Dyson College of Arts and Sciences

Summit on Resilience II: The Next Storm

Dyson College of Arts and Sciences

Issue link: http://dysoncollege.uberflip.com/i/633753

Contents of this Issue

Navigation

Page 77 of 80

Footnotes 1 "System Time", available at http://en.wikipedia.org/wiki/System_time 2 Presidential Policy Directive PPD 21: Critical Infrastructure Security and Resilience, available at: http://www.whitehouse.gov/the-press- office/2013/02/12/presidential-policy-directive-critical-infrastructure- security-and-resil 3 Critical Infrastructure Security, Department of Homeland Security, available at: http://www.dhs.gov/topic/critical-infrastructure-security 4 Council on CyberSecurity / Le Conseil de la CyberSecurité Annual Report, page 3, available at http://www.counciloncybersecurity.org/resources/ council-presentations/ 5 The Critical Security Controls for Effective Cyber Defense v 5.1, page 5. 6 http://krebsonsecurity.com/2013/02/security-firm-bit9-used-to-spread- malware/: 7 https://blog.bit9.com/2013/02/08/bit9-and-our-customers-security:/: 8 https://m.facebook.com/note.php?note_id=10151249208250766 9 Ibid. 10 http://arstechnica.com/security/2012/06/8-million-leaked-passwords- connected-to-linkedin/ 11 http://arstechnica.com/security/2012/06/eharmoony-confrms-member- passwords-comromise/ 12 http://wired.com/threatlevel/2010/01/operation-aurora/ 13 http://zdnet.com/blog/security/microsoft-says-google-was-hacked-with-ie- zero-day/5250 14 "IM or Instant Headache", Association for Computing Machinery (ACM) Queue, May 4, 2004, pp. 72 – 78, available at http://delivery.acm. org/10.1145/990000/988410/stone.pdf?ip=218.189.105.254&id=988410& acc=OPEN&key=4D4702B0C3E38B35.4D4702B0C3E38B35.4D4702B0C3 E38B35.6D218144511F3437&CFID=486823391&CFTOKEN=72746622&__ acm__=1426050696_a5f007ad26011a008bbd0f08037615dd 15 "Guidelines for Data Classification", Carnegie Mellon University, Information Security Office, available at: http://www.cmu.edu/iso/governance/ guidelines/data-classification.html 16 "Renewable energy", Google public announcement made on behalf of Google Green–the firm's overarching commitment to alternative energy sources, available at: http://www.google.com/green/energy/ 17 "Google to Stop Censoring Search Results in China After Hack Attack", Wired, January 12, 2010, available at: http://www.wired.com/2010/01/ google-censorship-china/ 18 "Anatomy of an Attack", RSA Fraud Action Research Lab Report, April 1, 2011, available at: https://blogs.rsa.com/anatomy-of-an-attack/ 19 "Great Idea but Don't Quote Him", Los Angeles Times, September 2004, available at: http://articles.latimes.com/2004/sep/09/business/fi-deng9 74

Articles in this issue

Links on this page

view archives of Dyson College of Arts and Sciences - Summit on Resilience II: The Next Storm