Cybercrime: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Issues | Issues->]][[Cybercrime]]''
''[[Table of Contents | TOC->]][[Issues | Issues->]][[Cybercrime]]''
Anderson, Ross, et. al (2008) [[Security Economics and the Internal Market]]


{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
Line 14: Line 12:
|-
|-
|Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Moderate:Technology; Moderate:Cryptography||N/A
|Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Moderate:Technology; Moderate:Cryptography||N/A
|-
|Anderson, Ross, et. al|| ||2008||[[Security Economics and the Internal Market]]||Study||Low:Economics||[http://www.enisa.europa.eu/act/sr/reports/econ-sec/economics-sec/at_download/fullReport  ''Pdf'']
|-
|-
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']

Revision as of 12:52, 11 August 2010

TOC-> Issues->Cybercrime

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross J. 2008 Security Engineering Book Moderate:Technology; Moderate:Cryptography N/A
Anderson, Ross, et. al 2008 Security Economics and the Internal Market Study Low:Economics Pdf
Deputy Chief of Staff for Intelligence 2006 Critical Infrastructure Threats and Terrorism Government Report Low:Organizational Analysis; Low:Risk Management Pdf
Epstein, Richard A. Brown, Thomas P. 2008 Cybersecurity in the Payment Card Industry Law Review Article Low:Law; Low:Economics Pdf
Franklin, Jason, et. al 2007 An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants Conference Paper Low:Statistics; Low:Economics Pdf Alt Pdf
Johnson, Eric M. 2008 Managing Information Risk and the Economics of Security Book High:Economics N/A
Kramer, Franklin D., et. al 2009 Cyberpower and National Security Book None N/A
McAfee, Inc. 2010 McAfee Threats Report Industry Report None Pdf
Moore, Tyler Clayton, Richard 2007 Examining the Impact of Website Take-down on Phishing Conference Paper Low:Technology Pdf Alt Pdf
Moore, Tyler Clayton, Richard 2008 The Consequence of Non-Cooperation in the Fight Against Phishing Conference Paper Low:Technology; Low:Economics Pdf Alt Pdf
Moore, Tyler Clayton, Richard 2009 The Impact of Incentives on Notice and Take-down Book Chapter Moderate:Technology; Low:Law Pdf
Moore, Tyler, et. al 2009 The Economics of Online Crime Journal Article Low:Technology Pdf
National Research Council 2007 Toward a Safer and More Secure Cyberspace Independent Reports Low:Research Processes; Low:Technology Pdf
Symantec Corporation 2010 Symantec Global Internet Security Threat Report Industry Report Low/Moderate:Technology Pdf
Thomas, Rob Martin, Jerry 2006 The Underground Economy Journal Article Low:Technology Pdf
Trend Micro Incorporated 2010 Trend Micro Annual Report Industry Report Moderate:Technology Pdf
  • Subcategories: None

Jump to Table of Contents