 3027:Energy sector 3024: 3022: 3018: 3014: 3010: 3006: 3005:insulin pumps 3002: 2998: 2993: 2989: 2979: 2975: 2971: 2969: 2965: 2961: 2957: 2953: 2949: 2939: 2937: 2933: 2929: 2924: 2922: 2918: 2917:traffic light 2914: 2904: 2902: 2898: 2894: 2890: 2886: 2876: 2874: 2870: 2864: 2862: 2858: 2854: 2849: 2847: 2843: 2838: 2836: 2832: 2828: 2824: 2820: 2816: 2810: 2806: 2802: 2792: 2790: 2786: 2785:Sony Pictures 2782: 2778: 2774: 2769: 2765: 2763: 2759: 2755: 2751: 2747: 2746:data breaches 2743: 2733: 2730: 2726: 2722: 2718: 2714: 2709: 2707: 2703: 2693: 2691: 2687: 2682: 2679: 2675: 2672:devices like 2671: 2667: 2663: 2662:smart watches 2659: 2655: 2645: 2643: 2638: 2636: 2632: 2628: 2624: 2620: 2616: 2612: 2608: 2603: 2601: 2597: 2592: 2588: 2585: 2575: 2573: 2569: 2565: 2561: 2557: 2553: 2543: 2541: 2536: 2532: 2528: 2524: 2519: 2517: 2513: 2509: 2508:interoperable 2505: 2501: 2496: 2492: 2488: 2484: 2479: 2477: 2472: 2467: 2465: 2461: 2457: 2453: 2449: 2445: 2441: 2431: 2420: 2417: 2415: 2412: 2409: 2406: 2404: 2401: 2399: 2396: 2394: 2391: 2389: 2386: 2384: 2381: 2378: 2375: 2372: 2369: 2367: 2364: 2362: 2359: 2356: 2353: 2351: 2348: 2346: 2343: 2341: 2338: 2336: 2333: 2331: 2328: 2326: 2323: 2321: 2318: 2316: 2313: 2311: 2308: 2307: 2300: 2298: 2289: 2286: 2283: 2280: 2276: 2271: 2270: 2269: 2267: 2257: 2255: 2251: 2247: 2243: 2239: 2238:cyber hygiene 2235: 2230: 2226: 2224: 2219: 2215: 2214:cyber hygiene 2211: 2201: 2197: 2193: 2184: 2182: 2177: 2172: 2170: 2166: 2161: 2159: 2154: 2152: 2148: 2144: 2138: 2134: 2130: 2120: 2119:for example. 2118: 2114: 2110: 2106: 2105: 2100: 2099:secure coding 2094: 2093:Secure coding 2087:Secure coding 2084: 2082: 2078: 2074: 2068: 2055: 2052: 2049: 2045: 2041: 2038: 2034: 2030: 2026: 2022: 2018: 2014: 2011: 2007: 2004: 2000: 1997: 1994: 1991: 1988: 1984: 1979: 1975: 1974: 1973: 1971: 1967: 1961: 1951: 1949: 1944: 1940: 1938: 1934: 1930: 1925: 1923: 1919: 1914: 1910: 1908: 1904: 1900: 1896: 1892: 1882: 1880: 1875: 1873: 1869: 1865: 1860: 1858: 1854: 1850: 1844: 1834: 1830: 1828: 1824: 1820: 1819:Apache Hadoop 1816: 1811: 1809: 1805: 1801: 1797: 1793: 1792:network stack 1789: 1785: 1781: 1773: 1769: 1766: 1763: 1759: 1756: 1753: 1749: 1745: 1741: 1738: 1734: 1731: 1728: 1724: 1721: 1717: 1716: 1715: 1706: 1700: 1697: 1694: 1693: 1692: 1688: 1676: 1672: 1669: 1665: 1662: 1659: 1655: 1651: 1650:fail insecure 1647: 1643: 1640: 1637: 1634: 1630: 1627: 1624: 1621: 1618: 1614: 1610: 1609: 1608: 1602: 1598: 1595: 1592: 1589: 1588: 1587: 1584: 1580: 1570: 1567: 1565: 1561: 1548: 1547: 1541: 1538: 1535: 1532: 1531: 1530: 1529: 1525: 1522: 1519: 1516: 1515: 1514: 1510: 1507: 1497: 1494: 1492: 1488: 1484: 1475: 1473: 1469: 1465: 1461: 1452: 1450: 1442: 1438: 1434: 1431: 1428: 1425: 1422: 1418: 1414: 1411: 1408: 1404: 1401: 1398: 1394: 1391: 1390: 1389: 1387: 1380: 1370: 1368: 1364: 1360: 1357: 1352: 1350: 1346: 1341: 1339: 1335: 1331: 1322: 1319: 1312: 1298: 1294: 1293: 1292: 1289: 1287: 1283: 1279: 1275: 1274: 1269: 1268:vulnerability 1264: 1255: 1253: 1248: 1245: 1244:look and feel 1241: 1237: 1233: 1229: 1225: 1218: 1214: 1210: 1206: 1202: 1198: 1194: 1189: 1180: 1176: 1166: 1161: 1158: 1155: 1152: 1147: 1143: 1140: 1139: 1138: 1136: 1124: 1120: 1116: 1112: 1108: 1104: 1101: 1098: 1094: 1091: 1087: 1086:Trojan horses 1084: 1081: 1077: 1074: 1070: 1067: 1066: 1065: 1062: 1060: 1056: 1052: 1042: 1040: 1036: 1032: 1028: 1024: 1020: 1015: 1013: 1009: 1005: 1000: 998: 993: 990: 989:Eavesdropping 984:Eavesdropping 981: 978: 973: 971: 967: 963: 959: 955: 951: 940: 938: 934: 930: 926: 922: 918: 909: 907: 902: 899: 895: 890: 887: 883: 879: 875: 865: 863: 858: 856: 852: 848: 842: 840: 836: 831: 826: 823: 821: 817: 816: 811: 810: 805: 801: 797: 790: 780: 778: 774: 770: 766: 762: 758: 753: 751: 747: 743: 739: 735: 731: 727: 723: 719: 718:smart devices 715: 711: 707: 702: 700: 696: 692: 688: 684: 680: 676: 672: 668: 664: 660: 659:cybersecurity 656: 648: 637: 632: 630: 625: 623: 618: 617: 615: 614: 609: 606: 604: 601: 599: 596: 594: 591: 589: 586: 584: 581: 579: 576: 574: 571: 570: 569: 568: 564: 563: 547: 546: 543: 540: 539: 529: 524: 522: 517: 515: 510: 509: 507: 506: 499: 498: 494: 492: 491: 487: 485: 482: 480: 479: 475: 474: 468: 467: 460: 456: 453: 450: 447: 444: 441: 438: 435: 432: 429: 427: 424: 422: 419: 418: 415: 410: 409: 402: 399: 397: 394: 392: 389: 388: 385: 380: 379: 372: 369: 367: 364: 362: 359: 357: 354: 352: 349: 347: 344: 342: 339: 337: 334: 332: 329: 327: 324: 322: 319: 317: 314: 312: 309: 307: 304: 303: 300: 295: 294: 287: 284: 282: 279: 278: 275: 270: 269: 262: 261:Vulnerability 259: 257: 254: 252: 249: 247: 244: 242: 239: 238: 235: 234:Hacking tools 230: 229: 222: 221:Script kiddie 219: 217: 214: 212: 209: 208: 205: 200: 199: 192: 189: 187: 184: 182: 179: 177: 174: 172: 169: 167: 164: 162: 159: 158: 155: 150: 149: 140: 137: 135: 132: 130: 127: 126: 125: 121: 119: 118:Maker culture 116: 114: 111: 109: 106: 104: 103: 99: 97: 94: 93: 90: 86: 81: 80: 73: 70: 68: 65: 63: 60: 58: 55: 54: 51: 46: 45: 42: 39: 38: 34: 33: 30: 19: 15927:Cyberwarfare 15922:Cryptography 15828:Cyberwarfare 15487:Cryptography 15478: 14827:Data masking 14386:Cyberwarfare 14348: 14270: 14251: 14224: 14220: 14175: 14171: 14148: 14122: 14113: 14084: 14080: 14043: 14009: 14005: 13979: 13954:. Retrieved 13949:the original 13941: 13916:. Retrieved 13912: 13902: 13890:. Retrieved 13880: 13871: 13862: 13850:. Retrieved 13846: 13836: 13824:. Retrieved 13820: 13811: 13799:. Retrieved 13794: 13785: 13755:(2): 46–58. 13752: 13748: 13738: 13731: 13702: 13690:. Retrieved 13686: 13676: 13664:. Retrieved 13660: 13650: 13638:. Retrieved 13626: 13613: 13591:(4): 12–25. 13588: 13584: 13557:. Retrieved 13553: 13544: 13532:. Retrieved 13528: 13519: 13507:. Retrieved 13493: 13481:. Retrieved 13467: 13455:. Retrieved 13446: 13434:. Retrieved 13430:the original 13425: 13416: 13407: 13398: 13386:. Retrieved 13366: 13354:. Retrieved 13350:the original 13345: 13336: 13324:. Retrieved 13310: 13298:. Retrieved 13284: 13272:. Retrieved 13258: 13240: 13231: 13222: 13210:. Retrieved 13205: 13196: 13184:. Retrieved 13179: 13170: 13158:. Retrieved 13154:the original 13144: 13132:. Retrieved 13117: 13105:. Retrieved 13101:the original 13096: 13086: 13074:. Retrieved 13070:the original 13065: 13055: 13027: 13020: 12987: 12983: 12977: 12943:(2): 49–60. 12940: 12936: 12926: 12881: 12877: 12867: 12855:. Retrieved 12851:the original 12844: 12834: 12822:. Retrieved 12813: 12803: 12793: 12788: 12778: 12774: 12761: 12749:. Retrieved 12740: 12730: 12695: 12689: 12677:. Retrieved 12656: 12644:. Retrieved 12635: 12625: 12613:. Retrieved 12599: 12587:. Retrieved 12583:the original 12573: 12561:. Retrieved 12550: 12541: 12529:. Retrieved 12525:the original 12515: 12507:the original 12502: 12492: 12480:. Retrieved 12476:the original 12470: 12463: 12451:. Retrieved 12447: 12438: 12426:. Retrieved 12416: 12398: 12386:. Retrieved 12382:the original 12377: 12368: 12358:10 September 12356:. Retrieved 12347: 12338: 12320: 12302: 12293: 12281:. Retrieved 12252:. Retrieved 12248:the original 12238: 12226: 12215: 12206: 12198:the original 12193: 12184: 12178:Congress.gov 12169: 12157:. Retrieved 12153: 12143: 12131:. Retrieved 12127: 12117: 12105:. Retrieved 12103:. Adil Sajid 12100: 12090: 12072: 12062:24 September 12060:. Retrieved 12051: 12041: 12032: 12026: 12014:. Retrieved 12010:the original 12005: 11996: 11978: 11966:. Retrieved 11956: 11944:. Retrieved 11935: 11926: 11913: 11904: 11892:. Retrieved 11883: 11874: 11862:. Retrieved 11854:Market Wired 11853: 11844: 11832:. Retrieved 11823: 11814: 11802:. Retrieved 11793: 11784: 11772:. Retrieved 11763: 11754: 11742:. Retrieved 11733: 11724: 11712:. Retrieved 11703: 11694: 11682:. Retrieved 11673: 11647:. Retrieved 11638: 11614:. Retrieved 11606:Market Wired 11605: 11596: 11578: 11560: 11542: 11530:. Retrieved 11520: 11508:. Retrieved 11498: 11486:. Retrieved 11481: 11472: 11453: 11449: 11439: 11430: 11420: 11411: 11401: 11389:. Retrieved 11375: 11357: 11324:. Retrieved 11313: 11296: 11292: 11286: 11273: 11263: 11250: 11240: 11232:the original 11227: 11217: 11204: 11194: 11182:. Retrieved 11173: 11164: 11151: 11141: 11133:the original 11129:Businessweek 11128: 11118: 11099: 11090: 11081: 11068: 11058: 11046:. Retrieved 11037: 11027: 11012: 11005:. Retrieved 10997:The Guardian 10996: 10986: 10974:. Retrieved 10967:the original 10953: 10941:. Retrieved 10926: 10914:. Retrieved 10905: 10895: 10882: 10872: 10859: 10850: 10831: 10819:. Retrieved 10805: 10786: 10766: 10761: 10749:. Retrieved 10739: 10712: 10706: 10681: 10677: 10671: 10644: 10640: 10630: 10618:. Retrieved 10614:www.cisa.gov 10613: 10604: 10592:. Retrieved 10580: 10570: 10545: 10541: 10535: 10517: 10508: 10499: 10487:. Retrieved 10483: 10473: 10461:. Retrieved 10447: 10435: 10423:. Retrieved 10414: 10404: 10392:. Retrieved 10378: 10366:. Retrieved 10352: 10340:. Retrieved 10331: 10322: 10310:. Retrieved 10301: 10292: 10280:. Retrieved 10271: 10262: 10250:. Retrieved 10242:The Register 10241: 10231: 10219:. Retrieved 10211:The Register 10210: 10200: 10188:. Retrieved 10179: 10170: 10158:. Retrieved 10149: 10140: 10128:. Retrieved 10099:. Retrieved 10090: 10080: 10068:. Retrieved 10059: 10050: 10038:. Retrieved 10029: 10019: 10007:. Retrieved 9999:Dark Reading 9998: 9989: 9977:. Retrieved 9969:Ars Technica 9968: 9959: 9946: 9936: 9924:. Retrieved 9903: 9891:. Retrieved 9879: 9867: 9855:. Retrieved 9846: 9836: 9811: 9807: 9794: 9782:. Retrieved 9773: 9764: 9754:24 September 9752:. Retrieved 9747: 9738: 9726:. Retrieved 9717: 9707: 9688: 9676:. Retrieved 9667: 9657: 9645:. Retrieved 9636: 9626: 9618:the original 9613: 9604: 9591: 9586: 9576:25 September 9574:. Retrieved 9565: 9556: 9543: 9534: 9515: 9509: 9500: 9491: 9479:. Retrieved 9475: 9466: 9458:Thales Group 9457: 9448: 9436:. Retrieved 9432: 9423: 9411:. Retrieved 9391: 9379:. Retrieved 9370: 9360: 9348:. Retrieved 9339: 9330: 9318:. Retrieved 9309: 9300: 9288:. Retrieved 9279: 9269: 9249: 9241:Brian Kantor 9234: 9222:. Retrieved 9214:The Guardian 9213: 9204: 9192:. Retrieved 9183: 9174: 9162:. Retrieved 9142: 9129: 9104:. Retrieved 9093: 9083: 