1.8 参考文献
[1]http://www.darkreading.com/attacks-breaches/new-iot-botnet-discovered-120k-ip-cameras-at-risk-of-attack/d/d-id/1328839.
[2]https://www.welivesecurity.com/2014/11/11/website-reveals-73000-unprotected-security-cameras-default-passwords/.
[3]https://threatpost.com/20-linksys-router-models-vulnerable-to-attack/125085/.
[4]https://www.nytimes.com/2017/02/15/us/remote-workers-work-from-home.html.
[5]https://blogs.technet.microsoft.com/yuridio-genes/2014/03/11/byod-article-published-at-issa-journal/.
[6]http://www.csoonline.com/article/3154714/security/ransomware-took-in-1-billion-in-2016-improved-defenses-may-not-be-enough-to-stem-the-tide.html.
[7]http://blog.trendmicro.com/ransomware-growth-will-plateau-in-2017-but-attack-methods-and-targets-will-diversify/.
[8]http://www.telegraph.co.uk/finance/personalfinance/bank-accounts/12149022/Use-the-same-password-for-everything-Youre-fuelling-a-surge-in-current-account-fraud.html.
[9]http://www.verizonenterprise.com/resources/reports/rp_DBIR_2017_Report_en_xg.pdf.
[10]https://www.microsoft.com/sdl.
[11]https://support.office.com/en-us/article/Office-365-Security-Compliance-Center-7e696a40-b86b-4a20-afcc-559218b7b1b8.
[12]https://downloads.cloudsecurityalliance.org/initiatives/surveys/capp/Cloud_Adop-tion_Practices_Priorities_Survey_Final.pdf.
[13]http://www.kasperskyreport.com/?gclid=CN_89N2b0tQCFQYuaQodAQoMYQ.
[14]http://www.kasperskyreport.com/?gclid=CN_89N2b0tQCFQYuaQodAQoMYQ.
[15]https://info.microsoft.com/ME-Azure-WBNR-FY16-06Jun-21-22-Microsoft-Security-Briefing-Event-Series-231990.html?ls=Social.
[16]https://technet.microsoft.com/en-us/library/security/ms17-010.aspx.
[17]https://www.symantec.com/connect/blogs/equation-has-secretive-cyberespionage-group-been-breached.
[18]https://twitter.com/MalwareTechBlog/status/865761555190775808.
[19]https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/.
[20]http://www.cnbc.com/2015/08/06/russia-hacks-pentagon-computers-nbc-citing-sources.html.
[22]https://www.quora.com/Could-the-attack-on-Pearl-Harbor-have-been-prevented-What-actions-could-the-US-have-taken-ahead-of-time-to-deter-dissuade-Japan-from-attacking#!n=12.
[23]http://usacac.army.mil/sites/default/files/documents/ufmcs/The_Applied_Critical_Thinking_Handbook_v7.0.pdf.
[24]https://www.fema.gov/media-library-data/20130726-1914-25045-8890/hseep_apr13_.pdf.
[25]https://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf.
[26]http://www.cbsnews.com/news/fbi-fighting-two-front-war-on-growing-enemy-cyber-espionage/.