Page 343 - Introduction to Electronic Commerce and Social Commerce
P. 343
330 10 E-Commerce Security and Fraud Issues and Protections
Katz, O. “Analyzing a Malicious Botnet Attack Campaign through the Scott, W. Information Security 249 Success Secrets- 249 Most Asked
Security Big Data Prism.” January 6, 2014. blogs.akamai. Questions on Information Security- What You Need to Know.
com/2014/01/analyzing-a-malicious-botnet-attack-campaign- Brisbane, Queensland, Australia: Emereo Publishing, 2014.
through-the-security-big-data-prism.html (accessed April 2016). Singer, P. W., and A. Friedman. Cybersecurity and Cyberwar: What
Kavilanz, P. “Cyberattacks Devastated My Business!” (Last updated Everyone Needs to Know. 1st Edition, New York: Oxford University
May 28, 2013). money.cnn.com/gallery/smallbusiness/2013/05/28/ Press, 2014.
cybercrime/index.html?iid=Lead (accessed April 2016). Smith, C. “It Turns Out Target Could Have Easily Prevented Its Massive
Kitten, T. “Case Study: How to Stop Scams.” July 14, 2010. bankinfos- Security Breach.” March 13, 2014. bgr.com/2014/03/13/target-
ecurity.com/case-study-how-to-stop-scams-a-2748 (accessed data- hack-how-it-happened (accessed April 2016).
April 2016). Smith, R. Elementary Information Security, 2nd edition. Burlington,
Kravets, D. “How China’s Army Hacked America.” May 19, 2014 MA: Jones Bartlett, 2015.
arstechnica.com/tech-policy/2014/05/how-chinas-army-hacked- SUNY College at Old Westbury. “Website Privacy Policy Statement.”
american- companies (accessed June 2014). 2014. oldwestbury.edu/policies/website-privacy-policy- statement
Lawinski, J. “Security Slideshow: Malicious Attacks Skyrocket as (accessed May 2016).
Hackers Explore New Targets.” CIO Insight, May 7, 2012. Swann, C. T. Marlins Cry a Phishing Story. Spokane, WA: Cutting
Lemos, R. “Phishing Attacks Continue to Sneak Past Defenses.” eWeek, Edge Communications, Inc., 2012.
February 11, 2016. Symantec. “Infographic: The State of Financial Trojans 2013.” Updated
Lenovo. “Lenovo Recommends 15 Steps to Reducing Security Risks in January 8, 2014. symantec.com/connect/blogs/state-financial-
Enterprise Mobility.” White Paper, August 2013. Available for trojans-2013 (accessed April 2016).
download in.pdf format at techrepublic.com/resource-library/ Symantec. “Web-Based Attacks.” White paper, #20016955, February
whitepapers/lenovo-recommends-15-steps-to-reducing- 2009. symantec.com/content/en/us/enterprise/media/security_
security- risks-in-enterprise-mobility/post (accessed April 2016). response/whitepapers/web_based_attacks_02-2009.pdf
Maxwell, D. Hacking: Bootcamp—How to Hack Computers, Basic (accessed April 2016).
Security and Penetration Testing (Hacking The Common Core). TechRepublic Staff. “The 15 Most Frightening Data Breaches.”
[Kindle Edition] Seattle, WA: Amazon Digital Services, 2016. TechRepublic, October 29, 2015.
Nakashima, E., and M. Zapotosky. “U.S. Charges Iran-Linked Hackers Teo, F. “Monitoring Your Internal Network with Intelligent Firewalls.”
with Targeting Banks, N.Y. Dam.” The Washington Post, March 24, Enterprise Innovation, January 18, 2016.