9071:. Retrieved 9060: 9050: 9038:. Retrieved 9023: 9011:. Retrieved 8996: 8984:. Retrieved 8975: 8965: 8953:. Retrieved 8944: 8934: 8922:. Retrieved 8913: 8903: 8891:. Retrieved 8882: 8873: 8861:. Retrieved 8852: 8843: 8820: 8785: 8781: 8771: 8762: 8752: 8739: 8715:. Retrieved 8711:the original 8701: 8689:. Retrieved 8685: 8676: 8664:. Retrieved 8660:the original 8650: 8632: 8614: 8602:. Retrieved 8597: 8587: 8575:. Retrieved 8566: 8556: 8544:. Retrieved 8535: 8526: 8508: 8493: 8483: 8476: 8464:. Retrieved 8455: 8445: 8435:15 September 8433:. Retrieved 8426:the original 8422:ccp.ucla.edu 8421: 8408: 8391: 8385: 8368: 8364: 8358: 8348:28 September 8346:. Retrieved 8342: 8333: 8323:28 September 8321:. Retrieved 8317: 8308: 8302:Congress.gov 8293: 8283:28 September 8281:. Retrieved 8277: 8268: 8258:28 September 8256:. Retrieved 8251: 8242: 8232:28 September 8230:. Retrieved 8226: 8217: 8207:27 September 8205:. Retrieved 8200:the original 8194: 8184: 8172:. Retrieved 8168: 8159: 8149:27 September 8147:. Retrieved 8124:27 September 8122:. Retrieved 8098:. Retrieved 8094:the original 8089: 8080: 8068:. Retrieved 8065:The Guardian 8064: 8054: 8042:. Retrieved 8037: 8025: 8013:. Retrieved 8008: 7999: 7987:. Retrieved 7982: 7973: 7961:. Retrieved 7956: 7947: 7935:. Retrieved 7930: 7921: 7908: 7901: 7862: 7855: 7823:(2): 38–47. 7820: 7816: 7803: 7794: 7781: 7772: 7766: 7754:. Retrieved 7750: 7741: 7708: 7704: 7694: 7644:(15): 5577. 7641: 7637: 7627: 7615:. Retrieved 7595: 7583:. Retrieved 7579: 7570: 7558:. Retrieved 7540: 7528:. Retrieved 7518: 7499: 7489: 7471: 7459:. Retrieved 7445: 7433:. Retrieved 7412: 7400:. Retrieved 7386: 7374:. Retrieved 7360: 7348:. Retrieved 7344: 7335: 7326: 7320: 7308:. Retrieved 7304: 7295: 7283:. Retrieved 7279: 7270: 7258:. Retrieved 7254: 7245: 7237:the original 7226: 7215:the original 7206: 7199: 7187:. Retrieved 7180:the original 7167: 7147: 7140: 7105: 7099: 7091: 7077: 7071: 7051: 7044: 7025: 7019: 7007:. Retrieved 7002: 6993: 6981:. Retrieved 6977: 6967: 6955:. Retrieved 6940: 6928:. Retrieved 6924: 6915: 6888: 6884: 6859:. Retrieved 6850: 6840: 6828:. Retrieved 6824: 6815: 6803:. Retrieved 6798: 6789: 6777:. Retrieved 6773: 6749:. Retrieved 6745: 6736: 6712: 6701:the original 6688: 6661: 6655: 6638: 6634: 6613:17 September 6611:. Retrieved 6599: 6587: 6551: 6544: 6527: 6517: 6505:. Retrieved 6501: 6492: 6480:. Retrieved 6476: 6451:. Retrieved 6443:Ars Technica 6442: 6432: 6420:. Retrieved 6416: 6407: 6356: 6350: 6338:. Retrieved 6316: 6306: 6294:. Retrieved 6285: 6276: 6264:. Retrieved 6250: 6238:. Retrieved 6234:the original 6229: 6219: 6207:. Retrieved 6195: 6182: 6170:. Retrieved 6166: 6138:. Retrieved 6134:the original 6129: 6120: 6108:. Retrieved 6104: 6094: 6082:. Retrieved 6078: 6069: 6057:. Retrieved 6053:the original 6043: 6032:, retrieved 6002: 5976: 5966: 5957: 5948: 5937: 5913:. Retrieved 5909: 5900: 5881: 5877: 5867: 5855:. Retrieved 5850: 5818:. Retrieved 5814: 5805: 5794:, retrieved 5780: 5770: 5758:. Retrieved 5754: 5730:. Retrieved 5726: 5702:. Retrieved 5698: 5689: 5677:. Retrieved 5673: 5647:. Retrieved 5642: 5618:. Retrieved 5613: 5604: 5592:. Retrieved 5588: 5564:. Retrieved 5560: 5536:. Retrieved 5532: 5506:. Retrieved 5502: 5492: 5480:. Retrieved 5476:the original 5471: 5462: 5452: 5445: 5433:. Retrieved 5429: 5420: 5394: 5390: 5377: 5340: 5336: 5326: 5317: 5305: 5296: 5288: 5271: 5267: 5257: 5090:Dancing pigs 4940:Susan Landau 4900:Ian Goldberg 4860:L. Jean Camp 4808:cyberwarfare 4802: 4800: 4788: 4773: 4766: 4758: 4732: 4724: 4719: 4713: 4694: 4678: 4501:Cyberwarfare 4378:, and other 4336:Applications 4281: 4264: 4253: 4249: 4165: 4160: 4153: 4145: 4130: 4127:cyberwarfare 4126: 4124: 4119: 4111: 4109: 4106:Cyberwarfare 4073: 4067: 4047: 4005: 4004: 3995: 3968: 3961: 3954: 3927: 3920: 3905: 3890: 3873: 3867: 3850: 3841: 3833: 3818: 3804: 3788: 3780: 3766: 3757: 3737: 3734: 3721:Clare O'Neil 3714: 3700: 3692: 3688: 3681: 3677: 3669: 3643:adopted the 3634: 3547: 3531: 3515: 3496: 3485: 3455:cyber attack 3447: 3439: 3424: 3394: 3365: 3343:The Guardian 3341: 3335: 3329: 3303: 3275: 3255: 3234: 3220: 3187: 3175: 3166: 3162:nation state 3158: 3150: 3146: 3139: 3121: 3100: 3098:anecdotal." 3088: 3072: 3068:optical disc 3053: 3046: 3032: 3030: 2995: 2976: 2972: 2945: 2925: 2910: 2882: 2865: 2857:over the air 2856: 2850: 2842:compact disc 2839: 2812: 2770: 2766: 2744:and involve 2739: 2710: 2699: 2683: 2664:, and other 2651: 2639: 2604: 2593: 2589: 2581: 2549: 2520: 2480: 2468: 2456:black market 2452:bank account 2437: 2429: 2325:Anti-spyware 2320:Anti-malware 2294: 2275:jurisdiction 2263: 2237: 2233: 2231: 2227: 2213: 2209: 2207: 2198: 2194: 2190: 2173: 2162: 2155: 2140: 2102: 2096: 2072: 2070: 2050:protections. 