Page 25 - index
P. 25







friends really are as much, and network security professionals will be in more demand than
ever.

As we move into another generation of technology, we should be able to feel comfortable
with what we do and who we are on the Internet. Cybercriminals: your time is running out.



References

Clough, Jonathan. “Cybercrime”, Commonwealth Law Bulletin (2011): 37:4, 671-680. One
Search. Web. 8 Apr. 2014

"Cyber Crimes and Criminals." Carnegie Cyber Academy, n.d. Web. 13 Apr. 2014.
http://www.carnegiecyberacademy.com/facultyPages/cyberCriminals/catching.html
Harress, Christopher. "Obama Says Cyberterrorism Is Country's Biggest Threat, U.S.
Government Assembles "Cyber Warriors"" International Business Times. N.p., 18 Feb. 2014.
Web. 10 Apr. 2014.

http://www.ibtimes.com/obama-says-cyberterrorism-countrys-biggest-threat-us-government-
assembles-cyber-warriors-1556337

"Homeland Security." Protect Myself from Cyber Attacks. N.p., n.d. Web. 13 Apr. 2014.
https://www.dhs.gov/how-do-i/protect-myself-cyber-attacks

Pizzi, Michael. "Cyberwarfare Greater Threat to US than Terrorism, Say Security Experts."
Aljazeera America. N.p., 7 Jan. 2014. Web. 10 Apr. 2014.
http://america.aljazeera.com/articles/2014/1/7/defense-leaders-
saycyberwarfaregreatestthreattous.html


Rowan, Tom. "Intrusion Prevention Systems: Superior Security." Network Security (2007): 1-
15. One Search. Web. 8 Apr. 2014

Types of Hacker. Secpoint, n.d. Web. 8 Apr. 2014.


https://www.secpoint.com/Ftypes-of-hacker.html
"What Is a Firewall?" Firewall: What It Is and How It Works. N.p., n.d. Web. 12 Apr. 2014.
http://www.microsoft.com/security/pc-security/firewalls-whatis.aspx


http://www.forbes.com/2010/10/06/iran-nuclear-computer-technology-security-stuxnet-
worm.html

Worthen, Ben. "What to Do If You've Been Hacked." The Wall Street Journal. Dow Jones &
Company, 16 Sept. 2011. Web. 8 Apr. 2014.
http://online.wsj.com/news/articles/SB10001424053111904265504576566991567148576







25 Cyber Warnings E-Magazine – April 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   20   21   22   23   24   25   26   27   28   29   30