Skip to main content

Cyber Attacks, Prevention, and Countermeasures

  • Chapter
  • First Online:
Counterterrorism and Cybersecurity

Abstract

In response to the ever-increasing number of cyber attacks on both private companies and the United States government, U.S. Congress has introduced the Cybersecurity Enhancement Act of 2007, the National Commission on American Cybersecurity Act of 2008, the Cybersecurity Act of 2009, the Cybersecurity and American Cyber Competitiveness Act of 2011, and most recently the Cybersecurity Act of 2012.

There are only two types of companies: those that have been hacked, and those that will be. Even that is merging into one category: those that have been hacked and will be again.

—FBI Director Robert Mueller RSA conference (March 1, 2012).

The attack surfaces for adversaries to get on the Internet now include all those mobile devices. The mobile security situation lags. It’s far behind.

—Army Gen. Keith Alexander, Director of National Security Agency and Commander of U.S. Cyber Command DEF CON 20 (July 27, 2012).

There is no such thing as 100 % security, on- or offline, but we must strive to strengthen our defenses against those who are constantly working to do us harm…. The alternative could be a digital Pearl Harbor—and another day of infamy.

—U.S. senators Joe Lieberman, Susan Collins and Tom Carper (July 7, 2011).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Schiff, et al. H.R.2290 – Cyber-Security Enhancement Act of 2007 (Introduced in House—IH). [Online] The Library of Congress, May 14, 2007. http://thomas.loc.gov/cgi-bin/query/z?c110:H.R.2290:.

  2. Ackerman, et al. H.R.7007—National Commission on American Cybersecurity Act of 2008. [Online] The Library of Congress, September 23, 2008. http://thomas.loc.gov/cgi-bin/query/z?c110:H.R.7007:.

  3. Rockefeller, et al. S.773—Cybersecurity Act of 2009. [Online] The Library of Congress, April 1, 2009. http://thomas.loc.gov/cgi-bin/query/z?c111:S.773:.

  4. Reid, et al. S.21—Cyber Security and American Cyber Competitiveness Act of 2011. [Online] The Library of Congress, January 25, 2011. http://thomas.loc.gov/cgi-bin/query/z?c112:S.21:.

  5. Lieberman, et al. S.2105—Cybersecurity Act of 2012. [Online] The Library of Congress, February 14, 2012. http://thomas.loc.gov/cgi-bin/query/z?c112:S.2105:.

  6. Lieberman, Joe, Collins, Susan and Carper, Tom. A gold standard in cyber-defense. [Online] The Washington Post, July 7, 2011. http://www.washingtonpost.com/opinions/a-gold-standard-in-cyber-defense/2011/07/01/gIQAjsZk2H_story.html.

  7. Nagesh, Gautham. Sen. Rockefeller presses Congress to pass cybersecurity legislation. [Online] The Hill, January 31, 2012. http://thehill.com/blogs/hillicon-valley/technology/207729-rockefeller-presses-congress-to-pass-cybersecurity-legislation.

  8. Kain, Erik. Does The Cybersecurity Act Of 2012 Mark The Beginning Of The War On Cyber-terrorism? [Online] Forbes, February 22, 2012. http://www.forbes.com/sites/erikkain/2012/02/22/does-the-cybersecurity-act-of-2012-mark-the-beginning-of-the-war-on-cyber-terrorism/.

  9. Stiennon, Richard. Rockefeller’s Cybersecurity Act of 2010: A Very Bad Bill. [Online] Forbes, May 4, 2010. http://www.forbes.com/sites/firewall/2010/05/04/rockefellers-cybersecurity-act-of-2010-a-very-bad-bill/.

  10. Brito, Jerry and Watkins, Tate. Wired Opinion: Cyberwar Is the New Yellowcake. [Online] Wired, February 14, 2012. http://www.wired.com/threatlevel/2012/02/yellowcake-and-cyberwar/.