2019:, the newer 1963: 1945: 1941: 1936: 1932: 1926: 1915: 1911: 1888: 1876: 1861: 1846: 1831: 1812: 1807: 1777: 1770:Forward web 1757: 1748:audit trails 1727:cryptography 1720:user account 1712: 1704: 1689: 1685: 1674: 1664:Audit trails 1649: 1648:rather than 1645: 1633:unit testing 1629:Code reviews 1606: 1585: 1582: 1568: 1557: 1511: 1503: 1495: 1481: 1472:surveillance 1462:describes a 1458: 1446: 1413:MAC spoofing 1396: 1382: 1363:Peter Feigin 1353: 1342: 1328: 1314: 1290: 1271: 1261: 1249: 1236:text message 1222: 1208: 1204: 1200: 1196: 1177: 1174: 1157:DNS spoofing 1133: 1079: 1063: 1048: 1023:NarusInSight 1016: 1001: 994: 987: 974: 946: 915: 903: 891: 878:cryptosystem 871: 859: 855:water holing 843: 827: 824: 813: 807: 799: 792: 754: 720:, including 703: 666: 662: 658: 654: 653: 608:Input/output 602: 495: 488: 476: 471:Publications 383: 316:Trojan horse 281:HackThisSite 100: 29: 15838:Video games 15818:Digital art 15575:Concurrency 15444:Data mining 15356:Probability 15096:Interpreter 14767:Misuse case 14601:Infostealer 14576:Email fraud 14541:Data breach 14376:Cybergeddon 14145:Lee, Newton 14125:. Seattle: 12960:10945/60589 12233:(full text) 12159:18 December 12133:18 December 12107:18 December 12016:19 February 11968:22 November 11456:(2): 5–12. 11299:(9): 8–16. 11184:25 February 10916:18 February 10821:12 December 10463:29 December 10425:29 December 10394:29 December 10368:29 December 10342:29 December 10312:29 December 10282:29 December 10252:29 December 10221:29 December 10190:29 December 10160:29 December 10130:29 December 10101:29 December 9438:25 November 9106:18 December 8924:29 November 8893:29 November 8863:21 December 8853:Fortune.com 8686:www.dhs.gov 8577:21 November 8174:27 December 8015:7 September 7756:19 December 7617:16 November 7585:16 November 7435:18 December 7310:19 December 7285:19 December 7260:19 December 7009:25 February 6983:25 February 6930:25 February 6830:18 December 6779:18 December 6751:11 December 6600:verizon.com 6507:22 February 6110:17 February 5939:verizon.com 5915:30 November 5851:www.ibm.com 5704:30 November 5614:nordvpn.com 5594:30 November 5566:30 November 5538:30 November 5430:www.cve.org 5014:Attack tree 4995:Willis Ware 4960:Susan Nycum 4920:Paul Kocher 4835:Annie Anton 4769:Morris worm 4762:Markus Hess 4709:Ware Report 4701:Willis Ware 4662:Logic bombs 4613:microkernel 4547:shared keys 4495:cyberattack 4487:attribution 4312:smart cards 4278:Terminology 3811:§ 1030 3801:Legislation 3763:South Korea 3488:regulations 3468:dynamic DNS 3453:or form of 3370:broke into 3286:credit card 3231:Morris worm 3182:data breach 3066:-compliant 3056:HTTP server 2956:electronics 2891:. Unlike a 2795:Automobiles 2706:tele-health 2654:Smartphones 2540:mall kiosks 2516:source code 2512:open source 2495:domain name 2476:credit card 2149:(ACLs) and 2109:correctness 1646:fail secure 1369:tax forms. 1201:discrepancy 1109:which uses 800:exploitable 769:metal locks 726:televisions 722:smartphones 588:File system 484:Hacker News 371:Infostealer 154:Conferences 108:Hackerspace 15911:Categories 15896:Glossaries 15768:E-commerce 15361:Statistics 15304:Algorithms 15101:Middleware 14957:Peripheral 14832:Encryption 14708:Web shells 14648:Ransomware 14596:Hacktivism 14359:Cybercrime 13956:9 February 13918:8 February 13892:4 December 13852:23 January 13826:23 January 13666:16 January 13559:13 October 13534:13 October 13483:31 October 13457:31 October 13436:23 October 13232:ico.org.uk 13107:10 October 12679:4 November 12531:3 December 12388:9 December 11946:3 November 11894:1 November 11864:3 November 11834:3 November 11804:1 November 11774:1 November 11744:1 November 11714:3 November 11684:3 November 11649:1 November 11616:1 November 11391:3 November 11326:3 December 10976:30 October 10943:30 October 10731:1224516855 10620:4 December 10594:4 December 9926:4 November 9893:4 November 9481:3 February 9413:22 January 9381:22 January 9350:22 January 9320:22 January 9290:22 January 9224:22 January 9194:22 January 9164:4 November 8986:8 November 8788:(8): 127. 8691:3 February 7931:CSO Online 7797:: 554–563. 6851:Techopedia 6602:(Report). 6482:7 December 6422:9 February 6391:2014942635 6313:"spoofing" 6296:16 January 6172:7 December 6140:24 October 6084:6 December 6034:6 December 5958:MSSP Alert 5857:6 December 5820:5 December 5796:5 December 5760:5 December 5732:4 December 5679:4 December 5649:4 December 5397:(2): 1–4. 5249:References 4850:Matt Blaze 4795:protection 4679:Since the 4650:key logger 4643:open ports 4618:user space 4600:Honey pots 4527:Encryption 4491:cybercrime 4451:Capability 4392:namespaces 3855:President 3791:cyberspace 3777:Cyber Plan 3507:blockchain 3499:cyberspace 3492:power-grid 3376:Home Depot 3290:debit card 3060:smart card 3013:Windows XP 3009:ransomware 3001:pacemakers 2986:See also: 2907:Government 2873:Nuevo León 2799:See also: 2777:hacktivist 2750:Home Depot 2696:Healthcare 2617:to reduce 2556:power grid 2527:MasterCard 2478:security. 2340:Anti-theft 2181:E language 2113:algorithms 2044:sandboxing 2036:buildings. 1958:See also: 1918:backing up 1868:open ports 1825:to detect 1725:and using 1238:, or on a 1117:, trigger 1097:keyloggers 1055:ransomware 954:keyloggers 921:IP address 896:often use 851:ransomware 761:encryption 598:Networking 578:Interrupts 341:Logic bomb 336:Ransomware 113:Hacktivism 15717:Rendering 15712:Animation 15343:computing 15294:Semantics 14992:Processor 14663:Shellcode 14658:Scareware 14506:Crimeware 14466:Backdoors 14243:1877-0509 14200:216704215 14192:1556-5068 14101:0145-2096 14034:224886794 14026:0020-8183 13769:1934-1547 13388:20 August 13326:9 January 13300:9 January 13212:4 January 13186:1 January 13031:. Wiley. 13012:146145942 13004:0095-327X 12969:2183-2463 12918:2214-6296 12884:: 36–40. 12795:NEI 08-09 12792:Refer to 12722:2340-1117 12348:Infragard 11007:16 August 10698:152277480 10663:1927-0321 10589:0362-4331 10415:The Verge 9520:CiteSeerX 9433:nhtsa.gov 9073:4 January 9062:CNN Money 8604:9 January 8456:CNN Money 8100:8 October 8070:8 October 8044:9 October 7989:8 October 7963:8 October 7937:8 October 7825:CiteSeerX 7733:226767829 7725:2327-4662 7668:1424-8220 6907:0001-0782 6861:9 October 6805:4 January 6641:: 46–52. 6579:2340-1095 6383:2191-6594 6340:8 October 6029:187294508 5884:: 24–31. 5620:3 January 5482:17 August 5369:2071-1050 5280:1558-7215 5000:Moti Yung 4980:Dawn Song 4840:Adam Back 4774:In 1993, 4720:CIA triad 4639:port scan 4632:port scan 4567:Firewalls 4485:, is an 4316:biometric 4304:passwords 4090:licensees 3962:The U.S. 3923:InfraGard 3857:Joe Biden 3834:In 2013, 3824:18 U.S.C. 3805:The 1986 3697:Australia 3574:Microsoft 3519:R. Clarke 3472:fast flux 3236:internet 3011:attacks, 2869:Monterrey 2781:Anonymous 2729:Microsoft 2627:Australia 2611:microchip 2242:Vint Cerf 2167:(MAC) or 2029:biometric 2017:Bluetooth 2009:networks. 1922:insurance 1780:firewalls 1744:forensics 1733:Firewalls 1654:fail-safe 1460:Tampering 1455:Tampering 1427:Biometric 1419:of their 1340:attacks. 1300:accounts. 1103:Scareware 1072:computer. 1019:Carnivore 894:Criminals 882:algorithm 757:passwords 746:elections 459:Blue team 451:(defunct) 445:(defunct) 439:(defunct) 433:(defunct) 421:Anonymous 361:Web shell 211:Crimeware 191:Summercon 139:White hat 129:Black hat 122:Types of 96:Hackathon 57:Phreaking 15876:Category 15704:Graphics 15479:Security 15148:Compiler 15047:Networks 14944:Hardware 14837:Firewall 14742:Defenses 14668:Spamming 14653:Rootkits 14626:Phishing 14586:Exploits 14147:(2015). 14062:Archived 14050:. NATO. 13777:18929482 13724:Archived 13631:Archived 13627:nist.gov 13605:17609542 13509:15 March 13503:Archived 13477:Archived 13379:Archived 13320:Archived 13294:Archived 13268:Archived 13250:Archived 13180:cisa.gov 13160:30 April 13134:24 April 13128:Archived 13076:23 March 12824:16 April 12818:Archived 12745:Archived 12670:Archived 12640:Archived 12609:Archived 12557:Archived 12408:Archived 12352:Archived 12330:Archived 12312:Archived 12277:Archived 12176: at 12056:Archived 11988:Archived 11940:Archived 11918:Archived 11888:Archived 11858:Archived 11828:Archived 11798:Archived 11768:Archived 11738:Archived 11708:Archived 11678:Archived 11643:Archived 11610:Archived 11588:Archived 11570:Archived 11552:Archived 11385:Archived 11367:Archived 11349:Archived 11278:Archived 11255:Archived 11209:Archived 11178:Archived 11156:Archived 11107:Archived 11073:Archived 11042:Archived 11001:Archived 10937:Archived 10910:Archived 10887:Archived 10883:CBS News 10864:Archived 10839:Archived 10815:Archived 10794:Archived 10751:13 March 10454:Archived 10419:Archived 10388:Archived 10362:Archived 10336:Archived 10306:Archived 10302:BBC News 10276:Archived 10272:BBC News 10246:Archived 10215:Archived 10184:Archived 10180:NBC News 10154:Archived 10124:Archived 10095:Archived 10064:Archived 10034:Archived 10003:Archived 9973:Archived 9951:Archived 9917:Archived 9884:Archived 9851:Archived 9778:Archived 9722:Archived 9699:Archived 9672:Archived 9641:Archived 9570:Archived 9566:BBC News 9548:Archived 9404:Archived 9375:Archived 9344:Archived 9314:Archived 9284:Archived 9258:Archived 9218:Archived 9188:Archived 9155:Archived 9134:Archived 9100:Archived 9067:Archived 9040:29 March 9034:Archived 9013:29 March 9007:Archived 8980:Archived 8949:Archived 8918:Archived 8887:Archived 8857:Archived 8835:Archived 8831:CNNMoney 8812:28733949 8744:Archived 8642:Archived 8624:Archived 8598:Aerogram 8571:Archived 8546:19 March 8540:Archived 8518:Archived 8466:16 April 8460:Archived 8371:: 1253. 8300: at 7686:35898079 7608:Archived 7560:20 March 7554:Archived 7530:26 April 7481:Archived 7461:20 March 7455:Archived 7426:Archived 7402:20 March 7396:Archived 7376:20 March 7370:Archived 7132:44585546 6951:Archived 6855:Archived 6725:Archived 6604:Archived 6453:3 August 6447:Archived 6399:27594864 6290:Archived 6260:Archived 6209:16 April 6200:Archived 5755:Fortinet 5508:25 March 5468:"Ghidra" 5435:12 April 5409:Archived 5007:See also 4776:Netscape 4685:academia 4681:Internet 4539:breaking 4504:systems. 4407:AppArmor 4318:systems. 4086:U.S. NRC 3950:networks 3887:Agencies 3745:CERT- In 3639:and the 3597:AT&T 3593:Facebook 3558:AT&T 3407:such as 3368:Rescator 3122:As with 2960:software 2952:embedded 2936:Pentagon 2913:military 2879:Shipping 2668:such as 2584:aviation 2578:Aviation 2366:Firewall 2246:Congress 2153:(RBAC). 1853:firmware 1815:big data 1788:Internet 1758:Response 1746:, while 1617:attacker 1386:phishing 1373:Spoofing 1338:phishing 1286:phishing 1224:Phishing 1197:received 1183:Phishing 1002:Using a 968:and the 880:, or an 874:backdoor 868:Backdoor 847:phishing 779:schema. 