Footnotes
1
"System Time", available at http://en.wikipedia.org/wiki/System_time
2
Presidential Policy Directive PPD 21: Critical Infrastructure Security
and Resilience, available at: http://www.whitehouse.gov/the-press-
office/2013/02/12/presidential-policy-directive-critical-infrastructure-
security-and-resil
3
Critical Infrastructure Security, Department of Homeland Security, available
at: http://www.dhs.gov/topic/critical-infrastructure-security
4
Council on CyberSecurity / Le Conseil de la CyberSecurité Annual Report,
page 3, available at http://www.counciloncybersecurity.org/resources/
council-presentations/
5
The Critical Security Controls for Effective Cyber Defense v 5.1, page 5.
6
http://krebsonsecurity.com/2013/02/security-firm-bit9-used-to-spread-
malware/:
7
https://blog.bit9.com/2013/02/08/bit9-and-our-customers-security:/:
8
https://m.facebook.com/note.php?note_id=10151249208250766
9
Ibid.
10
http://arstechnica.com/security/2012/06/8-million-leaked-passwords-
connected-to-linkedin/
11
http://arstechnica.com/security/2012/06/eharmoony-confrms-member-
passwords-comromise/
12
http://wired.com/threatlevel/2010/01/operation-aurora/
13
http://zdnet.com/blog/security/microsoft-says-google-was-hacked-with-ie-
zero-day/5250
14
"IM or Instant Headache", Association for Computing Machinery (ACM)
Queue, May 4, 2004, pp. 72 – 78, available at http://delivery.acm.
org/10.1145/990000/988410/stone.pdf?ip=218.189.105.254&id=988410&
acc=OPEN&key=4D4702B0C3E38B35.4D4702B0C3E38B35.4D4702B0C3
E38B35.6D218144511F3437&CFID=486823391&CFTOKEN=72746622&__
acm__=1426050696_a5f007ad26011a008bbd0f08037615dd
15
"Guidelines for Data Classification", Carnegie Mellon University, Information
Security Office, available at: http://www.cmu.edu/iso/governance/
guidelines/data-classification.html
16
"Renewable energy", Google public announcement made on behalf of
Google Green–the firm's overarching commitment to alternative energy
sources, available at: http://www.google.com/green/energy/
17
"Google to Stop Censoring Search Results in China After Hack Attack",
Wired, January 12, 2010, available at: http://www.wired.com/2010/01/
google-censorship-china/
18
"Anatomy of an Attack", RSA Fraud Action Research Lab Report, April 1, 2011,
available at: https://blogs.rsa.com/anatomy-of-an-attack/
19
"Great Idea but Don't Quote Him", Los Angeles Times, September 2004,
available at: http://articles.latimes.com/2004/sep/09/business/fi-deng9
74