  11. Singel, Ryan. NSA Must Examine All Internet Traffic to Prevent Cyber Nine-Eleven, Top Spy Says. [Online] Wired, January 15, 2008. http://www.wired.com/threatlevel/2008/01/feds-must-exami/.

  12. Obama, Barack. Executive Order—Improving Critical Infrastructure Cybersecurity. [Online] The White House, February 12, 2013. http://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity.

  13. Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure. [Online] The White House, May 8, 2009. http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf.

  14. National Security Council. The Comprehensive National Cybersecurity Initiative. [Online] The White House. [Cited: January 18, 2013.] http://www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurity-initiative.

  15. The White House. National Initiative for Cybersecurity Education (NICE) Relationship to President’s Education Agenda. [Online] The White House, April 19, 2010. http://www.whitehouse.gov/sites/default/files/rss_viewer/cybersecurity_niceeducation.pdf.

  16. Information Assurance Support Environment (IASE). Cyber Awareness Challenge. [Online] U.S. Department of Defense. [Cited: January 21, 2013.] http://iase.disa.mil/eta/cyberchallenge/launchPage.htm.

  17. Homeland Security. National Cyber Security Awareness Month. [Online] U.S. Department of Homeland Security. [Cited: January 18, 2013.] http://www.dhs.gov/national-cyber-security-awareness-month.

  18. Homeland Security. Cyber Storm: Securing Cyber Space. [Online] U.S. Department of Homeland Security. [Cited: January 18, 2013.] http://www.dhs.gov/cyber-storm-securing-cyber-space.

  19. National Cybersecurity Alliance (NCSA). StaySafeOnline.org. [Online] National Cybersecurity Alliance (NCSA). [Cited: January 18, 2013.] http://www.staysafeonline.org/.

  20. Center for Internet Security. Multi-State Information Sharing and Analysis Center (MS-ISAC). [Online] Center for Internet Security. [Cited: January 18, 2013.] http://msisac.cisecurity.org/.

  21. Patrikakis, Charalampos, Masikos, Michalis and Zouraraki, Olga. Distributed Denial of Service Attacks. [Online] The Internet Protocol Journal, December 2004. http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_7-4/dos_attacks.html.

  22. Goodin, Dan. DDoS attacks on major US banks are no Stuxnet—here’s why. [Online] ArsTechnica, October 3, 2012. http://arstechnica.com/security/2012/10/ddos-attacks-against-major-us-banks-no-stuxnet/.

  23. Prolexic. Prolexic Quarterly Global DDoS Attack Report. [Online] Prolexic, Q4 2012. http://www.prolexic.com/knowledge-center-ddos-attack-report-2012-q4/pr.html.

  24. Eddy, W. TCP SYN Flooding Attacks and Common Mitigations. [Online] The Internet Engineering Task Force (IETF), August 2007. http://tools.ietf.org/html/rfc4987.

  25. VeriSign. DDoS Mitigation - Best Practices for a Rapidly Changing Threat Landscape Whitepaper. [Online] VeriSign, 2012. http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/nia-information-center/ddos-best-practice-confirmation/index.xhtml.

  26. Cisco. Defeating DDOS Attacks. [Online] Cisco. [Cited: January 20, 2013.] http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5879/ps6264/ps5888/prod_white_paper0900aecd8011e927.html.

  27. VeriSign. VeriSign Internet Defense Network Enhanced With New DDoS Monitoring Service. [Online] Reuters, September 10, 2009. http://www.reuters.com/article/2009/09/10/idUS126052+10-Sep-2009+MW20090910.

  28. Prolexic. Prolexic Issues Mitigation, Detection Rules for Critical DDoS Threat Used in Banking Attacks. [Online] PresseBox, January 3, 2013. http://www.pressebox.com/inactive/prolexic-technologies/Prolexic-Issues-Mitigation-Detection-Rules-for-Critical-DDoS-Threat-Used-in-Banking-Attacks/boxid/564817.

  29. Tata Communications. Cloud-based security services. [Online] Tata Communications. [Cited: January 20, 2013.] http://security.tatacommunications.com/cloud.asp.

