Forensics Journal - Stevenson University 2015 | Page 26

STEVENSON UNIVERSITY Gewirt, D. (2013, December 1). Cyber attacks: Welcome to the forever war. Retrieved February 10, 2014, from http://www.iacsp.com National Institute of Standards and Technology. (2014, February 12). Framework for improving critical Iinfrastructure cybersecurity. Retrieved February 27, 2014, from http://www.nist.gov Gilbert, D. (2014, February 12). Mega DDoS attacks of 800Gbps expected within a year. Retrieved February 17, 2014, from http://www.ibtimes.com SANS NewsBites. (2014, February 14). Retrieved February 26, 2014, from http://www.sans.org/newsletters/newsbites Shackleford, D. (2013, September). SANS security analytics survey. Retrieved January 26, 2014, from http://www.sans.org Gjelten, T. (2010, April 6). Cyber insecurity: U.S. struggles to confront threat. Retrieved February 10, 2014, from http://www.npr.org Shape security unveils shape shifter. (2014, January 24). Retrieved February 24, 2014, from http://www.wirelessweek.com Greenberg, A. (2014, February 10). Ex-googlers’ startup shape turns hackers’ code-morphing tricks against them. Retrieved February 24, 2014, from http://www.forbes.com United Nations Interregional Crime and Justice Research Institute. (n.d.). Cyber threats to SCADA networks. Hammond, B. (2014, February 4). Intelligence officials stress importance of metadata program amid cyber threats. Retrieved February 17, 2014, from http://www.tr.com Vlahos, K. (2014, February 14). Special report: The cyberwar threat from North Korea. Retrieved February 17, 2014, from http://www.foxnews.com Harris, S. (2014, February 17). Forget China: Iran’s hackers are America’s newest cyber threat. Retrieved February 18, 2014, from http://www.magazine.com/foreignpolicy Wingfield, B. (2012, February 1). Power-grid cyber attack seen leaving millions in dark for months. Retrieved February 27, 2014, from http://www.bloomberg.com Hoffman, K. (2014, February 3). Advanced malware: The growing cyber menace. Retrieved February 10, 2014, from http://www.scmagazine.com Zakaria, F. (2014, February 3). The Case for Snooping. Retrieved February 10, 2014, from http://www.time.com Holtfreter, R., & Harrington, A. (2014, January 1). Will hackers win the battle? Retrieved February 17, 2014, from http://www.imanet.org/resources-publications/strategic-finance KERA VALENTI M  s. Valenti graduated from Stevenson University in 2009 with a Bachelor of Science in Business Administration. She is currently working towards her Master of Science in Forensic Studies. Ms. Valenti has been employed by the Department of Defense since 2010, where she serves as the lead writer/editor on a technology-focused communications team. Hruska, J. (2009, March 30). Chinese cyberespionage network runs across 103 nations. Retrieved February 17, 2014, from http://www.arstechnica.com Kennedy, B. (2014, February 7). How vulnerable is America’s power grid to a planned assault? Retrieved February 27, 2014, from http://www.cbsinteractive.com Kerner, S. (2013, November 15). Computer viruses evolve from minor nuisances to costly pests. Retrieved February 17, 2014, from http://www.eweek.com Malware definition. (2006, February 5). Retrieved January 26, 2014, from The Linux information project website: http://www.linfo.org McConnell, M. (2010, February 8). Mike McConnell on how to win the cyber-war we’re losing. Ret