710:Internet 699:services 691:software 687:hardware 679:networks 603:Security 455:Red team 311:Backdoor 186:ShmooCon 134:Grey hat 15942:Malware 15886:Outline 14678:Spyware 14621:Payload 14616:Malware 14556:Viruses 14536:Botnets 14443:Threats 14208:3220475 13847:fbi.gov 13801:12 June 13640:19 June 13356:19 June 12886:Bibcode 12857:15 June 12751:15 June 12743:. IDG. 12636:Nextgov 12482:10 July 12453:20 June 12404:"CCIPS" 12283:14 June 12254:14 June 11584:"MAAWG" 11566:"MAAWG" 11528:. FIRST 11506:. FIRST 11347:. TED. 11251:Reuters 11174:Reuters 11048:11 June 11015:Verizon 10747:. iCIMS 10562:1500788 9857:26 June 9828:4732406 9784:26 June 9184:AOL.com 8945:Reuters 8803:5522514 8666:15 June 8567:Reuters 8400:2765010 8377:2996896 7893:6185138 7847:1958270 7751:Tech.co 7677:9331300 7646:Bibcode 7638:Sensors 7350:12 June 6978:F5 Labs 6957:13 July 6196:upc.edu 6130:Trellix 5472:nsa.gov 5295:at the 5168:IT risk 5026:CAPTCHA 4746:ARPANET 4738:Creeper 4714:A 1977 4703:at the 4675:History 4624:Pinging 4571:logging 4535:ciphers 4533:secure 4445:Backups 4403:SELinux 4396:Cgroups 4376:OpenBSD 4372:FreeBSD 4330:malware 4286:Access 4150:Careers 4080:in the 4029:CERT/CC 4021:of the 4015:US-CERT 3554:US-CERT 3511:bitcoin 3451:malware 3306:Stuxnet 3199:remains 3128:vandals 2964:sensors 2893:barcode 2823:airbags 2762:Equifax 2754:Staples 2564:Stuxnet 2398:Sandbox 2171:(DAC). 2111:of the 2033:QR code 1978:dongles 1966:dongles 1872:malware 1667:tracks. 1449:Trellix 1217:webpage 1119:anxiety 1107:malware 1093:Spyware 1089:damage. 1080:without 1069:Viruses 1059:Bitcoin 1051:malware 1045:Malware 1039:TEMPEST 997:malware 995:Unlike 898:malware 862:threats 815:threats 809:exploit 750:finance 730:devices 683:threats 675:systems 443:LulzSec 331:Spyware 306:Rootkit 299:Malware 251:Payload 241:Exploit 171:DEF CON 124:hackers 50:History 14872:(SIEM) 14849:(HIDS) 14733:Zombie 14470:Bombs 14451:Adware 14277:  14258:  14241:  14206:  14198:  14190:  14155:  14133:  14099:  14054:  14032:  14024:  13977:about 13775:  13767:  13692:31 May 13603:  13408:GOV.UK 13043:  13010:  13002:  12967:  12916:  12720:  12710:  12646:23 May 12615:23 May 12589:23 May 12563:23 May 12428:9 July 11532:6 July 11510:6 July 11488:26 May 11412:Quartz 10729:  10719:  10696:  10661:  10587:  10560:  10489:4 July 10091:Forbes 10070:23 May 10040:23 May 10009:23 May 9979:23 May 9847:Forbes 9826:  9728:23 May 9678:5 June 9647:5 June 9522:  8955:23 May 8810:  8800:  8398:  8375:  8169:GOV.UK 8040:. 2014 8038:PcSite 7891:  7881:  7845:  7827:  7731:  7723:  7684:  7674:  7666:  7189:19 May 7155:  7130:  7120:  7084:  7059:  7032:  6905:  6801:. 2024 6577:  6567:  6397:  6389:  6381:  6371:  6331:  6266:20 May 6059:4 July 6027:  6017:  5910:McAfee 5787:  5643:McAfee 5561:GOV.UK 5367:  5278:  4812:Israel 4750:Reaper 4594:hacker 4553:using 4549:, and 4394:, and 4384:chroot 4314:, and 4187:other 4135:. The 4052:, the 4039:(SEI). 3826:  3813:, the 3809:  3674:Canada 3631:Europe 3609:Sprint 3570:McAfee 3356:Google 2966:, and 2934:, and 2807:, and 2779:group 2760:, and 2713:Humana 2625:, and 2554:, the 2502:, and 2410:(SIEM) 2250:Senate 2135:, and 2083:(CC). 2040:IOMMUs 2023:(LE), 1907:PikeOS 1901:, and 1804:kernel 1782:or an 1564:attack 1203:as rec 962:CD-ROM 933:botnet 804:attack 748:, and 712:, and 708:, the 657:(also 497:Phrack 414:Groups 346:Botnet 286:Zone-H 15289:Logic 15130:tools 14718:Worms 14713:Wiper 14631:Voice 14479:Logic 14196:S2CID 14077:(DOC) 14065:(PDF) 14048:(PDF) 14030:S2CID 13773:S2CID 13727:(PDF) 13712:(PDF) 13634:(PDF) 13623:(PDF) 13601:S2CID 13529:ISACA 13382:(PDF) 13375:(PDF) 13274:5 May 13008:S2CID 12673:(PDF) 12666:(PDF) 12082:(PDF) 11019:Obama 10970:(PDF) 10963:(PDF) 10906:Wired 10694:S2CID 10558:S2CID 10527:(PDF) 10457:(PDF) 10444:(PDF) 9920:(PDF) 9913:(PDF) 9887:(PDF) 9876:(PDF) 9824:S2CID 9804:(PDF) 9407:(PDF) 9400:(PDF) 9280:Wired 9261:(PDF) 9254:(PDF) 9158:(PDF) 9151:(PDF) 8717:1 May 8429:(PDF) 8418:(PDF) 8227:Wired 8034:(PDF) 7913:(PDF) 7889:S2CID 7867:(PDF) 7843:S2CID 7813:(PDF) 7791:(PDF) 7729:S2CID 7611:(PDF) 7604:(PDF) 7580:Apple 7429:(PDF) 7422:(PDF) 7218:(PDF) 7211:(PDF) 7183:(PDF) 7176:(PDF) 7128:S2CID 6925:ISACA 6728:(PDF) 6721:(PDF) 6704:(PDF) 6697:(PDF) 6607:(PDF) 6596:(PDF) 6395:S2CID 6240:7 May 6203:(PDF) 6192:(PDF) 6025:S2CID 5727:Kroll 5412:(PDF) 5387:(PDF) 5274:(2). 