  30. Mueller, Robert S. III. Robert S. Mueller, III Speech at RSA Cyber Security Conference. [Online] Federal Bureau of Investigation, March 1, 2012. http://www.fbi.gov/news/speeches/combating-threats-in-the-cyber-world-outsmarting-terrorists-hackers-and-spies.

  31. Microsoft. Microsoft Joins Financial Services Industry to Disrupt Massive Zeus Cybercrime Operation That Fuels Worldwide Fraud and Identity Theft. [Online] Microsoft, March 25, 2012. http://www.microsoft.com/en-us/news/press/2012/mar12/03-25CybercrimePR.aspx.

  32. Mushtaq, Atif. Grum, World’s Third-Largest Botnet, Knocked Down. [Online] FireEye, July 18, 2012. http://blog.fireeye.com/research/2012/07/grum-botnet-no-longer-safe-havens.html.

  33. Cowley, Stacy. Grum takedown: ‘50% of worldwide spam is gone’. [Online] CNNMoney, July 19, 2012. http://money.cnn.com/2012/07/19/technology/grum-spam-botnet/index.htm.

  34. Prolexic. Prolexic Issues Dirt Jumper Threat Advisory and Releases Free Security Scanner. [Online] PRWeb, December 29, 2011. http://www.prweb.com/releases/2011/12/prweb9067808.htm.

  35. Breeden, John II. Hackers’ new super weapon adds firepower to DDOS. [Online] GCN, October 24, 2012. http://gcn.com/Articles/2012/10/24/Hackers-new-super-weapon-adds-firepower-to-DDOS.aspx.

  36. Cowley, Stacy. FBI Director: Cybercrime will eclipse terrorism. [Online] CNNMoney, March 2, 2012. http://money.cnn.com/2012/03/02/technology/fbi_cybersecurity/index.htm.

  37. Perlroth, Nicole. Some Victims of Online Hacking Edge Into the Light. [Online] The New York Times, February 20, 2013. http://www.nytimes.com/2013/02/21/technology/hacking-victims-edge-into-light.html

  38. Zetter, Kim. Google Hack Attack Was Ultra Sophisticated, New Details Show. [Online] Wired, January 14, 2010. http://www.wired.com/threatlevel/2010/01/operation-aurora/.

  39. Cowley, Stacy. Former FBI cyber cop worries about a digital 9/11. [Online] CNN, July 25, 2012. http://money.cnn.com/2012/07/25/technology/blackhat-shawn-henry/index.htm.

  40. Jewell, Mark. TJX breach could top 94 million accounts. [Online] NBC News, October 24, 2007. http://www.msnbc.msn.com/id/21454847/ns/technology_and_science-security/t/tjx-breach-could-top-million-accounts/.

  41. Hickins, Michael and Clark, Don. Questions Over Break-In at Security Firm RSA. [Online] The Wall Street Journal, March 18, 2011. http://online.wsj.com/article/SB10001424052748703512404576208983743029392.html.

  42. Wingfield, Nick, Sherr, Ian and Worthen, Ben. Hacker Raids Sony Videogame Network. [Online] The Wall Street Journal, April 27, 2011. http://online.wsj.com/article/SB10001424052748703778104576287362503776534.html.

  43. Smith, Aaron. Citi: Millions stolen in May hack attack. [Online] CNNMoney, June 27, 2011. http://money.cnn.com/2011/06/27/technology/citi_credit_card/index.htm.

  44. Goldman, David. More than 6 million LinkedIn passwords stolen. [Online] CNNMoney, June 7, 2012. http://money.cnn.com/2012/06/06/technology/linkedin-password-hack/index.htm.

  45. Gross, Doug. Yahoo hacked, 450,000 passwords posted online. [Online] CNN, July 13, 2012. http://www.cnn.com/2012/07/12/tech/web/yahoo-users-hacked/index.html?hpt=hp_t1.

  46. Riley, Charles. Barnes & Noble customer data stolen. [Online] CNNMoney, October 24, 2012. http://money.cnn.com/2012/10/24/technology/barnes–noble-hack/index.html.

