Page 31 - index
P. 31








The final perspectives


The aim of this brief review’s article would be to provide some sort of an insight into situation
over a never-ending “threat – security warfare” as well as discuss all the risks, impacts and
possible investigative perspectives of such a “cause – effect” interaction.

References:

[1] 2013 Cost of Cyber Crime Study: United States, Ponemon Institute Research Report, 2013
[2] Sonia Bui, Michelle Enyeart, Jenghuei Luong, Issues in Computer Forensics, COEN 150,
2003
[3] Brian Carrier, Defining Digital Forensic Examination and Analysis Tools Using Abstraction
Layers, International Journal of Digital Evidence, 2003
[4] China might be building vast database of federal worker info, experts say, CNN -
http://edition.cnn.com/2015/06/04/politics/federal-agency-hacked-personnel-management/
[5] Computer Forensics, Wikipedia - https://en.wikipedia.org/wiki/Computer_forensics
[6] Data Breach Response Guide, Experian Data Breach Resolution, 2013-2014 Edition
[7] Karen Kent, Suzanne Chevalier, Tim Grance, Hung Dang, Guide to Integrating Forensic
Techniques into Incident Response, NIST, 2006
[8] Records from government data breach surface on 'darknet,' says expert, Fox News -
http://www.foxnews.com/politics/2015/06/10/records-from-government-data-breach-surface-on-
darknet-says-expert/
[9] Wiltshire County Council, Business Continuity Guide for Small Businesses, Emergency
Planning Unit, Environmental Services Department, 2006



About The Author:

Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Milica is a researcher
from Subotica, Serbia. She also serves as a Reviewer at the Journal of
Computer Sciences and Applications. She writes for Australian and
American security magazines. She is a volunteer with the American corner
of Subotica as well as a lecturer with the local engineering society.












31 Cyber Warnings E-Magazine – July 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   26   27   28   29   30   31   32   33   34   35   36