5211:OWASP 4368:Linux 4296:login 3839:13636 3731:India 3605:Cisco 3601:Apple 3566:Cisco 3562:Apple 3294:check 3095:virus 3058:in a 3037:Pepco 2954:with 2897:FedEx 2853:Tesla 2717:WebMD 2379:(IPS) 2373:(IDS) 2357:(CAD) 2002:time. 1903:SYSGO 1800:Linux 1772:proxy 1762:legal 1652:(see 1600:them. 1240:phone 1193:email 1115:shock 1076:Worms 1008:HTTPS 931:of a 693:, or 681:from 665:, or 321:Virus 89:ethic 15128:and 15001:Form 14997:Size 14484:Time 14474:Fork 14275:ISBN 14256:ISBN 14239:ISSN 14204:SSRN 14188:ISSN 14153:ISBN 14131:ISBN 14097:ISSN 14052:ISBN 14022:ISSN 13958:2021 13920:2021 13894:2023 13854:2024 13828:2024 13803:2024 13765:ISSN 13694:2012 13668:2021 13642:2020 13561:2023 13536:2023 13511:2014 13485:2011 13459:2011 13438:2021 13390:2021 13358:2017 13328:2015 13302:2015 13276:2013 13214:2022 13188:2022 13162:2013 13136:2014 13109:2021 13078:2016 13041:ISBN 13000:ISSN 12965:ISSN 12914:ISSN 12859:2017 12826:2015 12753:2008 12718:ISSN 12708:ISBN 12681:2016 12648:2016 12617:2016 12591:2016 12565:2016 12533:2014 12484:2010 12455:2020 12430:2018 12390:2009 12360:2010 12285:2008 12256:2008 12161:2023 12135:2023 12109:2023 12064:2013 12018:2018 11970:2023 11948:2014 11896:2014 11866:2014 11836:2014 11806:2014 11776:2014 11746:2014 11716:2014 11686:2014 11651:2014 11618:2014 11534:2018 11512:2018 11490:2020 11393:2015 11328:2023 11297:2015 11186:2017 11152:CNET 11050:2014 11009:2013 10978:2011 10945:2011 10918:2011 10823:2009 10753:2021 10727:OCLC 10717:ISBN 10659:ISSN 10622:2023 10596:2023 10585:ISSN 10491:2018 10465:2016 10427:2016 10396:2016 10370:2016 10344:2016 10314:2016 10284:2016 10254:2016 10223:2016 10192:2016 10162:2016 10132:2016 10103:2016 10072:2016 10042:2016 10011:2016 9981:2016 9928:2016 9895:2016 9859:2015 9786:2015 9756:2019 9730:2016 9680:2015 9649:2015 9597:Text 9578:2012 9483:2023 9440:2022 9415:2017 9383:2017 9352:2017 9322:2017 9292:2017 9226:2017 9196:2017 9166:2016 9108:2014 9075:2015 9042:2011 9015:2011 8988:2017 8957:2016 8926:2017 8895:2017 8865:2014 8808:PMID 8719:2023 8693:2023 8668:2017 8606:2024 8579:2021 8548:2020 8468:2015 8437:2023 8396:SSRN 8373:SSRN 8350:2018 8325:2018 8285:2018 8260:2018 8234:2018 8209:2018 8176:2023 8151:2018 8126:2018 8102:2018 8072:2018 8046:2020 8017:2019 7991:2018 7965:2018 7939:2018 7879:ISBN 7758:2023 7721:ISSN 7682:PMID 7664:ISSN 7619:2022 7587:2022 7562:2014 7532:2024 7463:2014 7437:2013 7404:2014 7378:2014 7352:2024 7312:2023 7287:2023 7262:2023 7191:2015 7153:ISBN 7118:ISBN 7082:ISBN 7057:ISBN 7030:ISBN 7011:2020 6985:2020 6959:2016 6932:2023 6903:ISSN 6863:2014 6832:2023 6807:2024 6781:2023 6753:2023 6680:2828 6615:2021 6575:ISSN 6565:ISBN 6509:2023 6484:2023 6455:2014 6424:2023 6387:LCCN 6379:ISSN 6369:ISBN 6342:2017 6329:ISBN 6298:2022 6268:2016 6242:2016 6211:2019 6174:2023 6142:2022 6112:2020 6086:2023 6061:2016 6036:2023 6015:ISBN 5917:2023 5859:2023 5822:2023 5798:2023 5785:ISBN 5762:2023 5734:2023 5706:2023 5681:2023 5651:2023 5622:2024 5596:2023 5568:2023 5540:2023 5510:2021 5484:2020 5437:2023 5365:ISSN 5276:ISSN 4789:The 4716:NIST 4695:The 4577:and 4453:and 4380:Unix 4338:are 4233:GDPR 4129:and 4068:The 3969:The 3955:The 3940:and 3928:The 3891:The 3868:The 3781:The 3738:The 3682:The 3579:The 3509:and 3474:and 3352:NIST 3340:and 3215:and 3003:and 2990:and 2946:The 2926:The 2899:and 2885:RFID 2825:and 2787:was 2727:and 2582:The 2525:and 2523:Visa 2504:VoIP 2489:and 2471:UCLA 2469:The 2464:PINs 2460:ATMs 2279:logs 2248:and 1976:USB 1920:and 1899:seL4 1796:UNIX 1752:logs 1750:and 1631:and 1611:The 1487:HTML 1483:HTML 1397:From 1273:root 1199:and 1021:and 1012:HTTP 759:and 695:data 677:and 356:HIDS 326:Worm 87:and 14489:Zip 14295:doi 14229:doi 14180:doi 14089:doi 14014:doi 13757:doi 13716:doi 13593:doi 13554:RIT 13033:doi 12992:doi 12955:hdl 12945:doi 12904:hdl 12894:doi 12700:doi 12217:NPR 11458:doi 11301:doi 10686:doi 10649:doi 10550:doi 9816:doi 9774:ITU 9668:CNN 9637:NPR 9130:Vox 8883:CNN 8798:PMC 8790:doi 8740:NPR 8536:NPR 7871:doi 7835:doi 7713:doi 7672:PMC 7654:doi 7504:doi 7110:doi 6893:doi 6677:RFC 6667:doi 6643:hdl 6557:doi 6532:doi 6361:doi 6321:doi 6007:doi 5886:doi 5399:doi 5355:hdl 5345:doi 4780:SSL 4742:BBN 4728:IBM 4489:of 4405:or 4300:FTP 3525:in 3348:NSA 3278:TJX 3138:in 3132:KGB 3114:). 3064:DVD 3049:SIM 2932:CIA 2928:FBI 2901:UPS 2725:EDS 2531:EMV 2485:), 2212:or 2156:An 1905:'s 1367:W-2 1359:NBA 1345:FBI 1213:URL 806:or 366:RCE 15913:: 14999:/ 14237:. 14223:. 14219:. 14202:. 14194:. 14186:. 14174:. 14170:. 14129:. 14112:. 14095:. 14085:43 14083:. 14079:. 14060:. 14028:. 14020:. 14010:75 14008:. 13940:. 13928:^ 13911:. 13870:. 13845:. 13819:. 13793:. 13771:. 13763:. 13753:37 13751:. 13747:. 13722:. 13685:. 13659:. 13625:. 13599:. 13589:38 13587:. 13583:. 13569:^ 13552:. 13527:. 13475:. 13424:. 13406:. 13344:. 13230:. 13204:. 13178:. 13095:. 13064:. 13039:. 13006:. 12998:. 12988:42 12986:. 12963:. 12953:. 12939:. 12935:. 12912:. 12902:. 12892:. 12882:49 12880:. 12876:. 12843:. 12816:. 12812:. 12739:. 12716:. 12706:. 12668:. 12638:. 12634:. 12555:. 12549:. 12501:. 12446:. 12376:. 12350:. 12346:. 12328:. 12264:^ 12214:. 12192:. 12152:. 12126:. 12099:. 12050:. 12004:. 11986:. 11934:. 11912:. 11886:. 11882:. 11852:. 11822:. 11796:. 11792:. 11766:. 11762:. 11732:. 11702:. 11672:. 11659:^ 11637:. 11626:^ 11604:. 11586:. 11568:. 11550:. 11480:. 11452:. 11448:. 11429:. 11410:. 11336:^ 11295:. 11276:. 11272:. 11253:. 11249:. 11226:. 11207:. 11203:. 11172:. 11150:. 11127:. 11089:. 11071:. 11067:. 11040:. 11036:. 11011:. 10999:. 10995:. 10908:. 10904:. 10885:. 10881:. 10858:. 10774:^ 10725:. 10692:. 10682:33 10680:. 10657:. 10643:. 10639:. 10612:. 10583:. 10579:. 10556:. 10544:. 10507:. 10482:. 10446:. 10417:. 10413:. 