  47. Lord, Bob. Keeping our users secure. [Online] Twitter Blog, February 1, 2013. http://blog.twitter.com/2013/02/keeping-our-users-secure.html.

  48. Bull, Alister and Finkle, Jim. Fed says internal site breached by hackers, no critical functions affected. [Online] Reuters, February 6, 2013. http://www.reuters.com/article/2013/02/06/net-us-usa-fed-hackers-idUSBRE91501920130206.

  49. Engberg, Dave. Security Notice: Service-wide Password Reset. [Online] The Evernote Blog, March 2, 2013. http://blog.evernote.com/blog/2013/03/02/security-notice-service-wide-password-reset/

  50. Verizon RISK Team. 2012 Data Breach Investigations Report. [Online] Verizon, 2012. http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf.

  51. Menegaz, Gery. SQL Injection Attack: What is it, and how to prevent it. [Online] ZDNet, July 13, 2012. http://www.zdnet.com/sql-injection-attack-what-is-it-and-how-to-prevent-it-7000000881/.

  52. OWASP. SQL Injection Prevention Cheat Sheet. [Online] The Open Web Application Security Project, December 6, 2012. https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet.

  53. First Data Corporation. What Data Thieves Don’t Want You to Know: The Facts About Encryption. [Online] First Data Corporation, 2012. http://www.firstdata.com/downloads/thought-leadership/TokenizationEncryptionWP.pdf.

  54. Cowley, Stacy. How a lying ‘social engineer’ hacked Wal-Mart. [Online] CNNMoney, August 8, 2012. http://money.cnn.com/2012/08/07/technology/walmart-hack-defcon/index.htm.

  55. Honan, Mat. How Apple and Amazon Security Flaws Led to My Epic Hacking. [Online] Wired, August 6, 2012. http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all/.

  56. Kirk, Jeremy. Researchers find vulnerability in Call of Duty: Modern Warfare 3. [Online] CSO, November 9, 2012. http://www.csoonline.com/article/721133/researchers-find-vulnerability-in-call-of-duty-modern-warfare-3.

  57. Facebook Security. Protecting People On Facebook. [Online] Facebook, February 15, 2013. https://www.facebook.com/notes/facebook-security/protecting-people-on-facebook/10151249208250766.

  58. Mila. Targeted attacks against personal accounts of military, government employees and associates. [Online] Contagio, February 17, 2011. http://contagiodump.blogspot.com/2011/02/targeted-attacks-against-personal.html.

  59. Kelly, Suzanne and Benson, Pam. U.S. gears up for cyberwar amid conflicting ideas on how to fight it. [Online] CNN, February 24, 2012. http://security.blogs.cnn.com/2012/02/24/u-s-gears-up-for-cyberwar-amid-conflicting-ideas-on-how-to-fight-it/.

  60. Kim, Erin. Internet blackout for thousands begins Monday. [Online] CNNMoney, July 9, 2012. http://money.cnn.com/2012/07/06/technology/dnschanger/index.htm.

  61. Whittaker, Zack. Google services ‘disrupted’ in China; traffic declines rapidly. [Online] ZDNet, November 9, 2012. http://www.zdnet.com/google-services-disrupted-in-china-traffic-declines-rapidly-7000007195/.

  62. APWG. Phishing Activity Trends Report (2nd Quarter 2012). Anti-Phishing Working Group (APWG). [Online] September 2012. http://docs.apwg.org/reports/apwg_trends_report_q2_2012.pdf.

  63. Taylor, Brad. Fighting phishing with eBay and PayPal. [Online] Official Gmail Blog, July 8, 2008. http://gmailblog.blogspot.com/2008/07/fighting-phishing-with-ebay-and-paypal.html#!/2008/07/fighting-phishing-with-ebay-and-paypal.html.

  64. Zetter, Kim. How a Google Headhunter’s E-Mail Unraveled a Massive Net Security Hole. [Online] Wired, October 24, 2012. http://www.wired.com/threatlevel/2012/10/dkim-vulnerability-widespread/all/.

