Page 66 - Cyber Warnings
P. 66
Morris, P. W. G. (2012). Cleland and King: Project management and the systems approach.
International Journal of Managing Projects in Business, 5(4), 634 – 642.
doi:10.1108/17538371211268951
Nakishima, E. (2014, October 28). Hackers breach some White House computers. The
Washington Post, Retrieved from Retrieved from
http://www.washingtonpost.com/world/national-security/hackers-breach-some-white-
house-computers/2014/10/28/2ddf2fa0-5ef7-11e4-91f7-5d89b5e8c251_story.html
Paganini, P. (2014, March). $5 Billion in military cyber spending fivefold increase over last year.
Security Affairs. Retrieved from http://securityaffairs.co/wordpress/22952/cyber-warfare-
2/5-billion-military-cyber-spending.html
Pagliery, J. (2015, Jan. 5). Morgan Stanley insider exposes rich clients' info online. CNN Money.
Retrieved from http://money.cnn.com/2015/01/05/technology/security/morgan-stanley-
data-breach
Soluade, O. A., & Opara, E. U. (2014). Security breaches, network exploits and vulnerabilities: A
conundrum and an analysis. International Journal Of Cyber-Security and Digital
Forensics, 3(4), 246-281. Retrieved from http://sdiwc.net/security-journal/prev_issue.php
Ten Big Federal Security Breaches. (n.d.). ARCSITE. Retrieved from
http://cdn.govexec.com/resources/10-big-federal-security-breaches/doc.pdf.
About The Author
Dr. Daniel Osafo. Harrison, D.C.S, Security+
Daniel is a Doctor of Computer Science in Information Assurance, Senior
Cybersecurity Administrator and Compliance Auditor for Industrial Control
Systems at Bechtel Nuclear Security & Environment and a member of Cyber
security Team at Pueblo Chemical Agent-Destruction Pilot Plant for
Department of the Army.
He functioned across the enterprise as a technical liaison between governance and
administration, regulatory compliance and implemented and managed cyber-security solutions.
Daniel can be reached online at [email protected] and at our company website
http://www.bechtel.com/
66 Cyber Warnings E-Magazine – September 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide