Jump to content

Wikipedia:WikiProject Spam/LinkReports/tier3.xyz

From Wikipedia, the free encyclopedia



Links[edit]

Users[edit]

Additions[edit]

  1. 2015-12-10 11:16:41 (UTC): User Stirmizi t • c • dc • l • ef • b • bl; (13) to Computer security (edit | talk | history | links | watch | logs) (diff  !top) - Link: tier3.xyz/cyber-security-pakistan/ (R/Xmeta/L- removed)
    Other links: tier3.xyz/aboutus/ (13, 25, 9, 1- R/X/L) tier3.xyz/aboutus/ (13, 25, 9, 1- R/X/L) www.nr3c.gov.pk/about_us.html (13, 16, 2, 1- R/X/L) www.nr3c.gov.pk/about_us.html (13, 16, 2, 1- R/X/L) tier3.xyz/cyber-security-pakistan (13, 25, 9, 1- R/X/L) tier3.xyz/cyber-security-pakistan (13, 25, 9, 1- R/X/L) tier3.xyz/cyber-security-pakistan/ (13, 25, 9, 1- R/X/L) tier3.xyz/cyber-security-pakistan/ (13, 25, 9, 1- R/X/L)
  2. 2015-12-23 09:41:56 (UTC): User Stirmizi t • c • dc • l • ef • b • bl; (13) to Tier 3 (edit | talk | history | links | watch | logs) (diff  !top) - Link: tier3.xyz (R/Xmeta/L- removed)
    Other links: tier3.xyz (13, 25, 9, 1- R/X/L) tier3.xyz (13, 25, 9, 1- R/X/L) tier3.xyz (13, 25, 9, 1- R/X/L)
  3. 2016-06-30 10:51:17 (UTC): User Anarchyte t • c • dc • l • ef • b • bl; (6036) to Computer security (edit | talk | history | links | watch | logs) (diff  !top) - Link: tier3.xyz/cyber-security-pakistan/ (R/Xmeta/L- removed)
    Other links: arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars/ (6036, , X, X- R/X/L) www.reuters.com/article/us-cybersecurity-healthcare-fbi-exclusiv-idUSBREA3M1Q920140423 (6036, -1, X, X- R/X/L) www.jsonline.com/business/national/target-40m-accounts-may-be-involved-in-breach648fde78ab7a4e838a2eced0da89b9a5-236530941.html (6036, , X, X- R/X/L) fortune.com/2014/12/19/staples-cards-affected-breach/ (6036, , X, X- R/X/L) money.cnn.com/2014/09/18/technology/security/home-depot-hack/ (6036, , X, X- R/X/L) www.npr.org/blogs/alltechconsidered/2014/08/06/338334508/is-your-watch-or-thermostat-a-spy-cyber-security-firms-are-on-it (6036, , X, X- R/X/L) www.reuters.com/article/2014/08/04/us-cybersecurity-hackers-airplanes-idUSKBN0G40WQ20140804 (6036, -1, X, X- R/X/L) www.npr.org/blogs/alltechconsidered/2014/08/04/337794061/hacker-says-he-can-break-into-airplane-systems-using-in-flight-wi-fi (6036, , X, X- R/X/L) www.securityweek.com/air-traffic-control-systems-vulnerabilities-could-make-unfriendly-skies-black-hat (6036, , X, X- R/X/L) www.securestate.com/blog/2012/02/16/vulnerabilities-in-smart-meters (6036, , X, X- R/X/L) www.securestate.com/blog/2012/02/16/vulnerabilities-in-smart-meters (6036, , X, X- R/X/L) money.cnn.com/2014/11/18/technology/security/energy-grid-hack/ (6036, , X, X- R/X/L) ssrn.com/abstract=2765010 (6036, , X, X- R/X/L) ssrn.com/abstract=2765010 (6036, , X, X- R/X/L) espn.go.com/nba/story/_/id/15615363/milwaukee-bucks-leak-tax-information-players-employees-result-email-scam (6036, , X, X- R/X/L) www.ft.com/intl/cms/s/0/83b4e9be-db16-11e5-a72f-1e7744c66818.html#axzz41pN5YBV4 (6036, , X, X- R/X/L) upcommons.upc.edu/pfc/bitstream/2099.1/12289/1/73827.pdf (6036, , X, X- R/X/L) arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ (6036, , X, X- R/X/L) gadgtecs.com/2016/03/30/wifi-mouse-leave-billions-risk-computer-hack/ (6036, , X, X- R/X/L) www.theaustralian.com.au/technology/opinion/reliance-spells-end-of-road-for-ict-amateurs/story-e6frgb0o-1226636267865?nk=34fe4ab684629535daaf6a8fe6e6ef3d (6036, , X, X- R/X/L) searchsecurity.techtarget.com/definition/social-engineering (6036, , X, X- R/X/L) www.pcmag.com/encyclopedia/term/40169/computer-security (6036, , X, X- R/X/L) ece.uwaterloo.ca/~vganesh/TEACHING/S2014/ECE458/building-secure-systems.pdf (6036, , X, X- R/X/L) www.law.cornell.edu/uscode/text/18/1030#e_2 (6036, , X, X- R/X/L) www.law.cornell.edu/uscode/text/18/1030 (6036, , X, X- R/X/L) www.techopedia.com/definition/5398/spoofing (6036, , X, X- R/X/L) www.dmoz.org/Computers/Security/Policy/ (6036, , X, X- R/X/L) www.webopedia.com/TERM/E/endpoint_security.html (6036, , X, X- R/X/L) www.businessdictionary.com/definition/data-integrity.html (6036, , X, X- R/X/L) medical-dictionary.thefreedictionary.com/confidentiality (6036, , X, X- R/X/L) www.learnquest.com/subcategories.aspx?categoryid=33 (6036, , X, X- R/X/L) msisac.cisecurity.org/resources/videos/free-training.cfm (6036, , X, X- R/X/L) www.dhs.gov/cybersecurity-training-exercises (6036, , X, X- R/X/L) www.dhs.gov/join-dhs-cybersecurity (6036, , X, X- R/X/L) niccs.us-cert.gov/home/students (6036, , X, X- R/X/L) www.cs.gwu.edu/academics/graduate_programs/master/cybersecurity/cybersecurity-jobs (6036, , X, X- R/X/L) www.defenceiq.com/defence-technology/articles/the-cyber-security-industry-and-you/ (6036, , X, X- R/X/L) burning-glass.com/demand-for-cybersecurity-workers-outstripping-supply/ (6036, , X, X- R/X/L) www.networkworld.com/article/3045801/security/cybersecurity-skills-shortage-impact-on-cloud-computing.html (6036, , X, X- R/X/L) www.burning-glass.com/research/cybersecurity/ (6036, , X, X- R/X/L) www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race (6036, , X, X- R/X/L) blogs.wsj.com/korearealtime/2013/09/23/seoul-puts-a-price-on-cyberdefense/ (6036, -1, X, X- R/X/L) tier3.xyz/aboutus/ (6036, 25, X, X- R/X/L) www.nr3c.gov.pk/about_us.html (6036, 16, X, X- R/X/L) tier3.xyz/cyber-security-pakistan/ (6036, 25, X, X- R/X/L) www.getcybersafe.gc.ca/index-eng.aspx (6036, 18, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (6036, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (6036, 715, X, X- R/X/L) www.marketwired.com/press-release/government-canada-launches-cyber-security-awareness-month-with-new-public-awareness-1706660.htm (6036, 4692, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/rprt-eng.aspx (6036, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/index-eng.aspx (6036, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/ccirc-ccric-eng.aspx (6036, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (6036, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-ncdnt-frmwrk/index-eng.aspx#_Toc360619104 (6036, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (6036, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/index-eng.aspx (6036, 715, X, X- R/X/L) www.marketwired.com/press-release/government-of-canada-launches-canadas-cyber-security-strategy-1328661.htm (6036, 4692, X, X- R/X/L) www.maawg.org/about/roster (6036, , X, X- R/X/L) www.maawg.org/about_maawg (6036, , X, X- R/X/L) www.coe.int/t/DGHL/cooperation/economiccrime/cybercrime/default_en.asp (6036, , X, X- R/X/L) www.first.org/members/teams/index.html (6036, , X, X- R/X/L) www.first.org/about/mission/mission.html (6036, , X, X- R/X/L) www.computerworld.com/securitytopics/security/story/0,10801,89488,00.html (6036, , X, X- R/X/L) www.fas.org/sgp/crs/homesec/IN10296.pdf (6036, , X, X- R/X/L) www.fas.org/sgp/crs/homesec/IN10296.pdf (6036, , X, X- R/X/L) www.nextgov.com/cybersecurity/2016/03/faa-has-started-shaping-cybersecurity-regulations/126449/ (6036, , X, X- R/X/L) www.gao.gov/products/GAO-15-370 (6036, , X, X- R/X/L) www.nhtsa.gov/Research/Crash+Avoidance/Automotive+Cybersecurity (6036, , X, X- R/X/L) www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm356423.htm (6036, , X, X- R/X/L) www.fcc.gov/pshs/emergency-information/cybersecurity.html (6036, , X, X- R/X/L) www.brookings.edu (6036, , X, X- R/X/L) www.brookings.edu/opinions/2010/0923_military_internet_shachtman.aspx (6036, , X, X- R/X/L) www.defense.gov/speeches/speech.aspx?speechid=1399 (6036, , X, X- R/X/L) www.stratcom.mil/factsheets/Cyber_Command/ (6036, , X, X- R/X/L) www.cybercrime.gov (6036, , X, X- R/X/L) www.infragard.net/media/files/dir_med.mov (6036, , X, X- R/X/L) www.infragard.net (6036, , X, X- R/X/L) www.ic3.gov/default.aspx (6036, , X, X- R/X/L) www.fbi.gov/about-us/quick-facts (6036, , X, X- R/X/L) www.cyber.st.dhs.gov/faq.html (6036, , X, X- R/X/L) www.dhs.gov/xabout/structure/editorial_0839.shtm (6036, , X, X- R/X/L) web.archive.org/web/20120120040012/http://hsgac.senate.gov/public/index.cfm?FuseAction=Files.View&FileStore_id=4ee63497-ca5b-4a4b-9bba-04b7f4cb0123 (6036, -1, X, X- R/X/L) hsgac.senate.gov/public/index.cfm?FuseAction=Files.View&FileStore_id=4ee63497-ca5b-4a4b-9bba-04b7f4cb0123 (6036, , X, X- R/X/L) www.opencongress.org/bill/111-h4962/text (6036, , X, X- R/X/L) articles.sfgate.com/2005-02-17/business/17361991_1_rsa-security-conference-cybersecurity-counterpane-internet-security (6036, , X, X- R/X/L) www.gao.gov/highrisk/protecting_the_federal_government_information_systems/why_did_study (6036, , X, X- R/X/L) www.youtube.com/watch?v=0TMFRO66Wv4 (6036, -1, X, X- R/X/L) www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net.html (6036, , X, X- R/X/L) www.sciencedirect.com/science/article/pii/S1353485815300805 (6036, , X, X- R/X/L) www.cnet.com/news/53-million-emails-stolen-in-home-depot-breach/ (6036, , X, X- R/X/L) www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data (6036, , X, X- R/X/L) www.freesnowden.is/fr/2014/01/27/video-ard-interview-with-edward-snowden/ (6036, , X, X- R/X/L) mashable.com/2013/10/30/nsa-google-yahoo-data-centers/ (6036, -1, X, X- R/X/L) spectrum.ieee.org/telecom/security/can-you-trust-nist (6036, , X, X- R/X/L) www.crows.org/images/stories/pdf/IOI/IO%20Journal_Vol2Iss2_0210.pdf (6036, , X, X- R/X/L) www.stripes.com/news/cone-of-silence-surrounds-u-s-cyberwarfare-1.158090 (6036, , X, X- R/X/L) www.wired.com/threatlevel/2011/02/cyberwar-issues-likely-to-be-addressed-only-after-a-catastrophe (6036, , X, X- R/X/L) www.cbsnews.com/8301-501465_162-20017507-501465.html (6036, , X, X- R/X/L) www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11 (6036, , X, X- R/X/L) www.myfoxtwincities.com/myfox/pages/Home/Detail?contentId=2804836&version=3&locale=EN-US&layoutCode=TSTY&pageId=1.1.1 (6036, , X, X- R/X/L) www.businesswire.com/news/tjx/20070117005971/en (6036, , X, X- R/X/L) fas.org/irp/gao/aim96084.htm (6036, , X, X- R/X/L) vita-technologies.com/articles/board-bored-lockheed-martin-co/ (6036, , X, X- R/X/L) www.darkreading.com/applications/secure-os-gets-highest-nsa-rating-goes-c/212100421 (6036, , X, X- R/X/L) video.foxbusiness.com/v/2804966490001/forget-ids-use-your-phone-as-credentials/?playlist_id=937116503001#sp=show-clips (6036, , X, X- R/X/L) www.networkworld.com/news/tech/2010/110810-network-vulnerabilities.html (6036, , X, X- R/X/L) www.pcmag.com/article2/0,2817,2342798,00.asp (6036, , X, X- R/X/L) www.scmagazine.com/safenet-protectdrive-84/review/2596/ (6036, , X, X- R/X/L) www.intel.com/content/dam/www/public/us/en/documents/white-papers/trusted-execution-technology-security-paper.pdf (6036, , X, X- R/X/L) www.thewindowsclub.com/lock-protect-your-windows-pc-using-a-usb-drive-with-predator (6036, , X, X- R/X/L) www.safenet-inc.com/multi-factor-authentication/authenticators/pki-usb-authentication/etoken-5200-token-based-authentication/ (6036, , X, X- R/X/L) www.e-spincorp.com/espinv3/index.php/solutions/3-solutions/174-sentinel-hasp-hl (6036, , X, X- R/X/L) www.cs.columbia.edu/~waksman/PDFs/Oakland_2010.pdf (6036, , X, X- R/X/L) www.scientificamerican.com/article/the-hacker-in-your-hardware/ (6036, -1, X, X- R/X/L) www.techopedia.com/definition/72/security-architecture (6036, , X, X- R/X/L) www.opensecurityarchitecture.org/cms/definitions/it-security-architecture (6036, , X, X- R/X/L) www.academia.edu/6495360/Assessing_the_Role_of_Conceptual_Knowledge_in_an_Anti-Phishing_Educational_Game (6036, , X, X- R/X/L) www.academia.edu/2390447/Designing_a_Mobile_Game_to_Teach_Conceptual_Knowledge_of_Avoiding_Phishing_Attacks (6036, , X, X- R/X/L) www.ganssle.com/rants/gettingitright.htm (6036, , X, X- R/X/L) www-wjp.cs.uni-saarland.de/publikationen/Ba10EW.pdf (6036, , X, X- R/X/L) sel4.systems/Docs/seL4-spec.pdf (6036, , X, X- R/X/L) portal.acm.org/citation.cfm?id=800667 (6036, , X, X- R/X/L) www.reuters.com/article/2010/10/18/us-crime-fraud-idUSTRE69H25820101018 (6036, -1, X, X- R/X/L) www.infosectoday.com/Articles/Glossary.pdf (6036, , X, X- R/X/L) www.cnss.gov/Assets/pdf/cnssi_4009.pdf (6036, , X, X- R/X/L) www.thedailybeast.com/articles/2014/11/17/how-your-pacemaker-will-get-hacked.html (6036, , X, X- R/X/L) www.computerworld.com/article/2492453/malware-vulnerabilities/pacemaker-hack-can-deliver-deadly-830-volt-jolt.html (6036, , X, X- R/X/L) www.darkreading.com/vulnerabilities---threats/hospital-medical-devices-used-as-weapons-in-cyberattacks/d/d-id/1320751 (6036, , X, X- R/X/L) arstechnica.com/security/2012/11/hotel-room-burglars-exploit-critical-flaw-in-electronic-door-locks/ (6036, , X, X- R/X/L) blogs.hbr.org/2013/06/rethinking-security-for-the-in (6036, , X, X- R/X/L) www.internet-of-things-research.eu/pdf/Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdf (6036, , X, X- R/X/L) www.internet-of-things-research.eu/pdf/Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdf (6036, , X, X- R/X/L) hbr.org/resources/pdfs/comm/verizon/18980_HBR_Verizon_IoT_Nov_14.pdf (6036, , X, X- R/X/L) hbr.org/resources/pdfs/comm/verizon/18980_HBR_Verizon_IoT_Nov_14.pdf (6036, , X, X- R/X/L) www.forbes.com/sites/chrisclearfield/2013/09/18/why-the-ftc-cant-regulate-the-internet-of-things/ (6036, -1, X, X- R/X/L) ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7165580 (6036, -1, X, X- R/X/L) www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx (6036, , X, X- R/X/L) www.edweek.org/ew/articles/2015/10/21/lessons-learned-from-security-breaches.html (6036, , X, X- R/X/L) arstechnica.com/security/2015/06/encryption-would-not-have-helped-at-opm-says-dhs-official/ (6036, , X, X- R/X/L) www.cnn.com/2015/06/04/politics/federal-agency-hacked-personnel-management/ (6036, , X, X- R/X/L) www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-employees-records-at-risk (6036, , X, X- R/X/L) www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html (6036, -1, X, X- R/X/L) www.publications.parliament.uk/pa/ld200708/ldjudgmt/jd080730/mckinn-1.htm (6036, , X, X- R/X/L) www.bbc.co.uk/news/uk-19506090 (6036, , X, X- R/X/L) www.telegraph.co.uk/news/worldnews/northamerica/usa/4320901/Gary-McKinnon-profile-Autistic-hacker-who-started-writing-computer-programs-at-14.html (6036, -1, X, X- R/X/L) www.webcitation.org/6GNY6Rgfk (6036, -1, X, X- R/X/L) rt.com/usa/anonymous-barrettbrown-sopa-megaupload-241/ (6036, , X, X- R/X/L) www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf (6036, , X, X- R/X/L) www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf (6036, , X, X- R/X/L) www.autosec.org/pubs/cars-usenixsec2011.pdf (6036, , X, X- R/X/L) www.autosec.org/pubs/cars-usenixsec2011.pdf (6036, , X, X- R/X/L) www.vox.com/2015/1/18/7629603/car-hacking-dangers (6036, , X, X- R/X/L) www.businessinsider.com/the-sony-hackers-still-have-a-massive-amount-of-data-that-hasnt-been-leaked-yet-2014-12 (6036, , X, X- R/X/L) money.cnn.com/2014/12/24/technology/security/sony-hack-facts/ (6036, , X, X- R/X/L) arstechnica.com/tech-policy/news/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price.ars/ (6036, , X, X- R/X/L)

    User is in a trusted group sysop on some wikis
  4. 2017-02-01 19:55:36 (UTC): User Excirial t • c • dc • l • ef • b • bl; (53626) to Computer security (edit | talk | history | links | watch | logs) (diff  !top) - Link: tier3.xyz/cyber-security-pakistan/ (R/Xmeta/L- removed)
    Other links: www.reuters.com/article/us-cybersecurity-healthcare-fbi-exclusiv-idUSBREA3M1Q920140423 (53626, -1, X, X- R/X/L) www.jsonline.com/business/national/target-40m-accounts-may-be-involved-in-breach648fde78ab7a4e838a2eced0da89b9a5-236530941.html (53626, , X, X- R/X/L) fortune.com/2014/12/19/staples-cards-affected-breach/ (53626, , X, X- R/X/L) money.cnn.com/2014/09/18/technology/security/home-depot-hack/ (53626, , X, X- R/X/L) www.npr.org/blogs/alltechconsidered/2014/08/06/338334508/is-your-watch-or-thermostat-a-spy-cyber-security-firms-are-on-it (53626, , X, X- R/X/L) www.faa.gov/nextgen/programs/datacomm/general/ (53626, , X, X- R/X/L) www.eurocontrol.int/news/centralised-services-newpens-moves-forward (53626, , X, X- R/X/L) www.eurocontrol.int/articles/pan-european-network-services-pens (53626, , X, X- R/X/L) www.reuters.com/article/2014/08/04/us-cybersecurity-hackers-airplanes-idUSKBN0G40WQ20140804 (53626, -1, X, X- R/X/L) www.npr.org/blogs/alltechconsidered/2014/08/04/337794061/hacker-says-he-can-break-into-airplane-systems-using-in-flight-wi-fi (53626, , X, X- R/X/L) www.securityweek.com/air-traffic-control-systems-vulnerabilities-could-make-unfriendly-skies-black-hat (53626, , X, X- R/X/L) www.securestate.com/blog/2012/02/16/vulnerabilities-in-smart-meters (53626, , X, X- R/X/L) money.cnn.com/2014/11/18/technology/security/energy-grid-hack/ (53626, , X, X- R/X/L) ssrn.com/abstract=2765010 (53626, , X, X- R/X/L) ssrn.com/abstract=2765010 (53626, , X, X- R/X/L) espn.go.com/nba/story/_/id/15615363/milwaukee-bucks-leak-tax-information-players-employees-result-email-scam (53626, , X, X- R/X/L) www.ft.com/intl/cms/s/0/83b4e9be-db16-11e5-a72f-1e7744c66818.html#axzz41pN5YBV4 (53626, , X, X- R/X/L) upcommons.upc.edu/pfc/bitstream/2099.1/12289/1/73827.pdf (53626, , X, X- R/X/L) www.case.edu/its/kba/its-kba-27196-phishing-attempt/ (53626, , X, X- R/X/L) arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ (53626, , X, X- R/X/L) www.techopedia.com/definition/5398/spoofing (53626, , X, X- R/X/L) gadgtecs.com/2016/03/30/wifi-mouse-leave-billions-risk-computer-hack/ (53626, , X, X- R/X/L) www.csa.gov.sg/gosafeonline/go-safe-for-business/smes/distributed-denial-of-service-attack (53626, , X, X- R/X/L) www.researchgate.net/profile/Nikola_Zlatanov3/publication/298807979_Computer_Security_and_Mobile_Security_Challenges/links/56ec6ff908aea35d5b98255e.pdf (53626, , X, X- R/X/L) www.theaustralian.com.au/technology/opinion/reliance-spells-end-of-road-for-ict-amateurs/story-e6frgb0o-1226636267865?nk=34fe4ab684629535daaf6a8fe6e6ef3d (53626, , X, X- R/X/L) searchsecurity.techtarget.com/definition/social-engineering (53626, , X, X- R/X/L) www.pcmag.com/encyclopedia/term/40169/computer-security (53626, , X, X- R/X/L) ece.uwaterloo.ca/~vganesh/TEACHING/S2014/ECE458/building-secure-systems.pdf (53626, , X, X- R/X/L) www.law.cornell.edu/uscode/text/18/1030#e_2 (53626, , X, X- R/X/L) www.law.cornell.edu/uscode/text/18/1030 (53626, , X, X- R/X/L) www.dmoz.org/Computers/Security/Policy/ (53626, , X, X- R/X/L) www.webopedia.com/TERM/E/endpoint_security.html (53626, , X, X- R/X/L) www.businessdictionary.com/definition/data-integrity.html (53626, , X, X- R/X/L) medical-dictionary.thefreedictionary.com/confidentiality (53626, , X, X- R/X/L) www.learnquest.com/subcategories.aspx?categoryid=33 (53626, , X, X- R/X/L) msisac.cisecurity.org/resources/videos/free-training.cfm (53626, , X, X- R/X/L) www.dhs.gov/cybersecurity-training-exercises (53626, , X, X- R/X/L) www.dhs.gov/join-dhs-cybersecurity (53626, , X, X- R/X/L) niccs.us-cert.gov/home/students (53626, , X, X- R/X/L) www.cs.gwu.edu/academics/graduate_programs/master/cybersecurity/cybersecurity-jobs (53626, , X, X- R/X/L) www.defenceiq.com/defence-technology/articles/the-cyber-security-industry-and-you/ (53626, , X, X- R/X/L) burning-glass.com/demand-for-cybersecurity-workers-outstripping-supply/ (53626, , X, X- R/X/L) www.networkworld.com/article/3045801/security/cybersecurity-skills-shortage-impact-on-cloud-computing.html (53626, , X, X- R/X/L) www.burning-glass.com/research/cybersecurity/ (53626, , X, X- R/X/L) www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race (53626, , X, X- R/X/L) blogs.wsj.com/korearealtime/2013/09/23/seoul-puts-a-price-on-cyberdefense/ (53626, -1, X, X- R/X/L) tier3.xyz/aboutus/ (53626, 25, X, X- R/X/L) www.nr3c.gov.pk/about_us.html (53626, 16, X, X- R/X/L) tier3.xyz/cyber-security-pakistan/ (53626, 25, X, X- R/X/L) www.getcybersafe.gc.ca/index-eng.aspx (53626, 18, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (53626, 715, X, X- R/X/L) www.marketwired.com/press-release/government-canada-launches-cyber-security-awareness-month-with-new-public-awareness-1706660.htm (53626, 4692, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/rprt-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/index-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/ccirc-ccric-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-ncdnt-frmwrk/index-eng.aspx#_Toc360619104 (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/index-eng.aspx (53626, 715, X, X- R/X/L) www.marketwired.com/press-release/government-of-canada-launches-canadas-cyber-security-strategy-1328661.htm (53626, 4692, X, X- R/X/L) www.maawg.org/about/roster (53626, , X, X- R/X/L) www.maawg.org/about_maawg (53626, , X, X- R/X/L) www.coe.int/t/DGHL/cooperation/economiccrime/cybercrime/default_en.asp (53626, , X, X- R/X/L) www.first.org/members/teams/index.html (53626, , X, X- R/X/L) www.first.org/about/mission/mission.html (53626, , X, X- R/X/L) www.computerworld.com/securitytopics/security/story/0,10801,89488,00.html (53626, , X, X- R/X/L) www.fas.org/sgp/crs/homesec/IN10296.pdf (53626, , X, X- R/X/L) www.nextgov.com/cybersecurity/2016/03/faa-has-started-shaping-cybersecurity-regulations/126449/ (53626, , X, X- R/X/L) www.gao.gov/products/GAO-15-370 (53626, , X, X- R/X/L) www.nhtsa.gov/Research/Crash+Avoidance/Automotive+Cybersecurity (53626, , X, X- R/X/L) www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm356423.htm (53626, , X, X- R/X/L) www.fcc.gov/pshs/emergency-information/cybersecurity.html (53626, , X, X- R/X/L) www.brookings.edu (53626, , X, X- R/X/L) www.brookings.edu/opinions/2010/0923_military_internet_shachtman.aspx (53626, , X, X- R/X/L) www.defense.gov/speeches/speech.aspx?speechid=1399 (53626, , X, X- R/X/L) www.stratcom.mil/factsheets/Cyber_Command/ (53626, , X, X- R/X/L) www.cybercrime.gov (53626, , X, X- R/X/L) www.infragard.net/media/files/dir_med.mov (53626, , X, X- R/X/L) www.infragard.net (53626, , X, X- R/X/L) www.ic3.gov/default.aspx (53626, , X, X- R/X/L) www.fbi.gov/about-us/quick-facts (53626, , X, X- R/X/L) www.cyber.st.dhs.gov/faq.html (53626, , X, X- R/X/L) www.dhs.gov/xabout/structure/editorial_0839.shtm (53626, , X, X- R/X/L) web.archive.org/web/20080611210347/https://www.dhs.gov/xabout/structure/editorial_0839.shtm (53626, -1, X, X- R/X/L) web.archive.org/web/20120120040012/http://hsgac.senate.gov/public/index.cfm?FuseAction=Files.View&FileStore_id=4ee63497-ca5b-4a4b-9bba-04b7f4cb0123 (53626, -1, X, X- R/X/L) hsgac.senate.gov/public/index.cfm?FuseAction=Files.View&FileStore_id=4ee63497-ca5b-4a4b-9bba-04b7f4cb0123 (53626, , X, X- R/X/L) www.opencongress.org/bill/111-h4962/text (53626, , X, X- R/X/L) articles.sfgate.com/2005-02-17/business/17361991_1_rsa-security-conference-cybersecurity-counterpane-internet-security (53626, , X, X- R/X/L) www.gao.gov/highrisk/protecting_the_federal_government_information_systems/why_did_study (53626, , X, X- R/X/L) www.youtube.com/watch?v=0TMFRO66Wv4 (53626, -1, X, X- R/X/L) www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net.html (53626, , X, X- R/X/L) www.sciencedirect.com/science/article/pii/S1353485815300805 (53626, , X, X- R/X/L) www.cnet.com/news/53-million-emails-stolen-in-home-depot-breach/ (53626, , X, X- R/X/L) www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data (53626, , X, X- R/X/L) www.freesnowden.is/fr/2014/01/27/video-ard-interview-with-edward-snowden/ (53626, , X, X- R/X/L) mashable.com/2013/10/30/nsa-google-yahoo-data-centers/ (53626, -1, X, X- R/X/L) spectrum.ieee.org/telecom/security/can-you-trust-nist (53626, , X, X- R/X/L) www.crows.org/images/stories/pdf/IOI/IO%20Journal_Vol2Iss2_0210.pdf (53626, , X, X- R/X/L) www.stripes.com/news/cone-of-silence-surrounds-u-s-cyberwarfare-1.158090 (53626, , X, X- R/X/L) www.wired.com/threatlevel/2011/02/cyberwar-issues-likely-to-be-addressed-only-after-a-catastrophe (53626, , X, X- R/X/L) www.cbsnews.com/8301-501465_162-20017507-501465.html (53626, , X, X- R/X/L) www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11 (53626, , X, X- R/X/L) www.myfoxtwincities.com/myfox/pages/Home/Detail?contentId=2804836&version=3&locale=EN-US&layoutCode=TSTY&pageId=1.1.1 (53626, , X, X- R/X/L) www.businesswire.com/news/tjx/20070117005971/en (53626, , X, X- R/X/L) fas.org/irp/gao/aim96084.htm (53626, , X, X- R/X/L) vita-technologies.com/articles/board-bored-lockheed-martin-co/ (53626, , X, X- R/X/L) www.darkreading.com/applications/secure-os-gets-highest-nsa-rating-goes-c/212100421 (53626, , X, X- R/X/L) video.foxbusiness.com/v/2804966490001/forget-ids-use-your-phone-as-credentials/?playlist_id=937116503001#sp=show-clips (53626, , X, X- R/X/L) www.networkworld.com/news/tech/2010/110810-network-vulnerabilities.html (53626, , X, X- R/X/L) www.pcmag.com/article2/0,2817,2342798,00.asp (53626, , X, X- R/X/L) www.scmagazine.com/safenet-protectdrive-84/review/2596/ (53626, , X, X- R/X/L) www.intel.com/content/dam/www/public/us/en/documents/white-papers/trusted-execution-technology-security-paper.pdf (53626, , X, X- R/X/L) www.thewindowsclub.com/lock-protect-your-windows-pc-using-a-usb-drive-with-predator (53626, , X, X- R/X/L) www.safenet-inc.com/multi-factor-authentication/authenticators/pki-usb-authentication/etoken-5200-token-based-authentication/ (53626, , X, X- R/X/L) www.e-spincorp.com/espinv3/index.php/solutions/3-solutions/174-sentinel-hasp-hl (53626, , X, X- R/X/L) www.cs.columbia.edu/~waksman/PDFs/Oakland_2010.pdf (53626, , X, X- R/X/L) www.scientificamerican.com/article/the-hacker-in-your-hardware/ (53626, -1, X, X- R/X/L) www.academia.edu/6495360/Assessing_the_Role_of_Conceptual_Knowledge_in_an_Anti-Phishing_Educational_Game (53626, , X, X- R/X/L) www.academia.edu/2390447/Designing_a_Mobile_Game_to_Teach_Conceptual_Knowledge_of_Avoiding_Phishing_Attacks (53626, , X, X- R/X/L) www.ganssle.com/rants/gettingitright.htm (53626, , X, X- R/X/L) www-wjp.cs.uni-saarland.de/publikationen/Ba10EW.pdf (53626, , X, X- R/X/L) sel4.systems/Docs/seL4-spec.pdf (53626, , X, X- R/X/L) portal.acm.org/citation.cfm?id=800667 (53626, , X, X- R/X/L) www.codenomicon.com/solutions/unknown-vulnerability-management/ (53626, , X, X- R/X/L) www.reuters.com/article/2010/10/18/us-crime-fraud-idUSTRE69H25820101018 (53626, -1, X, X- R/X/L) www.datanami.com/2016/05/09/oni-may-best-hope-cyber-security-now/ (53626, , X, X- R/X/L) www.cloudera.com/solutions/cybersecurity.html (53626, , X, X- R/X/L) www.techopedia.com/definition/72/security-architecture (53626, , X, X- R/X/L) www.opensecurityarchitecture.org/cms/definitions/it-security-architecture (53626, , X, X- R/X/L) www.infosectoday.com/Articles/Glossary.pdf (53626, , X, X- R/X/L) www.cnss.gov/Assets/pdf/cnssi_4009.pdf (53626, , X, X- R/X/L) www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM482022.pdf (53626, , X, X- R/X/L) www.theverge.com/2016/12/27/14095166/fda-guidance-medical-device-cybersecurity-cyberattack-hacking-guidelines (53626, , X, X- R/X/L) www.healthcareitnews.com/news/texas-hospital-hacked-affects-nearly-30000-patient-records (53626, , X, X- R/X/L) boston.cbslocal.com/2016/12/27/former-patient-accused-data-breech-new-hampshire-psychiatric-hospital/ (53626, , X, X- R/X/L) www.rt.com/usa/371979-nh-hospital-data-breach/ (53626, , X, X- R/X/L) indianexpress.com/article/technology/tech-news-technology/legion-hacking-no-political-agenda-just-computer-geeks-says-hacker-4423167/ (53626, , X, X- R/X/L) www.bbc.com/news/uk-england-humber-37822084 (53626, -1, X, X- R/X/L) www.bbc.com/news/uk-england-humber-37849746 (53626, -1, X, X- R/X/L) www.grimsbytelegraph.co.uk/grimsby-hospital-computer-hack-no-ransom-has-been-demanded/story-29856124-detail/story.html (53626, , X, X- R/X/L) www.theregister.co.uk/2016/01/19/melbourne_hospital_pathology_wing_splattered_by_virus/ (53626, , X, X- R/X/L) www.theregister.co.uk/2016/06/28/medjack/ (53626, , X, X- R/X/L) www.nbcnews.com/news/us-news/medstar-hospitals-recovering-after-ransomware-hack-n548121 (53626, , X, X- R/X/L) www.businessinsider.com/hospital-ransomware-hack-2016-5 (53626, , X, X- R/X/L) www.wiwo.de/technologie/digitale-welt/cyber-angriffe-krankenhaeuser-ruecken-ins-visier-der-hacker/14946040.html (53626, , X, X- R/X/L) www.forbes.com/sites/kalevleetaru/2016/03/29/hacking-hospitals-and-holding-hostages-cybersecurity-in-2016/ (53626, -1, X, X- R/X/L) www.thedailybeast.com/articles/2014/11/17/how-your-pacemaker-will-get-hacked.html (53626, , X, X- R/X/L) www.computerworld.com/article/2492453/malware-vulnerabilities/pacemaker-hack-can-deliver-deadly-830-volt-jolt.html (53626, , X, X- R/X/L) www.darkreading.com/vulnerabilities---threats/hospital-medical-devices-used-as-weapons-in-cyberattacks/d/d-id/1320751 (53626, , X, X- R/X/L) arstechnica.com/security/2012/11/hotel-room-burglars-exploit-critical-flaw-in-electronic-door-locks/ (53626, , X, X- R/X/L) blogs.hbr.org/2013/06/rethinking-security-for-the-in (53626, , X, X- R/X/L) www.internet-of-things-research.eu/pdf/Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdf (53626, , X, X- R/X/L) hbr.org/resources/pdfs/comm/verizon/18980_HBR_Verizon_IoT_Nov_14.pdf (53626, , X, X- R/X/L) www.forbes.com/sites/chrisclearfield/2013/09/18/why-the-ftc-cant-regulate-the-internet-of-things/ (53626, -1, X, X- R/X/L) ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7165580 (53626, -1, X, X- R/X/L) www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx (53626, , X, X- R/X/L) www.edweek.org/ew/articles/2015/10/21/lessons-learned-from-security-breaches.html (53626, , X, X- R/X/L) arstechnica.com/security/2015/06/encryption-would-not-have-helped-at-opm-says-dhs-official/ (53626, , X, X- R/X/L) www.cnn.com/2015/06/04/politics/federal-agency-hacked-personnel-management/ (53626, , X, X- R/X/L) www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-employees-records-at-risk (53626, , X, X- R/X/L) www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html (53626, -1, X, X- R/X/L) www.publications.parliament.uk/pa/ld200708/ldjudgmt/jd080730/mckinn-1.htm (53626, , X, X- R/X/L) www.bbc.co.uk/news/uk-19506090 (53626, , X, X- R/X/L) www.telegraph.co.uk/news/worldnews/northamerica/usa/4320901/Gary-McKinnon-profile-Autistic-hacker-who-started-writing-computer-programs-at-14.html (53626, -1, X, X- R/X/L) www.webcitation.org/6GNY6Rgfk?url=http://rt.com/usa/anonymous-barrettbrown-sopa-megaupload-241/ (53626, -1, X, X- R/X/L) rt.com/usa/anonymous-barrettbrown-sopa-megaupload-241/ (53626, , X, X- R/X/L) www.telegraph.co.uk/technology/2016/09/21/tesla-fixes-software-bug-that-allowed-chinese-hackers-to-control/ (53626, -1, X, X- R/X/L) www.theguardian.com/technology/2015/dec/23/the-problem-with-self-driving-cars-who-controls-the-code (53626, -1, X, X- R/X/L) www.aol.com/article/news/2016/12/26/expert-warns-major-event-will-need-to-happen-for-cybersecurity/21632630/ (53626, , X, X- R/X/L) www.nytimes.com/2016/09/20/technology/self-driving-cars-guidelines.html?_r=0 (53626, -1, X, X- R/X/L) www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf (53626, , X, X- R/X/L) www.independent.co.uk/news/science/hackers-remotely-carjack-jeep-from-10-miles-away-and-drive-it-into-ditch-10406554.html (53626, , X, X- R/X/L) www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ (53626, , X, X- R/X/L) www.autosec.org/pubs/cars-usenixsec2011.pdf (53626, , X, X- R/X/L) www.vox.com/2015/1/18/7629603/car-hacking-dangers (53626, , X, X- R/X/L) www.businessinsider.com/the-sony-hackers-still-have-a-massive-amount-of-data-that-hasnt-been-leaked-yet-2014-12 (53626, , X, X- R/X/L) money.cnn.com/2014/12/24/technology/security/sony-hack-facts/ (53626, , X, X- R/X/L) arstechnica.com/tech-policy/news/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price.ars/ (53626, , X, X- R/X/L) arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars/ (53626, , X, X- R/X/L)