  65. Orlando, Michael. Vulnerability Note VU#268267: DomainKeys Identified Mail (DKIM) Verifiers may inappropriately convey message trust. [Online] U.S. Department of Homeland Security’s United States Computer Emergency Readiness Team (US-CERT), October 24, 2012. http://www.kb.cert.org/vuls/id/268267.

  66. US-CERT. Report Phishing Sites. [Online] U.S. Department of Homeland Security’s United States Computer Emergency Readiness Team (US-CERT). [Cited: January 22, 2013.] http://www.us-cert.gov/nav/report_phishing.html.

  67. The Google Safe Browsing Team. Report Phishing Page. [Online] Google. [Cited: January 22, 2013.] http://www.google.com/safebrowsing/report_phish/.

  68. Saran, Cliff. ING Direct implements two-factor authentication. [Online] Computer Weekly, August 17, 2006. http://www.computerweekly.com/news/2240078159/ING-Direct-implements-two-factor-authentication.

  69. Danchev, Dancho. Attacker: Hacking Sarah Palin’s email was easy. [Online] ZDNet, September 18, 2008. http://www.zdnet.com/blog/security/attacker-hacking-sarah-palins-email-was-easy/1939.

  70. Cheng, Roger and McCullagh, Declan. Yahoo breach: Swiped passwords by the numbers. [Online] CNet, July 12, 2012. http://news.cnet.com/8301-1009_3-57470878-83/yahoo-breach-swiped-passwords-by-the-numbers/.

  71. Microsoft. Microsoft Security Intelligence Report. [Online] Microsoft, January-June 2012. http://download.microsoft.com/download/C/1/F/C1F6A2B2-F45F-45F7-B788-32D2CCA48D29/Microsoft_Security_Intelligence_Report_Volume_13_English.pdf.

  72. Danchev, Dancho. Report: Malicious PDF files comprised 80 percent of all exploits for 2009. [Online] ZDNet, February 16, 2010. http://www.zdnet.com/blog/security/report-malicious-pdf-files-comprised-80-percent-of-all-exploits-for-2009/5473.

  73. Perlroth, Nicole. Department of Homeland Security: Disable Java ‘Unless It Is Absolutely Necessary’. [Online] The New York Times, January 14, 2013. http://bits.blogs.nytimes.com/2013/01/14/department-of-homeland-security-disable-java-unless-it-is-absolutely-necessary/.

  74. Dormann, Will. Vulnerability Note VU#625617: Java 7 fails to restrict access to privileged code. [Online] U.S. Department of Homeland Security’s United States Computer Emergency Readiness Team (US-CERT), January 10, 2013. http://www.kb.cert.org/vuls/id/625617.

  75. IC3. Malware Installed on Travelers’ Laptops Through Software Updates on Hotel Internet Connections. [Online] Internet Crime Complaint Center (IC3), May 8, 2012. http://www.ic3.gov/media/2012/120508.aspx.

  76. Keizer, Gregg. Is Stuxnet the ‘best’ malware ever? [Online] Computerworld, September 16, 2010. http://www.computerworld.com/s/article/9185919/Is_Stuxnet_the_best_malware_ever_.

  77. Fouda, Amir. Security Protection. [Online] Microsoft Malware Protection Center, September 7, 2011. http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Security+Protection.

  78. Gross, Doug. Virus found in fake Android version of ‘Angry Birds: Space’. [Online] CNN, April 12, 2012. http://www.cnn.com/2012/04/12/tech/gaming-gadgets/angry-birds-virus-android/index.html.

  79. Halliday, Derek. Security Alert: SpamSoldier. [Online] Lookout Mobile Security, December 17, 2012. https://blog.lookout.com/blog/2012/12/17/security-alert-spamsoldier/.

  80. Messmer, Ellen. Pirated mobile Android and Apple apps getting hacked, cracked and smacked. [Online] Network World, August 20, 2012. http://www.networkworld.com/news/2012/082012-pirated-app-malware-261702.html.

