Open Access

Study Regarding the Cyber Threats to the National Security


Cite

Agrafiotis, A., Nurse, J., Goldsmith, M., Creese, S., & Upton, D. (2018). A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, Vol. 4, Issue 1.10.1093/cybsec/tyy006Search in Google Scholar

Carnegie Endowment for International Peace. (2020). Timeline of Cyber Incidents Involving Financial Institutions. Washington.Search in Google Scholar

Dearden, L. (2017). Ukraine cyber attack: Chaos as national bank, state power provider and airport hit by hackers. The Independent, available at: https://www.independent.co.uk/news/world/europe/ukraine-cyber-attack-hackers-national-bank-state-power-company-airportrozenko-pavlo-cabinet-a7810471.html, accessed on 09 April 2020.Search in Google Scholar

Gandhi, R. et al. (2011). Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political. IEEE Technology and Society Magazine.10.1109/MTS.2011.940293Search in Google Scholar

Gunaratna, R. et al. (2017). Cyber Terrorism: Assessment of the Threat to Insurance. United Kingdom: Cambridge Centre for Risk Studies.Search in Google Scholar

Hopper, T. (2015). Ashley Madison aftermath: Confessions, suicide reports and hot on the hacker’s trail. The National Post, available at: https://nationalpost.com/news/canada/ashley-madison-aftermath-confessions-suicide-reports-and-hot-on-the-hackers-trail, accessed on 09 April 2020.Search in Google Scholar

Maxat, A., Vassilakis, V.G., & Logothetis, M.D. (2019). WannaCry Ransomware: Analysis of Infection, Persistence, Recovery Prevention and Propagation Mechanisms. Journal of Telecommunications and Information Technology, Vol. 1, Issue 1.Search in Google Scholar

McGuire, M. (2012). Organised Crime in the Digital Age. London: John Grieve Centre for Policing and Security.Search in Google Scholar

McQuade, M. (2018). The Untold Story of NotPetya, the Most Devastating Cyberattack in History. The Wired Magazine.Search in Google Scholar

Mills, C. (2017). Nuclear Weapons – Country Comparisons. London: House of Commons Library.Search in Google Scholar

Perez, E. (2016). U.S. official blames Russia for power grid attack in Ukraine. CNN, available at: https://edition.cnn.com/2016/02/11/politics/ukraine-power-grid-attack-russiaus/index.html, accessed on 07 May 2020.Search in Google Scholar

Romanian National Computer Security Incident Response Team. (2018). Threats evolution in the Romanian cyberspace 2018. Bucharest.Search in Google Scholar

Roscini, M. (2014). Cyber Operations and the Use of Force in International Law. Oxford: Oxford University Press.10.1093/acprof:oso/9780199655014.001.0001Search in Google Scholar

Satter, R., Stubbs, J., & Bing, C. (2020). Hackers tried to infiltrate the World Health Organization, the latest in a string of cyberattacks aimed at health officials during the coronavirus pandemic. Reuters, available at: https://www.businessinsider.com/world-healthorganization-hack-tried-steal-passwords-with-fake-website-2020-3?r=US&IR=T, accessed on 12 April 2020.Search in Google Scholar

Trend Micro. (2015). US OPM Hack Exposes Data of 4 Million Federal Employees, available at: https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/us-opm-hackexposes-data-of-4-million-federal-employees, accessed on 09 April 2020.Search in Google Scholar

Whitehead, D. E, Owens, K., Gammel, D., & Smith, J. (2017). Ukraine Cyber-Induced Power Outage: Analysis and Practical Mitigation Strategies. 70th Annual Conference for Protective Relay Engineers, Washington.10.1109/CPRE.2017.8090056Search in Google Scholar

eISSN:
2451-3148
ISSN:
1224-5178
Language:
English