Forensics Journal - Stevenson University 2015 | Page 26
STEVENSON UNIVERSITY
Gewirt, D. (2013, December 1). Cyber attacks: Welcome
to the forever war. Retrieved February 10, 2014, from
http://www.iacsp.com
National Institute of Standards and Technology. (2014, February 12).
Framework for improving critical Iinfrastructure cybersecurity.
Retrieved February 27, 2014, from http://www.nist.gov
Gilbert, D. (2014, February 12). Mega DDoS attacks of 800Gbps
expected within a year. Retrieved February 17, 2014, from
http://www.ibtimes.com
SANS NewsBites. (2014, February 14). Retrieved February 26, 2014,
from http://www.sans.org/newsletters/newsbites
Shackleford, D. (2013, September). SANS security analytics survey.
Retrieved January 26, 2014, from http://www.sans.org
Gjelten, T. (2010, April 6). Cyber insecurity: U.S. struggles
to confront threat. Retrieved February 10, 2014, from
http://www.npr.org
Shape security unveils shape shifter. (2014, January 24). Retrieved
February 24, 2014, from http://www.wirelessweek.com
Greenberg, A. (2014, February 10). Ex-googlers’ startup shape turns
hackers’ code-morphing tricks against them. Retrieved February 24,
2014, from http://www.forbes.com
United Nations Interregional Crime and Justice Research Institute.
(n.d.). Cyber threats to SCADA networks.
Hammond, B. (2014, February 4). Intelligence officials stress
importance of metadata program amid cyber threats.
Retrieved February 17, 2014, from http://www.tr.com
Vlahos, K. (2014, February 14). Special report: The cyberwar
threat from North Korea. Retrieved February 17, 2014, from
http://www.foxnews.com
Harris, S. (2014, February 17). Forget China: Iran’s hackers are
America’s newest cyber threat. Retrieved February 18, 2014,
from http://www.magazine.com/foreignpolicy
Wingfield, B. (2012, February 1). Power-grid cyber attack seen
leaving millions in dark for months. Retrieved February 27, 2014,
from http://www.bloomberg.com
Hoffman, K. (2014, February 3). Advanced malware:
The growing cyber menace. Retrieved February 10, 2014,
from http://www.scmagazine.com
Zakaria, F. (2014, February 3). The Case for Snooping.
Retrieved February 10, 2014, from http://www.time.com
Holtfreter, R., & Harrington, A. (2014, January 1). Will
hackers win the battle? Retrieved February 17, 2014, from
http://www.imanet.org/resources-publications/strategic-finance
KERA VALENTI
M
s. Valenti graduated from Stevenson
University in 2009 with a Bachelor of
Science in Business Administration. She is
currently working towards her Master of
Science in Forensic Studies. Ms. Valenti
has been employed by the Department of
Defense since 2010, where she serves as the
lead writer/editor on a technology-focused
communications team.
Hruska, J. (2009, March 30). Chinese cyberespionage network
runs across 103 nations. Retrieved February 17, 2014, from
http://www.arstechnica.com
Kennedy, B. (2014, February 7). How vulnerable is America’s power
grid to a planned assault? Retrieved February 27, 2014, from
http://www.cbsinteractive.com
Kerner, S. (2013, November 15). Computer viruses evolve from
minor nuisances to costly pests. Retrieved February 17, 2014,
from http://www.eweek.com
Malware definition. (2006, February 5). Retrieved January 26, 2014,
from The Linux information project website: http://www.linfo.org
McConnell, M. (2010, February 8). Mike McConnell on how
to win the cyber-war we’re losing. Ret