10330:. 10300:. 10270:. 10244:. 10240:. 10213:. 10209:. 10178:. 10152:. 10148:. 10111:^ 10093:. 10089:. 10058:. 10032:. 10028:. 9997:. 9967:. 9949:. 9945:. 9882:. 9878:. 9849:. 9845:. 9822:. 9810:. 9806:. 9776:. 9772:. 9746:. 9720:. 9716:. 9697:. 9670:. 9666:. 9639:. 9635:. 9612:. 9564:. 9542:. 9499:. 9474:. 9456:. 9431:. 9402:. 9373:. 9369:. 9338:. 9308:. 9282:. 9278:. 9212:. 9182:. 9132:. 9128:. 9116:^ 9098:. 9092:. 9065:. 9059:. 8978:. 8974:. 8947:. 8943:. 8916:. 8912:. 8881:. 8851:. 8833:. 8829:. 8806:. 8796:. 8786:41 8784:. 8780:. 8761:. 8738:. 8727:^ 8684:. 8622:. 8596:. 8569:. 8565:. 8534:. 8454:. 8420:. 8394:. 8369:66 8367:. 8341:. 8316:. 8276:. 8250:. 8225:. 8193:. 8167:. 8134:^ 8110:^ 8088:. 8063:. 8036:. 8007:. 7981:. 7955:. 7929:. 7887:. 7877:. 7841:. 7833:. 7821:29 7819:. 7815:. 7793:. 7749:. 7727:. 7719:. 7707:. 7703:. 7680:. 7670:. 7662:. 7652:. 7642:22 7640:. 7636:. 7578:. 7548:. 7498:. 7343:. 7303:. 7278:. 7253:. 7126:. 7116:. 7090:. 7001:. 6976:. 6949:. 6923:. 6901:. 6889:40 6887:. 6883:. 6871:^ 6849:. 6823:. 6797:. 6772:. 6761:^ 6744:. 6723:. 6675:. 6665:. 6639:31 6637:. 6623:^ 6598:. 6573:. 6563:. 6526:. 6500:. 6475:. 6463:^ 6445:. 6441:. 6415:. 6393:. 6385:. 6377:. 6367:. 6327:. 6315:. 6288:. 6284:. 6228:. 6198:. 6194:. 6165:. 6150:^ 6128:. 6103:. 6077:. 6023:, 6013:, 6001:, 5985:^ 5975:. 5956:. 5936:. 5925:^ 5908:. 5882:28 5880:. 5876:. 5849:. 5830:^ 5813:. 5779:, 5753:. 5742:^ 5725:. 5714:^ 5697:. 5672:. 5659:^ 5641:. 5630:^ 5612:. 5587:. 5576:^ 5559:. 5548:^ 5531:. 5518:^ 5501:. 5470:. 5428:. 5407:. 5393:. 5389:. 5363:. 5353:. 5341:13 5339:. 5335:. 5316:. 5272:12 5270:. 5266:. 4648:A 4637:A 4611:A 4592:A 4374:, 4370:, 4332:). 4310:, 4306:, 4262:. 4156:IT 4143:. 3993:. 3925:. 3848:. 3755:. 3727:. 3607:, 3603:, 3599:, 3595:, 3591:, 3572:, 3568:, 3564:, 3560:, 3556:, 3494:. 3470:, 3292:, 3288:, 3180:a 3144:. 3081:. 2962:, 2958:, 2930:, 2903:. 2875:. 2817:, 2803:, 2764:. 2756:, 2752:, 2723:, 2719:, 2660:, 2656:, 2623:UK 2558:, 2466:. 2299:. 2254:EU 2183:. 2131:, 1968:, 1924:. 1859:. 1829:. 1288:. 1234:, 1230:, 1205:ie 1014:. 956:, 952:, 872:A 853:, 849:, 763:, 752:. 744:, 724:, 689:, 673:, 661:, 457:/ 14937:. 14917:e 14910:t 14903:v 14327:e 14320:t 14313:v 14297:: 14283:. 14264:. 14245:. 14231:: 14225:3 14210:. 14182:: 14176:2 14161:. 14139:. 14116:. 14103:. 14091:: 14036:. 14016:: 13960:. 13922:. 13896:. 13856:. 13830:. 13805:. 13779:. 13759:: 13718:: 13696:. 13670:. 13644:. 13607:. 13595:: 13563:. 13538:. 13513:. 13487:. 13461:. 13440:. 13410:. 13392:. 13360:. 13330:. 13304:. 13278:. 13216:. 13190:. 13164:. 13138:. 13111:. 13080:. 13049:. 13035:: 13014:. 12994:: 12971:. 12957:: 12947:: 12941:6 12920:. 12906:: 12896:: 12888:: 12861:. 12828:. 12769:. 12755:. 12724:. 12702:: 12683:. 12650:. 12619:. 12593:. 12567:. 12535:. 12486:. 12457:. 12432:. 12392:. 12362:. 12287:. 12258:. 12220:. 12163:. 12137:. 12111:. 12066:. 12020:. 11972:. 11950:. 11898:. 11868:. 11838:. 11808:. 11778:. 11748:. 11718:. 11688:. 11653:. 11620:. 11536:. 11514:. 11492:. 11466:. 11460:: 11454:6 11433:. 11414:. 11395:. 11330:. 11307:. 11303:: 11188:. 11052:. 10980:. 10947:. 10920:. 10825:. 10755:. 10733:. 10700:. 10688:: 10665:. 10651:: 10645:4 10624:. 10598:. 10564:. 10552:: 10546:5 10511:. 10493:. 10467:. 10429:. 10398:. 10372:. 10346:. 10316:. 10286:. 10256:. 10225:. 10194:. 10164:. 10134:. 10105:. 10074:. 10044:. 10013:. 9983:. 9930:. 9897:. 9861:. 9830:. 9818:: 9812:3 9788:. 9758:. 9732:. 9682:. 9651:. 9599:. 9580:. 9528:. 9503:. 9485:. 9460:. 9442:. 9417:. 9385:. 9354:. 9324:. 9294:. 9228:. 9198:. 9168:. 9110:. 9077:. 9044:. 9017:. 8990:. 8959:. 8928:. 8897:. 8867:. 8814:. 8792:: 8765:. 8721:. 8695:. 8670:. 8608:. 8581:. 8550:. 8470:. 8439:. 8402:. 8379:. 8352:. 8327:. 8287:. 8262:. 8236:. 8211:. 8178:. 8153:. 8128:. 8104:. 8074:. 8048:. 8019:. 7993:. 7967:. 7941:. 7895:. 7873:: 7849:. 7837:: 7775:. 7760:. 7735:. 7715:: 7709:8 7688:. 7656:: 7648:: 7621:. 7589:. 7564:. 7534:. 7512:. 7506:: 7465:. 7439:. 7406:. 7380:. 7354:. 7314:. 7289:. 7264:. 7193:. 7161:. 7134:. 7112:: 7065:. 7038:. 7013:. 6987:. 6961:. 6934:. 6909:. 6895:: 6865:. 6834:. 6809:. 6783:. 6755:. 6682:. 6669:: 6649:. 6645:: 6617:. 6581:. 6559:: 6538:. 6534:: 6511:. 6486:. 6457:. 6426:. 6401:. 6363:: 6344:. 6323:: 6300:. 6270:. 6244:. 6213:. 6176:. 6144:. 6114:. 6088:. 6063:. 6009:: 5979:. 5942:. 5919:. 5894:. 5888:: 5861:. 5824:. 5764:. 5736:. 5708:. 5683:. 5653:. 5624:. 5598:. 5570:. 5542:. 5512:. 5486:. 5439:. 5401:: 5395:6 5371:. 5357:: 5347:: 5320:. 5282:. 4620:. 4497:. 4025:. 3626:. 1209:e 1153:. 635:e 628:t 621:v 527:e 520:t 513:v 20:)

Index

Computer Security
Computer hacking
History
Phreaking
Cryptovirology
Hacking of consumer electronics
List of hackers
Hacker culture
ethic
Hackathon
Hacker Manifesto
Hackerspace
Hacktivism
Maker culture
hackers
Black hat
Grey hat
White hat
Conferences
Black Hat Briefings
Chaos Communication Congress
DEF CON
Hackers on Planet Earth
Security BSides
ShmooCon
Summercon
Computer crime
Crimeware
List of computer criminals
Script kiddie

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.