диссертация (1169572), страница 39
Текст из файла (страница 39)
Speech at the London Conference on Cyberspace[Электронныйресурс]/ICANN.November2,2011.–URL:https://www.icann.org/en/system/files/files/beckstrom-speech-cybersecuritylondon-02nov11-en.pdf101. Brennan J. United States Counter Terrorism Cyber Law and Policy, Enabling orDisabling? [Электронный ресурс] / U.S. Army War College, Pennsylvania.CivilianResearchProject.March15,2012.–27p.–URL:http://nsfp.web.unc.edu/files/2012/09/Brennan_UNITED-STATES-COUNTERTERRORISM-CYBER-LAW-AND-POLICY.pdf102. Clinton H. Internet Rights and Wrongs: Choices & Challenges in a NetworkedWorld. Remarks in George Washington University. Washington, D.C.February15,2011[Электронныйресурс].–URL:http://www.state.gov/secretary/rm/2011/02/156619.htm103.
Critical Foundations: Protecting America’s Infrastructures [Электронныйресурс] / President’s Commission on Critical Infrastructure Protection Report.October 1997. – 192 p. – URL: https://www.fas.org/sgp/library/pccip.pdf104. Critical Infrastructure Protection: Multiple Efforts to Secure Control SystemsAre Under Way, but Challenges Remain [Электронный ресурс] / United StatesGovernment Accountability Office.
September 10, 2007. – 52 p. – URL:http://www.gao.gov/assets/270/268137.pdf182105. Cyber Security: A Crisis of Prioritization. Report to the President[Электронный ресурс] / The President’s Information Technology AdvisoryCommittee. February 2005. – 59 p. – URL:http://www.nitrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdf106. Cyberspace Policy Review: Assuring a Trusted and Resilient Information andCommunications Infrastructure.
Report for the President. May 2009. – 75 p.[Электронный ресурс]. – URL:http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf107. Cyberspace:UnitedStatesFacesChallengesinAddressingGlobalCybersecurity and Governance. [Электронный ресурс] / United StatesGovernment Accountability Office Report. July 2010. – 47 p. – URL:http://www.gao.gov/assets/310/308401.pdf108. Cyber Threat: Part 1. On the Front Lines with Shawn Henry [Электронныйресурс] / Federal Bureau of Investigation. March 27, 2012.
– URL:http://www.fbi.gov/news/stories/2012/march/shawn-henry_032712109. Denning D. Cyberterrorism. Testimony before the Special Oversight Panel onTerrorism Committee on Armed Services US House of Representatives. May23,2000[Электронныйресурс].–URL:http://www.stealth-iss.com/documents/pdf/CYBERTERRORISM.pdf110. Figliuzzi F. Statement Before the House Committee on Homeland Security,Subcommittee on Counterterrorism and Intelligence.
Washington, D.C.June 28, 2012 [Электронный ресурс]. – URL:http://www.fbi.gov/news/testimony/economic-espionage-a-foreign-intelligencethreat-to-americans-jobs-and-homeland-security111. Finklea K., Theohary C. Cybercrime: Conceptual Issues for Congress and U.S.Law Enforcement [Электронный ресурс] / Congressional Research Service.January 9, 2013. – 26 p. – URL: http://www.fas.org/sgp/crs/misc/R42547.pdf112. Foreign Spies Stealing U.S. Economic Secrets in Cyberspace. Report toCongress on Foreign Economic Collection and Industrial Espionage 2009-2011.183[Электронный ресурс] / Office of the National Counterintelligence Executive.October 2011. – 31 p. – URL:http://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf113. Bush G.W. Speech to the National Security Council. The White House,September 17, 2002 [Электронный ресурс]. – URL: http://georgewbushwhitehouse.archives.gov/nsc/nss/2002/nssintro.html114.
Gordon S., Ford R. Cyberterrorism? [Электронный ресурс] / Symantec. WhitePaper 2003. – 16 p. – URL:http://www.symantec.com/avcenter/reference/cyberterrorism.pdf115. Global Trends 2025: A Transformed World [Электронный ресурс] / NationalIntelligence Council, Office of the Director of National Intelligence. November2008. – 100 p. – URL: http://www.fas.org/irp/nic/2025.pdf116. Hathaway M. Strategic Advantage: Why America Should Care AboutCybersecurity[Электронный ресурс] / Belfer Center for Science andInternationalAffairs.October2009.–URL:http://belfercenter.ksg.harvard.edu/files/Hathaway.Strategic%20Advantage.Why%20America%20Should%20Care%20About%20Cybersecurity.pdf117. ICS-CERT Monitor. Industrial Control Systems Cyber Emergency ResponseTeam [Электронный ресурс] / U.S.