2016. Timberg, C. “Foreign Regimes Use Spyware against Journalists, Even
Pagliery, J. “Drug Site Silk Road Wiped Out by Bitcoin Glitch.” CNN in U.S.” February 12, 2014. washingtonpost.com/business/tech-
Money, February 14, 2014a. money.cnn.com/2014/02/14/technol- nology/foreign-regimes-use-spyware-against-journalists-even-
ogy/security/silk-road-bitcoin (accessed April 2016). in- us/2014/02/12/9501a20e-9043-11e3-84e1-27626c5ef5fb_story.
Pagliery, J. “Your Car Is a Giant Computer- and It Can Be Hacked.” html (accessed April 2016).
CNN Money, June 2, 2014b. Troinovski, A. “German Parliament Struggles to Purge Hackers from
Pontrioli, S. “Social Engineering, Hacking the Human OS.” December Computer Network.” The Wall Street Journal, June 12, 2015.
20, 2013. blog.kaspersky.com/social-engineering-hacking-the- Van Allen, F. “The 18 Scariest Computer Viruses of All Time.”
human- os (accessed April 2016). TechRepublic, January 22, 2016.
PWC. “Key Findings from the 2013 US State of Cybercrime Survey.” Victor, D. “Authorities Shut Down Darkode, a Marketplace for Stolen
June 2013. pwc.com/en_US/us/increasing-it-effectiveness/publi- Personal Data.” New York Times, July 15, 2015.
cations/assets/us-state-of-cybercrime.pdf (accessed April 2016). Wagstaff, K. “Why Is the U.S. Going After Chinese Hackers? Jobs?”
Reisinger, D. “10 Mobile Security Issues that Should Worry You.” NBC News, May 19, 2014.
eWeek, February 11, 2014. Wang, R. “Malware B-Z: Inside the Threat from Blackhole to Zero
Reuters. “Malware Suspected in Bangladesh Bank Heist.” Fortune.com, Access.” A Sophos White Paper, Sophos Ltd., January 2013.
March 12, 2016. fortune.com/2016/03/12/malware-bangladesh- sophos.com/en-us/medialibrary/Gated%20Assets/white%20
bank-heist (accessed April 2016). papers/sophos_from_blackhole_to_zeroaccess_wpna.pdf
Russell, K. “Here’s How to Protect Yourself from the Massive Security (accessed April 2016).
Flaw That’s Taken over the Internet.” Business Insider, April 8, 2014. Westervelt, R. “Top 10 BYOD Risks Facing the Enterprise.” July 26,
Schwartz, M. J. “Target Breach: Phishing Attack Implicated.” 2013. crn.com/slide-shows/security/240157796/top-10-byod- risks-
Information Week Dark Reading, February 13, 2014. darkreading. facing-the-enterprise.htm (accessed April 2016).
com/attacks-and-breaches/target-breach-phishing-attack- Winton, R. “Hollywood Hospital Pays $17,000 in Bitcoin to Hackers:
implicated/d/d-id/1113829 (accessed April 2016). FBI Investigation.” Los Angeles Times, February 18, 2016.
Scott, J. Cybersecurity 101: What You Absolutely Must Know!- Volume Wollen, J. “10 Social Engineering Exploits Your Users Should Be
1: Learn to be Pwned, Thwart Spear Phishing and Zero Day Aware Of.” TechRepublic, January 27, 2016.
Exploits, Cloud Security Basics and Much More. [Kindle Edition] Yan, S. “Chinese Man Admits to Cyber Spying on Boeing and Other
Seattle, WA: Amazon Digital Services, 2016a. U.S. Firms.” Money CNN News, March 24, 2016.
Scott, J. Cybersecurity 101: What You Absolutely Must Know!- Volume Yadron, D. “Newest Hacker Target: Ads.” The Wall Street Journal
2: Learn JavaScript Threat Basics, USB Attacks, Easy Steps to Tech, January 31, 2014. online.wsj.com/news/articles/SB1000142
Strong Cybersecurity, Defense Against Cookie Vulnerabilities, and 4052702303743604579350654103483462 (accessed April 2016).
Much More! [Kindle Edition] Seattle, WA: Amazon Digital
Services, 2016b.