  81. Microsoft Security Intelligence Report. Deceptive Downloads: Software, Music, and Movies. [Online] Microsoft. [Cited: January 24, 2013.] http://www.microsoft.com/security/sir/story/default.aspx#!deceptive_downloads.

  82. Boscovich, Richard Domingues. Microsoft Disrupts the Emerging Nitol Botnet Being Spread through an Unsecure Supply Chain. [Online] The Office Microsoft Blog, September 13, 2012. http://blogs.technet.com/b/microsoft_blog/archive/2012/09/13/microsoft-disrupts-the-emerging-nitol-botnet-being-spread-through-an-unsecure-supply-chain.aspx.

  83. Microsoft. Microsoft Safety Scanner. [Online] Microsoft. [Cited: January 24, 2013.] http://www.microsoft.com/security/scanner/en-us/default.aspx.

  84. Martin, Douglas. Joybubbles, 58, Peter Pan of Phone Hackers, Dies. [Online] The New York Times, August 20, 2007. http://www.nytimes.com/2007/08/20/us/20engressia.html.

  85. Chen, Brian X. Get Ready for 1 Billion Smartphones by 2016, Forrester Says. [Online] The New York Times, February 13, 2012. http://bits.blogs.nytimes.com/2012/02/13/get-ready-for-1-billion-smartphones-by-2016-forrester-says/.

  86. Goldman, David. Your smartphone will (eventually) be hacked. [Online] CNNMoney, September 12, 2012. http://money.cnn.com/2012/09/17/technology/smartphone-cyberattack/index.html.

  87. Norton. Cybercrime Report 2011. [Online] Symantec Corporation, 2012. http://now-static.norton.com/now/en/pu/images/Promotions/2012/cybercrime/assets/downloads/en-us/NCR-DataSheet.pdf.

  88. Bell, Ian. Commwarrior.A Virus Targets Cell Phones. [Online] Digital Trends, March 9, 2005. http://www.digitaltrends.com/mobile/commwarriora-virus-targets-cell-phones/.

  89. Gold, Jon. Researchers reveal new rootkit threat to Android security. [Online] Network World, July 2, 2012. http://www.networkworld.com/news/2012/070212-android-malware-260627.html.

  90. Cowley, Stacy. NFC exploit: Be very, very careful what your smartphone gets near. [Online] CNNMoney, July 26, 2012. http://money.cnn.com/2012/07/26/technology/nfc-hack/index.htm.

  91. Limer, Eric. Crazy New Exploit Can Brick Samsung Phones or Steal All Their Data. [Online] Gizmodo, December 16, 2012. http://gizmodo.com/5968879/crazy-new-exploit-can-brick-samsung-phones-or-steal-all-their-data.

  92. Kirk, Jeremy. Android Botnet Abuses People’s Phones for SMS Spam. [Online] CIO, December 17, 2012. http://www.cio.com/article/724237/Android_Botnet_Abuses_People_s_Phones_for_SMS_Spam.

  93. Merica, Dan. Five things you need to know about U.S. national security. [Online] CNN, July 29, 2012. http://security.blogs.cnn.com/2012/07/29/five-things-you-need-to-know-about-u-s-national-security/.

  94. Goldman, David. Watching porn is bad for your smartphone. [Online] CNNMoney, February 11, 2013. http://money.cnn.com/2013/02/11/technology/security/smartphone-porn/index.html.

  95. Sengupta, Somini. U.S. Military Hunts for Safe Smartphones for Soldiers. [Online] The New York Times, June 22, 2012. http://bits.blogs.nytimes.com/2012/06/22/u-s-military-hunts-for-safe-smartphones-for-soldiers/.

  96. FCC Smartphone Security Checker. [Online] FCC. [Cited: January 25, 2013.] http://www.fcc.gov/smartphone-security.

  97. Souppourison, Aaron. iPhone lockscreen can be bypassed with new iOS 6.1 trick. [Online] The Verge, February 14, 2013. http://www.theverge.com/2013/2/14/3987830/ios-6-1-security-flaw-lets-anyone-make-calls-from-your-iphone.

