Main Content
Department of Defense, Strategy for Operating in Cyberspace, July 2011
3.2.2.2.1
http://www.defense.gov/news/d20110714cyber.pdf
Dinei Florencio and Cormac Herley, The Cybercrime Wave that Wasn’t, New York Times, Apr 14, 2012
2.2.1.5
http://www.nytimes.com/2012/04/15/opinion/sunday/the-cybercrime-wave-that-wasnt.html?_r=2
D. Richard Kuhn et al., Introduction to Public Key Technology and the Federal PKI Infrastructure, NIST, 2001
1.2.4.1.3
http://csrc.nist.gov/publications/nistpubs/800-32/sp800-32.pdf
Economic Theft Case Studies - Berkman Cybersecurity Wiki
2.1.5.1
http://cyber.law.harvard.edu/cybersecurity/Category:Case_Studies
Elihu Zimet and Edward Skoudis, Cyberpower and National Security, Ch. 4: A Graphical Introduction to the Structural Elements of Cyberspace, eds. Kramer, Starr, and Wentz, 2009
1.2.2.2
http://cyber.law.harvard.edu/cybersecurity/Cyberpower_and_National_Security
Ellen Nakashima et al., U.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say, Washington Post, Jun 19, 2012
2.1.4.2
http://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say/2012/06/19/gJQA6xBPoV_story.html
Eric Chabrow, The Cybersecurity Czar Who Wasn't, GovInfo Security, 2 June 2012
3.2.2.1.2
http://www.govinfosecurity.com/blogs/cybersecurity-czar-who-wasnt-p-1282/op-1
Estonia Case Study - Berkman Cybersecurity Wiki
2.1.1.1
http://cyber.law.harvard.edu/cybersecurity/Estonia
Flame Case Study - Berkman Cybersecurity Wiki
2.1.4.1
http://cyber.law.harvard.edu/cybersecurity/Flame
Ghostnet Case Study - Berkman Cybersecurity Wiki
2.1.2.1
http://cyber.law.harvard.edu/cybersecurity/GhostNet
This book, and all H2O books, are Creative Commons licensed for sharing and re-use. Material included from the American Legal Institute is reproduced with permission and is exempted from the open license.