    User is in a trusted group sysop on some wikis
  5. 2017-02-01 19:58:57 (UTC): User Excirial t • c • dc • l • ef • b • bl; (53626) to Computer security (edit | talk | history | links | watch | logs) (diff  !top) - Link: tier3.xyz/cyber-security-pakistan/ (R/Xmeta/L- removed)
    Other links: www.businessinsider.com/hospital-ransomware-hack-2016-5 (53626, , X, X- R/X/L) www.wiwo.de/technologie/digitale-welt/cyber-angriffe-krankenhaeuser-ruecken-ins-visier-der-hacker/14946040.html (53626, , X, X- R/X/L) www.forbes.com/sites/kalevleetaru/2016/03/29/hacking-hospitals-and-holding-hostages-cybersecurity-in-2016/ (53626, -1, X, X- R/X/L) www.thedailybeast.com/articles/2014/11/17/how-your-pacemaker-will-get-hacked.html (53626, , X, X- R/X/L) www.computerworld.com/article/2492453/malware-vulnerabilities/pacemaker-hack-can-deliver-deadly-830-volt-jolt.html (53626, , X, X- R/X/L) www.darkreading.com/vulnerabilities---threats/hospital-medical-devices-used-as-weapons-in-cyberattacks/d/d-id/1320751 (53626, , X, X- R/X/L) arstechnica.com/security/2012/11/hotel-room-burglars-exploit-critical-flaw-in-electronic-door-locks/ (53626, , X, X- R/X/L) blogs.hbr.org/2013/06/rethinking-security-for-the-in (53626, , X, X- R/X/L) www.internet-of-things-research.eu/pdf/Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdf (53626, , X, X- R/X/L) hbr.org/resources/pdfs/comm/verizon/18980_HBR_Verizon_IoT_Nov_14.pdf (53626, , X, X- R/X/L) www.forbes.com/sites/chrisclearfield/2013/09/18/why-the-ftc-cant-regulate-the-internet-of-things/ (53626, -1, X, X- R/X/L) ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7165580 (53626, -1, X, X- R/X/L) www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx (53626, , X, X- R/X/L) www.edweek.org/ew/articles/2015/10/21/lessons-learned-from-security-breaches.html (53626, , X, X- R/X/L) arstechnica.com/security/2015/06/encryption-would-not-have-helped-at-opm-says-dhs-official/ (53626, , X, X- R/X/L) www.cnn.com/2015/06/04/politics/federal-agency-hacked-personnel-management/ (53626, , X, X- R/X/L) www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-employees-records-at-risk (53626, , X, X- R/X/L) www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html (53626, -1, X, X- R/X/L) www.publications.parliament.uk/pa/ld200708/ldjudgmt/jd080730/mckinn-1.htm (53626, , X, X- R/X/L) www.bbc.co.uk/news/uk-19506090 (53626, , X, X- R/X/L) www.telegraph.co.uk/news/worldnews/northamerica/usa/4320901/Gary-McKinnon-profile-Autistic-hacker-who-started-writing-computer-programs-at-14.html (53626, -1, X, X- R/X/L) www.webcitation.org/6GNY6Rgfk?url=http://rt.com/usa/anonymous-barrettbrown-sopa-megaupload-241/ (53626, -1, X, X- R/X/L) rt.com/usa/anonymous-barrettbrown-sopa-megaupload-241/ (53626, , X, X- R/X/L) www.telegraph.co.uk/technology/2016/09/21/tesla-fixes-software-bug-that-allowed-chinese-hackers-to-control/ (53626, -1, X, X- R/X/L) www.theguardian.com/technology/2015/dec/23/the-problem-with-self-driving-cars-who-controls-the-code (53626, -1, X, X- R/X/L) www.aol.com/article/news/2016/12/26/expert-warns-major-event-will-need-to-happen-for-cybersecurity/21632630/ (53626, , X, X- R/X/L) www.nytimes.com/2016/09/20/technology/self-driving-cars-guidelines.html?_r=0 (53626, -1, X, X- R/X/L) www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf (53626, , X, X- R/X/L) www.independent.co.uk/news/science/hackers-remotely-carjack-jeep-from-10-miles-away-and-drive-it-into-ditch-10406554.html (53626, , X, X- R/X/L) www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ (53626, , X, X- R/X/L) www.autosec.org/pubs/cars-usenixsec2011.pdf (53626, , X, X- R/X/L) www.vox.com/2015/1/18/7629603/car-hacking-dangers (53626, , X, X- R/X/L) www.businessinsider.com/the-sony-hackers-still-have-a-massive-amount-of-data-that-hasnt-been-leaked-yet-2014-12 (53626, , X, X- R/X/L) money.cnn.com/2014/12/24/technology/security/sony-hack-facts/ (53626, , X, X- R/X/L) arstechnica.com/tech-policy/news/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price.ars/ (53626, , X, X- R/X/L) arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars/ (53626, , X, X- R/X/L) www.reuters.com/article/us-cybersecurity-healthcare-fbi-exclusiv-idUSBREA3M1Q920140423 (53626, -1, X, X- R/X/L) www.jsonline.com/business/national/target-40m-accounts-may-be-involved-in-breach648fde78ab7a4e838a2eced0da89b9a5-236530941.html (53626, , X, X- R/X/L) fortune.com/2014/12/19/staples-cards-affected-breach/ (53626, , X, X- R/X/L) money.cnn.com/2014/09/18/technology/security/home-depot-hack/ (53626, , X, X- R/X/L) www.npr.org/blogs/alltechconsidered/2014/08/06/338334508/is-your-watch-or-thermostat-a-spy-cyber-security-firms-are-on-it (53626, , X, X- R/X/L) www.faa.gov/nextgen/programs/datacomm/general/ (53626, , X, X- R/X/L) www.eurocontrol.int/news/centralised-services-newpens-moves-forward (53626, , X, X- R/X/L) www.eurocontrol.int/articles/pan-european-network-services-pens (53626, , X, X- R/X/L) www.reuters.com/article/2014/08/04/us-cybersecurity-hackers-airplanes-idUSKBN0G40WQ20140804 (53626, -1, X, X- R/X/L) www.npr.org/blogs/alltechconsidered/2014/08/04/337794061/hacker-says-he-can-break-into-airplane-systems-using-in-flight-wi-fi (53626, , X, X- R/X/L) www.securityweek.com/air-traffic-control-systems-vulnerabilities-could-make-unfriendly-skies-black-hat (53626, , X, X- R/X/L) www.securestate.com/blog/2012/02/16/vulnerabilities-in-smart-meters (53626, , X, X- R/X/L) money.cnn.com/2014/11/18/technology/security/energy-grid-hack/ (53626, , X, X- R/X/L) ssrn.com/abstract=2765010 (53626, , X, X- R/X/L) ssrn.com/abstract=2765010 (53626, , X, X- R/X/L) espn.go.com/nba/story/_/id/15615363/milwaukee-bucks-leak-tax-information-players-employees-result-email-scam (53626, , X, X- R/X/L) www.ft.com/intl/cms/s/0/83b4e9be-db16-11e5-a72f-1e7744c66818.html#axzz41pN5YBV4 (53626, , X, X- R/X/L) upcommons.upc.edu/pfc/bitstream/2099.1/12289/1/73827.pdf (53626, , X, X- R/X/L) www.case.edu/its/kba/its-kba-27196-phishing-attempt/ (53626, , X, X- R/X/L) arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ (53626, , X, X- R/X/L) www.techopedia.com/definition/5398/spoofing (53626, , X, X- R/X/L) gadgtecs.com/2016/03/30/wifi-mouse-leave-billions-risk-computer-hack/ (53626, , X, X- R/X/L) www.csa.gov.sg/gosafeonline/go-safe-for-business/smes/distributed-denial-of-service-attack (53626, , X, X- R/X/L) www.researchgate.net/profile/Nikola_Zlatanov3/publication/298807979_Computer_Security_and_Mobile_Security_Challenges/links/56ec6ff908aea35d5b98255e.pdf (53626, , X, X- R/X/L) www.theaustralian.com.au/technology/opinion/reliance-spells-end-of-road-for-ict-amateurs/story-e6frgb0o-1226636267865?nk=34fe4ab684629535daaf6a8fe6e6ef3d (53626, , X, X- R/X/L) searchsecurity.techtarget.com/definition/social-engineering (53626, , X, X- R/X/L) www.pcmag.com/encyclopedia/term/40169/computer-security (53626, , X, X- R/X/L) ece.uwaterloo.ca/~vganesh/TEACHING/S2014/ECE458/building-secure-systems.pdf (53626, , X, X- R/X/L) www.law.cornell.edu/uscode/text/18/1030#e_2 (53626, , X, X- R/X/L) www.law.cornell.edu/uscode/text/18/1030 (53626, , X, X- R/X/L) www.dmoz.org/Computers/Security/Policy/ (53626, , X, X- R/X/L) www.webopedia.com/TERM/E/endpoint_security.html (53626, , X, X- R/X/L) www.businessdictionary.com/definition/data-integrity.html (53626, , X, X- R/X/L) medical-dictionary.thefreedictionary.com/confidentiality (53626, , X, X- R/X/L) www.learnquest.com/subcategories.aspx?categoryid=33 (53626, , X, X- R/X/L) msisac.cisecurity.org/resources/videos/free-training.cfm (53626, , X, X- R/X/L) www.dhs.gov/cybersecurity-training-exercises (53626, , X, X- R/X/L) www.dhs.gov/join-dhs-cybersecurity (53626, , X, X- R/X/L) niccs.us-cert.gov/home/students (53626, , X, X- R/X/L) www.cs.gwu.edu/academics/graduate_programs/master/cybersecurity/cybersecurity-jobs (53626, , X, X- R/X/L) www.defenceiq.com/defence-technology/articles/the-cyber-security-industry-and-you/ (53626, , X, X- R/X/L) burning-glass.com/demand-for-cybersecurity-workers-outstripping-supply/ (53626, , X, X- R/X/L) www.networkworld.com/article/3045801/security/cybersecurity-skills-shortage-impact-on-cloud-computing.html (53626, , X, X- R/X/L) www.burning-glass.com/research/cybersecurity/ (53626, , X, X- R/X/L) www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race (53626, , X, X- R/X/L) blogs.wsj.com/korearealtime/2013/09/23/seoul-puts-a-price-on-cyberdefense/ (53626, -1, X, X- R/X/L) tier3.xyz/aboutus/ (53626, 25, X, X- R/X/L) www.nr3c.gov.pk/about_us.html (53626, 16, X, X- R/X/L) tier3.xyz/cyber-security-pakistan/ (53626, 25, X, X- R/X/L) www.getcybersafe.gc.ca/index-eng.aspx (53626, 18, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (53626, 715, X, X- R/X/L) www.marketwired.com/press-release/government-canada-launches-cyber-security-awareness-month-with-new-public-awareness-1706660.htm (53626, 4692, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/rprt-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/index-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/ccirc-ccric-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-ncdnt-frmwrk/index-eng.aspx#_Toc360619104 (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/index-eng.aspx (53626, 715, X, X- R/X/L) www.marketwired.com/press-release/government-of-canada-launches-canadas-cyber-security-strategy-1328661.htm (53626, 4692, X, X- R/X/L) www.maawg.org/about/roster (53626, , X, X- R/X/L) www.maawg.org/about_maawg (53626, , X, X- R/X/L) www.coe.int/t/DGHL/cooperation/economiccrime/cybercrime/default_en.asp (53626, , X, X- R/X/L) www.first.org/members/teams/index.html (53626, , X, X- R/X/L) www.first.org/about/mission/mission.html (53626, , X, X- R/X/L) www.computerworld.com/securitytopics/security/story/0,10801,89488,00.html (53626, , X, X- R/X/L) www.fas.org/sgp/crs/homesec/IN10296.pdf (53626, , X, X- R/X/L) www.nextgov.com/cybersecurity/2016/03/faa-has-started-shaping-cybersecurity-regulations/126449/ (53626, , X, X- R/X/L) www.gao.gov/products/GAO-15-370 (53626, , X, X- R/X/L) www.nhtsa.gov/Research/Crash+Avoidance/Automotive+Cybersecurity (53626, , X, X- R/X/L) www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm356423.htm (53626, , X, X- R/X/L) www.fcc.gov/pshs/emergency-information/cybersecurity.html (53626, , X, X- R/X/L) www.brookings.edu (53626, , X, X- R/X/L) www.brookings.edu/opinions/2010/0923_military_internet_shachtman.aspx (53626, , X, X- R/X/L) www.defense.gov/speeches/speech.aspx?speechid=1399 (53626, , X, X- R/X/L) www.stratcom.mil/factsheets/Cyber_Command/ (53626, , X, X- R/X/L) www.cybercrime.gov (53626, , X, X- R/X/L) www.infragard.net/media/files/dir_med.mov (53626, , X, X- R/X/L) www.infragard.net (53626, , X, X- R/X/L) www.ic3.gov/default.aspx (53626, , X, X- R/X/L) www.fbi.gov/about-us/quick-facts (53626, , X, X- R/X/L) www.cyber.st.dhs.gov/faq.html (53626, , X, X- R/X/L) www.dhs.gov/xabout/structure/editorial_0839.shtm (53626, , X, X- R/X/L) web.archive.org/web/20080611210347/https://www.dhs.gov/xabout/structure/editorial_0839.shtm (53626, -1, X, X- R/X/L) web.archive.org/web/20120120040012/http://hsgac.senate.gov/public/index.cfm?FuseAction=Files.View&FileStore_id=4ee63497-ca5b-4a4b-9bba-04b7f4cb0123 (53626, -1, X, X- R/X/L) hsgac.senate.gov/public/index.cfm?FuseAction=Files.View&FileStore_id=4ee63497-ca5b-4a4b-9bba-04b7f4cb0123 (53626, , X, X- R/X/L) www.opencongress.org/bill/111-h4962/text (53626, , X, X- R/X/L) articles.sfgate.com/2005-02-17/business/17361991_1_rsa-security-conference-cybersecurity-counterpane-internet-security (53626, , X, X- R/X/L) www.gao.gov/highrisk/protecting_the_federal_government_information_systems/why_did_study (53626, , X, X- R/X/L) www.youtube.com/watch?v=0TMFRO66Wv4 (53626, -1, X, X- R/X/L) www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net.html (53626, , X, X- R/X/L) www.sciencedirect.com/science/article/pii/S1353485815300805 (53626, , X, X- R/X/L) www.cnet.com/news/53-million-emails-stolen-in-home-depot-breach/ (53626, , X, X- R/X/L) www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data (53626, , X, X- R/X/L) www.freesnowden.is/fr/2014/01/27/video-ard-interview-with-edward-snowden/ (53626, , X, X- R/X/L) mashable.com/2013/10/30/nsa-google-yahoo-data-centers/ (53626, -1, X, X- R/X/L) spectrum.ieee.org/telecom/security/can-you-trust-nist (53626, , X, X- R/X/L) www.crows.org/images/stories/pdf/IOI/IO%20Journal_Vol2Iss2_0210.pdf (53626, , X, X- R/X/L) www.stripes.com/news/cone-of-silence-surrounds-u-s-cyberwarfare-1.158090 (53626, , X, X- R/X/L) www.wired.com/threatlevel/2011/02/cyberwar-issues-likely-to-be-addressed-only-after-a-catastrophe (53626, , X, X- R/X/L) www.cbsnews.com/8301-501465_162-20017507-501465.html (53626, , X, X- R/X/L) www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11 (53626, , X, X- R/X/L) www.myfoxtwincities.com/myfox/pages/Home/Detail?contentId=2804836&version=3&locale=EN-US&layoutCode=TSTY&pageId=1.1.1 (53626, , X, X- R/X/L) www.businesswire.com/news/tjx/20070117005971/en (53626, , X, X- R/X/L) fas.org/irp/gao/aim96084.htm (53626, , X, X- R/X/L) vita-technologies.com/articles/board-bored-lockheed-martin-co/ (53626, , X, X- R/X/L) www.darkreading.com/applications/secure-os-gets-highest-nsa-rating-goes-c/212100421 (53626, , X, X- R/X/L) video.foxbusiness.com/v/2804966490001/forget-ids-use-your-phone-as-credentials/?playlist_id=937116503001#sp=show-clips (53626, , X, X- R/X/L) www.networkworld.com/news/tech/2010/110810-network-vulnerabilities.html (53626, , X, X- R/X/L) www.pcmag.com/article2/0,2817,2342798,00.asp (53626, , X, X- R/X/L) www.scmagazine.com/safenet-protectdrive-84/review/2596/ (53626, , X, X- R/X/L) www.intel.com/content/dam/www/public/us/en/documents/white-papers/trusted-execution-technology-security-paper.pdf (53626, , X, X- R/X/L) www.thewindowsclub.com/lock-protect-your-windows-pc-using-a-usb-drive-with-predator (53626, , X, X- R/X/L) www.safenet-inc.com/multi-factor-authentication/authenticators/pki-usb-authentication/etoken-5200-token-based-authentication/ (53626, , X, X- R/X/L) www.e-spincorp.com/espinv3/index.php/solutions/3-solutions/174-sentinel-hasp-hl (53626, , X, X- R/X/L) www.cs.columbia.edu/~waksman/PDFs/Oakland_2010.pdf (53626, , X, X- R/X/L) www.scientificamerican.com/article/the-hacker-in-your-hardware/ (53626, -1, X, X- R/X/L) www.academia.edu/6495360/Assessing_the_Role_of_Conceptual_Knowledge_in_an_Anti-Phishing_Educational_Game (53626, , X, X- R/X/L) www.academia.edu/2390447/Designing_a_Mobile_Game_to_Teach_Conceptual_Knowledge_of_Avoiding_Phishing_Attacks (53626, , X, X- R/X/L) www.ganssle.com/rants/gettingitright.htm (53626, , X, X- R/X/L) www-wjp.cs.uni-saarland.de/publikationen/Ba10EW.pdf (53626, , X, X- R/X/L) sel4.systems/Docs/seL4-spec.pdf (53626, , X, X- R/X/L) portal.acm.org/citation.cfm?id=800667 (53626, , X, X- R/X/L) www.codenomicon.com/solutions/unknown-vulnerability-management/ (53626, , X, X- R/X/L) www.reuters.com/article/2010/10/18/us-crime-fraud-idUSTRE69H25820101018 (53626, -1, X, X- R/X/L) www.datanami.com/2016/05/09/oni-may-best-hope-cyber-security-now/ (53626, , X, X- R/X/L) www.cloudera.com/solutions/cybersecurity.html (53626, , X, X- R/X/L) www.techopedia.com/definition/72/security-architecture (53626, , X, X- R/X/L) www.opensecurityarchitecture.org/cms/definitions/it-security-architecture (53626, , X, X- R/X/L) www.infosectoday.com/Articles/Glossary.pdf (53626, , X, X- R/X/L) www.cnss.gov/Assets/pdf/cnssi_4009.pdf (53626, , X, X- R/X/L) www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM482022.pdf (53626, , X, X- R/X/L) www.theverge.com/2016/12/27/14095166/fda-guidance-medical-device-cybersecurity-cyberattack-hacking-guidelines (53626, , X, X- R/X/L) www.healthcareitnews.com/news/texas-hospital-hacked-affects-nearly-30000-patient-records (53626, , X, X- R/X/L) boston.cbslocal.com/2016/12/27/former-patient-accused-data-breech-new-hampshire-psychiatric-hospital/ (53626, , X, X- R/X/L) www.rt.com/usa/371979-nh-hospital-data-breach/ (53626, , X, X- R/X/L) indianexpress.com/article/technology/tech-news-technology/legion-hacking-no-political-agenda-just-computer-geeks-says-hacker-4423167/ (53626, , X, X- R/X/L) www.bbc.com/news/uk-england-humber-37822084 (53626, -1, X, X- R/X/L) www.bbc.com/news/uk-england-humber-37849746 (53626, -1, X, X- R/X/L) www.grimsbytelegraph.co.uk/grimsby-hospital-computer-hack-no-ransom-has-been-demanded/story-29856124-detail/story.html (53626, , X, X- R/X/L) www.theregister.co.uk/2016/01/19/melbourne_hospital_pathology_wing_splattered_by_virus/ (53626, , X, X- R/X/L) www.theregister.co.uk/2016/06/28/medjack/ (53626, , X, X- R/X/L) www.nbcnews.com/news/us-news/medstar-hospitals-recovering-after-ransomware-hack-n548121 (53626, , X, X- R/X/L)

    User is in a trusted group sysop on some wikis
  6. 2017-02-01 20:00:31 (UTC): User Excirial t • c • dc • l • ef • b • bl; (53626) to Computer security (edit | talk | history | links | watch | logs) (diff  !top) - Link: tier3.xyz/cyber-security-pakistan/ (R/Xmeta/L- removed)
    Other links: www.dmoz.org/Computers/Security/Policy/ (53626, , X, X- R/X/L) www.webopedia.com/TERM/E/endpoint_security.html (53626, , X, X- R/X/L) www.businessdictionary.com/definition/data-integrity.html (53626, , X, X- R/X/L) medical-dictionary.thefreedictionary.com/confidentiality (53626, , X, X- R/X/L) www.learnquest.com/subcategories.aspx?categoryid=33 (53626, , X, X- R/X/L) msisac.cisecurity.org/resources/videos/free-training.cfm (53626, , X, X- R/X/L) www.dhs.gov/cybersecurity-training-exercises (53626, , X, X- R/X/L) www.dhs.gov/join-dhs-cybersecurity (53626, , X, X- R/X/L) niccs.us-cert.gov/home/students (53626, , X, X- R/X/L) www.cs.gwu.edu/academics/graduate_programs/master/cybersecurity/cybersecurity-jobs (53626, , X, X- R/X/L) www.defenceiq.com/defence-technology/articles/the-cyber-security-industry-and-you/ (53626, , X, X- R/X/L) burning-glass.com/demand-for-cybersecurity-workers-outstripping-supply/ (53626, , X, X- R/X/L) www.networkworld.com/article/3045801/security/cybersecurity-skills-shortage-impact-on-cloud-computing.html (53626, , X, X- R/X/L) www.burning-glass.com/research/cybersecurity/ (53626, , X, X- R/X/L) www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race (53626, , X, X- R/X/L) blogs.wsj.com/korearealtime/2013/09/23/seoul-puts-a-price-on-cyberdefense/ (53626, -1, X, X- R/X/L) tier3.xyz/aboutus/ (53626, 25, X, X- R/X/L) www.nr3c.gov.pk/about_us.html (53626, 16, X, X- R/X/L) tier3.xyz/cyber-security-pakistan/ (53626, 25, X, X- R/X/L) www.getcybersafe.gc.ca/index-eng.aspx (53626, 18, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (53626, 715, X, X- R/X/L) www.marketwired.com/press-release/government-canada-launches-cyber-security-awareness-month-with-new-public-awareness-1706660.htm (53626, 4692, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/rprt-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/index-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/ccirc-ccric-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-ncdnt-frmwrk/index-eng.aspx#_Toc360619104 (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/index-eng.aspx (53626, 715, X, X- R/X/L) www.marketwired.com/press-release/government-of-canada-launches-canadas-cyber-security-strategy-1328661.htm (53626, 4692, X, X- R/X/L) www.maawg.org/about/roster (53626, , X, X- R/X/L) www.maawg.org/about_maawg (53626, , X, X- R/X/L) www.coe.int/t/DGHL/cooperation/economiccrime/cybercrime/default_en.asp (53626, , X, X- R/X/L) www.first.org/members/teams/index.html (53626, , X, X- R/X/L) www.first.org/about/mission/mission.html (53626, , X, X- R/X/L) www.computerworld.com/securitytopics/security/story/0,10801,89488,00.html (53626, , X, X- R/X/L) www.fas.org/sgp/crs/homesec/IN10296.pdf (53626, , X, X- R/X/L) www.nextgov.com/cybersecurity/2016/03/faa-has-started-shaping-cybersecurity-regulations/126449/ (53626, , X, X- R/X/L) www.gao.gov/products/GAO-15-370 (53626, , X, X- R/X/L) www.nhtsa.gov/Research/Crash+Avoidance/Automotive+Cybersecurity (53626, , X, X- R/X/L) www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm356423.htm (53626, , X, X- R/X/L) www.fcc.gov/pshs/emergency-information/cybersecurity.html (53626, , X, X- R/X/L) www.brookings.edu (53626, , X, X- R/X/L) www.brookings.edu/opinions/2010/0923_military_internet_shachtman.aspx (53626, , X, X- R/X/L) www.defense.gov/speeches/speech.aspx?speechid=1399 (53626, , X, X- R/X/L) www.stratcom.mil/factsheets/Cyber_Command/ (53626, , X, X- R/X/L) www.cybercrime.gov (53626, , X, X- R/X/L) www.infragard.net/media/files/dir_med.mov (53626, , X, X- R/X/L) www.infragard.net (53626, , X, X- R/X/L) www.ic3.gov/default.aspx (53626, , X, X- R/X/L) www.fbi.gov/about-us/quick-facts (53626, , X, X- R/X/L) www.cyber.st.dhs.gov/faq.html (53626, , X, X- R/X/L) www.dhs.gov/xabout/structure/editorial_0839.shtm (53626, , X, X- R/X/L) web.archive.org/web/20080611210347/https://www.dhs.gov/xabout/structure/editorial_0839.shtm (53626, -1, X, X- R/X/L) web.archive.org/web/20120120040012/http://hsgac.senate.gov/public/index.cfm?FuseAction=Files.View&FileStore_id=4ee63497-ca5b-4a4b-9bba-04b7f4cb0123 (53626, -1, X, X- R/X/L) hsgac.senate.gov/public/index.cfm?FuseAction=Files.View&FileStore_id=4ee63497-ca5b-4a4b-9bba-04b7f4cb0123 (53626, , X, X- R/X/L) www.opencongress.org/bill/111-h4962/text (53626, , X, X- R/X/L) articles.sfgate.com/2005-02-17/business/17361991_1_rsa-security-conference-cybersecurity-counterpane-internet-security (53626, , X, X- R/X/L) www.gao.gov/highrisk/protecting_the_federal_government_information_systems/why_did_study (53626, , X, X- R/X/L) www.youtube.com/watch?v=0TMFRO66Wv4 (53626, -1, X, X- R/X/L) www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net.html (53626, , X, X- R/X/L) www.sciencedirect.com/science/article/pii/S1353485815300805 (53626, , X, X- R/X/L) www.cnet.com/news/53-million-emails-stolen-in-home-depot-breach/ (53626, , X, X- R/X/L) www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data (53626, , X, X- R/X/L) www.freesnowden.is/fr/2014/01/27/video-ard-interview-with-edward-snowden/ (53626, , X, X- R/X/L) mashable.com/2013/10/30/nsa-google-yahoo-data-centers/ (53626, -1, X, X- R/X/L) spectrum.ieee.org/telecom/security/can-you-trust-nist (53626, , X, X- R/X/L) www.crows.org/images/stories/pdf/IOI/IO%20Journal_Vol2Iss2_0210.pdf (53626, , X, X- R/X/L) www.stripes.com/news/cone-of-silence-surrounds-u-s-cyberwarfare-1.158090 (53626, , X, X- R/X/L) www.wired.com/threatlevel/2011/02/cyberwar-issues-likely-to-be-addressed-only-after-a-catastrophe (53626, , X, X- R/X/L) www.cbsnews.com/8301-501465_162-20017507-501465.html (53626, , X, X- R/X/L) www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11 (53626, , X, X- R/X/L) www.myfoxtwincities.com/myfox/pages/Home/Detail?contentId=2804836&version=3&locale=EN-US&layoutCode=TSTY&pageId=1.1.1 (53626, , X, X- R/X/L) www.businesswire.com/news/tjx/20070117005971/en (53626, , X, X- R/X/L) fas.org/irp/gao/aim96084.htm (53626, , X, X- R/X/L) vita-technologies.com/articles/board-bored-lockheed-martin-co/ (53626, , X, X- R/X/L) www.darkreading.com/applications/secure-os-gets-highest-nsa-rating-goes-c/212100421 (53626, , X, X- R/X/L) video.foxbusiness.com/v/2804966490001/forget-ids-use-your-phone-as-credentials/?playlist_id=937116503001#sp=show-clips (53626, , X, X- R/X/L) www.networkworld.com/news/tech/2010/110810-network-vulnerabilities.html (53626, , X, X- R/X/L) www.pcmag.com/article2/0,2817,2342798,00.asp (53626, , X, X- R/X/L) www.scmagazine.com/safenet-protectdrive-84/review/2596/ (53626, , X, X- R/X/L) www.intel.com/content/dam/www/public/us/en/documents/white-papers/trusted-execution-technology-security-paper.pdf (53626, , X, X- R/X/L) www.thewindowsclub.com/lock-protect-your-windows-pc-using-a-usb-drive-with-predator (53626, , X, X- R/X/L) www.safenet-inc.com/multi-factor-authentication/authenticators/pki-usb-authentication/etoken-5200-token-based-authentication/ (53626, , X, X- R/X/L) www.e-spincorp.com/espinv3/index.php/solutions/3-solutions/174-sentinel-hasp-hl (53626, , X, X- R/X/L) www.cs.columbia.edu/~waksman/PDFs/Oakland_2010.pdf (53626, , X, X- R/X/L) www.scientificamerican.com/article/the-hacker-in-your-hardware/ (53626, -1, X, X- R/X/L) www.academia.edu/6495360/Assessing_the_Role_of_Conceptual_Knowledge_in_an_Anti-Phishing_Educational_Game (53626, , X, X- R/X/L) www.academia.edu/2390447/Designing_a_Mobile_Game_to_Teach_Conceptual_Knowledge_of_Avoiding_Phishing_Attacks (53626, , X, X- R/X/L) www.ganssle.com/rants/gettingitright.htm (53626, , X, X- R/X/L) www-wjp.cs.uni-saarland.de/publikationen/Ba10EW.pdf (53626, , X, X- R/X/L) sel4.systems/Docs/seL4-spec.pdf (53626, , X, X- R/X/L) portal.acm.org/citation.cfm?id=800667 (53626, , X, X- R/X/L) www.codenomicon.com/solutions/unknown-vulnerability-management/ (53626, , X, X- R/X/L) www.reuters.com/article/2010/10/18/us-crime-fraud-idUSTRE69H25820101018 (53626, -1, X, X- R/X/L) www.datanami.com/2016/05/09/oni-may-best-hope-cyber-security-now/ (53626, , X, X- R/X/L) www.cloudera.com/solutions/cybersecurity.html (53626, , X, X- R/X/L) www.techopedia.com/definition/72/security-architecture (53626, , X, X- R/X/L) www.opensecurityarchitecture.org/cms/definitions/it-security-architecture (53626, , X, X- R/X/L) www.infosectoday.com/Articles/Glossary.pdf (53626, , X, X- R/X/L) www.cnss.gov/Assets/pdf/cnssi_4009.pdf (53626, , X, X- R/X/L) www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM482022.pdf (53626, , X, X- R/X/L) www.theverge.com/2016/12/27/14095166/fda-guidance-medical-device-cybersecurity-cyberattack-hacking-guidelines (53626, , X, X- R/X/L) www.healthcareitnews.com/news/texas-hospital-hacked-affects-nearly-30000-patient-records (53626, , X, X- R/X/L) boston.cbslocal.com/2016/12/27/former-patient-accused-data-breech-new-hampshire-psychiatric-hospital/ (53626, , X, X- R/X/L) www.rt.com/usa/371979-nh-hospital-data-breach/ (53626, , X, X- R/X/L) indianexpress.com/article/technology/tech-news-technology/legion-hacking-no-political-agenda-just-computer-geeks-says-hacker-4423167/ (53626, , X, X- R/X/L) www.bbc.com/news/uk-england-humber-37822084 (53626, -1, X, X- R/X/L) www.bbc.com/news/uk-england-humber-37849746 (53626, -1, X, X- R/X/L) www.grimsbytelegraph.co.uk/grimsby-hospital-computer-hack-no-ransom-has-been-demanded/story-29856124-detail/story.html (53626, , X, X- R/X/L) www.theregister.co.uk/2016/01/19/melbourne_hospital_pathology_wing_splattered_by_virus/ (53626, , X, X- R/X/L) www.theregister.co.uk/2016/06/28/medjack/ (53626, , X, X- R/X/L) www.nbcnews.com/news/us-news/medstar-hospitals-recovering-after-ransomware-hack-n548121 (53626, , X, X- R/X/L) www.businessinsider.com/hospital-ransomware-hack-2016-5 (53626, , X, X- R/X/L) www.wiwo.de/technologie/digitale-welt/cyber-angriffe-krankenhaeuser-ruecken-ins-visier-der-hacker/14946040.html (53626, , X, X- R/X/L) www.forbes.com/sites/kalevleetaru/2016/03/29/hacking-hospitals-and-holding-hostages-cybersecurity-in-2016/ (53626, -1, X, X- R/X/L) www.thedailybeast.com/articles/2014/11/17/how-your-pacemaker-will-get-hacked.html (53626, , X, X- R/X/L) www.computerworld.com/article/2492453/malware-vulnerabilities/pacemaker-hack-can-deliver-deadly-830-volt-jolt.html (53626, , X, X- R/X/L) www.darkreading.com/vulnerabilities---threats/hospital-medical-devices-used-as-weapons-in-cyberattacks/d/d-id/1320751 (53626, , X, X- R/X/L) arstechnica.com/security/2012/11/hotel-room-burglars-exploit-critical-flaw-in-electronic-door-locks/ (53626, , X, X- R/X/L) blogs.hbr.org/2013/06/rethinking-security-for-the-in (53626, , X, X- R/X/L) www.internet-of-things-research.eu/pdf/Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdf (53626, , X, X- R/X/L) hbr.org/resources/pdfs/comm/verizon/18980_HBR_Verizon_IoT_Nov_14.pdf (53626, , X, X- R/X/L) www.forbes.com/sites/chrisclearfield/2013/09/18/why-the-ftc-cant-regulate-the-internet-of-things/ (53626, -1, X, X- R/X/L) ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7165580 (53626, -1, X, X- R/X/L) www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx (53626, , X, X- R/X/L) www.edweek.org/ew/articles/2015/10/21/lessons-learned-from-security-breaches.html (53626, , X, X- R/X/L) arstechnica.com/security/2015/06/encryption-would-not-have-helped-at-opm-says-dhs-official/ (53626, , X, X- R/X/L) www.cnn.com/2015/06/04/politics/federal-agency-hacked-personnel-management/ (53626, , X, X- R/X/L) www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-employees-records-at-risk (53626, , X, X- R/X/L) www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html (53626, -1, X, X- R/X/L) www.publications.parliament.uk/pa/ld200708/ldjudgmt/jd080730/mckinn-1.htm (53626, , X, X- R/X/L) www.bbc.co.uk/news/uk-19506090 (53626, , X, X- R/X/L) www.telegraph.co.uk/news/worldnews/northamerica/usa/4320901/Gary-McKinnon-profile-Autistic-hacker-who-started-writing-computer-programs-at-14.html (53626, -1, X, X- R/X/L) www.webcitation.org/6GNY6Rgfk?url=http://rt.com/usa/anonymous-barrettbrown-sopa-megaupload-241/ (53626, -1, X, X- R/X/L) rt.com/usa/anonymous-barrettbrown-sopa-megaupload-241/ (53626, , X, X- R/X/L) www.telegraph.co.uk/technology/2016/09/21/tesla-fixes-software-bug-that-allowed-chinese-hackers-to-control/ (53626, -1, X, X- R/X/L) www.theguardian.com/technology/2015/dec/23/the-problem-with-self-driving-cars-who-controls-the-code (53626, -1, X, X- R/X/L) www.aol.com/article/news/2016/12/26/expert-warns-major-event-will-need-to-happen-for-cybersecurity/21632630/ (53626, , X, X- R/X/L) www.nytimes.com/2016/09/20/technology/self-driving-cars-guidelines.html?_r=0 (53626, -1, X, X- R/X/L) www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf (53626, , X, X- R/X/L) www.independent.co.uk/news/science/hackers-remotely-carjack-jeep-from-10-miles-away-and-drive-it-into-ditch-10406554.html (53626, , X, X- R/X/L) www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ (53626, , X, X- R/X/L) www.autosec.org/pubs/cars-usenixsec2011.pdf (53626, , X, X- R/X/L) www.vox.com/2015/1/18/7629603/car-hacking-dangers (53626, , X, X- R/X/L) www.businessinsider.com/the-sony-hackers-still-have-a-massive-amount-of-data-that-hasnt-been-leaked-yet-2014-12 (53626, , X, X- R/X/L) money.cnn.com/2014/12/24/technology/security/sony-hack-facts/ (53626, , X, X- R/X/L) arstechnica.com/tech-policy/news/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price.ars/ (53626, , X, X- R/X/L) arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars/ (53626, , X, X- R/X/L) www.reuters.com/article/us-cybersecurity-healthcare-fbi-exclusiv-idUSBREA3M1Q920140423 (53626, -1, X, X- R/X/L) www.jsonline.com/business/national/target-40m-accounts-may-be-involved-in-breach648fde78ab7a4e838a2eced0da89b9a5-236530941.html (53626, , X, X- R/X/L) fortune.com/2014/12/19/staples-cards-affected-breach/ (53626, , X, X- R/X/L) money.cnn.com/2014/09/18/technology/security/home-depot-hack/ (53626, , X, X- R/X/L) www.npr.org/blogs/alltechconsidered/2014/08/06/338334508/is-your-watch-or-thermostat-a-spy-cyber-security-firms-are-on-it (53626, , X, X- R/X/L) www.faa.gov/nextgen/programs/datacomm/general/ (53626, , X, X- R/X/L) www.eurocontrol.int/news/centralised-services-newpens-moves-forward (53626, , X, X- R/X/L) www.eurocontrol.int/articles/pan-european-network-services-pens (53626, , X, X- R/X/L) www.reuters.com/article/2014/08/04/us-cybersecurity-hackers-airplanes-idUSKBN0G40WQ20140804 (53626, -1, X, X- R/X/L) www.npr.org/blogs/alltechconsidered/2014/08/04/337794061/hacker-says-he-can-break-into-airplane-systems-using-in-flight-wi-fi (53626, , X, X- R/X/L) www.securityweek.com/air-traffic-control-systems-vulnerabilities-could-make-unfriendly-skies-black-hat (53626, , X, X- R/X/L) www.securestate.com/blog/2012/02/16/vulnerabilities-in-smart-meters (53626, , X, X- R/X/L) money.cnn.com/2014/11/18/technology/security/energy-grid-hack/ (53626, , X, X- R/X/L) ssrn.com/abstract=2765010 (53626, , X, X- R/X/L) ssrn.com/abstract=2765010 (53626, , X, X- R/X/L) espn.go.com/nba/story/_/id/15615363/milwaukee-bucks-leak-tax-information-players-employees-result-email-scam (53626, , X, X- R/X/L) www.ft.com/intl/cms/s/0/83b4e9be-db16-11e5-a72f-1e7744c66818.html#axzz41pN5YBV4 (53626, , X, X- R/X/L) upcommons.upc.edu/pfc/bitstream/2099.1/12289/1/73827.pdf (53626, , X, X- R/X/L) www.case.edu/its/kba/its-kba-27196-phishing-attempt/ (53626, , X, X- R/X/L) arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ (53626, , X, X- R/X/L) www.techopedia.com/definition/5398/spoofing (53626, , X, X- R/X/L) gadgtecs.com/2016/03/30/wifi-mouse-leave-billions-risk-computer-hack/ (53626, , X, X- R/X/L) www.csa.gov.sg/gosafeonline/go-safe-for-business/smes/distributed-denial-of-service-attack (53626, , X, X- R/X/L) www.researchgate.net/profile/Nikola_Zlatanov3/publication/298807979_Computer_Security_and_Mobile_Security_Challenges/links/56ec6ff908aea35d5b98255e.pdf (53626, , X, X- R/X/L) www.theaustralian.com.au/technology/opinion/reliance-spells-end-of-road-for-ict-amateurs/story-e6frgb0o-1226636267865?nk=34fe4ab684629535daaf6a8fe6e6ef3d (53626, , X, X- R/X/L) searchsecurity.techtarget.com/definition/social-engineering (53626, , X, X- R/X/L) www.pcmag.com/encyclopedia/term/40169/computer-security (53626, , X, X- R/X/L) ece.uwaterloo.ca/~vganesh/TEACHING/S2014/ECE458/building-secure-systems.pdf (53626, , X, X- R/X/L) www.law.cornell.edu/uscode/text/18/1030#e_2 (53626, , X, X- R/X/L) www.law.cornell.edu/uscode/text/18/1030 (53626, , X, X- R/X/L)

    User is in a trusted group sysop on some wikis
  7. 2017-02-01 20:00:56 (UTC): User Excirial t • c • dc • l • ef • b • bl; (53626) to Computer security (edit | talk | history | links | watch | logs) (diff  !top) - Link: tier3.xyz/cyber-security-pakistan/ (R/Xmeta/L- removed)
    Other links: www.webopedia.com/TERM/E/endpoint_security.html (53626, , X, X- R/X/L) www.businessdictionary.com/definition/data-integrity.html (53626, , X, X- R/X/L) medical-dictionary.thefreedictionary.com/confidentiality (53626, , X, X- R/X/L) www.learnquest.com/subcategories.aspx?categoryid=33 (53626, , X, X- R/X/L) msisac.cisecurity.org/resources/videos/free-training.cfm (53626, , X, X- R/X/L) www.dhs.gov/cybersecurity-training-exercises (53626, , X, X- R/X/L) www.dhs.gov/join-dhs-cybersecurity (53626, , X, X- R/X/L) niccs.us-cert.gov/home/students (53626, , X, X- R/X/L) www.cs.gwu.edu/academics/graduate_programs/master/cybersecurity/cybersecurity-jobs (53626, , X, X- R/X/L) www.defenceiq.com/defence-technology/articles/the-cyber-security-industry-and-you/ (53626, , X, X- R/X/L) burning-glass.com/demand-for-cybersecurity-workers-outstripping-supply/ (53626, , X, X- R/X/L) www.networkworld.com/article/3045801/security/cybersecurity-skills-shortage-impact-on-cloud-computing.html (53626, , X, X- R/X/L) www.burning-glass.com/research/cybersecurity/ (53626, , X, X- R/X/L) www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race (53626, , X, X- R/X/L) blogs.wsj.com/korearealtime/2013/09/23/seoul-puts-a-price-on-cyberdefense/ (53626, -1, X, X- R/X/L) tier3.xyz/aboutus/ (53626, 25, X, X- R/X/L) www.nr3c.gov.pk/about_us.html (53626, 16, X, X- R/X/L) tier3.xyz/cyber-security-pakistan/ (53626, 25, X, X- R/X/L) www.getcybersafe.gc.ca/index-eng.aspx (53626, 18, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (53626, 715, X, X- R/X/L) www.marketwired.com/press-release/government-canada-launches-cyber-security-awareness-month-with-new-public-awareness-1706660.htm (53626, 4692, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/rprt-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/index-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/ccirc-ccric-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-ncdnt-frmwrk/index-eng.aspx#_Toc360619104 (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (53626, 715, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/index-eng.aspx (53626, 715, X, X- R/X/L) www.marketwired.com/press-release/government-of-canada-launches-canadas-cyber-security-strategy-1328661.htm (53626, 4692, X, X- R/X/L) www.maawg.org/about/roster (53626, , X, X- R/X/L) www.maawg.org/about_maawg (53626, , X, X- R/X/L) www.coe.int/t/DGHL/cooperation/economiccrime/cybercrime/default_en.asp (53626, , X, X- R/X/L) www.first.org/members/teams/index.html (53626, , X, X- R/X/L) www.first.org/about/mission/mission.html (53626, , X, X- R/X/L) www.computerworld.com/securitytopics/security/story/0,10801,89488,00.html (53626, , X, X- R/X/L) www.fas.org/sgp/crs/homesec/IN10296.pdf (53626, , X, X- R/X/L) www.nextgov.com/cybersecurity/2016/03/faa-has-started-shaping-cybersecurity-regulations/126449/ (53626, , X, X- R/X/L) www.gao.gov/products/GAO-15-370 (53626, , X, X- R/X/L) www.nhtsa.gov/Research/Crash+Avoidance/Automotive+Cybersecurity (53626, , X, X- R/X/L) www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm356423.htm (53626, , X, X- R/X/L) www.fcc.gov/pshs/emergency-information/cybersecurity.html (53626, , X, X- R/X/L) www.brookings.edu (53626, , X, X- R/X/L) www.brookings.edu/opinions/2010/0923_military_internet_shachtman.aspx (53626, , X, X- R/X/L) www.defense.gov/speeches/speech.aspx?speechid=1399 (53626, , X, X- R/X/L) www.stratcom.mil/factsheets/Cyber_Command/ (53626, , X, X- R/X/L) www.cybercrime.gov (53626, , X, X- R/X/L) www.infragard.net/media/files/dir_med.mov (53626, , X, X- R/X/L) www.infragard.net (53626, , X, X- R/X/L) www.ic3.gov/default.aspx (53626, , X, X- R/X/L) www.fbi.gov/about-us/quick-facts (53626, , X, X- R/X/L) www.cyber.st.dhs.gov/faq.html (53626, , X, X- R/X/L) www.dhs.gov/xabout/structure/editorial_0839.shtm (53626, , X, X- R/X/L) web.archive.org/web/20080611210347/https://www.dhs.gov/xabout/structure/editorial_0839.shtm (53626, -1, X, X- R/X/L) web.archive.org/web/20120120040012/http://hsgac.senate.gov/public/index.cfm?FuseAction=Files.View&FileStore_id=4ee63497-ca5b-4a4b-9bba-04b7f4cb0123 (53626, -1, X, X- R/X/L) hsgac.senate.gov/public/index.cfm?FuseAction=Files.View&FileStore_id=4ee63497-ca5b-4a4b-9bba-04b7f4cb0123 (53626, , X, X- R/X/L) www.opencongress.org/bill/111-h4962/text (53626, , X, X- R/X/L) articles.sfgate.com/2005-02-17/business/17361991_1_rsa-security-conference-cybersecurity-counterpane-internet-security (53626, , X, X- R/X/L) www.gao.gov/highrisk/protecting_the_federal_government_information_systems/why_did_study (53626, , X, X- R/X/L) www.youtube.com/watch?v=0TMFRO66Wv4 (53626, -1, X, X- R/X/L) www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net.html (53626, , X, X- R/X/L) www.sciencedirect.com/science/article/pii/S1353485815300805 (53626, , X, X- R/X/L) www.cnet.com/news/53-million-emails-stolen-in-home-depot-breach/ (53626, , X, X- R/X/L) www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data (53626, , X, X- R/X/L) www.freesnowden.is/fr/2014/01/27/video-ard-interview-with-edward-snowden/ (53626, , X, X- R/X/L) mashable.com/2013/10/30/nsa-google-yahoo-data-centers/ (53626, -1, X, X- R/X/L) spectrum.ieee.org/telecom/security/can-you-trust-nist (53626, , X, X- R/X/L) www.crows.org/images/stories/pdf/IOI/IO%20Journal_Vol2Iss2_0210.pdf (53626, , X, X- R/X/L) www.stripes.com/news/cone-of-silence-surrounds-u-s-cyberwarfare-1.158090 (53626, , X, X- R/X/L) www.wired.com/threatlevel/2011/02/cyberwar-issues-likely-to-be-addressed-only-after-a-catastrophe (53626, , X, X- R/X/L) www.cbsnews.com/8301-501465_162-20017507-501465.html (53626, , X, X- R/X/L) www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11 (53626, , X, X- R/X/L) www.myfoxtwincities.com/myfox/pages/Home/Detail?contentId=2804836&version=3&locale=EN-US&layoutCode=TSTY&pageId=1.1.1 (53626, , X, X- R/X/L) www.businesswire.com/news/tjx/20070117005971/en (53626, , X, X- R/X/L) fas.org/irp/gao/aim96084.htm (53626, , X, X- R/X/L) vita-technologies.com/articles/board-bored-lockheed-martin-co/ (53626, , X, X- R/X/L) www.darkreading.com/applications/secure-os-gets-highest-nsa-rating-goes-c/212100421 (53626, , X, X- R/X/L) video.foxbusiness.com/v/2804966490001/forget-ids-use-your-phone-as-credentials/?playlist_id=937116503001#sp=show-clips (53626, , X, X- R/X/L) www.networkworld.com/news/tech/2010/110810-network-vulnerabilities.html (53626, , X, X- R/X/L) www.pcmag.com/article2/0,2817,2342798,00.asp (53626, , X, X- R/X/L) www.scmagazine.com/safenet-protectdrive-84/review/2596/ (53626, , X, X- R/X/L) www.intel.com/content/dam/www/public/us/en/documents/white-papers/trusted-execution-technology-security-paper.pdf (53626, , X, X- R/X/L) www.thewindowsclub.com/lock-protect-your-windows-pc-using-a-usb-drive-with-predator (53626, , X, X- R/X/L) www.safenet-inc.com/multi-factor-authentication/authenticators/pki-usb-authentication/etoken-5200-token-based-authentication/ (53626, , X, X- R/X/L) www.e-spincorp.com/espinv3/index.php/solutions/3-solutions/174-sentinel-hasp-hl (53626, , X, X- R/X/L) www.cs.columbia.edu/~waksman/PDFs/Oakland_2010.pdf (53626, , X, X- R/X/L) www.scientificamerican.com/article/the-hacker-in-your-hardware/ (53626, -1, X, X- R/X/L) www.academia.edu/6495360/Assessing_the_Role_of_Conceptual_Knowledge_in_an_Anti-Phishing_Educational_Game (53626, , X, X- R/X/L) www.academia.edu/2390447/Designing_a_Mobile_Game_to_Teach_Conceptual_Knowledge_of_Avoiding_Phishing_Attacks (53626, , X, X- R/X/L) www.ganssle.com/rants/gettingitright.htm (53626, , X, X- R/X/L) www-wjp.cs.uni-saarland.de/publikationen/Ba10EW.pdf (53626, , X, X- R/X/L) sel4.systems/Docs/seL4-spec.pdf (53626, , X, X- R/X/L) portal.acm.org/citation.cfm?id=800667 (53626, , X, X- R/X/L) www.codenomicon.com/solutions/unknown-vulnerability-management/ (53626, , X, X- R/X/L) www.reuters.com/article/2010/10/18/us-crime-fraud-idUSTRE69H25820101018 (53626, -1, X, X- R/X/L) www.datanami.com/2016/05/09/oni-may-best-hope-cyber-security-now/ (53626, , X, X- R/X/L) www.cloudera.com/solutions/cybersecurity.html (53626, , X, X- R/X/L) www.techopedia.com/definition/72/security-architecture (53626, , X, X- R/X/L) www.opensecurityarchitecture.org/cms/definitions/it-security-architecture (53626, , X, X- R/X/L) www.infosectoday.com/Articles/Glossary.pdf (53626, , X, X- R/X/L) www.cnss.gov/Assets/pdf/cnssi_4009.pdf (53626, , X, X- R/X/L) www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM482022.pdf (53626, , X, X- R/X/L) www.theverge.com/2016/12/27/14095166/fda-guidance-medical-device-cybersecurity-cyberattack-hacking-guidelines (53626, , X, X- R/X/L) www.healthcareitnews.com/news/texas-hospital-hacked-affects-nearly-30000-patient-records (53626, , X, X- R/X/L) boston.cbslocal.com/2016/12/27/former-patient-accused-data-breech-new-hampshire-psychiatric-hospital/ (53626, , X, X- R/X/L) www.rt.com/usa/371979-nh-hospital-data-breach/ (53626, , X, X- R/X/L) indianexpress.com/article/technology/tech-news-technology/legion-hacking-no-political-agenda-just-computer-geeks-says-hacker-4423167/ (53626, , X, X- R/X/L) www.bbc.com/news/uk-england-humber-37822084 (53626, -1, X, X- R/X/L) www.bbc.com/news/uk-england-humber-37849746 (53626, -1, X, X- R/X/L) www.grimsbytelegraph.co.uk/grimsby-hospital-computer-hack-no-ransom-has-been-demanded/story-29856124-detail/story.html (53626, , X, X- R/X/L) www.theregister.co.uk/2016/01/19/melbourne_hospital_pathology_wing_splattered_by_virus/ (53626, , X, X- R/X/L) www.theregister.co.uk/2016/06/28/medjack/ (53626, , X, X- R/X/L) www.nbcnews.com/news/us-news/medstar-hospitals-recovering-after-ransomware-hack-n548121 (53626, , X, X- R/X/L) www.businessinsider.com/hospital-ransomware-hack-2016-5 (53626, , X, X- R/X/L) www.wiwo.de/technologie/digitale-welt/cyber-angriffe-krankenhaeuser-ruecken-ins-visier-der-hacker/14946040.html (53626, , X, X- R/X/L) www.forbes.com/sites/kalevleetaru/2016/03/29/hacking-hospitals-and-holding-hostages-cybersecurity-in-2016/ (53626, -1, X, X- R/X/L) www.thedailybeast.com/articles/2014/11/17/how-your-pacemaker-will-get-hacked.html (53626, , X, X- R/X/L) www.computerworld.com/article/2492453/malware-vulnerabilities/pacemaker-hack-can-deliver-deadly-830-volt-jolt.html (53626, , X, X- R/X/L) www.darkreading.com/vulnerabilities---threats/hospital-medical-devices-used-as-weapons-in-cyberattacks/d/d-id/1320751 (53626, , X, X- R/X/L) arstechnica.com/security/2012/11/hotel-room-burglars-exploit-critical-flaw-in-electronic-door-locks/ (53626, , X, X- R/X/L) blogs.hbr.org/2013/06/rethinking-security-for-the-in (53626, , X, X- R/X/L) www.internet-of-things-research.eu/pdf/Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdf (53626, , X, X- R/X/L) hbr.org/resources/pdfs/comm/verizon/18980_HBR_Verizon_IoT_Nov_14.pdf (53626, , X, X- R/X/L) www.forbes.com/sites/chrisclearfield/2013/09/18/why-the-ftc-cant-regulate-the-internet-of-things/ (53626, -1, X, X- R/X/L) ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7165580 (53626, -1, X, X- R/X/L) www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx (53626, , X, X- R/X/L) www.edweek.org/ew/articles/2015/10/21/lessons-learned-from-security-breaches.html (53626, , X, X- R/X/L) arstechnica.com/security/2015/06/encryption-would-not-have-helped-at-opm-says-dhs-official/ (53626, , X, X- R/X/L) www.cnn.com/2015/06/04/politics/federal-agency-hacked-personnel-management/ (53626, , X, X- R/X/L) www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-employees-records-at-risk (53626, , X, X- R/X/L) www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html (53626, -1, X, X- R/X/L) www.publications.parliament.uk/pa/ld200708/ldjudgmt/jd080730/mckinn-1.htm (53626, , X, X- R/X/L) www.bbc.co.uk/news/uk-19506090 (53626, , X, X- R/X/L) www.telegraph.co.uk/news/worldnews/northamerica/usa/4320901/Gary-McKinnon-profile-Autistic-hacker-who-started-writing-computer-programs-at-14.html (53626, -1, X, X- R/X/L) www.webcitation.org/6GNY6Rgfk?url=http://rt.com/usa/anonymous-barrettbrown-sopa-megaupload-241/ (53626, -1, X, X- R/X/L) rt.com/usa/anonymous-barrettbrown-sopa-megaupload-241/ (53626, , X, X- R/X/L) www.telegraph.co.uk/technology/2016/09/21/tesla-fixes-software-bug-that-allowed-chinese-hackers-to-control/ (53626, -1, X, X- R/X/L) www.theguardian.com/technology/2015/dec/23/the-problem-with-self-driving-cars-who-controls-the-code (53626, -1, X, X- R/X/L) www.aol.com/article/news/2016/12/26/expert-warns-major-event-will-need-to-happen-for-cybersecurity/21632630/ (53626, , X, X- R/X/L) www.nytimes.com/2016/09/20/technology/self-driving-cars-guidelines.html?_r=0 (53626, -1, X, X- R/X/L) www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf (53626, , X, X- R/X/L) www.independent.co.uk/news/science/hackers-remotely-carjack-jeep-from-10-miles-away-and-drive-it-into-ditch-10406554.html (53626, , X, X- R/X/L) www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ (53626, , X, X- R/X/L) www.autosec.org/pubs/cars-usenixsec2011.pdf (53626, , X, X- R/X/L) www.vox.com/2015/1/18/7629603/car-hacking-dangers (53626, , X, X- R/X/L) www.businessinsider.com/the-sony-hackers-still-have-a-massive-amount-of-data-that-hasnt-been-leaked-yet-2014-12 (53626, , X, X- R/X/L) money.cnn.com/2014/12/24/technology/security/sony-hack-facts/ (53626, , X, X- R/X/L) arstechnica.com/tech-policy/news/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price.ars/ (53626, , X, X- R/X/L) arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars/ (53626, , X, X- R/X/L) www.reuters.com/article/us-cybersecurity-healthcare-fbi-exclusiv-idUSBREA3M1Q920140423 (53626, -1, X, X- R/X/L) www.jsonline.com/business/national/target-40m-accounts-may-be-involved-in-breach648fde78ab7a4e838a2eced0da89b9a5-236530941.html (53626, , X, X- R/X/L) fortune.com/2014/12/19/staples-cards-affected-breach/ (53626, , X, X- R/X/L) money.cnn.com/2014/09/18/technology/security/home-depot-hack/ (53626, , X, X- R/X/L) www.npr.org/blogs/alltechconsidered/2014/08/06/338334508/is-your-watch-or-thermostat-a-spy-cyber-security-firms-are-on-it (53626, , X, X- R/X/L) www.faa.gov/nextgen/programs/datacomm/general/ (53626, , X, X- R/X/L) www.eurocontrol.int/news/centralised-services-newpens-moves-forward (53626, , X, X- R/X/L) www.eurocontrol.int/articles/pan-european-network-services-pens (53626, , X, X- R/X/L) www.reuters.com/article/2014/08/04/us-cybersecurity-hackers-airplanes-idUSKBN0G40WQ20140804 (53626, -1, X, X- R/X/L) www.npr.org/blogs/alltechconsidered/2014/08/04/337794061/hacker-says-he-can-break-into-airplane-systems-using-in-flight-wi-fi (53626, , X, X- R/X/L) www.securityweek.com/air-traffic-control-systems-vulnerabilities-could-make-unfriendly-skies-black-hat (53626, , X, X- R/X/L) www.securestate.com/blog/2012/02/16/vulnerabilities-in-smart-meters (53626, , X, X- R/X/L) money.cnn.com/2014/11/18/technology/security/energy-grid-hack/ (53626, , X, X- R/X/L) ssrn.com/abstract=2765010 (53626, , X, X- R/X/L) ssrn.com/abstract=2765010 (53626, , X, X- R/X/L) espn.go.com/nba/story/_/id/15615363/milwaukee-bucks-leak-tax-information-players-employees-result-email-scam (53626, , X, X- R/X/L) www.ft.com/intl/cms/s/0/83b4e9be-db16-11e5-a72f-1e7744c66818.html#axzz41pN5YBV4 (53626, , X, X- R/X/L) upcommons.upc.edu/pfc/bitstream/2099.1/12289/1/73827.pdf (53626, , X, X- R/X/L) www.case.edu/its/kba/its-kba-27196-phishing-attempt/ (53626, , X, X- R/X/L) arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ (53626, , X, X- R/X/L) www.techopedia.com/definition/5398/spoofing (53626, , X, X- R/X/L) gadgtecs.com/2016/03/30/wifi-mouse-leave-billions-risk-computer-hack/ (53626, , X, X- R/X/L) www.csa.gov.sg/gosafeonline/go-safe-for-business/smes/distributed-denial-of-service-attack (53626, , X, X- R/X/L) www.researchgate.net/profile/Nikola_Zlatanov3/publication/298807979_Computer_Security_and_Mobile_Security_Challenges/links/56ec6ff908aea35d5b98255e.pdf (53626, , X, X- R/X/L) www.theaustralian.com.au/technology/opinion/reliance-spells-end-of-road-for-ict-amateurs/story-e6frgb0o-1226636267865?nk=34fe4ab684629535daaf6a8fe6e6ef3d (53626, , X, X- R/X/L) searchsecurity.techtarget.com/definition/social-engineering (53626, , X, X- R/X/L) www.pcmag.com/encyclopedia/term/40169/computer-security (53626, , X, X- R/X/L) ece.uwaterloo.ca/~vganesh/TEACHING/S2014/ECE458/building-secure-systems.pdf (53626, , X, X- R/X/L) www.law.cornell.edu/uscode/text/18/1030#e_2 (53626, , X, X- R/X/L) www.law.cornell.edu/uscode/text/18/1030 (53626, , X, X- R/X/L) www.dmoz.org/Computers/Security/Policy/ (53626, , X, X- R/X/L)

    User is in a trusted group sysop on some wikis
  8. 2017-03-08 20:28:01 (UTC): User Whizz40 t • c • dc • l • ef • b • bl; (3380) to Computer emergency response team (edit | talk | history | links | watch | logs) (diff  !top) - Link: tier3.xyz/cyber-security-pakistan/ (R/Xmeta/L- removed)
    Other links: www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/rprt-eng.aspx (3380, 715, 18, 0- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/index-eng.aspx (3380, 715, 18, 0- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/ccirc-ccric-eng.aspx (3380, 715, 18, 0- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (3380, 715, 18, 0- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-ncdnt-frmwrk/index-eng.aspx#_Toc360619104 (3380, 715, 18, 0- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (3380, 715, 18, 0- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/index-eng.aspx (3380, 715, 18, 0- R/X/L) www.marketwired.com/press-release/government-of-canada-launches-canadas-cyber-security-strategy-1328661.htm (3380, 4692, X, X- R/X/L) nacta.gov.pk (3380, 16, 2, 1- R/X/L) tier3.pk (3380, 20, 4, 1- R/X/L) surfsafe.pk (3380, 9, 4, 1- R/X/L) blogs.wsj.com/korearealtime/2013/09/23/seoul-puts-a-price-on-cyberdefense/ (3380, -1, X, X- R/X/L) Surfsafe.pk (3380, 0, X, X- R/X/L) tier3.pk (3380, 20, 4, 1- R/X/L) www.nr3c.gov.pk/about_us.html (3380, 16, 2, 1- R/X/L) tier3.xyz/cyber-security-pakistan/ (3380, 25, 2, 1- R/X/L) www.getcybersafe.gc.ca/index-eng.aspx (3380, 18, 2, 1- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (3380, 715, 18, 0- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (3380, 715, 18, 0- R/X/L) www.marketwired.com/press-release/government-canada-launches-cyber-security-awareness-month-with-new-public-awareness-1706660.htm (3380, 4692, X, X- R/X/L)
  9. 2017-03-09 20:54:07 (UTC): User Whizz40 t • c • dc • l • ef • b • bl; (3380) to Computer security (edit | talk | history | links | watch | logs) (diff  !top) - Link: tier3.xyz/cyber-security-pakistan/ (R/Xmeta/L- removed)
    Other links: blogs.wsj.com/korearealtime/2013/09/23/seoul-puts-a-price-on-cyberdefense/ (3380, -1, X, X- R/X/L) Surfsafe.pk (3380, 0, X, X- R/X/L) tier3.pk (3380, 20, 4, 1- R/X/L) www.nr3c.gov.pk/about_us.html (3380, 16, 2, 1- R/X/L) tier3.xyz/cyber-security-pakistan/ (3380, 25, 2, 1- R/X/L) www.getcybersafe.gc.ca/index-eng.aspx (3380, 18, 2, 1- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (3380, 715, 18, 0- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (3380, 715, 18, 0- R/X/L) www.marketwired.com/press-release/government-canada-launches-cyber-security-awareness-month-with-new-public-awareness-1706660.htm (3380, 4692, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/rprt-eng.aspx (3380, 715, 18, 0- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/index-eng.aspx (3380, 715, 18, 0- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/ccirc-ccric-eng.aspx (3380, 715, 18, 0- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (3380, 715, 18, 0- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-ncdnt-frmwrk/index-eng.aspx#_Toc360619104 (3380, 715, 18, 0- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (3380, 715, 18, 0- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/index-eng.aspx (3380, 715, 18, 0- R/X/L) www.marketwired.com/press-release/government-of-canada-launches-canadas-cyber-security-strategy-1328661.htm (3380, 4692, X, X- R/X/L) nacta.gov.pk (3380, 16, 2, 1- R/X/L) tier3.pk (3380, 20, 4, 1- R/X/L) surfsafe.pk (3380, 9, 4, 1- R/X/L)
  10. 2018-01-18 08:27:28 (UTC): User Sawansasaram t • c • dc • l • ef • b • bl; (750) to User:Sawansasaram/sandbox (edit | talk | history | links | watch | logs) (diff - DELETED) - Link: tier3.xyz/cyber-security-pakistan/ (R/Xmeta/L)
    Other links: web.archive.org/web/20140923153548/http://www.maawg.org/about_maawg (750, -1, X, X- R/X/L) web.archive.org/web/20170202014932/http://www.telegraph.co.uk/technology/2016/09/21/tesla-fixes-software-bug-that-allowed-chinese-hackers-to-control/ (750, -1, X, X- R/X/L) www.maawg.org/about_maawg (750, , X, X- R/X/L) www.telegraph.co.uk/technology/2016/09/21/tesla-fixes-software-bug-that-allowed-chinese-hackers-to-control/ (750, -1, X, X- R/X/L) web.archive.org/web/20141203223358/http://www.coe.int/t/DGHL/cooperation/economiccrime/cybercrime/default_en.asp (750, -1, X, X- R/X/L) web.archive.org/web/20170202061247/http://www.independent.co.uk/news/science/hackers-remotely-carjack-jeep-from-10-miles-away-and-drive-it-into-ditch-10406554.html (750, -1, X, X- R/X/L) www.coe.int/t/DGHL/cooperation/economiccrime/cybercrime/default_en.asp (750, , X, X- R/X/L) www.independent.co.uk/news/science/hackers-remotely-carjack-jeep-from-10-miles-away-and-drive-it-into-ditch-10406554.html (750, , X, X- R/X/L) www.first.org/members/teams/index.html (750, , X, X- R/X/L) web.archive.org/web/20170119103855/https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ (750, -1, X, X- R/X/L) www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ (750, , X, X- R/X/L) web.archive.org/web/20150221064614/http://www.autosec.org/pubs/cars-usenixsec2011.pdf (750, -1, X, X- R/X/L) web.archive.org/web/20150925100225/http://www.first.org/members/teams/index.html (750, -1, X, X- R/X/L) www.autosec.org/pubs/cars-usenixsec2011.pdf (750, , X, X- R/X/L) www.first.org/about/mission/mission.html (750, , X, X- R/X/L) web.archive.org/web/20170316152605/https://www.theguardian.com/technology/2015/dec/23/the-problem-with-self-driving-cars-who-controls-the-code (750, -1, X, X- R/X/L) web.archive.org/web/20111014182329/http://first.org/about/mission/mission.html (750, -1, X, X- R/X/L) www.theguardian.com/technology/2015/dec/23/the-problem-with-self-driving-cars-who-controls-the-code (750, -1, X, X- R/X/L) articles.sfgate.com/2005-02-17/business/17361991_1_rsa-security-conference-cybersecurity-counterpane-internet-security (750, , X, X- R/X/L) web.archive.org/web/20151119221200/http://www.gao.gov/highrisk/protecting_the_federal_government_information_systems/why_did_study (750, -1, X, X- R/X/L) www.gao.gov/highrisk/protecting_the_federal_government_information_systems/why_did_study (750, , X, X- R/X/L) web.archive.org/web/20170120180918/https://www.aol.com/article/news/2016/12/26/expert-warns-major-event-will-need-to-happen-for-cybersecurity/21632630/ (750, -1, X, X- R/X/L) www.aol.com/article/news/2016/12/26/expert-warns-major-event-will-need-to-happen-for-cybersecurity/21632630/ (750, , X, X- R/X/L) web.archive.org/web/20161109040112/http://www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf (750, -1, X, X- R/X/L) www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf (750, , X, X- R/X/L) web.archive.org/web/20170317212726/http://www.vox.com/2015/1/18/7629603/car-hacking-dangers (750, -1, X, X- R/X/L) www.vox.com/2015/1/18/7629603/car-hacking-dangers (750, , X, X- R/X/L) web.archive.org/web/20141217204735/http://www.businessinsider.com/the-sony-hackers-still-have-a-massive-amount-of-data-that-hasnt-been-leaked-yet-2014-12 (750, -1, X, X- R/X/L) www.businessinsider.com/the-sony-hackers-still-have-a-massive-amount-of-data-that-hasnt-been-leaked-yet-2014-12 (750, , X, X- R/X/L) web.archive.org/web/20150104195455/http://money.cnn.com/2014/12/24/technology/security/sony-hack-facts/ (750, -1, X, X- R/X/L) money.cnn.com/2014/12/24/technology/security/sony-hack-facts/ (750, , X, X- R/X/L) web.archive.org/web/20110329090824/http://arstechnica.com/tech-policy/news/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price.ars (750, -1, X, X- R/X/L) arstechnica.com/tech-policy/news/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price.ars/ (750, , X, X- R/X/L) web.archive.org/web/20161125075257/https://www.youtube.com/watch?v=0TMFRO66Wv4 (750, -1, X, X- R/X/L) web.archive.org/web/20110327045801/http://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars (750, -1, X, X- R/X/L) arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars/ (750, , X, X- R/X/L) www.youtube.com/watch?v=0TMFRO66Wv4 (750, -1, X, X- R/X/L) web.archive.org/web/20171109081033/https://www.infosecurity-magazine.com/news/lack-of-employee-security-training/ (750, -1, X, X- R/X/L) web.archive.org/web/20130116010603/http://www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net.html (750, -1, X, X- R/X/L) www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net.html (750, , X, X- R/X/L) www.infosecurity-magazine.com/news/lack-of-employee-security-training/ (750, , X, X- R/X/L) web.archive.org/web/20180105015734/https://www.secureworks.com/blog/cybersecurity-programs-of-the-future-what-will-bench-strength-look-llke (750, -1, X, X- R/X/L) www.secureworks.com/blog/cybersecurity-programs-of-the-future-what-will-bench-strength-look-llke (750, , X, X- R/X/L) www.sciencedirect.com/science/article/pii/S1353485815300805 (750, , X, X- R/X/L) web.archive.org/web/20150605135158/http://www.nytimes.com/2015/06/05/us/breach-in-a-federal-computer-system-exposes-personnel-data.html (750, -1, X, X- R/X/L) www.nytimes.com/2015/06/05/us/breach-in-a-federal-computer-system-exposes-personnel-data.html (750, -1, X, X- R/X/L) web.archive.org/web/20150710075449/http://www.reuters.com/article/2015/07/09/us-cybersecurity-usa-idUSKCN0PJ2M420150709 (750, -1, X, X- R/X/L) www.reuters.com/article/2015/07/09/us-cybersecurity-usa-idUSKCN0PJ2M420150709 (750, -1, X, X- R/X/L) www.usnews.com/news/articles/2015/06/05/china-suspected-in-theft-of-federal-employee-records (750, , X, X- R/X/L) web.archive.org/web/20150606064331/http://www.usnews.com/news/articles/2015/06/05/china-suspected-in-theft-of-federal-employee-records (750, -1, X, X- R/X/L) web.archive.org/web/20160604120725/http://www.reuters.com/article/us-cybersecurity-healthcare-fbi-exclusiv-idUSBREA3M1Q920140423 (750, -1, X, X- R/X/L) web.archive.org/web/20150604215718/http://www.wsj.com/articles/u-s-suspects-hackers-in-china-behind-government-data-breach-sources-say-1433451888 (750, -1, X, X- R/X/L) www.reuters.com/article/us-cybersecurity-healthcare-fbi-exclusiv-idUSBREA3M1Q920140423 (750, -1, X, X- R/X/L) www.wsj.com/articles/u-s-suspects-hackers-in-china-behind-government-data-breach-sources-say-1433451888 (750, , X, X- R/X/L) web.archive.org/web/20171102050405/https://www.nytimes.com/2017/09/27/technology/twitter-russia-election.html (750, -1, X, X- R/X/L) web.archive.org/web/20170228005352/http://www.reuters.com/article/us-cybersecurity-usa-idUSKCN0PJ2M420150709 (750, -1, X, X- R/X/L) www.nytimes.com/2017/09/27/technology/twitter-russia-election.html (750, -1, X, X- R/X/L) www.reuters.com/article/us-cybersecurity-usa-idUSKCN0PJ2M420150709 (750, -1, X, X- R/X/L) web.archive.org/web/20171201054900/https://www.nytimes.com/2017/10/02/business/equifax-breach.html (750, -1, X, X- R/X/L) web.archive.org/web/20141209035159/http://www.cnet.com/news/53-million-emails-stolen-in-home-depot-breach/ (750, -1, X, X- R/X/L) www.nytimes.com/2017/10/02/business/equifax-breach.html (750, -1, X, X- R/X/L) www.cnet.com/news/53-million-emails-stolen-in-home-depot-breach/ (750, , X, X- R/X/L) web.archive.org/web/20171201035530/http://money.cnn.com/2013/12/18/news/companies/target-credit-card/index.html (750, -1, X, X- R/X/L) web.archive.org/web/20150127015928/http://www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data (750, -1, X, X- R/X/L) money.cnn.com/2013/12/18/news/companies/target-credit-card/index.html (750, , X, X- R/X/L) www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data (750, , X, X- R/X/L) web.archive.org/web/20141221160612/http://fortune.com/2014/12/19/staples-cards-affected-breach/ (750, -1, X, X- R/X/L) fortune.com/2014/12/19/staples-cards-affected-breach/ (750, , X, X- R/X/L) web.archive.org/web/20141218221105/http://money.cnn.com/2014/09/18/technology/security/home-depot-hack/ (750, -1, X, X- R/X/L) money.cnn.com/2014/09/18/technology/security/home-depot-hack/ (750, , X, X- R/X/L) web.archive.org/web/20150211064650/http://www.npr.org/blogs/alltechconsidered/2014/08/06/338334508/is-your-watch-or-thermostat-a-spy-cyber-security-firms-are-on-it (750, -1, X, X- R/X/L) www.npr.org/blogs/alltechconsidered/2014/08/06/338334508/is-your-watch-or-thermostat-a-spy-cyber-security-firms-are-on-it (750, , X, X- R/X/L) web.archive.org/web/20140709131535/http://mashable.com/2013/10/30/nsa-google-yahoo-data-centers/ (750, -1, X, X- R/X/L) web.archive.org/web/20170611031121/https://www.faa.gov/nextgen/update/progress_and_plans/data_comm/ (750, -1, X, X- R/X/L) mashable.com/2013/10/30/nsa-google-yahoo-data-centers/ (750, -1, X, X- R/X/L) www.faa.gov/nextgen/update/progress_and_plans/data_comm/ (750, , X, X- R/X/L) web.archive.org/web/20160201095426/http://spectrum.ieee.org/telecom/security/can-you-trust-nist (750, -1, X, X- R/X/L) spectrum.ieee.org/telecom/security/can-you-trust-nist (750, , X, X- R/X/L) web.archive.org/web/20140714174333/https://www.freesnowden.is/fr/2014/01/27/video-ard-interview-with-edward-snowden/ (750, -1, X, X- R/X/L) web.archive.org/web/20170319025329/https://www.eurocontrol.int/news/centralised-services-newpens-moves-forward (750, -1, X, X- R/X/L) www.freesnowden.is/fr/2014/01/27/video-ard-interview-with-edward-snowden/ (750, , X, X- R/X/L) www.eurocontrol.int/news/centralised-services-newpens-moves-forward (750, , X, X- R/X/L) web.archive.org/web/20130816045641/http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order (750, -1, X, X- R/X/L) web.archive.org/web/20161212175606/https://www.eurocontrol.int/articles/pan-european-network-services-pens (750, -1, X, X- R/X/L) www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order (750, -1, X, X- R/X/L) www.eurocontrol.int/articles/pan-european-network-services-pens (750, , X, X- R/X/L) web.archive.org/web/20111219174833/http://www.crows.org/images/stories/pdf/IOI/IO%20Journal_Vol2Iss2_0210.pdf (750, -1, X, X- R/X/L) www.crows.org/images/stories/pdf/IOI/IO%20Journal_Vol2Iss2_0210.pdf (750, , X, X- R/X/L) web.archive.org/web/20120307021747/http://www.stripes.com/news/cone-of-silence-surrounds-u-s-cyberwarfare-1.158090 (750, -1, X, X- R/X/L) web.archive.org/web/20151013061705/http://www.reuters.com/article/2014/08/04/us-cybersecurity-hackers-airplanes-idUSKBN0G40WQ20140804 (750, -1, X, X- R/X/L) www.stripes.com/news/cone-of-silence-surrounds-u-s-cyberwarfare-1.158090 (750, , X, X- R/X/L) www.reuters.com/article/2014/08/04/us-cybersecurity-hackers-airplanes-idUSKBN0G40WQ20140804 (750, -1, X, X- R/X/L) web.archive.org/web/20110218154415/http://www.wired.com/threatlevel/2011/02/cyberwar-issues-likely-to-be-addressed-only-after-a-catastrophe/ (750, -1, X, X- R/X/L) web.archive.org/web/20150208072554/http://www.npr.org/blogs/alltechconsidered/2014/08/04/337794061/hacker-says-he-can-break-into-airplane-systems-using-in-flight-wi-fi (750, -1, X, X- R/X/L) www.wired.com/threatlevel/2011/02/cyberwar-issues-likely-to-be-addressed-only-after-a-catastrophe (750, , X, X- R/X/L) www.npr.org/blogs/alltechconsidered/2014/08/04/337794061/hacker-says-he-can-break-into-airplane-systems-using-in-flight-wi-fi (750, , X, X- R/X/L) web.archive.org/web/20131016133651/http://www.cbsnews.com/8301-501465_162-20017507-501465.html (750, -1, X, X- R/X/L) web.archive.org/web/20150208070914/http://www.securityweek.com/air-traffic-control-systems-vulnerabilities-could-make-unfriendly-skies-black-hat (750, -1, X, X- R/X/L) www.cbsnews.com/8301-501465_162-20017507-501465.html (750, , X, X- R/X/L) www.securityweek.com/air-traffic-control-systems-vulnerabilities-could-make-unfriendly-skies-black-hat (750, , X, X- R/X/L) web.archive.org/web/20140509020404/http://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11 (750, -1, X, X- R/X/L) www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11 (750, , X, X- R/X/L) web.archive.org/web/20161017100223/https://www.securestate.com/blog/2012/02/16/vulnerabilities-in-smart-meters (750, -1, X, X- R/X/L) web.archive.org/web/20070928041047/http://www.myfoxtwincities.com/myfox/pages/Home/Detail?contentId=2804836&version=3&locale=EN-US&layoutCode=TSTY&pageId=1.1.1 (750, -1, X, X- R/X/L) www.myfoxtwincities.com/myfox/pages/Home/Detail?contentId=2804836&version=3&locale=EN-US&layoutCode=TSTY&pageId=1.1.1 (750, , X, X- R/X/L) www.securestate.com/blog/2012/02/16/vulnerabilities-in-smart-meters (750, , X, X- R/X/L) web.archive.org/web/20120927014805/http://www.businesswire.com/news/tjx/20070117005971/en (750, -1, X, X- R/X/L) web.archive.org/web/20150218070238/http://money.cnn.com/2014/11/18/technology/security/energy-grid-hack (750, -1, X, X- R/X/L) www.businesswire.com/news/tjx/20070117005971/en (750, , X, X- R/X/L) money.cnn.com/2014/11/18/technology/security/energy-grid-hack/ (750, , X, X- R/X/L) web.archive.org/web/20160306140354/http://fas.org/irp/gao/aim96084.htm (750, -1, X, X- R/X/L) fas.org/irp/gao/aim96084.htm (750, , X, X- R/X/L) web.archive.org/web/20120502090205/http://vita-technologies.com/articles/board-bored-lockheed-martin-co/ (750, -1, X, X- R/X/L) vita-technologies.com/articles/board-bored-lockheed-martin-co/ (750, , X, X- R/X/L) web.archive.org/web/20131203031833/http://www.darkreading.com/applications/secure-os-gets-highest-nsa-rating-goes-c/212100421 (750, -1, X, X- R/X/L) papers.ssrn.com/abstract=2996896 (750, , X, X- R/X/L) www.darkreading.com/applications/secure-os-gets-highest-nsa-rating-goes-c/212100421 (750, , X, X- R/X/L) web.archive.org/web/20160520144908/http://espn.go.com/nba/story/_/id/15615363/milwaukee-bucks-leak-tax-information-players-employees-result-email-scam (750, -1, X, X- R/X/L) web.archive.org/web/20140320215829/http://video.foxbusiness.com/v/2804966490001/forget-ids-use-your-phone-as-credentials/?playlist_id=937116503001#sp=show-clips (750, -1, X, X- R/X/L) espn.go.com/nba/story/_/id/15615363/milwaukee-bucks-leak-tax-information-players-employees-result-email-scam (750, , X, X- R/X/L) video.foxbusiness.com/v/2804966490001/forget-ids-use-your-phone-as-credentials/?playlist_id=937116503001#sp=show-clips (750, , X, X- R/X/L) www.networkworld.com/news/tech/2010/110810-network-vulnerabilities.html (750, , X, X- R/X/L) web.archive.org/web/20140424195204/http://www.networkworld.com/news/tech/2010/110810-network-vulnerabilities.html (750, -1, X, X- R/X/L) web.archive.org/web/20170621202140/http://www.pcmag.com/article2/0,2817,2342798,00.asp (750, -1, X, X- R/X/L) www.pcmag.com/article2/0,2817,2342798,00.asp (750, , X, X- R/X/L) web.archive.org/web/20140320220133/http://www.scmagazine.com/safenet-protectdrive-84/review/2596/ (750, -1, X, X- R/X/L) www.scmagazine.com/safenet-protectdrive-84/review/2596/ (750, , X, X- R/X/L) web.archive.org/web/20160623105523/http://www.ft.com/intl/cms/s/0/83b4e9be-db16-11e5-a72f-1e7744c66818.html#axzz41pN5YBV4 (750, -1, X, X- R/X/L) www.ft.com/intl/cms/s/0/83b4e9be-db16-11e5-a72f-1e7744c66818.html#axzz41pN5YBV4 (750, , X, X- R/X/L) web.archive.org/web/20131203043630/http://upcommons.upc.edu/pfc/bitstream/2099.1/12289/1/73827.pdf (750, -1, X, X- R/X/L) upcommons.upc.edu/pfc/bitstream/2099.1/12289/1/73827.pdf (750, , X, X- R/X/L) web.archive.org/web/20140611161421/http://www.intel.com/content/dam/www/public/us/en/documents/white-papers/trusted-execution-technology-security-paper.pdf (750, -1, X, X- R/X/L) web.archive.org/web/20150913200707/http://www.case.edu/its/kba/its-kba-27196-phishing-attempt/ (750, -1, X, X- R/X/L) www.intel.com/content/dam/www/public/us/en/documents/white-papers/trusted-execution-technology-security-paper.pdf (750, , X, X- R/X/L) www.case.edu/its/kba/its-kba-27196-phishing-attempt/ (750, , X, X- R/X/L) web.archive.org/web/20140320220321/http://www.thewindowsclub.com/lock-protect-your-windows-pc-using-a-usb-drive-with-predator (750, -1, X, X- R/X/L) www.thewindowsclub.com/lock-protect-your-windows-pc-using-a-usb-drive-with-predator (750, , X, X- R/X/L) web.archive.org/web/20140320234026/http://www.safenet-inc.com/multi-factor-authentication/authenticators/pki-usb-authentication/etoken-5200-token-based-authentication/ (750, -1, X, X- R/X/L) web.archive.org/web/20140804130416/http://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ (750, -1, X, X- R/X/L) www.safenet-inc.com/multi-factor-authentication/authenticators/pki-usb-authentication/etoken-5200-token-based-authentication/ (750, , X, X- R/X/L) arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ (750, , X, X- R/X/L) www.tandfonline.com.mutex.gmu.edu/doi/abs/10.1080/10658980701824432 (750, , X, X- R/X/L) web.archive.org/web/20140320220549/http://www.e-spincorp.com/espinv3/index.php/solutions/3-solutions/174-sentinel-hasp-hl (750, -1, X, X- R/X/L) link-springer-com.ezaccess.libraries.psu.edu/content/pdf/10.1007%2F978-1-4471-6524-8.pdf (750, , X, X- R/X/L) sites.google.com/site/datarecoverybrisbane/ (750, , X, X- R/X/L) www.e-spincorp.com/espinv3/index.php/solutions/3-solutions/174-sentinel-hasp-hl (750, , X, X- R/X/L) curlie.org/Computers/Security/Policy/ (750, , X, X- R/X/L) web.archive.org/web/20130921055451/http://www.cs.columbia.edu/~waksman/PDFs/Oakland_2010.pdf (750, -1, X, X- R/X/L) web.archive.org/web/20140316021605/http://www.webopedia.com/TERM/E/endpoint_security.html (750, -1, X, X- R/X/L) www.cs.columbia.edu/~waksman/PDFs/Oakland_2010.pdf (750, , X, X- R/X/L) www.oxfordreference.com.ezaccess.libraries.psu.edu/view/10.1093/acref/9780199688975.001.0001/acref-9780199688975-e-4987 (750, , X, X- R/X/L) www.webopedia.com/TERM/E/endpoint_security.html (750, , X, X- R/X/L) web.archive.org/web/20140312221955/http://www.scientificamerican.com/article/the-hacker-in-your-hardware/ (750, -1, X, X- R/X/L) web.archive.org/web/20111106055944/http://www.businessdictionary.com/definition/data-integrity.html (750, -1, X, X- R/X/L) www.scientificamerican.com/article/the-hacker-in-your-hardware/ (750, -1, X, X- R/X/L) www.businessdictionary.com/definition/data-integrity.html (750, , X, X- R/X/L) web.archive.org/web/20130504191958/http://www.ganssle.com/rants/gettingitright.htm (750, -1, X, X- R/X/L) web.archive.org/web/20160630134737/https://www.techopedia.com/definition/5398/spoofing (750, -1, X, X- R/X/L) www.ganssle.com/rants/gettingitright.htm (750, , X, X- R/X/L) www.techopedia.com/definition/5398/spoofing (750, , X, X- R/X/L) web.archive.org/web/20110719110932/http://www-wjp.cs.uni-saarland.de/publikationen/Ba10EW.pdf (750, -1, X, X- R/X/L) web.archive.org/web/20160403050123/http://gadgtecs.com/2016/03/30/wifi-mouse-leave-billions-risk-computer-hack/ (750, -1, X, X- R/X/L) www-wjp.cs.uni-saarland.de/publikationen/Ba10EW.pdf (750, , X, X- R/X/L) gadgtecs.com/2016/03/30/wifi-mouse-leave-billions-risk-computer-hack/ (750, , X, X- R/X/L) sel4.systems/Docs/seL4-spec.pdf (750, , X, X- R/X/L) medical-dictionary.thefreedictionary.com/confidentiality (750, , X, X- R/X/L) web.archive.org/web/20150521171234/https://sel4.systems/Docs/seL4-spec.pdf (750, -1, X, X- R/X/L) portal.acm.org/citation.cfm?id=800667 (750, , X, X- R/X/L) web.archive.org/web/20110227073552/http://www.codenomicon.com/solutions/unknown-vulnerability-management/ (750, -1, X, X- R/X/L) web.archive.org/web/20160806080013/https://www.csa.gov.sg/gosafeonline/go-safe-for-business/smes/distributed-denial-of-service-attack (750, -1, X, X- R/X/L) web.archive.org/web/20141003115305/http://www.learnquest.com/subcategories.aspx?categoryid=33 (750, -1, X, X- R/X/L) www.codenomicon.com/solutions/unknown-vulnerability-management/ (750, , X, X- R/X/L) www.csa.gov.sg/gosafeonline/go-safe-for-business/smes/distributed-denial-of-service-attack (750, , X, X- R/X/L) www.learnquest.com/subcategories.aspx?categoryid=33 (750, , X, X- R/X/L) web.archive.org/web/20150925113829/http://www.reuters.com/article/2010/10/18/us-crime-fraud-idUSTRE69H25820101018 (750, -1, X, X- R/X/L) web.archive.org/web/20161012010519/https://www.researchgate.net/publication/298807979_Computer_Security_and_Mobile_Security_Challenges (750, -1, X, X- R/X/L) web.archive.org/web/20150106064140/http://msisac.cisecurity.org/resources/videos/free-training.cfm (750, -1, X, X- R/X/L) www.reuters.com/article/2010/10/18/us-crime-fraud-idUSTRE69H25820101018 (750, -1, X, X- R/X/L) www.researchgate.net/publication/298807979_Computer_Security_and_Mobile_Security_Challenges (750, , X, X- R/X/L) msisac.cisecurity.org/resources/videos/free-training.cfm (750, , X, X- R/X/L) web.archive.org/web/20160820015812/https://www.datanami.com/2016/05/09/oni-may-best-hope-cyber-security-now/ (750, -1, X, X- R/X/L) www.theaustralian.com.au/technology/opinion/reliance-spells-end-of-road-for-ict-amateurs/story-e6frgb0o-1226636267865?nk=34fe4ab684629535daaf6a8fe6e6ef3d (750, , X, X- R/X/L) web.archive.org/web/20150107111146/http://www.dhs.gov/cybersecurity-training-exercises (750, -1, X, X- R/X/L) www.datanami.com/2016/05/09/oni-may-best-hope-cyber-security-now/ (750, , X, X- R/X/L) web.archive.org/web/20121321225800/http://searchsecurity.techtarget.com/definition/social-engineering (750, -1, X, X- R/X/L) www.dhs.gov/cybersecurity-training-exercises (750, , X, X- R/X/L) web.archive.org/web/20160713120506/http://www.cloudera.com/solutions/cybersecurity.html (750, -1, X, X- R/X/L) searchsecurity.techtarget.com/definition/social-engineering (750, , X, X- R/X/L) web.archive.org/web/20130502135412/http://www.dhs.gov/join-dhs-cybersecurity (750, -1, X, X- R/X/L) www.cloudera.com/solutions/cybersecurity.html (750, , X, X- R/X/L) web.archive.org/web/20171228171958/https://commons.erau.edu/jdfsl/vol12/iss2/8/ (750, -1, X, X- R/X/L) www.dhs.gov/join-dhs-cybersecurity (750, , X, X- R/X/L) commons.erau.edu/jdfsl/vol12/iss2/8/ (750, , X, X- R/X/L) niccs.us-cert.gov/home/students (750, , X, X- R/X/L) www.law.cornell.edu/uscode/text/18/1030#e_2 (750, , X, X- R/X/L) web.archive.org/web/20140223192040/http://niccs.us-cert.gov/home/students (750, -1, X, X- R/X/L) www.law.cornell.edu/uscode/text/18/1030 (750, , X, X- R/X/L) www.cs.gwu.edu/academics/graduate_programs/master/cybersecurity/cybersecurity-jobs (750, , X, X- R/X/L) www.nanoit.pt (750, , X, X- R/X/L) web.archive.org/web/20130603085633/http://www.cs.gwu.edu/academics/graduate_programs/master/cybersecurity/cybersecurity-jobs (750, -1, X, X- R/X/L) www.nanoit.pt (750, , X, X- R/X/L) web.archive.org/web/20161021073353/http://iase.disa.mil/iawip/Pages/iabaseline.aspx (750, -1, X, X- R/X/L) web.archive.org/web/20141003064643/http://www.techopedia.com/definition/72/security-architecture (750, -1, X, X- R/X/L) www.cncs.gov.pt (750, , X, X- R/X/L) iase.disa.mil/iawip/Pages/iabaseline.aspx (750, , X, X- R/X/L) www.techopedia.com/definition/72/security-architecture (750, , X, X- R/X/L) web.archive.org/web/20140424200253/http://www.defenceiq.com/defence-technology/articles/the-cyber-security-industry-and-you/ (750, -1, X, X- R/X/L) web.archive.org/web/20140315012754/http://www.opensecurityarchitecture.org/cms/definitions/it-security-architecture (750, -1, X, X- R/X/L) www.defenceiq.com/defence-technology/articles/the-cyber-security-industry-and-you/ (750, , X, X- R/X/L) www.opensecurityarchitecture.org/cms/definitions/it-security-architecture (750, , X, X- R/X/L) web.archive.org/web/20160528165313/http://burning-glass.com/demand-for-cybersecurity-workers-outstripping-supply/ (750, -1, X, X- R/X/L) burning-glass.com/demand-for-cybersecurity-workers-outstripping-supply/ (750, , X, X- R/X/L) web.archive.org/web/20160323042705/http://www.networkworld.com/article/3045801/security/cybersecurity-skills-shortage-impact-on-cloud-computing.html (750, -1, X, X- R/X/L) web.archive.org/web/20141120041536/http://www.infosectoday.com/Articles/Glossary.pdf (750, -1, X, X- R/X/L) www.networkworld.com/article/3045801/security/cybersecurity-skills-shortage-impact-on-cloud-computing.html (750, , X, X- R/X/L) www.infosectoday.com/Articles/Glossary.pdf (750, , X, X- R/X/L) web.archive.org/web/20160611173429/http://burning-glass.com/research/cybersecurity/ (750, -1, X, X- R/X/L) web.archive.org/web/20120227163121/http://www.cnss.gov/Assets/pdf/cnssi_4009.pdf (750, -1, X, X- R/X/L) www.burning-glass.com/research/cybersecurity/ (750, , X, X- R/X/L) www.cnss.gov/Assets/pdf/cnssi_4009.pdf (750, , X, X- R/X/L) www.webcitation.org/6kWCE919Q?url=https://www.washingtonpost.com/world/national-security/obama-to-be-urged-to-split-cyberwar-command-from-the-nsa/2016/09/12/0ad09a22-788f-11e6-ac8e-cf8e0dd91dc7_story.html (750, -1, X, X- R/X/L) www.washingtonpost.com/world/national-security/obama-to-be-urged-to-split-cyberwar-command-from-the-nsa/2016/09/12/0ad09a22-788f-11e6-ac8e-cf8e0dd91dc7_story.html (750, , X, X- R/X/L) web.archive.org/web/20150416090310/http://www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race (750, -1, X, X- R/X/L) tools.ietf.org/html/rfc2828 (750, -1, X, X- R/X/L) www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race (750, , X, X- R/X/L) web.archive.org/web/20050831162039/http://www.computerworld.com/securitytopics/security/story/0,10801,89488,00.html (750, -1, X, X- R/X/L) www.computerworld.com/securitytopics/security/story/0,10801,89488,00.html (750, , X, X- R/X/L) web.archive.org/web/20161017100306/https://www.fas.org/sgp/crs/homesec/IN10296.pdf (750, -1, X, X- R/X/L) www.fas.org/sgp/crs/homesec/IN10296.pdf (750, , X, X- R/X/L) web.archive.org/web/20161229102808/http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM482022.pdf (750, -1, X, X- R/X/L) web.archive.org/web/20160519181332/http://www.nextgov.com/cybersecurity/2016/03/faa-has-started-shaping-cybersecurity-regulations/126449/ (750, -1, X, X- R/X/L) www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM482022.pdf (750, , X, X- R/X/L) www.nextgov.com/cybersecurity/2016/03/faa-has-started-shaping-cybersecurity-regulations/126449/ (750, , X, X- R/X/L) web.archive.org/web/20160613150636/http://www.gao.gov/products/GAO-15-370 (750, -1, X, X- R/X/L) www.gao.gov/products/GAO-15-370 (750, , X, X- R/X/L) web.archive.org/web/20161228210257/http://www.theverge.com/2016/12/27/14095166/fda-guidance-medical-device-cybersecurity-cyberattack-hacking-guidelines (750, -1, X, X- R/X/L) web.archive.org/web/20160525195552/http://www.nhtsa.gov/Research/Crash+Avoidance/Automotive+Cybersecurity (750, -1, X, X- R/X/L) www.theverge.com/2016/12/27/14095166/fda-guidance-medical-device-cybersecurity-cyberattack-hacking-guidelines (750, , X, X- R/X/L) www.nhtsa.gov/Research/Crash+Avoidance/Automotive+Cybersecurity (750, , X, X- R/X/L) web.archive.org/web/20161229171117/http://www.healthcareitnews.com/news/texas-hospital-hacked-affects-nearly-30000-patient-records (750, -1, X, X- R/X/L) www.healthcareitnews.com/news/texas-hospital-hacked-affects-nearly-30000-patient-records (750, , X, X- R/X/L) web.archive.org/web/20170929233237/http://boston.cbslocal.com/2016/12/27/former-patient-accused-data-breech-new-hampshire-psychiatric-hospital/ (750, -1, X, X- R/X/L) web.archive.org/web/20160528153847/http://www.fda.gov/medicaldevices/safety/alertsandnotices/ucm356423.htm (750, -1, X, X- R/X/L) boston.cbslocal.com/2016/12/27/former-patient-accused-data-breech-new-hampshire-psychiatric-hospital/ (750, , X, X- R/X/L) www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm356423.htm (750, , X, X- R/X/L) web.archive.org/web/20161229100748/https://www.rt.com/usa/371979-nh-hospital-data-breach/ (750, -1, X, X- R/X/L) web.archive.org/web/20100527095750/http://www.fcc.gov/pshs/emergency-information/cybersecurity.html (750, -1, X, X- R/X/L) www.rt.com/usa/371979-nh-hospital-data-breach/ (750, , X, X- R/X/L) www.fcc.gov/pshs/emergency-information/cybersecurity.html (750, , X, X- R/X/L) web.archive.org/web/20060210001401/https://www.brookings.edu/ (750, -1, X, X- R/X/L) www.brookings.edu (750, , X, X- R/X/L) web.archive.org/web/20101106032102/http://www.brookings.edu/opinions/2010/0923_military_internet_shachtman.aspx (750, -1, X, X- R/X/L) www.brookings.edu/opinions/2010/0923_military_internet_shachtman.aspx (750, , X, X- R/X/L) web.archive.org/web/20100415113237/http://www.defense.gov/speeches/speech.aspx?speechid=1399 (750, -1, X, X- R/X/L) www.defense.gov/speeches/speech.aspx?speechid=1399 (750, , X, X- R/X/L) web.archive.org/web/20161229100631/http://indianexpress.com/article/technology/tech-news-technology/legion-hacking-no-political-agenda-just-computer-geeks-says-hacker-4423167/ (750, -1, X, X- R/X/L) web.archive.org/web/20161208004808/http://www.n2information.com/history (750, -1, X, X- R/X/L) indianexpress.com/article/technology/tech-news-technology/legion-hacking-no-political-agenda-just-computer-geeks-says-hacker-4423167/ (750, , X, X- R/X/L) www.n2information.com/history/ (750, , X, X- R/X/L) web.archive.org/web/20161229101209/http://www.bbc.com/news/uk-england-humber-37822084 (750, -1, X, X- R/X/L) web.archive.org/web/20060823173821/http://www.cybercrime.gov/ (750, -1, X, X- R/X/L) www.bbc.com/news/uk-england-humber-37822084 (750, -1, X, X- R/X/L) www.cybercrime.gov (750, , X, X- R/X/L) web.archive.org/web/20161229101819/http://www.bbc.com/news/uk-england-humber-37849746 (750, -1, X, X- R/X/L) www.infragard.net/media/files/dir_med.mov (750, , X, X- R/X/L) www.bbc.com/news/uk-england-humber-37849746 (750, -1, X, X- R/X/L) web.archive.org/web/20110617004540/http://www.infragard.net/media/files/dir_med.mov (750, -1, X, X- R/X/L) web.archive.org/web/20100909051004/http://www.infragard.net/ (750, -1, X, X- R/X/L) www.infragard.net (750, , X, X- R/X/L) www.grimsbytelegraph.co.uk/grimsby-hospital-computer-hack-no-ransom-has-been-demanded/story-29856124-detail/story.html (750, , X, X- R/X/L) web.archive.org/web/20111120021742/http://www.ic3.gov/default.aspx (750, -1, X, X- R/X/L) www.ic3.gov/default.aspx (750, , X, X- R/X/L) web.archive.org/web/20160711053557/https://www.fbi.gov/about-us/quick-facts (750, -1, X, X- R/X/L) www.fbi.gov/about-us/quick-facts (750, , X, X- R/X/L) web.archive.org/web/20081006042850/http://www.cyber.st.dhs.gov/faq.html (750, -1, X, X- R/X/L) web.archive.org/web/20161229101019/http://www.theregister.co.uk/2016/01/19/melbourne_hospital_pathology_wing_splattered_by_virus/ (750, -1, X, X- R/X/L) www.cyber.st.dhs.gov/faq.html (750, , X, X- R/X/L) www.theregister.co.uk/2016/01/19/melbourne_hospital_pathology_wing_splattered_by_virus/ (750, , X, X- R/X/L) web.archive.org/web/20161116141207/http://www.theregister.co.uk/2016/06/28/medjack (750, -1, X, X- R/X/L) www.dhs.gov/xabout/structure/editorial_0839.shtm (750, , X, X- R/X/L) www.theregister.co.uk/2016/06/28/medjack/ (750, , X, X- R/X/L) web.archive.org/web/20080611210347/https://www.dhs.gov/xabout/structure/editorial_0839.shtm (750, -1, X, X- R/X/L) web.archive.org/web/20161229103355/http://www.nbcnews.com/news/us-news/medstar-hospitals-recovering-after-ransomware-hack-n548121 (750, -1, X, X- R/X/L) web.archive.org/web/20120120040012/http://hsgac.senate.gov/public/index.cfm?FuseAction=Files.View&FileStore_id=4ee63497-ca5b-4a4b-9bba-04b7f4cb0123 (750, -1, X, X- R/X/L) www.nbcnews.com/news/us-news/medstar-hospitals-recovering-after-ransomware-hack-n548121 (750, , X, X- R/X/L) hsgac.senate.gov/public/index.cfm?FuseAction=Files.View&FileStore_id=4ee63497-ca5b-4a4b-9bba-04b7f4cb0123 (750, , X, X- R/X/L) www.opencongress.org/bill/111-h4962/text (750, , X, X- R/X/L) web.archive.org/web/20101228170910/http://www.opencongress.org/bill/111-h4962/text (750, -1, X, X- R/X/L) web.archive.org/web/20161229101247/http://www.businessinsider.com/hospital-ransomware-hack-2016-5 (750, -1, X, X- R/X/L) web.archive.org/web/20130925102342/http://blogs.wsj.com/korearealtime/2013/09/23/seoul-puts-a-price-on-cyberdefense/ (750, -1, X, X- R/X/L) www.businessinsider.com/hospital-ransomware-hack-2016-5 (750, , X, X- R/X/L) blogs.wsj.com/korearealtime/2013/09/23/seoul-puts-a-price-on-cyberdefense/ (750, -1, X, X- R/X/L) web.archive.org/web/20161229101724/http://www.wiwo.de/technologie/digitale-welt/cyber-angriffe-krankenhaeuser-ruecken-ins-visier-der-hacker/14946040.html (750, -1, X, X- R/X/L) www.wiwo.de/technologie/digitale-welt/cyber-angriffe-krankenhaeuser-ruecken-ins-visier-der-hacker/14946040.html (750, , X, X- R/X/L) web.archive.org/web/20161229104021/http://www.forbes.com/sites/kalevleetaru/2016/03/29/hacking-hospitals-and-holding-hostages-cybersecurity-in-2016/ (750, -1, X, X- R/X/L) www.forbes.com/sites/kalevleetaru/2016/03/29/hacking-hospitals-and-holding-hostages-cybersecurity-in-2016/ (750, -1, X, X- R/X/L) web.archive.org/web/20170202234526/https://tier3.pk/ (750, -1, X, X- R/X/L) web.archive.org/web/20160520155616/http://www.thedailybeast.com/articles/2014/11/17/how-your-pacemaker-will-get-hacked.html (750, -1, X, X- R/X/L) tier3.pk (750, 20, X, X- R/X/L) www.thedailybeast.com/articles/2014/11/17/how-your-pacemaker-will-get-hacked.html (750, , X, X- R/X/L) web.archive.org/web/20160604201841/http://www.computerworld.com/article/2492453/malware-vulnerabilities/pacemaker-hack-can-deliver-deadly-830-volt-jolt.html (750, -1, X, X- R/X/L) www.computerworld.com/article/2492453/malware-vulnerabilities/pacemaker-hack-can-deliver-deadly-830-volt-jolt.html (750, , X, X- R/X/L) web.archive.org/web/20151209014735/http://www.nr3c.gov.pk/about_us.html (750, -1, X, X- R/X/L) www.nr3c.gov.pk/about_us.html (750, 16, X, X- R/X/L) web.archive.org/web/20160529002947/http://www.darkreading.com/vulnerabilities---threats/hospital-medical-devices-used-as-weapons-in-cyberattacks/d/d-id/1320751 (750, -1, X, X- R/X/L) www.darkreading.com/vulnerabilities---threats/hospital-medical-devices-used-as-weapons-in-cyberattacks/d/d-id/1320751 (750, , X, X- R/X/L) tier3.xyz/cyber-security-pakistan/ (750, 25, X, X- R/X/L) web.archive.org/web/20160514002208/http://arstechnica.com/security/2012/11/hotel-room-burglars-exploit-critical-flaw-in-electronic-door-locks/ (750, -1, X, X- R/X/L) arstechnica.com/security/2012/11/hotel-room-burglars-exploit-critical-flaw-in-electronic-door-locks/ (750, , X, X- R/X/L) web.archive.org/web/20130920145534/http://blogs.hbr.org/2013/06/rethinking-security-for-the-in/ (750, -1, X, X- R/X/L) blogs.hbr.org/2013/06/rethinking-security-for-the-in (750, , X, X- R/X/L) web.archive.org/web/20161012010519/http://www.internet-of-things-research.eu/pdf/Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdf (750, -1, X, X- R/X/L) web.archive.org/web/20151211032450/https://tier3.xyz/cyber-security-pakistan/ (750, -1, X, X- R/X/L) web.archive.org/web/20171113165123/http://www.orfonline.org/cyfy-event/need-for-proper-structure-of-ppps-to-address-specific-cyberspace-risks/ (750, -1, X, X- R/X/L) www.internet-of-things-research.eu/pdf/Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdf (750, , X, X- R/X/L) www.orfonline.org/cyfy-event/need-for-proper-structure-of-ppps-to-address-specific-cyberspace-risks/ (750, , X, X- R/X/L) hbr.org/resources/pdfs/comm/verizon/18980_HBR_Verizon_IoT_Nov_14.pdf (750, , X, X- R/X/L) web.archive.org/web/20150627090938/http://www.forbes.com/sites/chrisclearfield/2013/09/18/why-the-ftc-cant-regulate-the-internet-of-things/ (750, -1, X, X- R/X/L) www.forbes.com/sites/chrisclearfield/2013/09/18/why-the-ftc-cant-regulate-the-internet-of-things/ (750, -1, X, X- R/X/L) ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7165580 (750, -1, X, X- R/X/L) web.archive.org/web/20150626125229/http://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx (750, -1, X, X- R/X/L) web.archive.org/web/20170323234015/https://www.merics.org/en/about-us/merics-analysis/chinas-political-system/ (750, -1, X, X- R/X/L) www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx (750, , X, X- R/X/L) www.merics.org/en/about-us/merics-analysis/chinas-political-system/ (750, , X, X- R/X/L) web.archive.org/web/20160610130749/http://www.edweek.org/ew/articles/2015/10/21/lessons-learned-from-security-breaches.html (750, -1, X, X- R/X/L) www.edweek.org/ew/articles/2015/10/21/lessons-learned-from-security-breaches.html (750, , X, X- R/X/L) web.archive.org/web/20170624014751/https://arstechnica.com/security/2015/06/encryption-would-not-have-helped-at-opm-says-dhs-official/ (750, -1, X, X- R/X/L) web.archive.org/web/20141111210737/http://www.getcybersafe.gc.ca/index-eng.aspx (750, -1, X, X- R/X/L) arstechnica.com/security/2015/06/encryption-would-not-have-helped-at-opm-says-dhs-official/ (750, , X, X- R/X/L) www.getcybersafe.gc.ca/index-eng.aspx (750, 18, X, X- R/X/L) web.archive.org/web/20150606063139/http://www.cnn.com/2015/06/04/politics/federal-agency-hacked-personnel-management/ (750, -1, X, X- R/X/L) www.cnn.com/2015/06/04/politics/federal-agency-hacked-personnel-management/ (750, , X, X- R/X/L) web.archive.org/web/20150605041629/http://www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-employees-records-at-risk (750, -1, X, X- R/X/L) www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-employees-records-at-risk (750, , X, X- R/X/L) web.archive.org/web/20151106193613/http://www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html (750, -1, X, X- R/X/L) web.archive.org/web/20141102184754/http://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (750, -1, X, X- R/X/L) www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html (750, -1, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (750, 715, X, X- R/X/L) web.archive.org/web/20090307045833/http://www.publications.parliament.uk/pa/ld200708/ldjudgmt/jd080730/mckinn-1.htm (750, -1, X, X- R/X/L) web.archive.org/web/20141102184754/http://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (750, -1, X, X- R/X/L) publications.parliament.uk/pa/ld200708/ldjudgmt/jd080730/mckinn-1.htm (750, , X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (750, 715, X, X- R/X/L) web.archive.org/web/20120906185731/http://www.bbc.co.uk/news/uk-19506090 (750, -1, X, X- R/X/L) web.archive.org/web/20141103225408/http://www.marketwired.com/press-release/government-canada-launches-cyber-security-awareness-month-with-new-public-awareness-1706660.htm (750, -1, X, X- R/X/L) www.bbc.co.uk/news/uk-19506090 (750, , X, X- R/X/L) www.marketwired.com/press-release/government-canada-launches-cyber-security-awareness-month-with-new-public-awareness-1706660.htm (750, 4692, X, X- R/X/L) web.archive.org/web/20100602065423/http://www.telegraph.co.uk/news/worldnews/northamerica/usa/4320901/Gary-McKinnon-profile-Autistic-hacker-who-started-writing-computer-programs-at-14.html (750, -1, X, X- R/X/L) web.archive.org/web/20141111212708/http://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/rprt-eng.aspx (750, -1, X, X- R/X/L) www.telegraph.co.uk/news/worldnews/northamerica/usa/4320901/Gary-McKinnon-profile-Autistic-hacker-who-started-writing-computer-programs-at-14.html (750, -1, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/rprt-eng.aspx (750, 715, X, X- R/X/L) www.webcitation.org/6GNY6Rgfk?url=http://rt.com/usa/anonymous-barrettbrown-sopa-megaupload-241/ (750, -1, X, X- R/X/L) web.archive.org/web/20141008194739/http://www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/index-eng.aspx (750, -1, X, X- R/X/L) rt.com/usa/anonymous-barrettbrown-sopa-megaupload-241/ (750, , X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/index-eng.aspx (750, 715, X, X- R/X/L) web.archive.org/web/20170121161404/https://www.transportation.gov/sites/dot.gov/files/docs/AV%20policy%20guidance%20PDF.pdf (750, -1, X, X- R/X/L) web.archive.org/web/20141008035436/http://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/ccirc-ccric-eng.aspx (750, -1, X, X- R/X/L) www.transportation.gov/sites/dot.gov/files/docs/AV%20policy%20guidance%20PDF.pdf (750, , X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/ccirc-ccric-eng.aspx (750, 715, X, X- R/X/L) web.archive.org/web/20141102173436/http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (750, -1, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (750, 715, X, X- R/X/L) web.archive.org/web/20141102213822/http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-ncdnt-frmwrk/index-eng.aspx#_Toc360619104 (750, -1, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-ncdnt-frmwrk/index-eng.aspx#_Toc360619104 (750, 715, X, X- R/X/L) web.archive.org/web/20141102173436/http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (750, -1, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (750, 715, X, X- R/X/L) web.archive.org/web/20141102175701/http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/index-eng.aspx (750, -1, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/index-eng.aspx (750, 715, X, X- R/X/L) web.archive.org/web/20141102175904/http://www.marketwired.com/press-release/government-of-canada-launches-canadas-cyber-security-strategy-1328661.htm (750, -1, X, X- R/X/L) www.marketwired.com/press-release/government-of-canada-launches-canadas-cyber-security-strategy-1328661.htm (750, 4692, X, X- R/X/L) web.archive.org/web/20141017165203/http://www.maawg.org/about/roster (750, -1, X, X- R/X/L) web.archive.org/web/20170214045032/https://www.nytimes.com/2016/09/20/technology/self-driving-cars-guidelines.html?_r=0 (750, -1, X, X- R/X/L) www.maawg.org/about/roster (750, , X, X- R/X/L) www.nytimes.com/2016/09/20/technology/self-driving-cars-guidelines.html?_r=0 (750, -1, X, X- R/X/L)
  11. 2018-01-18 08:32:26 (UTC): User Sawansasaram t • c • dc • l • ef • b • bl; (750) to User:Sawansasaram (edit | talk | history | links | watch | logs) (diff - DELETED) - Link: tier3.xyz/cyber-security-pakistan/ (R/Xmeta/L)
    Other links: web.archive.org/web/20160711053557/https://www.fbi.gov/about-us/quick-facts (750, -1, X, X- R/X/L) web.archive.org/web/20171109081033/https://www.infosecurity-magazine.com/news/lack-of-employee-security-training/ (750, -1, X, X- R/X/L) www.fbi.gov/about-us/quick-facts (750, , X, X- R/X/L) www.infosecurity-magazine.com/news/lack-of-employee-security-training/ (750, , X, X- R/X/L) web.archive.org/web/20081006042850/http://www.cyber.st.dhs.gov/faq.html (750, -1, X, X- R/X/L) web.archive.org/web/20180105015734/https://www.secureworks.com/blog/cybersecurity-programs-of-the-future-what-will-bench-strength-look-llke (750, -1, X, X- R/X/L) www.cyber.st.dhs.gov/faq.html (750, , X, X- R/X/L) www.secureworks.com/blog/cybersecurity-programs-of-the-future-what-will-bench-strength-look-llke (750, , X, X- R/X/L) www.dhs.gov/xabout/structure/editorial_0839.shtm (750, , X, X- R/X/L) web.archive.org/web/20160604120725/http://www.reuters.com/article/us-cybersecurity-healthcare-fbi-exclusiv-idUSBREA3M1Q920140423 (750, -1, X, X- R/X/L) web.archive.org/web/20080611210347/https://www.dhs.gov/xabout/structure/editorial_0839.shtm (750, -1, X, X- R/X/L) www.reuters.com/article/us-cybersecurity-healthcare-fbi-exclusiv-idUSBREA3M1Q920140423 (750, -1, X, X- R/X/L) web.archive.org/web/20120120040012/http://hsgac.senate.gov/public/index.cfm?FuseAction=Files.View&FileStore_id=4ee63497-ca5b-4a4b-9bba-04b7f4cb0123 (750, -1, X, X- R/X/L) web.archive.org/web/20171102050405/https://www.nytimes.com/2017/09/27/technology/twitter-russia-election.html (750, -1, X, X- R/X/L) hsgac.senate.gov/public/index.cfm?FuseAction=Files.View&FileStore_id=4ee63497-ca5b-4a4b-9bba-04b7f4cb0123 (750, , X, X- R/X/L) www.nytimes.com/2017/09/27/technology/twitter-russia-election.html (750, -1, X, X- R/X/L) www.opencongress.org/bill/111-h4962/text (750, , X, X- R/X/L) web.archive.org/web/20171201054900/https://www.nytimes.com/2017/10/02/business/equifax-breach.html (750, -1, X, X- R/X/L) web.archive.org/web/20101228170910/http://www.opencongress.org/bill/111-h4962/text (750, -1, X, X- R/X/L) www.nytimes.com/2017/10/02/business/equifax-breach.html (750, -1, X, X- R/X/L) web.archive.org/web/20130925102342/http://blogs.wsj.com/korearealtime/2013/09/23/seoul-puts-a-price-on-cyberdefense/ (750, -1, X, X- R/X/L) web.archive.org/web/20171201035530/http://money.cnn.com/2013/12/18/news/companies/target-credit-card/index.html (750, -1, X, X- R/X/L) blogs.wsj.com/korearealtime/2013/09/23/seoul-puts-a-price-on-cyberdefense/ (750, -1, X, X- R/X/L) money.cnn.com/2013/12/18/news/companies/target-credit-card/index.html (750, , X, X- R/X/L) web.archive.org/web/20170202234526/https://tier3.pk/ (750, -1, X, X- R/X/L) web.archive.org/web/20141221160612/http://fortune.com/2014/12/19/staples-cards-affected-breach/ (750, -1, X, X- R/X/L) tier3.pk (750, 20, X, X- R/X/L) fortune.com/2014/12/19/staples-cards-affected-breach/ (750, , X, X- R/X/L) web.archive.org/web/20151209014735/http://www.nr3c.gov.pk/about_us.html (750, -1, X, X- R/X/L) web.archive.org/web/20141218221105/http://money.cnn.com/2014/09/18/technology/security/home-depot-hack/ (750, -1, X, X- R/X/L) www.nr3c.gov.pk/about_us.html (750, 16, X, X- R/X/L) money.cnn.com/2014/09/18/technology/security/home-depot-hack/ (750, , X, X- R/X/L) tier3.xyz/cyber-security-pakistan/ (750, 25, X, X- R/X/L) web.archive.org/web/20150211064650/http://www.npr.org/blogs/alltechconsidered/2014/08/06/338334508/is-your-watch-or-thermostat-a-spy-cyber-security-firms-are-on-it (750, -1, X, X- R/X/L) web.archive.org/web/20151211032450/https://tier3.xyz/cyber-security-pakistan/ (750, -1, X, X- R/X/L) www.npr.org/blogs/alltechconsidered/2014/08/06/338334508/is-your-watch-or-thermostat-a-spy-cyber-security-firms-are-on-it (750, , X, X- R/X/L) web.archive.org/web/20171113165123/http://www.orfonline.org/cyfy-event/need-for-proper-structure-of-ppps-to-address-specific-cyberspace-risks/ (750, -1, X, X- R/X/L) web.archive.org/web/20170611031121/https://www.faa.gov/nextgen/update/progress_and_plans/data_comm/ (750, -1, X, X- R/X/L) www.orfonline.org/cyfy-event/need-for-proper-structure-of-ppps-to-address-specific-cyberspace-risks/ (750, , X, X- R/X/L) www.faa.gov/nextgen/update/progress_and_plans/data_comm/ (750, , X, X- R/X/L) web.archive.org/web/20170323234015/https://www.merics.org/en/about-us/merics-analysis/chinas-political-system/ (750, -1, X, X- R/X/L) web.archive.org/web/20170319025329/https://www.eurocontrol.int/news/centralised-services-newpens-moves-forward (750, -1, X, X- R/X/L) www.merics.org/en/about-us/merics-analysis/chinas-political-system/ (750, , X, X- R/X/L) www.eurocontrol.int/news/centralised-services-newpens-moves-forward (750, , X, X- R/X/L) web.archive.org/web/20141111210737/http://www.getcybersafe.gc.ca/index-eng.aspx (750, -1, X, X- R/X/L) web.archive.org/web/20161212175606/https://www.eurocontrol.int/articles/pan-european-network-services-pens (750, -1, X, X- R/X/L) www.getcybersafe.gc.ca/index-eng.aspx (750, 18, X, X- R/X/L) www.eurocontrol.int/articles/pan-european-network-services-pens (750, , X, X- R/X/L) web.archive.org/web/20141102184754/http://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (750, -1, X, X- R/X/L) web.archive.org/web/20151013061705/http://www.reuters.com/article/2014/08/04/us-cybersecurity-hackers-airplanes-idUSKBN0G40WQ20140804 (750, -1, X, X- R/X/L) www.reuters.com/article/2014/08/04/us-cybersecurity-hackers-airplanes-idUSKBN0G40WQ20140804 (750, -1, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (750, 715, X, X- R/X/L) web.archive.org/web/20150208072554/http://www.npr.org/blogs/alltechconsidered/2014/08/04/337794061/hacker-says-he-can-break-into-airplane-systems-using-in-flight-wi-fi (750, -1, X, X- R/X/L) www.npr.org/blogs/alltechconsidered/2014/08/04/337794061/hacker-says-he-can-break-into-airplane-systems-using-in-flight-wi-fi (750, , X, X- R/X/L) web.archive.org/web/20150208070914/http://www.securityweek.com/air-traffic-control-systems-vulnerabilities-could-make-unfriendly-skies-black-hat (750, -1, X, X- R/X/L) web.archive.org/web/20141102184754/http://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (750, -1, X, X- R/X/L) www.securityweek.com/air-traffic-control-systems-vulnerabilities-could-make-unfriendly-skies-black-hat (750, , X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (750, 715, X, X- R/X/L) web.archive.org/web/20161017100223/https://www.securestate.com/blog/2012/02/16/vulnerabilities-in-smart-meters (750, -1, X, X- R/X/L) web.archive.org/web/20141103225408/http://www.marketwired.com/press-release/government-canada-launches-cyber-security-awareness-month-with-new-public-awareness-1706660.htm (750, -1, X, X- R/X/L) www.securestate.com/blog/2012/02/16/vulnerabilities-in-smart-meters (750, , X, X- R/X/L) www.marketwired.com/press-release/government-canada-launches-cyber-security-awareness-month-with-new-public-awareness-1706660.htm (750, 4692, X, X- R/X/L) web.archive.org/web/20150218070238/http://money.cnn.com/2014/11/18/technology/security/energy-grid-hack (750, -1, X, X- R/X/L) web.archive.org/web/20141111212708/http://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/rprt-eng.aspx (750, -1, X, X- R/X/L) money.cnn.com/2014/11/18/technology/security/energy-grid-hack/ (750, , X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/rprt-eng.aspx (750, 715, X, X- R/X/L) papers.ssrn.com/abstract=2996896 (750, , X, X- R/X/L) web.archive.org/web/20141008194739/http://www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/index-eng.aspx (750, -1, X, X- R/X/L) web.archive.org/web/20160520144908/http://espn.go.com/nba/story/_/id/15615363/milwaukee-bucks-leak-tax-information-players-employees-result-email-scam (750, -1, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/index-eng.aspx (750, 715, X, X- R/X/L) espn.go.com/nba/story/_/id/15615363/milwaukee-bucks-leak-tax-information-players-employees-result-email-scam (750, , X, X- R/X/L) web.archive.org/web/20141008035436/http://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/ccirc-ccric-eng.aspx (750, -1, X, X- R/X/L) web.archive.org/web/20160623105523/http://www.ft.com/intl/cms/s/0/83b4e9be-db16-11e5-a72f-1e7744c66818.html#axzz41pN5YBV4 (750, -1, X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/ccirc-ccric-eng.aspx (750, 715, X, X- R/X/L) www.ft.com/intl/cms/s/0/83b4e9be-db16-11e5-a72f-1e7744c66818.html#axzz41pN5YBV4 (750, , X, X- R/X/L) web.archive.org/web/20141102173436/http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (750, -1, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (750, 715, X, X- R/X/L) web.archive.org/web/20131203043630/http://upcommons.upc.edu/pfc/bitstream/2099.1/12289/1/73827.pdf (750, -1, X, X- R/X/L) web.archive.org/web/20141102213822/http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-ncdnt-frmwrk/index-eng.aspx#_Toc360619104 (750, -1, X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-ncdnt-frmwrk/index-eng.aspx#_Toc360619104 (750, 715, X, X- R/X/L) web.archive.org/web/20141102173436/http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (750, -1, X, X- R/X/L) upcommons.upc.edu/pfc/bitstream/2099.1/12289/1/73827.pdf (750, , X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (750, 715, X, X- R/X/L) web.archive.org/web/20150913200707/http://www.case.edu/its/kba/its-kba-27196-phishing-attempt/ (750, -1, X, X- R/X/L) web.archive.org/web/20141102175701/http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/index-eng.aspx (750, -1, X, X- R/X/L) www.case.edu/its/kba/its-kba-27196-phishing-attempt/ (750, , X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/index-eng.aspx (750, 715, X, X- R/X/L) web.archive.org/web/20140804130416/http://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ (750, -1, X, X- R/X/L) web.archive.org/web/20141102175904/http://www.marketwired.com/press-release/government-of-canada-launches-canadas-cyber-security-strategy-1328661.htm (750, -1, X, X- R/X/L) arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ (750, , X, X- R/X/L) www.marketwired.com/press-release/government-of-canada-launches-canadas-cyber-security-strategy-1328661.htm (750, 4692, X, X- R/X/L) link-springer-com.ezaccess.libraries.psu.edu/content/pdf/10.1007%2F978-1-4471-6524-8.pdf (750, , X, X- R/X/L) web.archive.org/web/20141017165203/http://www.maawg.org/about/roster (750, -1, X, X- R/X/L) www.oxfordreference.com.ezaccess.libraries.psu.edu/view/10.1093/acref/9780199688975.001.0001/acref-9780199688975-e-4987 (750, , X, X- R/X/L) www.maawg.org/about/roster (750, , X, X- R/X/L) web.archive.org/web/20160630134737/https://www.techopedia.com/definition/5398/spoofing (750, -1, X, X- R/X/L) web.archive.org/web/20140923153548/http://www.maawg.org/about_maawg (750, -1, X, X- R/X/L) www.techopedia.com/definition/5398/spoofing (750, , X, X- R/X/L) www.maawg.org/about_maawg (750, , X, X- R/X/L) web.archive.org/web/20160403050123/http://gadgtecs.com/2016/03/30/wifi-mouse-leave-billions-risk-computer-hack/ (750, -1, X, X- R/X/L) web.archive.org/web/20141203223358/http://www.coe.int/t/DGHL/cooperation/economiccrime/cybercrime/default_en.asp (750, -1, X, X- R/X/L) gadgtecs.com/2016/03/30/wifi-mouse-leave-billions-risk-computer-hack/ (750, , X, X- R/X/L) www.coe.int/t/DGHL/cooperation/economiccrime/cybercrime/default_en.asp (750, , X, X- R/X/L) web.archive.org/web/20160806080013/https://www.csa.gov.sg/gosafeonline/go-safe-for-business/smes/distributed-denial-of-service-attack (750, -1, X, X- R/X/L) www.first.org/members/teams/index.html (750, , X, X- R/X/L) www.csa.gov.sg/gosafeonline/go-safe-for-business/smes/distributed-denial-of-service-attack (750, , X, X- R/X/L) web.archive.org/web/20150925100225/http://www.first.org/members/teams/index.html (750, -1, X, X- R/X/L) web.archive.org/web/20161012010519/https://www.researchgate.net/publication/298807979_Computer_Security_and_Mobile_Security_Challenges (750, -1, X, X- R/X/L) www.first.org/about/mission/mission.html (750, , X, X- R/X/L) www.researchgate.net/publication/298807979_Computer_Security_and_Mobile_Security_Challenges (750, , X, X- R/X/L) web.archive.org/web/20111014182329/http://first.org/about/mission/mission.html (750, -1, X, X- R/X/L) www.theaustralian.com.au/technology/opinion/reliance-spells-end-of-road-for-ict-amateurs/story-e6frgb0o-1226636267865?nk=34fe4ab684629535daaf6a8fe6e6ef3d (750, , X, X- R/X/L) articles.sfgate.com/2005-02-17/business/17361991_1_rsa-security-conference-cybersecurity-counterpane-internet-security (750, , X, X- R/X/L) web.archive.org/web/20121321225800/http://searchsecurity.techtarget.com/definition/social-engineering (750, -1, X, X- R/X/L) web.archive.org/web/20151119221200/http://www.gao.gov/highrisk/protecting_the_federal_government_information_systems/why_did_study (750, -1, X, X- R/X/L) searchsecurity.techtarget.com/definition/social-engineering (750, , X, X- R/X/L) www.gao.gov/highrisk/protecting_the_federal_government_information_systems/why_did_study (750, , X, X- R/X/L) web.archive.org/web/20171228171958/https://commons.erau.edu/jdfsl/vol12/iss2/8/ (750, -1, X, X- R/X/L) web.archive.org/web/20161125075257/https://www.youtube.com/watch?v=0TMFRO66Wv4 (750, -1, X, X- R/X/L) commons.erau.edu/jdfsl/vol12/iss2/8/ (750, , X, X- R/X/L) www.youtube.com/watch?v=0TMFRO66Wv4 (750, -1, X, X- R/X/L) www.law.cornell.edu/uscode/text/18/1030#e_2 (750, , X, X- R/X/L) web.archive.org/web/20130116010603/http://www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net.html (750, -1, X, X- R/X/L) www.law.cornell.edu/uscode/text/18/1030 (750, , X, X- R/X/L) www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net.html (750, , X, X- R/X/L) www.nanoit.pt (750, , X, X- R/X/L) www.sciencedirect.com/science/article/pii/S1353485815300805 (750, , X, X- R/X/L) www.nanoit.pt (750, , X, X- R/X/L) web.archive.org/web/20150605135158/http://www.nytimes.com/2015/06/05/us/breach-in-a-federal-computer-system-exposes-personnel-data.html (750, -1, X, X- R/X/L) www.cncs.gov.pt (750, , X, X- R/X/L) www.nytimes.com/2015/06/05/us/breach-in-a-federal-computer-system-exposes-personnel-data.html (750, -1, X, X- R/X/L) web.archive.org/web/20150710075449/http://www.reuters.com/article/2015/07/09/us-cybersecurity-usa-idUSKCN0PJ2M420150709 (750, -1, X, X- R/X/L) www.reuters.com/article/2015/07/09/us-cybersecurity-usa-idUSKCN0PJ2M420150709 (750, -1, X, X- R/X/L) www.usnews.com/news/articles/2015/06/05/china-suspected-in-theft-of-federal-employee-records (750, , X, X- R/X/L) web.archive.org/web/20150606064331/http://www.usnews.com/news/articles/2015/06/05/china-suspected-in-theft-of-federal-employee-records (750, -1, X, X- R/X/L) web.archive.org/web/20150604215718/http://www.wsj.com/articles/u-s-suspects-hackers-in-china-behind-government-data-breach-sources-say-1433451888 (750, -1, X, X- R/X/L) www.wsj.com/articles/u-s-suspects-hackers-in-china-behind-government-data-breach-sources-say-1433451888 (750, , X, X- R/X/L) web.archive.org/web/20170228005352/http://www.reuters.com/article/us-cybersecurity-usa-idUSKCN0PJ2M420150709 (750, -1, X, X- R/X/L) www.reuters.com/article/us-cybersecurity-usa-idUSKCN0PJ2M420150709 (750, -1, X, X- R/X/L) web.archive.org/web/20141209035159/http://www.cnet.com/news/53-million-emails-stolen-in-home-depot-breach/ (750, -1, X, X- R/X/L) www.cnet.com/news/53-million-emails-stolen-in-home-depot-breach/ (750, , X, X- R/X/L) web.archive.org/web/20150127015928/http://www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data (750, -1, X, X- R/X/L) www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data (750, , X, X- R/X/L) web.archive.org/web/20140709131535/http://mashable.com/2013/10/30/nsa-google-yahoo-data-centers/ (750, -1, X, X- R/X/L) mashable.com/2013/10/30/nsa-google-yahoo-data-centers/ (750, -1, X, X- R/X/L) web.archive.org/web/20160201095426/http://spectrum.ieee.org/telecom/security/can-you-trust-nist (750, -1, X, X- R/X/L) spectrum.ieee.org/telecom/security/can-you-trust-nist (750, , X, X- R/X/L) web.archive.org/web/20140714174333/https://www.freesnowden.is/fr/2014/01/27/video-ard-interview-with-edward-snowden/ (750, -1, X, X- R/X/L) www.freesnowden.is/fr/2014/01/27/video-ard-interview-with-edward-snowden/ (750, , X, X- R/X/L) web.archive.org/web/20130816045641/http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order (750, -1, X, X- R/X/L) www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order (750, -1, X, X- R/X/L) web.archive.org/web/20111219174833/http://www.crows.org/images/stories/pdf/IOI/IO%20Journal_Vol2Iss2_0210.pdf (750, -1, X, X- R/X/L) www.crows.org/images/stories/pdf/IOI/IO%20Journal_Vol2Iss2_0210.pdf (750, , X, X- R/X/L) web.archive.org/web/20120307021747/http://www.stripes.com/news/cone-of-silence-surrounds-u-s-cyberwarfare-1.158090 (750, -1, X, X- R/X/L) www.stripes.com/news/cone-of-silence-surrounds-u-s-cyberwarfare-1.158090 (750, , X, X- R/X/L) web.archive.org/web/20110218154415/http://www.wired.com/threatlevel/2011/02/cyberwar-issues-likely-to-be-addressed-only-after-a-catastrophe/ (750, -1, X, X- R/X/L) www.wired.com/threatlevel/2011/02/cyberwar-issues-likely-to-be-addressed-only-after-a-catastrophe (750, , X, X- R/X/L) web.archive.org/web/20131016133651/http://www.cbsnews.com/8301-501465_162-20017507-501465.html (750, -1, X, X- R/X/L) www.cbsnews.com/8301-501465_162-20017507-501465.html (750, , X, X- R/X/L) web.archive.org/web/20140509020404/http://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11 (750, -1, X, X- R/X/L) www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11 (750, , X, X- R/X/L) web.archive.org/web/20070928041047/http://www.myfoxtwincities.com/myfox/pages/Home/Detail?contentId=2804836&version=3&locale=EN-US&layoutCode=TSTY&pageId=1.1.1 (750, -1, X, X- R/X/L) www.myfoxtwincities.com/myfox/pages/Home/Detail?contentId=2804836&version=3&locale=EN-US&layoutCode=TSTY&pageId=1.1.1 (750, , X, X- R/X/L) web.archive.org/web/20120927014805/http://www.businesswire.com/news/tjx/20070117005971/en (750, -1, X, X- R/X/L) www.businesswire.com/news/tjx/20070117005971/en (750, , X, X- R/X/L) web.archive.org/web/20160306140354/http://fas.org/irp/gao/aim96084.htm (750, -1, X, X- R/X/L) fas.org/irp/gao/aim96084.htm (750, , X, X- R/X/L) web.archive.org/web/20120502090205/http://vita-technologies.com/articles/board-bored-lockheed-martin-co/ (750, -1, X, X- R/X/L) vita-technologies.com/articles/board-bored-lockheed-martin-co/ (750, , X, X- R/X/L) web.archive.org/web/20131203031833/http://www.darkreading.com/applications/secure-os-gets-highest-nsa-rating-goes-c/212100421 (750, -1, X, X- R/X/L) www.darkreading.com/applications/secure-os-gets-highest-nsa-rating-goes-c/212100421 (750, , X, X- R/X/L) web.archive.org/web/20140320215829/http://video.foxbusiness.com/v/2804966490001/forget-ids-use-your-phone-as-credentials/?playlist_id=937116503001#sp=show-clips (750, -1, X, X- R/X/L) video.foxbusiness.com/v/2804966490001/forget-ids-use-your-phone-as-credentials/?playlist_id=937116503001#sp=show-clips (750, , X, X- R/X/L) www.networkworld.com/news/tech/2010/110810-network-vulnerabilities.html (750, , X, X- R/X/L) web.archive.org/web/20140424195204/http://www.networkworld.com/news/tech/2010/110810-network-vulnerabilities.html (750, -1, X, X- R/X/L) web.archive.org/web/20170621202140/http://www.pcmag.com/article2/0,2817,2342798,00.asp (750, -1, X, X- R/X/L) www.pcmag.com/article2/0,2817,2342798,00.asp (750, , X, X- R/X/L) web.archive.org/web/20140320220133/http://www.scmagazine.com/safenet-protectdrive-84/review/2596/ (750, -1, X, X- R/X/L) www.scmagazine.com/safenet-protectdrive-84/review/2596/ (750, , X, X- R/X/L) web.archive.org/web/20140611161421/http://www.intel.com/content/dam/www/public/us/en/documents/white-papers/trusted-execution-technology-security-paper.pdf (750, -1, X, X- R/X/L) www.intel.com/content/dam/www/public/us/en/documents/white-papers/trusted-execution-technology-security-paper.pdf (750, , X, X- R/X/L) web.archive.org/web/20140320220321/http://www.thewindowsclub.com/lock-protect-your-windows-pc-using-a-usb-drive-with-predator (750, -1, X, X- R/X/L) www.thewindowsclub.com/lock-protect-your-windows-pc-using-a-usb-drive-with-predator (750, , X, X- R/X/L) web.archive.org/web/20140320234026/http://www.safenet-inc.com/multi-factor-authentication/authenticators/pki-usb-authentication/etoken-5200-token-based-authentication/ (750, -1, X, X- R/X/L) www.safenet-inc.com/multi-factor-authentication/authenticators/pki-usb-authentication/etoken-5200-token-based-authentication/ (750, , X, X- R/X/L) web.archive.org/web/20140320220549/http://www.e-spincorp.com/espinv3/index.php/solutions/3-solutions/174-sentinel-hasp-hl (750, -1, X, X- R/X/L) www.e-spincorp.com/espinv3/index.php/solutions/3-solutions/174-sentinel-hasp-hl (750, , X, X- R/X/L) web.archive.org/web/20130921055451/http://www.cs.columbia.edu/~waksman/PDFs/Oakland_2010.pdf (750, -1, X, X- R/X/L) www.cs.columbia.edu/~waksman/PDFs/Oakland_2010.pdf (750, , X, X- R/X/L) web.archive.org/web/20140312221955/http://www.scientificamerican.com/article/the-hacker-in-your-hardware/ (750, -1, X, X- R/X/L) www.scientificamerican.com/article/the-hacker-in-your-hardware/ (750, -1, X, X- R/X/L) web.archive.org/web/20130504191958/http://www.ganssle.com/rants/gettingitright.htm (750, -1, X, X- R/X/L) www.ganssle.com/rants/gettingitright.htm (750, , X, X- R/X/L) web.archive.org/web/20110719110932/http://www-wjp.cs.uni-saarland.de/publikationen/Ba10EW.pdf (750, -1, X, X- R/X/L) www-wjp.cs.uni-saarland.de/publikationen/Ba10EW.pdf (750, , X, X- R/X/L) sel4.systems/Docs/seL4-spec.pdf (750, , X, X- R/X/L) web.archive.org/web/20150521171234/https://sel4.systems/Docs/seL4-spec.pdf (750, -1, X, X- R/X/L) portal.acm.org/citation.cfm?id=800667 (750, , X, X- R/X/L) web.archive.org/web/20110227073552/http://www.codenomicon.com/solutions/unknown-vulnerability-management/ (750, -1, X, X- R/X/L) www.codenomicon.com/solutions/unknown-vulnerability-management/ (750, , X, X- R/X/L) web.archive.org/web/20150925113829/http://www.reuters.com/article/2010/10/18/us-crime-fraud-idUSTRE69H25820101018 (750, -1, X, X- R/X/L) www.reuters.com/article/2010/10/18/us-crime-fraud-idUSTRE69H25820101018 (750, -1, X, X- R/X/L) web.archive.org/web/20160820015812/https://www.datanami.com/2016/05/09/oni-may-best-hope-cyber-security-now/ (750, -1, X, X- R/X/L) www.datanami.com/2016/05/09/oni-may-best-hope-cyber-security-now/ (750, , X, X- R/X/L) web.archive.org/web/20160713120506/http://www.cloudera.com/solutions/cybersecurity.html (750, -1, X, X- R/X/L) www.cloudera.com/solutions/cybersecurity.html (750, , X, X- R/X/L) web.archive.org/web/20141003064643/http://www.techopedia.com/definition/72/security-architecture (750, -1, X, X- R/X/L) www.techopedia.com/definition/72/security-architecture (750, , X, X- R/X/L) web.archive.org/web/20140315012754/http://www.opensecurityarchitecture.org/cms/definitions/it-security-architecture (750, -1, X, X- R/X/L) www.opensecurityarchitecture.org/cms/definitions/it-security-architecture (750, , X, X- R/X/L) web.archive.org/web/20141120041536/http://www.infosectoday.com/Articles/Glossary.pdf (750, -1, X, X- R/X/L) www.infosectoday.com/Articles/Glossary.pdf (750, , X, X- R/X/L) web.archive.org/web/20120227163121/http://www.cnss.gov/Assets/pdf/cnssi_4009.pdf (750, -1, X, X- R/X/L) www.cnss.gov/Assets/pdf/cnssi_4009.pdf (750, , X, X- R/X/L) tools.ietf.org/html/rfc2828 (750, -1, X, X- R/X/L) web.archive.org/web/20161229102808/http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM482022.pdf (750, -1, X, X- R/X/L) www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM482022.pdf (750, , X, X- R/X/L) web.archive.org/web/20161228210257/http://www.theverge.com/2016/12/27/14095166/fda-guidance-medical-device-cybersecurity-cyberattack-hacking-guidelines (750, -1, X, X- R/X/L) www.theverge.com/2016/12/27/14095166/fda-guidance-medical-device-cybersecurity-cyberattack-hacking-guidelines (750, , X, X- R/X/L) web.archive.org/web/20161229171117/http://www.healthcareitnews.com/news/texas-hospital-hacked-affects-nearly-30000-patient-records (750, -1, X, X- R/X/L) www.healthcareitnews.com/news/texas-hospital-hacked-affects-nearly-30000-patient-records (750, , X, X- R/X/L) web.archive.org/web/20170929233237/http://boston.cbslocal.com/2016/12/27/former-patient-accused-data-breech-new-hampshire-psychiatric-hospital/ (750, -1, X, X- R/X/L) boston.cbslocal.com/2016/12/27/former-patient-accused-data-breech-new-hampshire-psychiatric-hospital/ (750, , X, X- R/X/L) web.archive.org/web/20161229100748/https://www.rt.com/usa/371979-nh-hospital-data-breach/ (750, -1, X, X- R/X/L) www.rt.com/usa/371979-nh-hospital-data-breach/ (750, , X, X- R/X/L) web.archive.org/web/20161229100631/http://indianexpress.com/article/technology/tech-news-technology/legion-hacking-no-political-agenda-just-computer-geeks-says-hacker-4423167/ (750, -1, X, X- R/X/L) indianexpress.com/article/technology/tech-news-technology/legion-hacking-no-political-agenda-just-computer-geeks-says-hacker-4423167/ (750, , X, X- R/X/L) web.archive.org/web/20161229101209/http://www.bbc.com/news/uk-england-humber-37822084 (750, -1, X, X- R/X/L) www.bbc.com/news/uk-england-humber-37822084 (750, -1, X, X- R/X/L) web.archive.org/web/20161229101819/http://www.bbc.com/news/uk-england-humber-37849746 (750, -1, X, X- R/X/L) www.bbc.com/news/uk-england-humber-37849746 (750, -1, X, X- R/X/L) www.grimsbytelegraph.co.uk/grimsby-hospital-computer-hack-no-ransom-has-been-demanded/story-29856124-detail/story.html (750, , X, X- R/X/L) web.archive.org/web/20161229101019/http://www.theregister.co.uk/2016/01/19/melbourne_hospital_pathology_wing_splattered_by_virus/ (750, -1, X, X- R/X/L) www.theregister.co.uk/2016/01/19/melbourne_hospital_pathology_wing_splattered_by_virus/ (750, , X, X- R/X/L) web.archive.org/web/20161116141207/http://www.theregister.co.uk/2016/06/28/medjack (750, -1, X, X- R/X/L) www.theregister.co.uk/2016/06/28/medjack/ (750, , X, X- R/X/L) web.archive.org/web/20161229103355/http://www.nbcnews.com/news/us-news/medstar-hospitals-recovering-after-ransomware-hack-n548121 (750, -1, X, X- R/X/L) www.nbcnews.com/news/us-news/medstar-hospitals-recovering-after-ransomware-hack-n548121 (750, , X, X- R/X/L) web.archive.org/web/20161229101247/http://www.businessinsider.com/hospital-ransomware-hack-2016-5 (750, -1, X, X- R/X/L) www.businessinsider.com/hospital-ransomware-hack-2016-5 (750, , X, X- R/X/L) web.archive.org/web/20161229101724/http://www.wiwo.de/technologie/digitale-welt/cyber-angriffe-krankenhaeuser-ruecken-ins-visier-der-hacker/14946040.html (750, -1, X, X- R/X/L) www.wiwo.de/technologie/digitale-welt/cyber-angriffe-krankenhaeuser-ruecken-ins-visier-der-hacker/14946040.html (750, , X, X- R/X/L) web.archive.org/web/20161229104021/http://www.forbes.com/sites/kalevleetaru/2016/03/29/hacking-hospitals-and-holding-hostages-cybersecurity-in-2016/ (750, -1, X, X- R/X/L) www.forbes.com/sites/kalevleetaru/2016/03/29/hacking-hospitals-and-holding-hostages-cybersecurity-in-2016/ (750, -1, X, X- R/X/L) web.archive.org/web/20160520155616/http://www.thedailybeast.com/articles/2014/11/17/how-your-pacemaker-will-get-hacked.html (750, -1, X, X- R/X/L) web.archive.org/web/20140316021605/http://www.webopedia.com/TERM/E/endpoint_security.html (750, -1, X, X- R/X/L) www.thedailybeast.com/articles/2014/11/17/how-your-pacemaker-will-get-hacked.html (750, , X, X- R/X/L) www.webopedia.com/TERM/E/endpoint_security.html (750, , X, X- R/X/L) web.archive.org/web/20160604201841/http://www.computerworld.com/article/2492453/malware-vulnerabilities/pacemaker-hack-can-deliver-deadly-830-volt-jolt.html (750, -1, X, X- R/X/L) web.archive.org/web/20111106055944/http://www.businessdictionary.com/definition/data-integrity.html (750, -1, X, X- R/X/L) www.computerworld.com/article/2492453/malware-vulnerabilities/pacemaker-hack-can-deliver-deadly-830-volt-jolt.html (750, , X, X- R/X/L) www.businessdictionary.com/definition/data-integrity.html (750, , X, X- R/X/L) web.archive.org/web/20160529002947/http://www.darkreading.com/vulnerabilities---threats/hospital-medical-devices-used-as-weapons-in-cyberattacks/d/d-id/1320751 (750, -1, X, X- R/X/L) medical-dictionary.thefreedictionary.com/confidentiality (750, , X, X- R/X/L) www.darkreading.com/vulnerabilities---threats/hospital-medical-devices-used-as-weapons-in-cyberattacks/d/d-id/1320751 (750, , X, X- R/X/L) web.archive.org/web/20141003115305/http://www.learnquest.com/subcategories.aspx?categoryid=33 (750, -1, X, X- R/X/L) web.archive.org/web/20160514002208/http://arstechnica.com/security/2012/11/hotel-room-burglars-exploit-critical-flaw-in-electronic-door-locks/ (750, -1, X, X- R/X/L) www.learnquest.com/subcategories.aspx?categoryid=33 (750, , X, X- R/X/L) arstechnica.com/security/2012/11/hotel-room-burglars-exploit-critical-flaw-in-electronic-door-locks/ (750, , X, X- R/X/L) web.archive.org/web/20150106064140/http://msisac.cisecurity.org/resources/videos/free-training.cfm (750, -1, X, X- R/X/L) web.archive.org/web/20130920145534/http://blogs.hbr.org/2013/06/rethinking-security-for-the-in/ (750, -1, X, X- R/X/L) msisac.cisecurity.org/resources/videos/free-training.cfm (750, , X, X- R/X/L) blogs.hbr.org/2013/06/rethinking-security-for-the-in (750, , X, X- R/X/L) web.archive.org/web/20150107111146/http://www.dhs.gov/cybersecurity-training-exercises (750, -1, X, X- R/X/L) web.archive.org/web/20161012010519/http://www.internet-of-things-research.eu/pdf/Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdf (750, -1, X, X- R/X/L) www.dhs.gov/cybersecurity-training-exercises (750, , X, X- R/X/L) www.internet-of-things-research.eu/pdf/Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdf (750, , X, X- R/X/L) web.archive.org/web/20130502135412/http://www.dhs.gov/join-dhs-cybersecurity (750, -1, X, X- R/X/L) hbr.org/resources/pdfs/comm/verizon/18980_HBR_Verizon_IoT_Nov_14.pdf (750, , X, X- R/X/L) www.dhs.gov/join-dhs-cybersecurity (750, , X, X- R/X/L) web.archive.org/web/20150627090938/http://www.forbes.com/sites/chrisclearfield/2013/09/18/why-the-ftc-cant-regulate-the-internet-of-things/ (750, -1, X, X- R/X/L) niccs.us-cert.gov/home/students (750, , X, X- R/X/L) www.forbes.com/sites/chrisclearfield/2013/09/18/why-the-ftc-cant-regulate-the-internet-of-things/ (750, -1, X, X- R/X/L) web.archive.org/web/20140223192040/http://niccs.us-cert.gov/home/students (750, -1, X, X- R/X/L) www.cs.gwu.edu/academics/graduate_programs/master/cybersecurity/cybersecurity-jobs (750, , X, X- R/X/L) ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7165580 (750, -1, X, X- R/X/L) web.archive.org/web/20130603085633/http://www.cs.gwu.edu/academics/graduate_programs/master/cybersecurity/cybersecurity-jobs (750, -1, X, X- R/X/L) web.archive.org/web/20150626125229/http://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx (750, -1, X, X- R/X/L) web.archive.org/web/20161021073353/http://iase.disa.mil/iawip/Pages/iabaseline.aspx (750, -1, X, X- R/X/L) www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx (750, , X, X- R/X/L) web.archive.org/web/20160610130749/http://www.edweek.org/ew/articles/2015/10/21/lessons-learned-from-security-breaches.html (750, -1, X, X- R/X/L) www.edweek.org/ew/articles/2015/10/21/lessons-learned-from-security-breaches.html (750, , X, X- R/X/L) iase.disa.mil/iawip/Pages/iabaseline.aspx (750, , X, X- R/X/L) web.archive.org/web/20170624014751/https://arstechnica.com/security/2015/06/encryption-would-not-have-helped-at-opm-says-dhs-official/ (750, -1, X, X- R/X/L) web.archive.org/web/20140424200253/http://www.defenceiq.com/defence-technology/articles/the-cyber-security-industry-and-you/ (750, -1, X, X- R/X/L) arstechnica.com/security/2015/06/encryption-would-not-have-helped-at-opm-says-dhs-official/ (750, , X, X- R/X/L) www.defenceiq.com/defence-technology/articles/the-cyber-security-industry-and-you/ (750, , X, X- R/X/L) web.archive.org/web/20150606063139/http://www.cnn.com/2015/06/04/politics/federal-agency-hacked-personnel-management/ (750, -1, X, X- R/X/L) web.archive.org/web/20160528165313/http://burning-glass.com/demand-for-cybersecurity-workers-outstripping-supply/ (750, -1, X, X- R/X/L) www.cnn.com/2015/06/04/politics/federal-agency-hacked-personnel-management/ (750, , X, X- R/X/L) burning-glass.com/demand-for-cybersecurity-workers-outstripping-supply/ (750, , X, X- R/X/L) web.archive.org/web/20150605041629/http://www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-employees-records-at-risk (750, -1, X, X- R/X/L) web.archive.org/web/20160323042705/http://www.networkworld.com/article/3045801/security/cybersecurity-skills-shortage-impact-on-cloud-computing.html (750, -1, X, X- R/X/L) www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-employees-records-at-risk (750, , X, X- R/X/L) www.networkworld.com/article/3045801/security/cybersecurity-skills-shortage-impact-on-cloud-computing.html (750, , X, X- R/X/L) web.archive.org/web/20151106193613/http://www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html (750, -1, X, X- R/X/L) web.archive.org/web/20160611173429/http://burning-glass.com/research/cybersecurity/ (750, -1, X, X- R/X/L) www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html (750, -1, X, X- R/X/L) www.burning-glass.com/research/cybersecurity/ (750, , X, X- R/X/L) web.archive.org/web/20090307045833/http://www.publications.parliament.uk/pa/ld200708/ldjudgmt/jd080730/mckinn-1.htm (750, -1, X, X- R/X/L) www.webcitation.org/6kWCE919Q?url=https://www.washingtonpost.com/world/national-security/obama-to-be-urged-to-split-cyberwar-command-from-the-nsa/2016/09/12/0ad09a22-788f-11e6-ac8e-cf8e0dd91dc7_story.html (750, -1, X, X- R/X/L) publications.parliament.uk/pa/ld200708/ldjudgmt/jd080730/mckinn-1.htm (750, , X, X- R/X/L) www.washingtonpost.com/world/national-security/obama-to-be-urged-to-split-cyberwar-command-from-the-nsa/2016/09/12/0ad09a22-788f-11e6-ac8e-cf8e0dd91dc7_story.html (750, , X, X- R/X/L) web.archive.org/web/20120906185731/http://www.bbc.co.uk/news/uk-19506090 (750, -1, X, X- R/X/L) web.archive.org/web/20150416090310/http://www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race (750, -1, X, X- R/X/L) www.bbc.co.uk/news/uk-19506090 (750, , X, X- R/X/L) www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race (750, , X, X- R/X/L) web.archive.org/web/20100602065423/http://www.telegraph.co.uk/news/worldnews/northamerica/usa/4320901/Gary-McKinnon-profile-Autistic-hacker-who-started-writing-computer-programs-at-14.html (750, -1, X, X- R/X/L) web.archive.org/web/20050831162039/http://www.computerworld.com/securitytopics/security/story/0,10801,89488,00.html (750, -1, X, X- R/X/L) www.telegraph.co.uk/news/worldnews/northamerica/usa/4320901/Gary-McKinnon-profile-Autistic-hacker-who-started-writing-computer-programs-at-14.html (750, -1, X, X- R/X/L) www.computerworld.com/securitytopics/security/story/0,10801,89488,00.html (750, , X, X- R/X/L) www.webcitation.org/6GNY6Rgfk?url=http://rt.com/usa/anonymous-barrettbrown-sopa-megaupload-241/ (750, -1, X, X- R/X/L) web.archive.org/web/20161017100306/https://www.fas.org/sgp/crs/homesec/IN10296.pdf (750, -1, X, X- R/X/L) rt.com/usa/anonymous-barrettbrown-sopa-megaupload-241/ (750, , X, X- R/X/L) www.fas.org/sgp/crs/homesec/IN10296.pdf (750, , X, X- R/X/L) web.archive.org/web/20170121161404/https://www.transportation.gov/sites/dot.gov/files/docs/AV%20policy%20guidance%20PDF.pdf (750, -1, X, X- R/X/L) web.archive.org/web/20160519181332/http://www.nextgov.com/cybersecurity/2016/03/faa-has-started-shaping-cybersecurity-regulations/126449/ (750, -1, X, X- R/X/L) www.transportation.gov/sites/dot.gov/files/docs/AV%20policy%20guidance%20PDF.pdf (750, , X, X- R/X/L) www.nextgov.com/cybersecurity/2016/03/faa-has-started-shaping-cybersecurity-regulations/126449/ (750, , X, X- R/X/L) web.archive.org/web/20170214045032/https://www.nytimes.com/2016/09/20/technology/self-driving-cars-guidelines.html?_r=0 (750, -1, X, X- R/X/L) web.archive.org/web/20160613150636/http://www.gao.gov/products/GAO-15-370 (750, -1, X, X- R/X/L) www.nytimes.com/2016/09/20/technology/self-driving-cars-guidelines.html?_r=0 (750, -1, X, X- R/X/L) www.gao.gov/products/GAO-15-370 (750, , X, X- R/X/L) web.archive.org/web/20170202014932/http://www.telegraph.co.uk/technology/2016/09/21/tesla-fixes-software-bug-that-allowed-chinese-hackers-to-control/ (750, -1, X, X- R/X/L) web.archive.org/web/20160525195552/http://www.nhtsa.gov/Research/Crash+Avoidance/Automotive+Cybersecurity (750, -1, X, X- R/X/L) www.telegraph.co.uk/technology/2016/09/21/tesla-fixes-software-bug-that-allowed-chinese-hackers-to-control/ (750, -1, X, X- R/X/L) www.nhtsa.gov/Research/Crash+Avoidance/Automotive+Cybersecurity (750, , X, X- R/X/L) web.archive.org/web/20170202061247/http://www.independent.co.uk/news/science/hackers-remotely-carjack-jeep-from-10-miles-away-and-drive-it-into-ditch-10406554.html (750, -1, X, X- R/X/L) web.archive.org/web/20160528153847/http://www.fda.gov/medicaldevices/safety/alertsandnotices/ucm356423.htm (750, -1, X, X- R/X/L) www.independent.co.uk/news/science/hackers-remotely-carjack-jeep-from-10-miles-away-and-drive-it-into-ditch-10406554.html (750, , X, X- R/X/L) www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm356423.htm (750, , X, X- R/X/L) web.archive.org/web/20170119103855/https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ (750, -1, X, X- R/X/L) www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ (750, , X, X- R/X/L) web.archive.org/web/20150221064614/http://www.autosec.org/pubs/cars-usenixsec2011.pdf (750, -1, X, X- R/X/L) web.archive.org/web/20100527095750/http://www.fcc.gov/pshs/emergency-information/cybersecurity.html (750, -1, X, X- R/X/L) www.autosec.org/pubs/cars-usenixsec2011.pdf (750, , X, X- R/X/L) www.fcc.gov/pshs/emergency-information/cybersecurity.html (750, , X, X- R/X/L) web.archive.org/web/20170316152605/https://www.theguardian.com/technology/2015/dec/23/the-problem-with-self-driving-cars-who-controls-the-code (750, -1, X, X- R/X/L) web.archive.org/web/20060210001401/https://www.brookings.edu/ (750, -1, X, X- R/X/L) www.theguardian.com/technology/2015/dec/23/the-problem-with-self-driving-cars-who-controls-the-code (750, -1, X, X- R/X/L) www.brookings.edu (750, , X, X- R/X/L) web.archive.org/web/20170120180918/https://www.aol.com/article/news/2016/12/26/expert-warns-major-event-will-need-to-happen-for-cybersecurity/21632630/ (750, -1, X, X- R/X/L) web.archive.org/web/20101106032102/http://www.brookings.edu/opinions/2010/0923_military_internet_shachtman.aspx (750, -1, X, X- R/X/L) www.aol.com/article/news/2016/12/26/expert-warns-major-event-will-need-to-happen-for-cybersecurity/21632630/ (750, , X, X- R/X/L) www.brookings.edu/opinions/2010/0923_military_internet_shachtman.aspx (750, , X, X- R/X/L) web.archive.org/web/20100415113237/http://www.defense.gov/speeches/speech.aspx?speechid=1399 (750, -1, X, X- R/X/L) web.archive.org/web/20161109040112/http://www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf (750, -1, X, X- R/X/L) www.defense.gov/speeches/speech.aspx?speechid=1399 (750, , X, X- R/X/L) www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf (750, , X, X- R/X/L) web.archive.org/web/20161208004808/http://www.n2information.com/history (750, -1, X, X- R/X/L) web.archive.org/web/20170317212726/http://www.vox.com/2015/1/18/7629603/car-hacking-dangers (750, -1, X, X- R/X/L) www.n2information.com/history/ (750, , X, X- R/X/L) www.vox.com/2015/1/18/7629603/car-hacking-dangers (750, , X, X- R/X/L) web.archive.org/web/20060823173821/http://www.cybercrime.gov/ (750, -1, X, X- R/X/L) web.archive.org/web/20141217204735/http://www.businessinsider.com/the-sony-hackers-still-have-a-massive-amount-of-data-that-hasnt-been-leaked-yet-2014-12 (750, -1, X, X- R/X/L) www.cybercrime.gov (750, , X, X- R/X/L) www.businessinsider.com/the-sony-hackers-still-have-a-massive-amount-of-data-that-hasnt-been-leaked-yet-2014-12 (750, , X, X- R/X/L) www.infragard.net/media/files/dir_med.mov (750, , X, X- R/X/L) web.archive.org/web/20150104195455/http://money.cnn.com/2014/12/24/technology/security/sony-hack-facts/ (750, -1, X, X- R/X/L) web.archive.org/web/20110617004540/http://www.infragard.net/media/files/dir_med.mov (750, -1, X, X- R/X/L) money.cnn.com/2014/12/24/technology/security/sony-hack-facts/ (750, , X, X- R/X/L) web.archive.org/web/20100909051004/http://www.infragard.net/ (750, -1, X, X- R/X/L) web.archive.org/web/20110329090824/http://arstechnica.com/tech-policy/news/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price.ars (750, -1, X, X- R/X/L) www.infragard.net (750, , X, X- R/X/L) arstechnica.com/tech-policy/news/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price.ars/ (750, , X, X- R/X/L) web.archive.org/web/20111120021742/http://www.ic3.gov/default.aspx (750, -1, X, X- R/X/L) web.archive.org/web/20110327045801/http://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars (750, -1, X, X- R/X/L) www.ic3.gov/default.aspx (750, , X, X- R/X/L) arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars/ (750, , X, X- R/X/L)
  12. 2018-05-18 12:13:35 (UTC): User Rajkiran g t • c • dc • l • ef • b • bl; (775) to User:Rajkiran g/sandbox (edit | talk | history | links | watch | logs) (diff  top) - Link: tier3.xyz/cyber-security-pakistan/ (R/Xmeta/L- still there)
    Other links: web.archive.org/web/20120123164134/http://www.bbc.co.uk/news/technology-12306041 (775, -1, X, X- R/X/L) www.internetsociety.org/internet/what-internet/history-internet/brief-history-internet (775, , X, X- R/X/L) burning-glass.com/demand-for-cybersecurity-workers-outstripping-supply/ (775, , X, X- R/X/L) www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ (775, , X, X- R/X/L) www.bbc.co.uk/news/technology-12306041 (775, , X, X- R/X/L) web.archive.org/web/20140502001005/http://www.webopedia.com/DidYouKnow/Internet/Web_vs_Internet.asp (775, -1, X, X- R/X/L) web.archive.org/web/20160323042705/http://www.networkworld.com/article/3045801/security/cybersecurity-skills-shortage-impact-on-cloud-computing.html (775, -1, X, X- R/X/L) web.archive.org/web/20150221064614/http://www.autosec.org/pubs/cars-usenixsec2011.pdf (775, -1, X, X- R/X/L) www.webcitation.org/5w51j0pga?url=http://www.renesys.com/blog/2011/01/egypt-leaves-the-internet.shtml (775, -1, X, X- R/X/L) www.webopedia.com/DidYouKnow/Internet/Web_vs_Internet.asp (775, , X, X- R/X/L) www.networkworld.com/article/3045801/security/cybersecurity-skills-shortage-impact-on-cloud-computing.html (775, , X, X- R/X/L) www.autosec.org/pubs/cars-usenixsec2011.pdf (775, , X, X- R/X/L) www.renesys.com/blog/2011/01/egypt-leaves-the-internet.shtml (775, , X, X- R/X/L) web.archive.org/web/20081006131915/http://www.w3.org/TR/html401/struct/links.html (775, -1, X, X- R/X/L) web.archive.org/web/20160611173429/http://burning-glass.com/research/cybersecurity/ (775, -1, X, X- R/X/L) web.archive.org/web/20170316152605/https://www.theguardian.com/technology/2015/dec/23/the-problem-with-self-driving-cars-who-controls-the-code (775, -1, X, X- R/X/L) web.archive.org/web/20130825075603/http://www.theguardian.com/world/2011/apr/06/georgian-woman-cuts-web-access (775, -1, X, X- R/X/L) www.w3.org/TR/html401/struct/links.html#h-12.1 (775, -1, X, X- R/X/L) www.burning-glass.com/research/cybersecurity/ (775, , X, X- R/X/L) www.theguardian.com/technology/2015/dec/23/the-problem-with-self-driving-cars-who-controls-the-code (775, -1, X, X- R/X/L) www.theguardian.com/world/2011/apr/06/georgian-woman-cuts-web-access (775, -1, X, X- R/X/L) www.oxforddnb.com/help/subscribe#public (775, , X, X- R/X/L) www.webcitation.org/6kWCE919Q?url=https://www.washingtonpost.com/world/national-security/obama-to-be-urged-to-split-cyberwar-command-from-the-nsa/2016/09/12/0ad09a22-788f-11e6-ac8e-cf8e0dd91dc7_story.html (775, -1, X, X- R/X/L) web.archive.org/web/20170120180918/https://www.aol.com/article/news/2016/12/26/expert-warns-major-event-will-need-to-happen-for-cybersecurity/21632630/ (775, -1, X, X- R/X/L) web.archive.org/web/20080220075300/https://www.theregister.co.uk/2008/02/18/finnish_policy_censor_activist/ (775, -1, X, X- R/X/L) oed.com/search?searchType=dictionary&q=Internetwork (775, , X, X- R/X/L) www.aol.com/article/news/2016/12/26/expert-warns-major-event-will-need-to-happen-for-cybersecurity/21632630/ (775, , X, X- R/X/L) www.theregister.co.uk/2008/02/18/finnish_policy_censor_activist/ (775, , X, X- R/X/L) www.oxforddnb.com/help/subscribe#public (775, , X, X- R/X/L) www.washingtonpost.com/world/national-security/obama-to-be-urged-to-split-cyberwar-command-from-the-nsa/2016/09/12/0ad09a22-788f-11e6-ac8e-cf8e0dd91dc7_story.html (775, , X, X- R/X/L) web.archive.org/web/20161109040112/http://www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf (775, -1, X, X- R/X/L) web.archive.org/web/20110604102753/http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=12187 (775, -1, X, X- R/X/L) oed.com/search?searchType=dictionary&q=Internetted (775, , X, X- R/X/L) web.archive.org/web/20150416090310/http://www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race (775, -1, X, X- R/X/L) web.archive.org/web/20141102175904/http://www.marketwired.com/press-release/government-of-canada-launches-canadas-cyber-security-strategy-1328661.htm (775, -1, X, X- R/X/L) www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf (775, , X, X- R/X/L) mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=12187 (775, , X, X- R/X/L) www.chicagomanualofstyle.org/16/ch07/ch07_sec076.html?para= (775, , X, X- R/X/L) www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race (775, , X, X- R/X/L) www.marketwired.com/press-release/government-of-canada-launches-canadas-cyber-security-strategy-1328661.htm (775, 4692, X, X- R/X/L) web.archive.org/web/20170317212726/http://www.vox.com/2015/1/18/7629603/car-hacking-dangers (775, -1, X, X- R/X/L) 12mars.rsf.org/wp-content/uploads/EN_RAPPORT_INTERNET_BD.pdf (775, , X, X- R/X/L) web.archive.org/web/20130527060356/http://www.chicagomanualofstyle.org/about16_rules.html (775, -1, X, X- R/X/L) web.archive.org/web/20141017165203/http://www.maawg.org/about/roster (775, -1, X, X- R/X/L) www.vox.com/2015/1/18/7629603/car-hacking-dangers (775, , X, X- R/X/L) web.archive.org/web/20140312120731/http://12mars.rsf.org/2014-en/#slide2 (775, -1, X, X- R/X/L) www.chicagomanualofstyle.org/about16_rules.html (775, , X, X- R/X/L) web.archive.org/web/20050831162039/http://www.computerworld.com/securitytopics/security/story/0,10801,89488,00.html (775, -1, X, X- R/X/L) www.maawg.org/about/roster (775, , X, X- R/X/L) web.archive.org/web/20141217204735/http://www.businessinsider.com/the-sony-hackers-still-have-a-massive-amount-of-data-that-hasnt-been-leaked-yet-2014-12 (775, -1, X, X- R/X/L) web.archive.org/web/20110826003215/http://opennet.net/research/profiles (775, -1, X, X- R/X/L) tools.ietf.org/html/rfc4677 (775, -1, X, X- R/X/L) www.computerworld.com/securitytopics/security/story/0,10801,89488,00.html (775, , X, X- R/X/L) web.archive.org/web/20140923153548/http://www.maawg.org/about_maawg (775, -1, X, X- R/X/L) www.businessinsider.com/the-sony-hackers-still-have-a-massive-amount-of-data-that-hasnt-been-leaked-yet-2014-12 (775, , X, X- R/X/L) opennet.net/research/profiles (775, , X, X- R/X/L) web.archive.org/web/20140619070159/http://computer.howstuffworks.com/internet/basics/who-owns-internet.htm (775, -1, X, X- R/X/L) web.archive.org/web/20161017100306/https://www.fas.org/sgp/crs/homesec/IN10296.pdf (775, -1, X, X- R/X/L) www.maawg.org/about_maawg (775, , X, X- R/X/L) web.archive.org/web/20150104195455/http://money.cnn.com/2014/12/24/technology/security/sony-hack-facts/ (775, -1, X, X- R/X/L) web.archive.org/web/20120110211146/http://opennet.net/research/data (775, -1, X, X- R/X/L) computer.howstuffworks.com/internet/basics/who-owns-internet.htm (775, , X, X- R/X/L) www.fas.org/sgp/crs/homesec/IN10296.pdf (775, , X, X- R/X/L) web.archive.org/web/20141203223358/http://www.coe.int/t/DGHL/cooperation/economiccrime/cybercrime/default_en.asp (775, -1, X, X- R/X/L) money.cnn.com/2014/12/24/technology/security/sony-hack-facts/ (775, , X, X- R/X/L) web.archive.org/web/20110903001108/http://www.nethistory.info/History%20of%20the%20Internet/origins.html (775, -1, X, X- R/X/L) web.archive.org/web/20160519181332/http://www.nextgov.com/cybersecurity/2016/03/faa-has-started-shaping-cybersecurity-regulations/126449/ (775, -1, X, X- R/X/L) www.coe.int/t/DGHL/cooperation/economiccrime/cybercrime/default_en.asp (775, , X, X- R/X/L) web.archive.org/web/20110329090824/http://arstechnica.com/tech-policy/news/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price.ars (775, -1, X, X- R/X/L) opennet.net/research/data (775, , X, X- R/X/L) www.nethistory.info/History%20of%20the%20Internet/origins.html (775, , X, X- R/X/L) www.nextgov.com/cybersecurity/2016/03/faa-has-started-shaping-cybersecurity-regulations/126449/ (775, , X, X- R/X/L) www.first.org/members/teams/index.html (775, , X, X- R/X/L) arstechnica.com/tech-policy/news/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price.ars/ (775, , X, X- R/X/L) freedomhouse.org/sites/default/files/FOTN_2017_Full_Report.pdf (775, , X, X- R/X/L) www.livinginternet.com/i/ii_summary.htm (775, , X, X- R/X/L) web.archive.org/web/20160613150636/http://www.gao.gov/products/GAO-15-370 (775, -1, X, X- R/X/L) web.archive.org/web/20150925100225/http://www.first.org/members/teams/index.html (775, -1, X, X- R/X/L) web.archive.org/web/20110327045801/http://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars (775, -1, X, X- R/X/L) web.archive.org/web/20131221173608/http://www.debka.com/article/3509/ (775, -1, X, X- R/X/L) www.livinginternet.com/i/ii_ipto.htm (775, , X, X- R/X/L) www.gao.gov/products/GAO-15-370 (775, , X, X- R/X/L) www.first.org/about/mission/mission.html (775, , X, X- R/X/L) arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars/ (775, , X, X- R/X/L) www.debka.com/article/3509/ (775, , X, X- R/X/L) tools.ietf.org/html/rfc2547 (775, -1, X, X- R/X/L) web.archive.org/web/20160525195552/http://www.nhtsa.gov/Research/Crash+Avoidance/Automotive+Cybersecurity (775, -1, X, X- R/X/L) web.archive.org/web/20111014182329/http://first.org/about/mission/mission.html (775, -1, X, X- R/X/L) web.archive.org/web/20171109081033/https://www.infosecurity-magazine.com/news/lack-of-employee-security-training/ (775, -1, X, X- R/X/L) news.zdnet.com/2100-9595_22-151059.html (775, , X, X- R/X/L) www.theguardian.com/technology/2012/apr/20/hacktivists-battle-internet (775, -1, X, X- R/X/L) www.nhtsa.gov/Research/Crash+Avoidance/Automotive+Cybersecurity (775, , X, X- R/X/L) articles.sfgate.com/2005-02-17/business/17361991_1_rsa-security-conference-cybersecurity-counterpane-internet-security (775, , X, X- R/X/L) www.infosecurity-magazine.com/news/lack-of-employee-security-training/ (775, , X, X- R/X/L) web.archive.org/web/20100407040227/http://news.zdnet.com/2100-9595_22-151059.html (775, -1, X, X- R/X/L) www.zdnet.com/blog/security/anonymous-hacks-uk-government-sites-over-draconian-surveillance/11412 (775, -1, X, X- R/X/L) web.archive.org/web/20160528153847/http://www.fda.gov/medicaldevices/safety/alertsandnotices/ucm356423.htm (775, -1, X, X- R/X/L) web.archive.org/web/20151119221200/http://www.gao.gov/highrisk/protecting_the_federal_government_information_systems/why_did_study (775, -1, X, X- R/X/L) web.archive.org/web/20180105015734/https://www.secureworks.com/blog/cybersecurity-programs-of-the-future-what-will-bench-strength-look-llke (775, -1, X, X- R/X/L) web.archive.org/web/20100511220550/http://www.usatoday.com/tech/news/surveillance/2004-10-11-chatroom-surv_x.htm (775, -1, X, X- R/X/L) www.aclu.org/FilesPDFs/aclu_report_bigger_monster_weaker_chains.pdf (775, , X, X- R/X/L) www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm356423.htm (775, , X, X- R/X/L) www.gao.gov/highrisk/protecting_the_federal_government_information_systems/why_did_study (775, , X, X- R/X/L) www.secureworks.com/blog/cybersecurity-programs-of-the-future-what-will-bench-strength-look-llke (775, , X, X- R/X/L) www.usatoday.com/tech/news/surveillance/2004-10-11-chatroom-surv_x.htm (775, , X, X- R/X/L) www.aclu.org/privacy/gen/index.html (775, , X, X- R/X/L) web.archive.org/web/20100527095750/http://www.fcc.gov/pshs/emergency-information/cybersecurity.html (775, -1, X, X- R/X/L) web.archive.org/web/20161125075257/https://www.youtube.com/watch?v=0TMFRO66Wv4 (775, -1, X, X- R/X/L) web.archive.org/web/20160604120725/http://www.reuters.com/article/us-cybersecurity-healthcare-fbi-exclusiv-idUSBREA3M1Q920140423 (775, -1, X, X- R/X/L) www.baller.com/pdfs/ACE.pdf (775, , X, X- R/X/L) wiki.ittc.ku.edu/resilinets_wiki/index.php/Definitions#Resilience (775, , X, X- R/X/L) www.fcc.gov/pshs/emergency-information/cybersecurity.html (775, , X, X- R/X/L) www.youtube.com/watch?v=0TMFRO66Wv4 (775, -1, X, X- R/X/L) www.reuters.com/article/us-cybersecurity-healthcare-fbi-exclusiv-idUSBREA3M1Q920140423 (775, -1, X, X- R/X/L) web.archive.org/web/20120907032500/http://www.baller.com/pdfs/ACE.pdf (775, -1, X, X- R/X/L) cne.gmu.edu/modules/os_perf/std.t.html (775, , X, X- R/X/L) web.archive.org/web/20060210001401/https://www.brookings.edu/ (775, -1, X, X- R/X/L) web.archive.org/web/20130116010603/http://www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net.html (775, -1, X, X- R/X/L) web.archive.org/web/20171102050405/https://www.nytimes.com/2017/09/27/technology/twitter-russia-election.html (775, -1, X, X- R/X/L) web.archive.org/web/20090501072553/http://www.eff.org/pages/calea-faq (775, -1, X, X- R/X/L) web.archive.org/web/20031015010139/http://cne.gmu.edu/modules/os_perf/std.t.html (775, -1, X, X- R/X/L) www.brookings.edu (775, , X, X- R/X/L) www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net.html (775, , X, X- R/X/L) www.nytimes.com/2017/09/27/technology/twitter-russia-election.html (775, -1, X, X- R/X/L) www.eff.org/pages/calea-faq (775, , X, X- R/X/L) www.telecommagazine.com (775, , X, X- R/X/L) web.archive.org/web/20101106032102/http://www.brookings.edu/opinions/2010/0923_military_internet_shachtman.aspx (775, -1, X, X- R/X/L) www.sciencedirect.com/science/article/pii/S1353485815300805 (775, , X, X- R/X/L) web.archive.org/web/20171201054900/https://www.nytimes.com/2017/10/02/business/equifax-breach.html (775, -1, X, X- R/X/L) web.archive.org/web/20090316041313/http://www.eff.org/issues/calea (775, -1, X, X- R/X/L) www.com.dtu.dk/teletraffic/handbook/telenook.pdf (775, , X, X- R/X/L) www.brookings.edu/opinions/2010/0923_military_internet_shachtman.aspx (775, , X, X- R/X/L) web.archive.org/web/20150605135158/http://www.nytimes.com/2015/06/05/us/breach-in-a-federal-computer-system-exposes-personnel-data.html (775, -1, X, X- R/X/L) www.nytimes.com/2017/10/02/business/equifax-breach.html (775, -1, X, X- R/X/L) www.eff.org/issues/calea (775, , X, X- R/X/L) web.archive.org/web/20070111015452/http://oldwww.com.dtu.dk/teletraffic/handbook/telenook.pdf (775, -1, X, X- R/X/L) web.archive.org/web/20100415113237/http://www.defense.gov/speeches/speech.aspx?speechid=1399 (775, -1, X, X- R/X/L) www.nytimes.com/2015/06/05/us/breach-in-a-federal-computer-system-exposes-personnel-data.html (775, -1, X, X- R/X/L) web.archive.org/web/20171201035530/http://money.cnn.com/2013/12/18/news/companies/target-credit-card/index.html (775, -1, X, X- R/X/L) w2.eff.org/Privacy/Surveillance/CALEA/?f=archive.html (775, , X, X- R/X/L) books.google.com/books?id=BvaFreun1W8C&pg=PA372&lpg=PA372 (775, -1, X, X- R/X/L) www.defense.gov/speeches/speech.aspx?speechid=1399 (775, , X, X- R/X/L) web.archive.org/web/20150710075449/http://www.reuters.com/article/2015/07/09/us-cybersecurity-usa-idUSKCN0PJ2M420150709 (775, -1, X, X- R/X/L) money.cnn.com/2013/12/18/news/companies/target-credit-card/index.html (775, , X, X- R/X/L) web.archive.org/web/20081025074518/http://w2.eff.org/Privacy/Surveillance/CALEA/?f=archive.html (775, -1, X, X- R/X/L) tools.ietf.org/html/rfc1035 (775, -1, X, X- R/X/L) web.archive.org/web/20161208004808/http://www.n2information.com/history (775, -1, X, X- R/X/L) www.reuters.com/article/2015/07/09/us-cybersecurity-usa-idUSKCN0PJ2M420150709 (775, -1, X, X- R/X/L) web.archive.org/web/20141221160612/http://fortune.com/2014/12/19/staples-cards-affected-breach/ (775, -1, X, X- R/X/L) www.sciam.com/article.cfm?id=internet-eavesdropping (775, , X, X- R/X/L) jolt.richmond.edu/v16i4/article14.pdf (775, , X, X- R/X/L) www.n2information.com/history/ (775, , X, X- R/X/L) www.usnews.com/news/articles/2015/06/05/china-suspected-in-theft-of-federal-employee-records (775, , X, X- R/X/L) fortune.com/2014/12/19/staples-cards-affected-breach/ (775, , X, X- R/X/L) www.microfinancefocus.com/news/2010/02/07/zidisha-set-to-expand-in-peer-to-peer-microfinance-julia-kurnia/ (775, 21, X, X- R/X/L) grouper.ieee.org/groups/802/20/ (775, , X, X- R/X/L) web.archive.org/web/20060823173821/http://www.cybercrime.gov/ (775, -1, X, X- R/X/L) web.archive.org/web/20100228000309/http://www.microfinancefocus.com/news/2010/02/07/zidisha-set-to-expand-in-peer-to-peer-microfinance-julia-kurnia (775, -1, X, X- R/X/L) www.ieee802.org/3/ba/ (775, , X, X- R/X/L) www.cybercrime.gov (775, , X, X- R/X/L) web.archive.org/web/20150606064331/http://www.usnews.com/news/articles/2015/06/05/china-suspected-in-theft-of-federal-employee-records (775, -1, X, X- R/X/L) web.archive.org/web/20170129225155/http://www.nytimes.com/2009/11/09/business/global/09kiva.html (775, -1, X, X- R/X/L) www.itu.int/ITU-T/newslog/New+Global+Standard+For+Fully+Networked+Home.aspx (775, , X, X- R/X/L) www.infragard.net/media/files/dir_med.mov (775, , X, X- R/X/L) web.archive.org/web/20150604215718/http://www.wsj.com/articles/u-s-suspects-hackers-in-china-behind-government-data-breach-sources-say-1433451888 (775, -1, X, X- R/X/L) www.nytimes.com/2009/11/09/business/global/09kiva.html (775, -1, X, X- R/X/L) web.archive.org/web/20090221090736/http://www.itu.int/ITU-T/newslog/New+Global+Standard+For+Fully+Networked+Home.aspx (775, -1, X, X- R/X/L) web.archive.org/web/20110617004540/http://www.infragard.net/media/files/dir_med.mov (775, -1, X, X- R/X/L) www.wsj.com/articles/u-s-suspects-hackers-in-china-behind-government-data-breach-sources-say-1433451888 (775, , X, X- R/X/L) web.archive.org/web/20100210045011/http://blogs.cgdev.org/open_book/2009/10/kiva-is-not-quite-what-it-seems.php (775, -1, X, X- R/X/L) searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci546288,00.html (775, , X, X- R/X/L) web.archive.org/web/20100909051004/http://www.infragard.net/ (775, -1, X, X- R/X/L) web.archive.org/web/20170228005352/http://www.reuters.com/article/us-cybersecurity-usa-idUSKCN0PJ2M420150709 (775, -1, X, X- R/X/L) blogs.cgdev.org/open_book/2009/10/kiva-is-not-quite-what-it-seems.php (775, 23, X, X- R/X/L) www.amazon.com/Nanoscale-Communication-Networks-Stephen-Bush/dp/1608070034 (775, -1, X, X- R/X/L) www.infragard.net (775, , X, X- R/X/L) www.reuters.com/article/us-cybersecurity-usa-idUSKCN0PJ2M420150709 (775, -1, X, X- R/X/L) web.archive.org/web/20170129225903/http://www.nytimes.com/2011/02/10/world/middleeast/10youth.html (775, -1, X, X- R/X/L) www.gsi.dit.upm.es/~legf/Varios/XDSL_MARTI.PDF (775, , X, X- R/X/L) web.archive.org/web/20141209035159/http://www.cnet.com/news/53-million-emails-stolen-in-home-depot-breach/ (775, -1, X, X- R/X/L) www.nytimes.com/2011/02/10/world/middleeast/10youth.html (775, -1, X, X- R/X/L) esm.cs.cmu.edu (775, , X, X- R/X/L) www.cnet.com/news/53-million-emails-stolen-in-home-depot-breach/ (775, , X, X- R/X/L) web.archive.org/web/20120705155248/http://www.etd.ceu.hu/2011/chokoshvili_davit.pdf (775, -1, X, X- R/X/L) web.archive.org/web/20050221110350/http://esm.cs.cmu.edu/ (775, -1, X, X- R/X/L) web.archive.org/web/20150127015928/http://www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data (775, -1, X, X- R/X/L) www.etd.ceu.hu/2011/chokoshvili_davit.pdf (775, , X, X- R/X/L) nms.lcs.mit.edu/papers/ron-sosp2001.html (775, , X, X- R/X/L) www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data (775, , X, X- R/X/L) web.archive.org/web/20141218221105/http://money.cnn.com/2014/09/18/technology/security/home-depot-hack/ (775, -1, X, X- R/X/L) www.miller-mccune.com/politics/the-cascading-effects-of-the-arab-spring-28575/ (775, , X, X- R/X/L) compnetworking.about.com/cs/internetworking/g/bldef_bridge.htm (775, , X, X- R/X/L) web.archive.org/web/20140709131535/http://mashable.com/2013/10/30/nsa-google-yahoo-data-centers/ (775, -1, X, X- R/X/L) money.cnn.com/2014/09/18/technology/security/home-depot-hack/ (775, , X, X- R/X/L) web.archive.org/web/20110227051329/http://www.miller-mccune.com/politics/the-cascading-effects-of-the-arab-spring-28575/ (775, -1, X, X- R/X/L) www.webopedia.com/TERM/s/switch.html (775, , X, X- R/X/L) mashable.com/2013/10/30/nsa-google-yahoo-data-centers/ (775, -1, X, X- R/X/L) web.archive.org/web/20150211064650/http://www.npr.org/blogs/alltechconsidered/2014/08/06/338334508/is-your-watch-or-thermostat-a-spy-cyber-security-firms-are-on-it (775, -1, X, X- R/X/L) web.archive.org/web/20150302173920/http://www.alexa.com/topsites (775, -1, X, X- R/X/L) www.ipnsig.org/reports/ISART9-2000.pdf (775, , X, X- R/X/L) www.nist.gov/itl/csd/sp800-90-042114.cfm (775, , X, X- R/X/L) www.npr.org/blogs/alltechconsidered/2014/08/06/338334508/is-your-watch-or-thermostat-a-spy-cyber-security-firms-are-on-it (775, , X, X- R/X/L) www.alexa.com/topsites (775, -1, X, X- R/X/L) web.archive.org/web/20120113053223/http://www.ipnsig.org/reports/ISART9-2000.pdf (775, -1, X, X- R/X/L) web.archive.org/web/20170611031121/https://www.faa.gov/nextgen/update/progress_and_plans/data_comm/ (775, -1, X, X- R/X/L) s23.org/wikistats/largest_html.php?sort=users_desc&th=8000&lines=500 (775, , X, X- R/X/L) www.blug.linux.no/rfc1149 (775, , X, X- R/X/L) web.archive.org/web/20160201095426/http://spectrum.ieee.org/telecom/security/can-you-trust-nist (775, -1, X, X- R/X/L) www.faa.gov/nextgen/update/progress_and_plans/data_comm/ (775, , X, X- R/X/L) web.archive.org/web/20140825164715/http://s23.org/wikistats/largest_html.php?sort=users_desc&th=8000&lines=500 (775, -1, X, X- R/X/L) smallbusiness.chron.com/disadvantages-wired-technology-17833.html (775, , X, X- R/X/L) spectrum.ieee.org/telecom/security/can-you-trust-nist (775, , X, X- R/X/L) web.archive.org/web/20170319025329/https://www.eurocontrol.int/news/centralised-services-newpens-moves-forward (775, -1, X, X- R/X/L) web.archive.org/web/20140703005842/http://heinonline.org/HOL/LandingPage?collection=journals&handle=hein.journals%2Fjled57&div=8&id=&page= (775, -1, X, X- R/X/L) www.worldcat.org/oclc/748332969 (775, -1, X, X- R/X/L) www.eurocontrol.int/news/centralised-services-newpens-moves-forward (775, , X, X- R/X/L) heinonline.org/HOL/LandingPage?collection=journals&handle=hein.journals/jled57&div=8&id=&page= (775, , X, X- R/X/L) web.archive.org/web/20070807213308/http://www.acm.org/classics/apr96/ (775, -1, X, X- R/X/L) web.archive.org/web/20161212175606/https://www.eurocontrol.int/articles/pan-european-network-services-pens (775, -1, X, X- R/X/L) archive.is/20121129052327/http://www.informaworld.com/smpp/content~content=a901841555&db=all (775, -1, X, X- R/X/L) www.acm.org/classics/apr96/ (775, , X, X- R/X/L) www.eurocontrol.int/articles/pan-european-network-services-pens (775, , X, X- R/X/L) www.informaworld.com/smpp/content~content=a901841555&db=all (775, 2170, X, X- R/X/L) www.itif.org/files/2009-designed-for-change.pdf (775, , X, X- R/X/L) web.archive.org/web/20151013061705/http://www.reuters.com/article/2014/08/04/us-cybersecurity-hackers-airplanes-idUSKBN0G40WQ20140804 (775, -1, X, X- R/X/L) portal.acm.org/citation.cfm?id=1142215.1142259 (775, , X, X- R/X/L) books.google.com/books?id=2ZCNAgAAQBAJ&pg=PA574&hl=en&sa=X&redir_esc=y#v=onepage&q&f=false (775, -1, X, X- R/X/L) www.reuters.com/article/2014/08/04/us-cybersecurity-hackers-airplanes-idUSKBN0G40WQ20140804 (775, -1, X, X- R/X/L) web.archive.org/web/20150120000258/https://www.washingtonpost.com/opinions/book-review-the-internet-is-not-the-answer-by-andrew-keen/2015/01/02/8627999a-7973-11e4-9a27-6fdbc612bff8_story.html (775, -1, X, X- R/X/L) books.google.com/books?id=pIH-JijUNS0C&lpg=PA25&ots=MKZj0F7pJN&pg=PA25#v=onepage&q&f=false (775, -1, X, X- R/X/L) web.archive.org/web/20150208072554/http://www.npr.org/blogs/alltechconsidered/2014/08/04/337794061/hacker-says-he-can-break-into-airplane-systems-using-in-flight-wi-fi (775, -1, X, X- R/X/L) www.washingtonpost.com/opinions/book-review-the-internet-is-not-the-answer-by-andrew-keen/2015/01/02/8627999a-7973-11e4-9a27-6fdbc612bff8_story.html (775, , X, X- R/X/L) www.engineer.ucla.edu/stories/2004/Internet35.htm (775, , X, X- R/X/L) www.npr.org/blogs/alltechconsidered/2014/08/04/337794061/hacker-says-he-can-break-into-airplane-systems-using-in-flight-wi-fi (775, , X, X- R/X/L) web.archive.org/web/20130215044619/http://www.theatlanticcities.com/jobs-and-economy/2012/12/death-american-shopping-mall/4252/ (775, -1, X, X- R/X/L) web.archive.org/web/20080308120314/http://www.engineer.ucla.edu/stories/2004/Internet35.htm (775, -1, X, X- R/X/L) web.archive.org/web/20150208070914/http://www.securityweek.com/air-traffic-control-systems-vulnerabilities-could-make-unfriendly-skies-black-hat (775, -1, X, X- R/X/L) www.theatlanticcities.com/jobs-and-economy/2012/12/death-american-shopping-mall/4252/ (775, 348, X, X- R/X/L) www.packet.cc/files/toward-coop-net.html (775, , X, X- R/X/L) www.securityweek.com/air-traffic-control-systems-vulnerabilities-could-make-unfriendly-skies-black-hat (775, , X, X- R/X/L) web.archive.org/web/20130128191411/http://www.comscore.com/Insights/Press_Releases/2012/12/Free_Shipping_Day_Promotion_Spurs_Late-Season_Online_Spending_Surge (775, -1, X, X- R/X/L) www.invent.org/honor/inductees/inductee-detail/?IID=328 (775, , X, X- R/X/L) web.archive.org/web/20161017100223/https://www.securestate.com/blog/2012/02/16/vulnerabilities-in-smart-meters (775, -1, X, X- R/X/L) www.comscore.com/Insights/Press_Releases/2012/12/Free_Shipping_Day_Promotion_Spurs_Late-Season_Online_Spending_Surge (775, , X, X- R/X/L) www.invent.org/honor/inductees/inductee-detail/?IID=316 (775, , X, X- R/X/L) www.securestate.com/blog/2012/02/16/vulnerabilities-in-smart-meters (775, , X, X- R/X/L) web.archive.org/web/20130219011301/http://www.zdnet.com/e-commerce-will-make-the-shopping-mall-a-retail-wasteland-7000009960/ (775, -1, X, X- R/X/L) books.google.com/books?id=4V9koAEACAAJ&lpg=PP1&pg=PA245#v=onepage&q&f=false (775, -1, X, X- R/X/L) web.archive.org/web/20150218070238/http://money.cnn.com/2014/11/18/technology/security/energy-grid-hack (775, -1, X, X- R/X/L) www.zdnet.com/e-commerce-will-make-the-shopping-mall-a-retail-wasteland-7000009960/ (775, -1, X, X- R/X/L) ria.ru/technology/20100809/263341026.html (775, , X, X- R/X/L) web.archive.org/web/20140714174333/https://www.freesnowden.is/fr/2014/01/27/video-ard-interview-with-edward-snowden/ (775, -1, X, X- R/X/L) money.cnn.com/2014/11/18/technology/security/energy-grid-hack/ (775, , X, X- R/X/L) web.archive.org/web/20130211095334/http://www.theatlanticcities.com/technology/2013/02/how-internet-reinforces-inequality-real-world/4602/ (775, -1, X, X- R/X/L) www.atis.org/glossary/definition.aspx?id=6555 (775, , X, X- R/X/L) www.freesnowden.is/fr/2014/01/27/video-ard-interview-with-edward-snowden/ (775, , X, X- R/X/L) www.theatlanticcities.com/technology/2013/02/how-internet-reinforces-inequality-real-world/4602/ (775, 348, X, X- R/X/L) web.archive.org/web/20120121061919/http://www.atis.org/glossary/definition.aspx?id=6555 (775, -1, X, X- R/X/L) web.archive.org/web/20140706101452/http://www.myclouddoor.com/web/documents/The%20New%20Digital%20Economy.pdf (775, -1, X, X- R/X/L) web.archive.org/web/20100211122715/http://www.damballa.com/solutions/advanced-persistent-threats.php (775, -1, X, X- R/X/L) papers.ssrn.com/abstract=2996896 (775, , X, X- R/X/L) www.myclouddoor.com/web/documents/The%20New%20Digital%20Economy.pdf (775, , X, X- R/X/L) www.damballa.com/knowledge/advanced-persistent-threats.php (775, , X, X- R/X/L) web.archive.org/web/20130816045641/http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order (775, -1, X, X- R/X/L) web.archive.org/web/20160520144908/http://espn.go.com/nba/story/_/id/15615363/milwaukee-bucks-leak-tax-informatiopn-players-employees-result-email-scam (775, -1, X, X- R/X/L) www.theshallowsbook.com/nicholascarr/Nicholas_Carrs_The_Shallows.html (775, , X, X- R/X/L) www.reuters.com/article/2013/02/20/us-china-hacking-idUSBRE91I06120130220 (775, -1, X, X- R/X/L) www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order (775, -1, X, X- R/X/L) espn.go.com/nba/story/_/id/15615363/milwaukee-bucks-leak-tax-information-players-employees-result-email-scam (775, , X, X- R/X/L) web.archive.org/web/20121020041820/http://www.scotsman.com/news/net-abuse-hits-small-city-firms-1-892163 (775, -1, X, X- R/X/L) intelreport.mandiant.com (775, , X, X- R/X/L) web.archive.org/web/20111219174833/http://www.crows.org/images/stories/pdf/IOI/IO%20Journal_Vol2Iss2_0210.pdf (775, -1, X, X- R/X/L) www.scotsman.com/news/net-abuse-hits-small-city-firms-1-892163 (775, , X, X- R/X/L) www.secureworks.com/resources/wp-outmaneuvering-advanced-and-evasive-malware-threats (775, , X, X- R/X/L) www.crows.org/images/stories/pdf/IOI/IO%20Journal_Vol2Iss2_0210.pdf (775, , X, X- R/X/L) web.archive.org/web/20160623105523/http://www.ft.com/intl/cms/s/0/83b4e9be-db16-11e5-a72f-1e7744c66818.html#axzz41pN5YBV4 (775, -1, X, X- R/X/L) www2.bc.edu/~hughesc/abstract.html (775, , X, X- R/X/L) www.educause.edu/ero/article/top-ten-it-issues-2011 (775, , X, X- R/X/L) www.ft.com/intl/cms/s/0/83b4e9be-db16-11e5-a72f-1e7744c66818.html#axzz41pN5YBV4 (775, , X, X- R/X/L) web.archive.org/web/20151107031736/https://www2.bc.edu/~hughesc/abstract.html (775, -1, X, X- R/X/L) www.usenix.org/event/lisa09/tech/slides/daly.pdf (775, , X, X- R/X/L) web.archive.org/web/20111120021742/http://www.ic3.gov/default.aspx (775, -1, X, X- R/X/L) web.archive.org/web/20131203043630/http://upcommons.upc.edu/pfc/bitstream/2099.1/12289/1/73827.pdf (775, -1, X, X- R/X/L) web.archive.org/web/20060425091409/http://internetgames.about.com/od/gamingnews/a/timeline.htm (775, -1, X, X- R/X/L) www.ic3.gov/default.aspx (775, , X, X- R/X/L) web.archive.org/web/20120307021747/http://www.stripes.com/news/cone-of-silence-surrounds-u-s-cyberwarfare-1.158090 (775, -1, X, X- R/X/L) upcommons.upc.edu/pfc/bitstream/2099.1/12289/1/73827.pdf (775, , X, X- R/X/L) internetgames.about.com/od/gamingnews/a/timeline.htm (775, , X, X- R/X/L) web.archive.org/web/20160711053557/https://www.fbi.gov/about-us/quick-facts (775, -1, X, X- R/X/L) www.stripes.com/news/cone-of-silence-surrounds-u-s-cyberwarfare-1.158090 (775, , X, X- R/X/L) web.archive.org/web/20150913200707/http://www.case.edu/its/kba/its-kba-27196-phishing-attempt/ (775, -1, X, X- R/X/L) web.archive.org/web/20110929074221/http://internetgames.about.com/od/gamingnews/a/trendsdecade.htm (775, -1, X, X- R/X/L) tominfosec.blogspot.com/2010/02/understanding-apt.html (775, , X, X- R/X/L) www.fbi.gov/about-us/quick-facts (775, , X, X- R/X/L) web.archive.org/web/20110218154415/http://www.wired.com/threatlevel/2011/02/cyberwar-issues-likely-to-be-addressed-only-after-a-catastrophe/ (775, -1, X, X- R/X/L) www.case.edu/its/kba/its-kba-27196-phishing-attempt/ (775, , X, X- R/X/L) internetgames.about.com/od/gamingnews/a/trendsdecade.htm (775, , X, X- R/X/L) web.archive.org/web/20100111174243/http://www.businessweek.com/technology/content/jul2009/tc2009076_873512.htm (775, -1, X, X- R/X/L) web.archive.org/web/20081006042850/http://www.cyber.st.dhs.gov/faq.html (775, -1, X, X- R/X/L) www.wired.com/threatlevel/2011/02/cyberwar-issues-likely-to-be-addressed-only-after-a-catastrophe (775, , X, X- R/X/L) web.archive.org/web/20140804130416/http://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ (775, -1, X, X- R/X/L) web.archive.org/web/20111230075056/http://abcnews.go.com/Business/SmallBiz/story?id=4151592 (775, -1, X, X- R/X/L) www.businessweek.com/technology/content/jul2009/tc2009076_873512.htm (775, , X, X- R/X/L) www.cyber.st.dhs.gov/faq.html (775, , X, X- R/X/L) web.archive.org/web/20131016133651/http://www.cbsnews.com/8301-501465_162-20017507-501465.html (775, -1, X, X- R/X/L) arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ (775, , X, X- R/X/L) abcnews.go.com/Business/SmallBiz/story?id=4151592 (775, -1, X, X- R/X/L) web.archive.org/web/20100121005238/http://www.spiegel.de/international/world/0%2C1518%2C672742%2C00.html (775, -1, X, X- R/X/L) www.dhs.gov/xabout/structure/editorial_0839.shtm (775, , X, X- R/X/L) www.cbsnews.com/8301-501465_162-20017507-501465.html (775, , X, X- R/X/L) link-springer-com.ezaccess.libraries.psu.edu/content/pdf/10.1007%2F978-1-4471-6524-8.pdf (775, , X, X- R/X/L) web.archive.org/web/20111013032720/http://internet-filter-review.toptenreviews.com/internet-pornography-statistics.html (775, -1, X, X- R/X/L) www.spiegel.de/international/world/0,1518,672742,00.html (775, -1, X, X- R/X/L) web.archive.org/web/20080611210347/https://www.dhs.gov/xabout/structure/editorial_0839.shtm (775, -1, X, X- R/X/L) www.oxfordreference.com/view/10.1093/acref/9780199688975.001.0001/acref-9780199688975-e-4987 (775, , X, X- R/X/L) internet-filter-review.toptenreviews.com/internet-pornography-statistics.html (775, , X, X- R/X/L) www.businessweek.com/magazine/content/08_16/b4080032218430.htm (775, , X, X- R/X/L) web.archive.org/web/20120120040012/http://hsgac.senate.gov/public/index.cfm?FuseAction=Files.View&FileStore_id=4ee63497-ca5b-4a4b-9bba-04b7f4cb0123 (775, -1, X, X- R/X/L) web.archive.org/web/20110418080952/http://www.businessweek.com/magazine/content/08_16/b4080032218430.htm (775, -1, X, X- R/X/L) hsgac.senate.gov/public/index.cfm?FuseAction=Files.View&FileStore_id=4ee63497-ca5b-4a4b-9bba-04b7f4cb0123 (775, , X, X- R/X/L) web.archive.org/web/20100110120647/http://www.businessweek.com/magazine/content/08_16/b4080032220668.htm (775, -1, X, X- R/X/L) web.archive.org/web/20141220082237/http://mashable.com/2010/10/11/social-networks-children/ (775, -1, X, X- R/X/L) www.businessweek.com/magazine/content/08_16/b4080032220668.htm (775, , X, X- R/X/L) www.opencongress.org/bill/111-h4962/text (775, , X, X- R/X/L) mashable.com/2010/10/11/social-networks-children/ (775, -1, X, X- R/X/L) www.pcworld.com/printable/article/id,254730/printable.html (775, , X, X- R/X/L) web.archive.org/web/20101228170910/http://www.opencongress.org/bill/111-h4962/text (775, -1, X, X- R/X/L) web.archive.org/web/20160630134737/https://www.techopedia.com/definition/5398/spoofing (775, -1, X, X- R/X/L) web.archive.org/web/20140904014545/http://www.bbc.co.uk/news/technology-23477130 (775, -1, X, X- R/X/L) www.secureworks.com/blog/advanced-persistent-threats-apt-a (775, , X, X- R/X/L) web.archive.org/web/20130925102342/http://blogs.wsj.com/korearealtime/2013/09/23/seoul-puts-a-price-on-cyberdefense/ (775, -1, X, X- R/X/L) www.techopedia.com/definition/5398/spoofing (775, , X, X- R/X/L) www.bbc.co.uk/news/technology-23477130 (775, , X, X- R/X/L) blogs.forrester.com/rick_holland/13-02-14-introducing_forresters_cyber_threat_intelligence_research (775, , X, X- R/X/L) blogs.wsj.com/korearealtime/2013/09/23/seoul-puts-a-price-on-cyberdefense/ (775, -1, X, X- R/X/L) web.archive.org/web/20160403050123/http://gadgtecs.com/2016/03/30/wifi-mouse-leave-billions-risk-computer-hack/ (775, -1, X, X- R/X/L) web.archive.org/web/20110515152637/http://librenix.com/?inode=5013 (775, -1, X, X- R/X/L) web.archive.org/web/20170202234526/https://tier3.pk/ (775, -1, X, X- R/X/L) gadgtecs.com/2016/03/30/wifi-mouse-leave-billions-risk-computer-hack/ (775, , X, X- R/X/L) librenix.com/?inode=5013 (775, , X, X- R/X/L) tier3.pk (775, 20, X, X- R/X/L) web.archive.org/web/20160806080013/https://www.csa.gov.sg/gosafeonline/go-safe-for-business/smes/distributed-denial-of-service-attack (775, -1, X, X- R/X/L) web.archive.org/web/20140809235408/http://www.cambridge.org/us/academic/subjects/psychology/social-psychology/psychological-aspects-cyberspace-theory-research-applications (775, -1, X, X- R/X/L) www.sans.edu/student-files/projects/JWP-Binde-McRee-OConnor.pdf (775, , X, X- R/X/L) web.archive.org/web/20151209014735/http://www.nr3c.gov.pk/about_us.html (775, -1, X, X- R/X/L) www.csa.gov.sg/gosafeonline/go-safe-for-business/smes/distributed-denial-of-service-attack (775, , X, X- R/X/L) www.cambridge.org/us/academic/subjects/psychology/social-psychology/psychological-aspects-cyberspace-theory-research-applications (775, , X, X- R/X/L) www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf (775, , X, X- R/X/L) web.archive.org/web/20150613002443/https://www.oxforddictionaries.com/definition/english/internaut (775, -1, X, X- R/X/L) www.commandfive.com/threats.html (775, , X, X- R/X/L) www.oxforddictionaries.com/definition/english/internaut (775, -1, X, X- R/X/L) www.maliciousfilehunter.com/feature-live-search.php (775, , X, X- R/X/L) web.archive.org/web/20070604153304/http://www.isoc.org/internet/history/brief.shtml (775, -1, X, X- R/X/L) www.commandfive.com/apt.html (775, , X, X- R/X/L) www.isoc.org/internet/history/brief.shtml (775, , X, X- R/X/L) www.secureworks.com/resources/sb-advanced-threat-protection-with-dell-secureworks (775, , X, X- R/X/L) web.archive.org/web/20110604214312/http://www.columbia.edu/~rh120/ch106.x01 (775, -1, X, X- R/X/L) www.academia.edu/6309905/Advanced_Persistent_Threat_-_APT (775, , X, X- R/X/L) www.columbia.edu/~rh120/ch106.x01 (775, , X, X- R/X/L) us.norton.com/yoursecurityresource/detail.jsp?aid=feature_word (775, , X, X- R/X/L) web.archive.org/web/20120421223939/http://dictionary.reference.com/browse/netizen (775, -1, X, X- R/X/L) www.easytechguides.com/malware.html#worm (775, , X, X- R/X/L) dictionary.reference.com/browse/netizen (775, , X, X- R/X/L) web.archive.org/web/20170905151414/https://books.google.com/books?id=3noNR3IfSpgC&pg=PA130&lpg=PA130&dq=citizen+of+the+net (775, -1, X, X- R/X/L) securityboulevard.com/2018/05/cryptomining-worm-massminer-exploits-multiple-vulnerabilities/ (775, , X, X- R/X/L) books.google.com/books?id=3noNR3IfSpgC&pg=PA130&lpg=PA130&dq=citizen+of+the+net (775, -1, X, X- R/X/L) antivirus.comodo.com/blog/computer-safety/short-history-computer-viruses/ (775, , X, X- R/X/L) www.nr3c.gov.pk/about_us.html (775, 16, X, X- R/X/L) web.archive.org/web/20140209141641/http://www.itu.int/en/ITU-D/Statistics/Documents/statistics/2013/Individuals_Internet_2000-2012.xls (775, -1, X, X- R/X/L) books.google.com/books?id=u5pZX6xt2PoC&pg=PA45&lpg=PA45&dq=worms+in+computer+hobbyist+circles&source=bl&ots=WPwXdhP7L_&sig=uT5pbDsDbE3lnADrHm_W_wyx6GU&hl=en&sa=X&ved=0ahUKEwj9ssvI0PjaAhVOt1MKHSggCWMQ6AEINDAF#v=onepage&q=worms%20in%20computer%20hobbyist%20circles&f=false (775, -1, X, X- R/X/L) www.itu.int/en/ITU-D/Statistics/Documents/statistics/2013/Individuals_Internet_2000-2012.xls (775, , X, X- R/X/L) www.malwarebytes.org/pup/ (775, , X, X- R/X/L) web.archive.org/web/20150729000029/http://blog.euromonitor.com/2013/08/special-report-the-telecom-consumer-in-2020.html (775, -1, X, X- R/X/L) arstechnica.com/security/2009/12/av-comparatives-picks-eight-antipua-winners/ (775, , X, X- R/X/L) blog.euromonitor.com/2013/08/special-report-the-telecom-consumer-in-2020.html (775, , X, X- R/X/L) about-threats.trendmicro.com/us/archive/grayware/GENERIC_GRAYWARE (775, , X, X- R/X/L) technorati.com/blogging/state-of-the-blogosphere/ (775, , X, X- R/X/L) www.spywareloop.com/news/grayware (775, , X, X- R/X/L) web.archive.org/web/20091002101707/http://technorati.com/blogging/state-of-the-blogosphere/ (775, -1, X, X- R/X/L) web.archive.org/web/20140715193841/http://www.spywareloop.com/news/grayware (775, -1, X, X- R/X/L) web.archive.org/web/20080916094836/http://www.entrepreneur.com/tradejournals/article/178175272.html (775, -1, X, X- R/X/L) arxiv.org/ftp/arxiv/papers/1606/1606.05915.pdf (775, -1, X, X- R/X/L) www.entrepreneur.com/tradejournals/article/178175272.html (775, , X, X- R/X/L) arxiv.org/ftp/arxiv/papers/1606/1606.05915.pdf (775, -1, X, X- R/X/L) business.rapleaf.com/company_press_2008_07_29.html (775, , X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (775, , X, X- R/X/L) www.google.com/safebrowsing/diagnostic?site=http://google.com/ (775, -1, X, X- R/X/L) web.archive.org/web/20090320211742/http://business.rapleaf.com/company_press_2008_07_29.html (775, -1, X, X- R/X/L) aw-snap.info/file-viewer/ (775, , X, X- R/X/L) web.archive.org/web/20170319013935/http://www.internetworldstats.com/stats.htm (775, -1, X, X- R/X/L) www.unmaskparasites.com (775, , X, X- R/X/L) www.internetworldstats.com/stats.htm (775, , X, X- R/X/L) www.microsoft.com/security/scanner/en-us/default.aspx (775, , X, X- R/X/L) web.archive.org/web/20141128020032/http://www.engadget.com/2014/11/25/3-billion-internet-users/ (775, -1, X, X- R/X/L) windows.microsoft.com/en-US/windows7/how-do-I-remove-a-computer-virus (775, , X, X- R/X/L) www.engadget.com/2014/11/25/3-billion-internet-users/ (775, , X, X- R/X/L) www.pcmag.com/article2/0,2817,2388652,00.asp (775, , X, X- R/X/L) web.archive.org/web/20121029074528/http://www.antaranews.com/en/news/71940/google-earth-demonstrates-how-technology-benefits-ris-civil-society-govt (775, -1, X, X- R/X/L) www.microsoft.com/en-us/download/details.aspx?id=17 (775, , X, X- R/X/L) www.antaranews.com/en/news/71940/google-earth-demonstrates-how-technology-benefits-ris-civil-society-govt (775, , X, X- R/X/L) web.archive.org/web/20120622074348/http://www.microsoft.com/en-us/download/details.aspx?id=17 (775, -1, X, X- R/X/L) www.itu.int/en/ITU-D/Statistics/Pages/stat/ (775, , X, X- R/X/L) www.microsoft.com/security/pc-security/malware-removal.aspx (775, , X, X- R/X/L) w3techs.com/technologies/overview/content_language/all (775, , X, X- R/X/L) web.archive.org/web/20120621103611/http://www.microsoft.com/security/pc-security/malware-removal.aspx (775, -1, X, X- R/X/L) web.archive.org/web/20120426122721/http://www.internetworldstats.com/stats7.htm (775, -1, X, X- R/X/L) windows.microsoft.com/en-US/windows/products/security-essentials (775, , X, X- R/X/L) www.internetworldstats.com/stats7.htm (775, , X, X- R/X/L) antivirus.comodo.com/how-antivirus-software-works.php (775, , X, X- R/X/L) web.archive.org/web/20150517033104/http://www.itu.int/ITU-D/ict/statistics/ict/ (775, -1, X, X- R/X/L) www.springerlink.com/index/3x8582h43ww06440.pdf (775, , X, X- R/X/L) www.itu.int/ITU-D/ict/statistics/ict/ (775, , X, X- R/X/L) www.cnet.com/uk/news/usb-devices-spreading-viruses/ (775, , X, X- R/X/L) web.archive.org/web/20140509020404/http://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11 (775, -1, X, X- R/X/L) web.archive.org/web/20150528031339/http://www.itu.int/en/ITU-D/Statistics/Documents/statistics/2014/ITU_Key_2005-2014_ICT_data.xls (775, -1, X, X- R/X/L) www.pcmag.com/article2/0,2817,2406767,00.asp (775, , X, X- R/X/L) www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11 (775, , X, X- R/X/L) www.itu.int/en/ITU-D/Statistics/Documents/statistics/2014/ITU_Key_2005-2014_ICT_data.xls (775, , X, X- R/X/L) www.adobe.com/support/security/ (775, , X, X- R/X/L) web.archive.org/web/20070928041047/http://www.myfoxtwincities.com/myfox/pages/Home/Detail?contentId=2804836&version=3&locale=EN-US&layoutCode=TSTY&pageId=1.1.1 (775, -1, X, X- R/X/L) www.youtube.com/t/fact_sheet (775, -1, X, X- R/X/L) www.zdnet.com/blog/security/kaspersky-12-different-vulnerabilities-detected-on-every-pc/9283 (775, -1, X, X- R/X/L) www.myfoxtwincities.com/myfox/pages/Home/Detail?contentId=2804836&version=3&locale=EN-US&layoutCode=TSTY&pageId=1.1.1 (775, , X, X- R/X/L) www.webcitation.org/5qyMMarNd?url=http://www.youtube.com/t/fact_sheet (775, -1, X, X- R/X/L) securitywatch.pcmag.com/none/305385-updated-browsers-still-vulnerable-to-attack-if-plugins-are-outdated (775, , X, X- R/X/L) web.archive.org/web/20110628201811/http://www.msnbc.msn.com/id/40241749/ns/technology_and_science-tech_and_gadgets (775, -1, X, X- R/X/L) www.kaspersky.com/images/Kaspersky_Report_Browser_Usage_ENG_Final.pdf (775, , X, X- R/X/L) web.archive.org/web/20120927014805/http://www.businesswire.com/news/tjx/20070117005971/en (775, -1, X, X- R/X/L) www.msnbc.msn.com/id/40241749/ns/technology_and_science-tech_and_gadgets (775, , X, X- R/X/L) tier3.xyz/cyber-security-pakistan/ (775, 25, X, X- R/X/L) www.businesswire.com/news/tjx/20070117005971/en (775, , X, X- R/X/L) www.iab.net/media/file/IAB_Internet_Advertising_Revenue_Report_FY_2012_rev.pdf (775, , X, X- R/X/L) web.archive.org/web/20160306140354/http://fas.org/irp/gao/aim96084.htm (775, -1, X, X- R/X/L) web.archive.org/web/20150702051222/http://www.internetlivestats.com/ (775, -1, X, X- R/X/L) www.yahoo.com/tech/s/latest-adware-disables-antivirus-software-152920421.html (775, -1, X, X- R/X/L) fas.org/irp/gao/aim96084.htm (775, , X, X- R/X/L) www.internetlivestats.com (775, , X, X- R/X/L) www.tripwire.com/state-of-security/security-data-protection/the-four-most-common-evasive-techniques-used-by-malware/ (775, , X, X- R/X/L) macategroup.wordpress.com/2016/07/07/top-3-leading-cybersecurity-countries/ (775, , X, X- R/X/L) web.archive.org/web/20150729162322/http://www.pewinternet.org/2014/03/11/world-wide-web-timeline/ (775, -1, X, X- R/X/L) www.net-security.org/malware_news.php?id=3022 (775, , X, X- R/X/L) web.archive.org/web/20120502090205/http://vita-technologies.com/articles/board-bored-lockheed-martin-co/ (775, -1, X, X- R/X/L) www.pewinternet.org/2014/03/11/world-wide-web-timeline/ (775, 1330, X, X- R/X/L) www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html (775, -1, X, X- R/X/L) vita-technologies.com/articles/board-bored-lockheed-martin-co/ (775, , X, X- R/X/L) web.archive.org/web/20100107095025/https://www.arin.net/knowledge/about_resources/ceo_letter.pdf (775, -1, X, X- R/X/L) www.itsecurity.com/features/top-zombie-trojan-bots-092507 (775, , X, X- R/X/L) web.archive.org/web/20131203031833/http://www.darkreading.com/applications/secure-os-gets-highest-nsa-rating-goes-c/212100421 (775, -1, X, X- R/X/L) web.archive.org/web/20161012010519/https://www.researchgate.net/publication/298807979_Computer_Security_and_Mobile_Security_Challenges (775, -1, X, X- R/X/L) www.arin.net/knowledge/about_resources/ceo_letter.pdf (775, , X, X- R/X/L) www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-3.html (775, -1, X, X- R/X/L) web.archive.org/web/20151211032450/https://tier3.xyz/cyber-security-pakistan/ (775, -1, X, X- R/X/L) www.darkreading.com/applications/secure-os-gets-highest-nsa-rating-goes-c/212100421 (775, , X, X- R/X/L) www.researchgate.net/publication/298807979_Computer_Security_and_Mobile_Security_Challenges (775, , X, X- R/X/L) web.archive.org/web/20090401001902/http://www.potaroo.net/tools/ipv4/index.html (775, -1, X, X- R/X/L) www.spywareloop.com/news/malware (775, , X, X- R/X/L) web.archive.org/web/20140320215829/http://video.foxbusiness.com/v/2804966490001/forget-ids-use-your-phone-as-credentials/?playlist_id=937116503001#sp=show-clips (775, -1, X, X- R/X/L) www.theaustralian.com.au/technology/opinion/reliance-spells-end-of-road-for-ict-amateurs/story-e6frgb0o-1226636267865?nk=34fe4ab684629535daaf6a8fe6e6ef3d (775, , X, X- R/X/L) www.potaroo.net/tools/ipv4/index.html (775, , X, X- R/X/L) catb.org/jargon/html/meaning-of-hack.html (775, , X, X- R/X/L) video.foxbusiness.com/v/2804966490001/forget-ids-use-your-phone-as-credentials/?playlist_id=937116503001#sp=show-clips (775, , X, X- R/X/L) web.archive.org/web/20121321225800/http://searchsecurity.techtarget.com/definition/social-engineering (775, -1, X, X- R/X/L) web.archive.org/web/20090618032558/http://www.ietf.org/ (775, -1, X, X- R/X/L) www.mcafeeactivation.info/home/activate-mcafee-product-key/ (775, , X, X- R/X/L) searchsecurity.techtarget.com/definition/social-engineering (775, , X, X- R/X/L) www.ietf.org (775, , X, X- R/X/L) www.us-cert.gov/ncas/tips/ST06-001 (775, , X, X- R/X/L) www.mcafeeactivation.info/home/activate-mcafee-product-key/ (775, , X, X- R/X/L) web.archive.org/web/20171228171958/https://commons.erau.edu/jdfsl/vol12/iss2/8/ (775, -1, X, X- R/X/L) web.archive.org/web/20111015061355/http://www.gartner.com/it/page.jsp?id=1278413 (775, -1, X, X- R/X/L) www.ncdrc.res.in (775, , X, X- R/X/L) web.archive.org/web/20170621202140/http://www.pcmag.com/article2/0,2817,2342798,00.asp (775, -1, X, X- R/X/L) commons.erau.edu/jdfsl/vol12/iss2/8/ (775, , X, X- R/X/L) www.gartner.com/it/page.jsp?id=1278413 (775, , X, X- R/X/L) betanews.com/2017/08/24/non-windows-malware (775, , X, X- R/X/L) www.pcmag.com/article2/0,2817,2342798,00.asp (775, , X, X- R/X/L) tools.ietf.org/html/rfc1123 (775, -1, X, X- R/X/L) web.archive.org/web/20060410104717/http://www.bloomberg.com/apps/news?pid=10000082&sid=aQ0ZfhMa4XGQ&refer=canada (775, -1, X, X- R/X/L) appleinsider.com/articles/17/03/14/proton-mac-trojan-has-apple-code-signing-signatures-sold-to-customers-for-50k (775, , X, X- R/X/L) web.archive.org/web/20171113165123/http://www.orfonline.org/cyfy-event/need-for-proper-structure-of-ppps-to-address-specific-cyberspace-risks/ (775, -1, X, X- R/X/L) web.archive.org/web/20140320220133/http://www.scmagazine.com/safenet-protectdrive-84/review/2596/ (775, -1, X, X- R/X/L) tools.ietf.org/html/rfc1122 (775, -1, X, X- R/X/L) www.bloomberg.com/apps/news?pid=10000082&sid=aQ0ZfhMa4XGQ&refer=canada (775, -1, X, X- R/X/L) www.faqs.org/faqs/computer-virus/faq/ (775, , X, X- R/X/L) www.orfonline.org/cyfy-event/need-for-proper-structure-of-ppps-to-address-specific-cyberspace-risks/ (775, , X, X- R/X/L) www.scmagazine.com/safenet-protectdrive-84/review/2596/ (775, , X, X- R/X/L) tools.ietf.org/html/rfc675 (775, -1, X, X- R/X/L) www.washingtonian.com/2016/09/14/70-percent-worlds-web-traffic-flows-loudoun-county/ (775, , X, X- R/X/L) www.symantec.com/business/support/index?page=content&id=TECH98539 (775, , X, X- R/X/L) web.archive.org/web/20140611161421/http://www.intel.com/content/dam/www/public/us/en/documents/white-papers/trusted-execution-technology-security-paper.pdf (775, -1, X, X- R/X/L) tools.ietf.org/html/rfc2914 (775, -1, X, X- R/X/L) gizmodo.com/5913934/the-bullseye-of-americas-internet (775, , X, X- R/X/L) www.anvari.org/fortune/Miscellaneous_Collections/291162_trojan-horse-coined-by-mit-hacker-turned-nsa-spook-dan-edwards-n.html (775, , X, X- R/X/L) www.intel.com/content/dam/www/public/us/en/documents/white-papers/trusted-execution-technology-security-paper.pdf (775, , X, X- R/X/L) www.opte.org/maps/ (775, , X, X- R/X/L) www.washingtonpost.com/news/capital-business/wp/2014/03/05/why-ashburn-va-is-the-center-of-the-internet/ (775, , X, X- R/X/L) tools.ietf.org/html/rfc1149 (775, -1, X, X- R/X/L) biz.loudoun.gov/key-business-sectors/data-centers/ (775, , X, X- R/X/L) tools.ietf.org/html/rfc2828 (775, -1, X, X- R/X/L) rmp.aps.org/abstract/RMP/v74/i1/p47_1 (775, , X, X- R/X/L) web.archive.org/web/20140320220321/http://www.thewindowsclub.com/lock-protect-your-windows-pc-using-a-usb-drive-with-predator (775, -1, X, X- R/X/L) www.law.cornell.edu/uscode/text/18/1030#e_2 (775, , X, X- R/X/L) adsabs.harvard.edu/abs/2002RvMP...74...47A (775, , X, X- R/X/L) web.archive.org/web/20170323234015/https://www.merics.org/en/about-us/merics-analysis/chinas-political-system/ (775, -1, X, X- R/X/L) www.thewindowsclub.com/lock-protect-your-windows-pc-using-a-usb-drive-with-predator (775, , X, X- R/X/L) www.law.cornell.edu/uscode/text/18/1030 (775, , X, X- R/X/L) archive.is/20120714043940/http://rmp.aps.org/abstract/RMP/v74/i1/p47_1 (775, -1, X, X- R/X/L) www.merics.org/en/about-us/merics-analysis/chinas-political-system/ (775, , X, X- R/X/L) web.archive.org/web/20140320234026/http://www.safenet-inc.com/multi-factor-authentication/authenticators/pki-usb-authentication/etoken-5200-token-based-authentication/ (775, -1, X, X- R/X/L) www.nanoit.pt (775, , X, X- R/X/L) www.isoc.org/internet/history/isochistory.shtml (775, , X, X- R/X/L) www.safenet-inc.com/multi-factor-authentication/authenticators/pki-usb-authentication/etoken-5200-token-based-authentication/ (775, , X, X- R/X/L) www.nanoit.pt (775, , X, X- R/X/L) web.archive.org/web/20111127114016/http://www.isoc.org/internet/history/isochistory.shtml (775, -1, X, X- R/X/L) web.archive.org/web/20140320220549/http://www.e-spincorp.com/espinv3/index.php/solutions/3-solutions/174-sentinel-hasp-hl (775, -1, X, X- R/X/L) www.cncs.gov.pt (775, , X, X- R/X/L) www.ianacg.org/icg-applauds-transfer-of-iana-stewardship/ (775, , X, X- R/X/L) www.e-spincorp.com/espinv3/index.php/solutions/3-solutions/174-sentinel-hasp-hl (775, , X, X- R/X/L) web.archive.org/web/20110919130539/https://www.theregister.co.uk/2005/07/01/bush_net_policy/ (775, -1, X, X- R/X/L) web.archive.org/web/20130921055451/http://www.cs.columbia.edu/~waksman/PDFs/Oakland_2010.pdf (775, -1, X, X- R/X/L) www.theregister.co.uk/2005/07/01/bush_net_policy/ (775, , X, X- R/X/L) www.cs.columbia.edu/~waksman/PDFs/Oakland_2010.pdf (775, , X, X- R/X/L) web.archive.org/web/20130524035251/http://www.ip3.gatech.edu/research/KLEIN_ICANN%2BSovereignty.doc (775, -1, X, X- R/X/L) web.archive.org/web/20140312221955/http://www.scientificamerican.com/article/the-hacker-in-your-hardware/ (775, -1, X, X- R/X/L) www.ip3.gatech.edu/research/KLEIN_ICANN%2BSovereignty.doc (775, , X, X- R/X/L) www.scientificamerican.com/article/the-hacker-in-your-hardware/ (775, -1, X, X- R/X/L) web.archive.org/web/20110531133712/http://www.sciencemag.org/content/suppl/2011/02/08/science.1200970.DC1/Hilbert-SOM.pdf (775, -1, X, X- R/X/L) web.archive.org/web/20130504191958/http://www.ganssle.com/rants/gettingitright.htm (775, -1, X, X- R/X/L) adsabs.harvard.edu/abs/2011Sci...332...60H (775, , X, X- R/X/L) www.ganssle.com/rants/gettingitright.htm (775, , X, X- R/X/L) www.sciencemag.org/content/suppl/2011/02/08/science.1200970.DC1/Hilbert-SOM.pdf (775, , X, X- R/X/L) web.archive.org/web/20110719110932/http://www-wjp.cs.uni-saarland.de/publikationen/Ba10EW.pdf (775, -1, X, X- R/X/L) web.archive.org/web/20110623200007/http://www.internetworldstats.com/stats.htm (775, -1, X, X- R/X/L) www-wjp.cs.uni-saarland.de/publikationen/Ba10EW.pdf (775, , X, X- R/X/L) sel4.systems/Docs/seL4-spec.pdf (775, , X, X- R/X/L) www.internetworldstats.com/stats.htm (775, , X, X- R/X/L) web.archive.org/web/20150521171234/https://sel4.systems/Docs/seL4-spec.pdf (775, -1, X, X- R/X/L) portal.acm.org/citation.cfm?id=800667 (775, , X, X- R/X/L) web.archive.org/web/20110227073552/http://www.codenomicon.com/solutions/unknown-vulnerability-management/ (775, -1, X, X- R/X/L) www.codenomicon.com/solutions/unknown-vulnerability-management/ (775, , X, X- R/X/L) web.archive.org/web/20070614012344/http://www.dtc.umn.edu/~odlyzko/doc/internet.size.pdf (775, -1, X, X- R/X/L) web.archive.org/web/20150925113829/http://www.reuters.com/article/2010/10/18/us-crime-fraud-idUSTRE69H25820101018 (775, -1, X, X- R/X/L) www.dtc.umn.edu/~odlyzko/doc/internet.size.pdf (775, , X, X- R/X/L) www.reuters.com/article/2010/10/18/us-crime-fraud-idUSTRE69H25820101018 (775, -1, X, X- R/X/L) clickz.com/showPage.html?page=3626274 (775, , X, X- R/X/L) web.archive.org/web/20160820015812/https://www.datanami.com/2016/05/09/oni-may-best-hope-cyber-security-now/ (775, -1, X, X- R/X/L) web.archive.org/web/20081004000237/http://www.clickz.com/showPage.html?page=3626274 (775, -1, X, X- R/X/L) www.datanami.com/2016/05/09/oni-may-best-hope-cyber-security-now/ (775, , X, X- R/X/L) www.itu.int/en/ITU-D/Statistics/Pages/facts/default.aspx (775, , X, X- R/X/L) web.archive.org/web/20160713120506/http://www.cloudera.com/solutions/cybersecurity.html (775, -1, X, X- R/X/L) www.census.gov/population/international/data/idb/worldpoptotal.php (775, , X, X- R/X/L) www.cloudera.com/solutions/cybersecurity.html (775, , X, X- R/X/L) web.archive.org/web/20111121092636/http://news.bbc.co.uk/2/hi/science/nature/5242252.stm (775, -1, X, X- R/X/L) web.archive.org/web/20141003064643/http://www.techopedia.com/definition/72/security-architecture (775, -1, X, X- R/X/L) news.bbc.co.uk/2/hi/science/nature/5242252.stm (775, -1, X, X- R/X/L) www.techopedia.com/definition/72/security-architecture (775, , X, X- R/X/L) www.webcitation.org/5msT2iV3b?url=http://info.cern.ch/ (775, -1, X, X- R/X/L) web.archive.org/web/20140315012754/http://www.opensecurityarchitecture.org/cms/definitions/it-security-architecture (775, -1, X, X- R/X/L) info.cern.ch (775, , X, X- R/X/L) www.opensecurityarchitecture.org/cms/definitions/it-security-architecture (775, , X, X- R/X/L) www.w3.org/Protocols/HTTP/AsImplemented.html (775, -1, X, X- R/X/L) web.archive.org/web/20141120041536/http://www.infosectoday.com/Articles/Glossary.pdf (775, -1, X, X- R/X/L) web.archive.org/web/19970605071155/http://www.w3.org/Protocols/HTTP/AsImplemented.html (775, -1, X, X- R/X/L) www.infosectoday.com/Articles/Glossary.pdf (775, , X, X- R/X/L) ftp.cuhk.edu.hk/pub/doc/internet/Internet.Monthly.Report/imr9002.txt (775, , X, X- R/X/L) web.archive.org/web/20120227163121/http://www.cnss.gov/Assets/pdf/cnssi_4009.pdf (775, -1, X, X- R/X/L) web.archive.org/web/20170129225422/https://books.google.com/books?id=wDAEAAAAMBAJ&pg=PT31&lpg=PT31&dq=compuserve%20to%20mci%20mail%20internet&source=bl&ots=O0PGdOm7ZZ&sig=Cz9Uu_Wt1y_5G_v4EJU8n5KmQQM&hl=en&sa=X&ved=0ahUKEwiK8KvN-bfOAhUO3WMKHQcrBdsQ6AEIQDAH (775, -1, X, X- R/X/L) www.cnss.gov/Assets/pdf/cnssi_4009.pdf (775, , X, X- R/X/L) books.google.com/books?id=wDAEAAAAMBAJ&pg=PT31&lpg=PT31&dq=compuserve%20to%20mci%20mail%20internet&source=bl&ots=O0PGdOm7ZZ&sig=Cz9Uu_Wt1y_5G_v4EJU8n5KmQQM&hl=en&sa=X&ved=0ahUKEwiK8KvN-bfOAhUO3WMKHQcrBdsQ6AEIQDAH#v=onepage&q=compuserve%20to%20mci%20mail%20internet&f=false (775, -1, X, X- R/X/L) tools.ietf.org/html/rfc2828 (775, -1, X, X- R/X/L) web.archive.org/web/20160304031416/http://www.nordu.net/history/TheHistoryOfNordunet_simple.pdf (775, -1, X, X- R/X/L) web.archive.org/web/20161229102808/http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM482022.pdf (775, -1, X, X- R/X/L) www.nordu.net/history/TheHistoryOfNordunet_simple.pdf (775, , X, X- R/X/L) searchsecurity.techtarget.com/definition/Trojan-horse (775, , X, X- R/X/L) www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM482022.pdf (775, , X, X- R/X/L) web.archive.org/web/20060201035514/http://apan.net/meetings/busan03/cs-history.htm (775, -1, X, X- R/X/L) www.webopedia.com/TERM/T/Trojan_horse.html (775, , X, X- R/X/L) web.archive.org/web/20161228210257/http://www.theverge.com/2016/12/27/14095166/fda-guidance-medical-device-cybersecurity-cyberattack-hacking-guidelines (775, -1, X, X- R/X/L) www.apan.net/meetings/busan03/cs-history.htm (775, , X, X- R/X/L) www.techterms.com/definition/trojanhorse (775, , X, X- R/X/L) www.theverge.com/2016/12/27/14095166/fda-guidance-medical-device-cybersecurity-cyberattack-hacking-guidelines (775, , X, X- R/X/L) www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA465587 (775, , X, X- R/X/L) web.archive.org/web/20161229171117/http://www.healthcareitnews.com/news/texas-hospital-hacked-affects-nearly-30000-patient-records (775, -1, X, X- R/X/L) www.malwarebytes.com/pdf/white-papers/stateofmalware.pdf (775, , X, X- R/X/L) www.healthcareitnews.com/news/texas-hospital-hacked-affects-nearly-30000-patient-records (775, , X, X- R/X/L) www.welivesecurity.com/wp-content/uploads/2016/02/Rise_of_Android_Ransomware.pdf (775, , X, X- R/X/L) web.archive.org/web/20170929233237/http://boston.cbslocal.com/2016/12/27/former-patient-accused-data-breech-new-hampshire-psychiatric-hospital/ (775, -1, X, X- R/X/L) books.google.com/books?id=XE-ddYF6uhYC&pg=PT204 (775, -1, X, X- R/X/L) boston.cbslocal.com/2016/12/27/former-patient-accused-data-breech-new-hampshire-psychiatric-hospital/ (775, , X, X- R/X/L) kb.iu.edu/d/aehm (775, , X, X- R/X/L) web.archive.org/web/20161229100748/https://www.rt.com/usa/371979-nh-hospital-data-breach/ (775, -1, X, X- R/X/L) www.cern.ch/ben/TCPHIST.html (775, , X, X- R/X/L) techacute.com/malware-information-privacy/ (775, , X, X- R/X/L) www.rt.com/usa/371979-nh-hospital-data-breach/ (775, , X, X- R/X/L) www.britannica.com/EBchecked/topic/130688/computer-virus (775, -1, X, X- R/X/L) web.archive.org/web/20141111210737/http://www.getcybersafe.gc.ca/index-eng.aspx (775, -1, X, X- R/X/L) web.archive.org/web/20161229100631/http://indianexpress.com/article/technology/tech-news-technology/legion-hacking-no-political-agenda-just-computer-geeks-says-hacker-4423167/ (775, -1, X, X- R/X/L) www.computerweekly.com/news/2240235919/Computer-killing-malware-used-in-Sony-attack-a-wake-up-call-to-business?asrc=EM_MDN_37122786 (775, , X, X- R/X/L) www.getcybersafe.gc.ca/index-eng.aspx (775, 18, X, X- R/X/L) indianexpress.com/article/technology/tech-news-technology/legion-hacking-no-political-agenda-just-computer-geeks-says-hacker-4423167/ (775, , X, X- R/X/L) www.computerweekly.com/news/2240161674/Shamoon-is-latest-malware-to-target-energy-sector (775, , X, X- R/X/L) web.archive.org/web/20141102184754/http://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (775, -1, X, X- R/X/L) web.archive.org/web/20161229101209/http://www.bbc.com/news/uk-england-humber-37822084 (775, -1, X, X- R/X/L) blogs.technet.com/b/mmpc/archive/2012/11/29/another-way-microsoft-is-disrupting-the-malware-ecosystem.aspx (775, , X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (775, 715, X, X- R/X/L) www.bbc.com/news/uk-england-humber-37822084 (775, -1, X, X- R/X/L) www.csoonline.com/article/3212260/ransomware/the-5-biggest-ransomware-attacks-of-the-last-5-years.html (775, , X, X- R/X/L) web.archive.org/web/20141102184754/http://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (775, -1, X, X- R/X/L) web.archive.org/web/20161229101819/http://www.bbc.com/news/uk-england-humber-37849746 (775, -1, X, X- R/X/L) oit.ncsu.edu/resnet/p2p (775, , X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (775, 715, X, X- R/X/L) www.bbc.com/news/uk-england-humber-37849746 (775, -1, X, X- R/X/L) www.pcworld.com/article/id,116841-page,1/article.html (775, , X, X- R/X/L) web.archive.org/web/20141103225408/http://www.marketwired.com/press-release/government-canada-launches-cyber-security-awareness-month-with-new-public-awareness-1706660.htm (775, -1, X, X- R/X/L) www.grimsbytelegraph.co.uk/grimsby-hospital-computer-hack-no-ransom-has-been-demanded/story-29856124-detail/story.html (775, , X, X- R/X/L) www.itworld.com/security/84077/child-porn-malwares-ultimate-evil (775, , X, X- R/X/L) www.marketwired.com/press-release/government-canada-launches-cyber-security-awareness-month-with-new-public-awareness-1706660.htm (775, 4692, X, X- R/X/L) technet.microsoft.com/en-us/library/cc512596.aspx (775, , X, X- R/X/L) web.archive.org/web/20141111212708/http://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/rprt-eng.aspx (775, -1, X, X- R/X/L) web.archive.org/web/20161229101019/http://www.theregister.co.uk/2016/01/19/melbourne_hospital_pathology_wing_splattered_by_virus/ (775, -1, X, X- R/X/L) news.softpedia.com/news/MiniDuke-Malware-Used-Against-European-Government-Organizations-333006.shtml (775, , X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/rprt-eng.aspx (775, 715, X, X- R/X/L) www.theregister.co.uk/2016/01/19/melbourne_hospital_pathology_wing_splattered_by_virus/ (775, , X, X- R/X/L) www.eweek.com/security/microsoft-vows-to-combat-government-cyber-spying.html (775, , X, X- R/X/L) web.archive.org/web/20141008194739/http://www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/index-eng.aspx (775, -1, X, X- R/X/L) web.archive.org/web/20161116141207/http://www.theregister.co.uk/2016/06/28/medjack (775, -1, X, X- R/X/L) www.consumer.ftc.gov/articles/0011-malware (775, , X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/index-eng.aspx (775, 715, X, X- R/X/L) www.theregister.co.uk/2016/06/28/medjack/ (775, , X, X- R/X/L) www.onguardonline.gov/media/video-0056-protect-your-computer-malware (775, , X, X- R/X/L) web.archive.org/web/20141008035436/http://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/ccirc-ccric-eng.aspx (775, -1, X, X- R/X/L) web.archive.org/web/20161229103355/http://www.nbcnews.com/news/us-news/medstar-hospitals-recovering-after-ransomware-hack-n548121 (775, -1, X, X- R/X/L) blogs.technet.com/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx (775, , X, X- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/ccirc-ccric-eng.aspx (775, 715, X, X- R/X/L) www.nbcnews.com/news/us-news/medstar-hospitals-recovering-after-ransomware-hack-n548121 (775, , X, X- R/X/L) ics-cert.us-cert.gov/sites/default/files/recommended_practices/CaseStudy-002.pdf (775, , X, X- R/X/L) web.archive.org/web/20141102173436/http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (775, -1, X, X- R/X/L) web.archive.org/web/20161229101247/http://www.businessinsider.com/hospital-ransomware-hack-2016-5 (775, -1, X, X- R/X/L) technet.microsoft.com/en-us/library/dd632948.aspx (775, , X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (775, 715, X, X- R/X/L) www.businessinsider.com/hospital-ransomware-hack-2016-5 (775, , X, X- R/X/L) www.cnn.com/2015/05/17/us/fbi-hacker-flight-computer-systems/index.html (775, , X, X- R/X/L) web.archive.org/web/20141102213822/http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-ncdnt-frmwrk/index-eng.aspx#_Toc360619104 (775, -1, X, X- R/X/L) web.archive.org/web/20161229101724/http://www.wiwo.de/technologie/digitale-welt/cyber-angriffe-krankenhaeuser-ruecken-ins-visier-der-hacker/14946040.html (775, -1, X, X- R/X/L) onlinenewsoman.com/2013/05/17/indian-companies-at-center-of-global-cyber-heist/ (775, , X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-ncdnt-frmwrk/index-eng.aspx#_Toc360619104 (775, 715, X, X- R/X/L) www.wiwo.de/technologie/digitale-welt/cyber-angriffe-krankenhaeuser-ruecken-ins-visier-der-hacker/14946040.html (775, , X, X- R/X/L) voices.washingtonpost.com/securityfix/2009/10/avoid_windows_malware_bank_on.html (775, , X, X- R/X/L) web.archive.org/web/20141102173436/http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (775, -1, X, X- R/X/L) web.archive.org/web/20161229104021/http://www.forbes.com/sites/kalevleetaru/2016/03/29/hacking-hospitals-and-holding-hostages-cybersecurity-in-2016/ (775, -1, X, X- R/X/L) ssrn.com/abstract=2765010 (775, , X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (775, 715, X, X- R/X/L) www.forbes.com/sites/kalevleetaru/2016/03/29/hacking-hospitals-and-holding-hostages-cybersecurity-in-2016/ (775, -1, X, X- R/X/L) dl.acm.org/citation.cfm?id=2818550 (775, , X, X- R/X/L) web.archive.org/web/20141102175701/http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/index-eng.aspx (775, -1, X, X- R/X/L) web.archive.org/web/20160520155616/http://www.thedailybeast.com/articles/2014/11/17/how-your-pacemaker-will-get-hacked.html (775, -1, X, X- R/X/L) www.pwc.com/en_US/us/financial-services/regulatory-services/publications/assets/sanctions-cyber-crime.pdf (775, , X, X- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/index-eng.aspx (775, 715, X, X- R/X/L) www.thedailybeast.com/articles/2014/11/17/how-your-pacemaker-will-get-hacked.html (775, , X, X- R/X/L) homelandprepnews.com/countermeasures/18834-expert-work-needed-get-private-sector-cyber-secure/ (775, , X, X- R/X/L) web.archive.org/web/20160604201841/http://www.computerworld.com/article/2492453/malware-vulnerabilities/pacemaker-hack-can-deliver-deadly-830-volt-jolt.html (775, -1, X, X- R/X/L) www.pcmag.com/article2/0,2817,2425836,00.asp (775, , X, X- R/X/L) www.computerworld.com/article/2492453/malware-vulnerabilities/pacemaker-hack-can-deliver-deadly-830-volt-jolt.html (775, , X, X- R/X/L) www.thenews.com.pk/Todays-News-6-172840-Cyber-Secure-Pakistan-initiative-launched (775, , X, X- R/X/L) web.archive.org/web/20160529002947/http://www.darkreading.com/vulnerabilities---threats/hospital-medical-devices-used-as-weapons-in-cyberattacks/d/d-id/1320751 (775, -1, X, X- R/X/L) www.thenews.com.pk/Todays-News-13-22095-Pakistani-hackers-defaced-over-1000-Indian-websites (775, , X, X- R/X/L) www.darkreading.com/vulnerabilities---threats/hospital-medical-devices-used-as-weapons-in-cyberattacks/d/d-id/1320751 (775, , X, X- R/X/L) tribune.com.pk/story/83967/36-government-websites-hacked-by-indian-cyber-army/ (775, , X, X- R/X/L) web.archive.org/web/20160514002208/http://arstechnica.com/security/2012/11/hotel-room-burglars-exploit-critical-flaw-in-electronic-door-locks/ (775, -1, X, X- R/X/L) www.public.navy.mil/spawar/Press/Documents/Publications/03.26.15_USSenate.pdf (775, , X, X- R/X/L) arstechnica.com/security/2012/11/hotel-room-burglars-exploit-critical-flaw-in-electronic-door-locks/ (775, , X, X- R/X/L) web.archive.org/web/20130920145534/http://blogs.hbr.org/2013/06/rethinking-security-for-the-in/ (775, -1, X, X- R/X/L) www.isaca.org/Knowledge-Center/Research/Documents/RiskIT-FW-18Nov09-Research.pdf (775, , X, X- R/X/L) blogs.hbr.org/2013/06/rethinking-security-for-the-in (775, , X, X- R/X/L) www.garykessler.net/library/ddos.html (775, , X, X- R/X/L) web.archive.org/web/20161012010519/http://www.internet-of-things-research.eu/pdf/Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdf (775, -1, X, X- R/X/L) www.merit.edu/research/nsfnet_article.php (775, , X, X- R/X/L) www.garykessler.net/library/ddos.html (775, , X, X- R/X/L) www.internet-of-things-research.eu/pdf/Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdf (775, , X, X- R/X/L) apnews.com/2c25d7da76f4409bae7daf063c071420/what-makes-cyberattack-experts-lobby-restrict-term (775, , X, X- R/X/L) hbr.org/resources/pdfs/comm/verizon/18980_HBR_Verizon_IoT_Nov_14.pdf (775, , X, X- R/X/L) web.archive.org/web/20130817124939/http://merit.edu/research/nsfnet_article.php (775, -1, X, X- R/X/L) papers.duckdns.org/files/2011_IECON_stuxnet.pdf (775, , X, X- R/X/L) web.archive.org/web/20150627090938/http://www.forbes.com/sites/chrisclearfield/2013/09/18/why-the-ftc-cant-regulate-the-internet-of-things/ (775, -1, X, X- R/X/L) standards.iso.org/ittf/PubliclyAvailableStandards/c041933_ISO_IEC_27000_2009.zip (775, , X, X- R/X/L) www.forbes.com/sites/chrisclearfield/2013/09/18/why-the-ftc-cant-regulate-the-internet-of-things/ (775, -1, X, X- R/X/L) web.archive.org/web/20150210181738/http://www.merit.edu/about/history/pdf/NSFNET_final.pdf (775, -1, X, X- R/X/L) ssrn.com/abstract=2765010 (775, , X, X- R/X/L) ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7165580 (775, -1, X, X- R/X/L) web.archive.org/web/20070604153304/http://www.isoc.org/internet/history/brief.shtml (775, -1, X, X- R/X/L) web.archive.org/web/20140316021605/http://www.webopedia.com/TERM/E/endpoint_security.html (775, -1, X, X- R/X/L) web.archive.org/web/20150626125229/http://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx (775, -1, X, X- R/X/L) www.webopedia.com/TERM/E/endpoint_security.html (775, , X, X- R/X/L) www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx (775, , X, X- R/X/L) adsabs.harvard.edu/abs/1999cs........1011L (775, , X, X- R/X/L) web.archive.org/web/20111106055944/http://www.businessdictionary.com/definition/data-integrity.html (775, -1, X, X- R/X/L) web.archive.org/web/20160610130749/http://www.edweek.org/ew/articles/2015/10/21/lessons-learned-from-security-breaches.html (775, -1, X, X- R/X/L) www.isoc.org/internet/history/brief.shtml (775, , X, X- R/X/L) www.edweek.org/ew/articles/2015/10/21/lessons-learned-from-security-breaches.html (775, , X, X- R/X/L) web.archive.org/web/20140719055501/http://www.wired.com/2012/12/queen-and-the-internet/ (775, -1, X, X- R/X/L) web.archive.org/web/20170624014751/https://arstechnica.com/security/2015/06/encryption-would-not-have-helped-at-opm-says-dhs-official/ (775, -1, X, X- R/X/L) www.wired.com/2012/12/queen-and-the-internet/ (775, , X, X- R/X/L) arstechnica.com/security/2015/06/encryption-would-not-have-helped-at-opm-says-dhs-official/ (775, , X, X- R/X/L) nrg.cs.ucl.ac.uk/internet-history.html (775, , X, X- R/X/L) www.businessdictionary.com/definition/data-integrity.html (775, , X, X- R/X/L) web.archive.org/web/20150606063139/http://www.cnn.com/2015/06/04/politics/federal-agency-hacked-personnel-management/ (775, -1, X, X- R/X/L) web.archive.org/web/20170306161657/http://www.vox.com/a/internet-maps (775, -1, X, X- R/X/L) www.cnn.com/2015/06/04/politics/federal-agency-hacked-personnel-management/ (775, , X, X- R/X/L) www.vox.com/a/internet-maps (775, , X, X- R/X/L) medical-dictionary.thefreedictionary.com/confidentiality (775, , X, X- R/X/L) web.archive.org/web/20150605041629/http://www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-employees-records-at-risk (775, -1, X, X- R/X/L) www.norsar.no/norsar/about-us/History/Internet/ (775, , X, X- R/X/L) www.gov.uk/government/news/cyber-skills-for-a-vibrant-and-secure-uk (775, , X, X- R/X/L) www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-employees-records-at-risk (775, , X, X- R/X/L) www.webcitation.org/6CyxHpfIR?url=http://www.norsar.no/norsar/about-us/History/Internet/ (775, -1, X, X- R/X/L) assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/386093/The_UK_Cyber_Security_Strategy_Report_on_Progress_and_Forward_Plans_-_De___.pdf (775, , X, X- R/X/L) web.archive.org/web/20151106193613/http://www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html (775, -1, X, X- R/X/L) www.sigtel.com/tel_hist_brief.html (775, , X, X- R/X/L) assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/386093/The_UK_Cyber_Security_Strategy_Report_on_Progress_and_Forward_Plans_-_De___.pdf (775, , X, X- R/X/L) www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html (775, -1, X, X- R/X/L) web.archive.org/web/20030405153523/http://www.sigtel.com/tel_hist_brief.html (775, -1, X, X- R/X/L) web.archive.org/web/20161021073353/http://iase.disa.mil/iawip/Pages/iabaseline.aspx (775, -1, X, X- R/X/L) web.archive.org/web/20090307045833/http://www.publications.parliament.uk/pa/ld200708/ldjudgmt/jd080730/mckinn-1.htm (775, -1, X, X- R/X/L) web.archive.org/web/20090721093920/http://www.columbia.edu/~rh120/other/tcpdigest_paper.txt (775, -1, X, X- R/X/L) iase.disa.mil/iawip/Pages/iabaseline.aspx (775, , X, X- R/X/L) publications.parliament.uk/pa/ld200708/ldjudgmt/jd080730/mckinn-1.htm (775, , X, X- R/X/L) www.columbia.edu/~rh120/other/tcpdigest_paper.txt (775, , X, X- R/X/L) web.archive.org/web/20141003115305/http://www.learnquest.com/subcategories.aspx?categoryid=33 (775, -1, X, X- R/X/L) web.archive.org/web/20120906185731/http://www.bbc.co.uk/news/uk-19506090 (775, -1, X, X- R/X/L) web.archive.org/web/20160127082435/http://www.netvalley.com/intval.html (775, -1, X, X- R/X/L) www.learnquest.com/subcategories.aspx?categoryid=33 (775, , X, X- R/X/L) www.bbc.co.uk/news/uk-19506090 (775, , X, X- R/X/L) www.netvalley.com/intval.html (775, , X, X- R/X/L) web.archive.org/web/20150106064140/http://msisac.cisecurity.org/resources/videos/free-training.cfm (775, -1, X, X- R/X/L) web.archive.org/web/20100602065423/http://www.telegraph.co.uk/news/worldnews/northamerica/usa/4320901/Gary-McKinnon-profile-Autistic-hacker-who-started-writing-computer-programs-at-14.html (775, -1, X, X- R/X/L) web.archive.org/web/20160409105511/http://www.internetsociety.org/internet/what-internet/history-internet/brief-history-internet (775, -1, X, X- R/X/L) msisac.cisecurity.org/resources/videos/free-training.cfm (775, , X, X- R/X/L) www.telegraph.co.uk/news/worldnews/northamerica/usa/4320901/Gary-McKinnon-profile-Autistic-hacker-who-started-writing-computer-programs-at-14.html (775, -1, X, X- R/X/L) www.internetsociety.org/internet/what-internet/history-internet/brief-history-internet#concepts (775, , X, X- R/X/L) web.archive.org/web/20150107111146/http://www.dhs.gov/cybersecurity-training-exercises (775, -1, X, X- R/X/L) www.webcitation.org/6GNY6Rgfk?url=http://rt.com/usa/anonymous-barrettbrown-sopa-megaupload-241/ (775, -1, X, X- R/X/L) web.archive.org/web/20160310063033/https://books.google.com/books?id=lESrw3neDokC&pg=PA53 (775, -1, X, X- R/X/L) www.dhs.gov/cybersecurity-training-exercises (775, , X, X- R/X/L) rt.com/usa/anonymous-barrettbrown-sopa-megaupload-241/ (775, , X, X- R/X/L) books.google.com/books?id=lESrw3neDokC&pg=PA53#v=onepage&q&f=false (775, -1, X, X- R/X/L) web.archive.org/web/20130502135412/http://www.dhs.gov/join-dhs-cybersecurity (775, -1, X, X- R/X/L) web.archive.org/web/20170121161404/https://www.transportation.gov/sites/dot.gov/files/docs/AV%20policy%20guidance%20PDF.pdf (775, -1, X, X- R/X/L) web.archive.org/web/20110321081034/http://www.informatik.uni-trier.de/~ley/db/conf/ifip/ifip1977.html (775, -1, X, X- R/X/L) www.dhs.gov/join-dhs-cybersecurity (775, , X, X- R/X/L) www.transportation.gov/sites/dot.gov/files/docs/AV%20policy%20guidance%20PDF.pdf (775, , X, X- R/X/L) www.informatik.uni-trier.de/~ley/db/conf/ifip/ifip1977.html#Zimmermann77 (775, , X, X- R/X/L) niccs.us-cert.gov/home/students (775, , X, X- R/X/L) web.archive.org/web/20170214045032/https://www.nytimes.com/2016/09/20/technology/self-driving-cars-guidelines.html?_r=0 (775, -1, X, X- R/X/L) www.cs.utexas.edu/users/chris/think/Cyclades/index.shtml (775, , X, X- R/X/L) web.archive.org/web/20140223192040/http://niccs.us-cert.gov/home/students (775, -1, X, X- R/X/L) www.nytimes.com/2016/09/20/technology/self-driving-cars-guidelines.html?_r=0 (775, -1, X, X- R/X/L) web.archive.org/web/20130901092641/http://www.cs.utexas.edu/users/chris/think/Cyclades/index.shtml (775, -1, X, X- R/X/L) www.cs.gwu.edu/academics/graduate_programs/master/cybersecurity/cybersecurity-jobs (775, , X, X- R/X/L) web.archive.org/web/20170202014932/http://www.telegraph.co.uk/technology/2016/09/21/tesla-fixes-software-bug-that-allowed-chinese-hackers-to-control/ (775, -1, X, X- R/X/L) web.archive.org/web/20140810075940/http://conferences.sigcomm.org/hotnets/2011/papers/hotnetsX-final56.pdf (775, -1, X, X- R/X/L) web.archive.org/web/20090207130720/http://merit.edu/about/history/article.php (775, -1, X, X- R/X/L) web.archive.org/web/20130603085633/http://www.cs.gwu.edu/academics/graduate_programs/master/cybersecurity/cybersecurity-jobs (775, -1, X, X- R/X/L) www.telegraph.co.uk/technology/2016/09/21/tesla-fixes-software-bug-that-allowed-chinese-hackers-to-control/ (775, -1, X, X- R/X/L) conferences.sigcomm.org/hotnets/2011/papers/hotnetsX-final56.pdf (775, , X, X- R/X/L) www.merit.edu/about/history/article.php (775, , X, X- R/X/L) web.archive.org/web/20140424200253/http://www.defenceiq.com/defence-technology/articles/the-cyber-security-industry-and-you/ (775, -1, X, X- R/X/L) web.archive.org/web/20170202061247/http://www.independent.co.uk/news/science/hackers-remotely-carjack-jeep-from-10-miles-away-and-drive-it-into-ditch-10406554.html (775, -1, X, X- R/X/L) web.archive.org/web/20141001113334/http://www.newscientist.com/blogs/onepercent/2011/10/307-gw-the-maximum-energy-the.html (775, -1, X, X- R/X/L) news.bbc.co.uk/1/hi/technology/8331253.stm (775, -1, X, X- R/X/L) www.defenceiq.com/defence-technology/articles/the-cyber-security-industry-and-you/ (775, , X, X- R/X/L) www.independent.co.uk/news/science/hackers-remotely-carjack-jeep-from-10-miles-away-and-drive-it-into-ditch-10406554.html (775, , X, X- R/X/L) www.newscientist.com/blogs/onepercent/2011/10/307-gw-the-maximum-energy-the.html (775, , X, X- R/X/L) web.archive.org/web/20160409105511/http://www.internetsociety.org/internet/what-internet/history-internet/brief-history-internet (775, -1, X, X- R/X/L) web.archive.org/web/20160528165313/http://burning-glass.com/demand-for-cybersecurity-workers-outstripping-supply/ (775, -1, X, X- R/X/L) web.archive.org/web/20170119103855/https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ (775, -1, X, X- R/X/L)

User:COIBot/EditSummary

  • Displayed all 13 additions.