  98. Peterson, Scott. Exclusive: Iran hijacked US drone, says Iranian engineer (Video). [Online] The Christian Science Monitor, December 15, 2011. http://www.csmonitor.com/World/Middle-East/2011/1215/Exclusive-Iran-hijacked-US-drone-says-Iranian-engineer-Video.

  99. Gallagher, Ryan. FBI Accused of Dragging Feet on Release of Info About “Stingray” Surveillance Technology. [Online] Slate, October 19, 2012. http://www.slate.com/blogs/future_tense/2012/10/19/stingray_imsi_fbi_accused_by_epic_of_dragging_feet_on_releasing_documents.html.

  100. Sandi National Laboratories. Sandia builds self-contained, Android-based network to study cyber disruptions and help secure hand-held devices. [Online] Sandi National Laboratories, October 2, 2012. https://share.sandia.gov/news/resources/news_releases/sandia-builds-self-contained-android-based-network-to-study-cyber-disruptions-and-help-secure-hand-held-devices/.

  101. Perlroth, Nicole. Hackers in China Attacked The Times for Last 4 Months. [Online] The New York Times, January 30, 2013. http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html.

  102. Symantec. Symantec Statement Regarding New York Times Cyber Attack. [Online] Symantec, January 31, 2013. http://www.marketwire.com/press-release/symantec-statement-regarding-new-york-times-cyber-attack-nasdaq-symc-1751586.htm.

  103. Goldman, David. Your antivirus software probably won’t prevent a cyberattack. [Online] CNNMoney, January 31, 2013. http://money.cnn.com/2013/01/31/technology/security/antivirus/index.html.

  104. Poeter, Damon. NBC.com Hacked, Infected With Citadel Trojan. [Online] PC Magazine, February 21, 2013. http://www.pcmag.com/article2/0,2817,2415735,00.asp.

  105. Kelly, Heather. Is the government doing enough to protect us online? [Online] CNN, July 31, 2012. http://www.cnn.com/2012/07/25/tech/regulating-cybersecurity/index.html.

  106. CNN Political Unit. Investigation opened into hacked Bush family e-mails. [Online] CNN, February 8, 2013. http://politicalticker.blogs.cnn.com/2013/02/08/investigation-opened-into-hacked-bush-family-emails/.

  107. Gaudin, Sharon. DARPA chief leaves Pentagon for Google job. [Online] Computerworld, March 13, 2012. http://www.computerworld.com/s/article/9225156/DARPA_chief_leaves_Pentagon_for_Google_job.

  108. Dugan, Regina. Regina Dugan: From mach-20 glider to humming bird drone. [Online] TED, March 2012. http://www.ted.com/talks/regina_dugan_from_mach_20_glider_to_humming_bird_drone.html.

  109. Segall, Laurie. Facebook pays $40,000 to bug spotters. [Online] CNNMoney, August 30, 2011. http://money.cnn.com/2011/08/30/technology/facebook_bug_bounty/index.htm.

  110. Facebook. Bounty. [Online] Facebook. [Cited: January 25, 2013.] http://www.facebook.com/whitehat/bounty/.

  111. Facebook. White Hats. [Online] Facebook. [Cited: January 25, 2013.] http://www.facebook.com/whitehat/.

  112. Pepitone, Julianne. Google awards $60,000 prize for Chrome hack. [Online] CNNMoney, October 10, 2012. http://money.cnn.com/2012/10/10/technology/security/google-chrome-hacker-prize/index.html.

  113. Kersey, Jason. Chrome Releases. [Online] Google, October 10, 2012. http://googlechromereleases.blogspot.com/2012/10/stable-channel-update_6105.html.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Newton Lee .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Lee, N. (2013). Cyber Attacks, Prevention, and Countermeasures. In: Counterterrorism and Cybersecurity. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7205-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-7205-6_8

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-7204-9

  • Online ISBN: 978-1-4614-7205-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics