网络安全与攻防策略:现代威胁应对之道(原书第2版)
上QQ阅读APP看书,第一时间看更新

1.8 参考文献

[1]http://www.darkreading.com/attacks-breaches/new-iot-botnet-discovered-120k-ip-cameras-at-risk-of-attack/d/d-id/1328839.

[2]https://www.welivesecurity.com/2014/11/11/website-reveals-73000-unprotected-security-cameras-default-passwords/.

[3]https://threatpost.com/20-linksys-router-models-vulnerable-to-attack/125085/.

[4]https://www.nytimes.com/2017/02/15/us/remote-workers-work-from-home.html.

[5]https://blogs.technet.microsoft.com/yuridio-genes/2014/03/11/byod-article-published-at-issa-journal/.

[6]http://www.csoonline.com/article/3154714/security/ransomware-took-in-1-billion-in-2016-improved-defenses-may-not-be-enough-to-stem-the-tide.html.

[7]http://blog.trendmicro.com/ransomware-growth-will-plateau-in-2017-but-attack-methods-and-targets-will-diversify/.

[8]http://www.telegraph.co.uk/finance/personalfinance/bank-accounts/12149022/Use-the-same-password-for-everything-Youre-fuelling-a-surge-in-current-account-fraud.html.

[9]http://www.verizonenterprise.com/resources/reports/rp_DBIR_2017_Report_en_xg.pdf.

[10]https://www.microsoft.com/sdl.

[11]https://support.office.com/en-us/article/Office-365-Security-Compliance-Center-7e696a40-b86b-4a20-afcc-559218b7b1b8.

[12]https://downloads.cloudsecurityalliance.org/initiatives/surveys/capp/Cloud_Adop-tion_Practices_Priorities_Survey_Final.pdf.

[13]http://www.kasperskyreport.com/?gclid=CN_89N2b0tQCFQYuaQodAQoMYQ.

[14]http://www.kasperskyreport.com/?gclid=CN_89N2b0tQCFQYuaQodAQoMYQ.

[15]https://info.microsoft.com/ME-Azure-WBNR-FY16-06Jun-21-22-Microsoft-Security-Briefing-Event-Series-231990.html?ls=Social.

[16]https://technet.microsoft.com/en-us/library/security/ms17-010.aspx.

[17]https://www.symantec.com/connect/blogs/equation-has-secretive-cyberespionage-group-been-breached.

[18]https://twitter.com/MalwareTechBlog/status/865761555190775808.

[19]https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/.

[20]http://www.cnbc.com/2015/08/06/russia-hacks-pentagon-computers-nbc-citing-sources.html.

[21]https://www.theverge.com/2017/5/17/15655484/wannacry-variants-bitcoin-monero-adylkuzz-cryptocurrency-mining.

[22]https://www.quora.com/Could-the-attack-on-Pearl-Harbor-have-been-prevented-What-actions-could-the-US-have-taken-ahead-of-time-to-deter-dissuade-Japan-from-attacking#!n=12.

[23]http://usacac.army.mil/sites/default/files/documents/ufmcs/The_Applied_Critical_Thinking_Handbook_v7.0.pdf.

[24]https://www.fema.gov/media-library-data/20130726-1914-25045-8890/hseep_apr13_.pdf.

[25]https://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf.

[26]http://www.cbsnews.com/news/fbi-fighting-two-front-war-on-growing-enemy-cyber-espionage/.

[27]https://unit42.paloaltonetworks.com/unit42-banking-trojans-ursnif-global-distribution-networks-identified/.