Department of Homeland Security.October/November/December 2012. – 15 p. – URL: https://ics-cert.uscert.gov/sites/default/files/ICS-CERT_Monthly_Monitor_Oct-Dec2012_2.pdf118. ICS-CERT Year in Review. Industrial Control Systems Cyber EmergencyResponse Team [Электронный ресурс] / U.S. Department of HomelandSecurity.2013.–20p.–URL:https://ics-cert.us-cert.gov/sites/default/files/documents/Year_In_Review_FY2013_Final.pdf119. Identity Fraud Survey Report: Consumer Version. [Электронный ресурс] /JavelinStrategy&Research.Februaryhttps://www.javelinstrategy.com/brochure/2072011.–URL:184120.
Information Security: Weaknesses Continue Amid New Federal Efforts toImplement Requirements [Электронный ресурс] / United States GovernmentAccountability Office Report to Congressional Committees. October 2011. – 49p. – URL: http://www.gao.gov/new.items/d12137.pdf121. Internet Security Threat Report. Trends for 2010 [Электронный ресурс] /Symantec.–Vol.16.–April2011.–18p.–URL:https://www4.symantec.com/mktginfo/downloads/21182883_GA_REPORT_ISTR_Main-Report_04-11_HI-RES.pdf122. In the Crossfire: Critical Infrastructure in the Age of Cyber War [Электронныйресурс]/MacAfee.2010.–40p.–URL:http://img.en25.com/Web/McAfee/NA_CIP_RPT_REG_2840.pdf123. Jones S. Re-Examining the Al Qa’ida Threat to the United States.
Testimonybefore the House Foreign Affairs Committee, Subcommittee on Terrorism,Nonproliferation, and Trade [Электронный ресурс] / RAND. July 18, 2013. –14 p. – URL: http://www.rand.org/pubs/testimonies/CT396-1.html124. Knake R. Internet Governance in the Age of Cyber Insecurity [Электронныйресурс] / Council on Foreign Relations Special Report. 2010. – 43 p. – URL:http://www.cfr.org/internet-policy/internet-governance-age-cyberinsecurity/p22832125.
Koh H. Remarks at the U.S. Cyber Command Inter-Agency Legal Conference:International Law in Cyberspace. September 18, 2012. [Электронный ресурс].– URL: http://www.state.gov/s/l/releases/remarks/197924.htm126. LetterfromScientistsFebruary 27, 2002toPresidentBush[ЭлектронныйRegardingресурс].Cybersecurity.–URL:http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/etc/letter.html127. Lewis J. Assessing the Risks of Cyber Terrorism, Cyber War and Other CyberThreats [Электронный ресурс] / Center for Strategic and International Studies.December2002.–12p.–http://csis.org/files/media/csis/pubs/021101_risks_of_cyberterror.pdfURL:185128.
Lewis J. Cyber Attacks, Real or Imagined, and Cyber War. Commentary /Center for Strategic and International Studies. July 11, 2011 [Электронныйресурс]. – URL: http://csis.org/print/31284129. Lewis J. Cybersecurity: Assessing the Immediate Threat to the United States.Statement before the House Oversight and Government Reform Committee,Subcommittee on National Security, Homeland Defense, and ForeignOperations.May25,2011[Электронныйресурс].–URL:http://oversight.house.gov/wp-content/uploads/2012/04/5-25-11-Subcommitteeon-National-Security-Homeland-Defense-and-Foreign-Operations-HearingTranscript.pdf130.
Lewis J. Thresholds for Cyberwar [Электронный ресурс] / Center for Strategicand International Studies. September 2010. – 9 p [Электронный ресурс]. –URL: http://csis.org/files/publication/101001_ieee_insert.pdf131. Mitchison N. Crime and Abuse in E-business [Электронный ресурс] / IPTSReport.–2001.–Vol. 57.–P.18-22.– URL:http://publications.jrc.ec.europa.eu/repository/handle/111111111/8543132. Net Losses: Estimating the Global Cost of Cybercrime [Электронный ресурс] /Center for Strategic and International Studies, McAfee. June 2014.
– 24 p. –URL: http://www.mcafee.com/us/resources/reports/rp-economic-impactcybercrime2.pdf133. NTIA Announces Intent to Transition Key Internet Domain Name Functions.March 14, 2014 [Электронный ресурс]. – URL: http://www.ntia.doc.gov/pressrelease/2014/ntia-announces-intent-transition-key-internet-domain-namefunctions134. Prosecuting Intellectual Property Crimes Manual. 4th Edition [Электронныйресурс] / Office of Legal Education Executive Office for United StatesAttorney.DepartmentofJustice.–497p.–URL:http://www.justice.gov/criminal/cybercrime/docs/prosecuting_ip_crimes_manual_2013.pdf186135. Remarks by the President at the National Defense University.