Appendix -References by chapter

Introduction

“Digital in 2018: World’s Internet Users Pass the 4 Billion Mark - We Are Social.” We Are Social USA. January 30, 2018. Accessed September 08, 2018. https://wearesocial.com/blog/2018/01/global-digital-report-2018.

“What Is Cybercrime? - Definition from Techopedia.” Techopedia.com. Accessed September 08, 2018. https://www.techopedia.com/definition/2387/cybercrime.

“Global Digital Population 2018 | Statistic.” Statista. Accessed September 08, 2018. https://www.statista.com/statistics/617136/digital-population-worldwide/.

Oyedele, Akin. “BUFFETT: This Is ‘the Number One Problem with Mankind’.” Business Insider. May 06, 2017. Accessed September 08, 2018. https://www.businessinsider.com/warren-buffett-cybersecurity-berkshire-hathaway-meeting-2017-5. Olcott, Jake. “Warren Buffett’s Cybersecurity Wake-up Call - Are We Listening?” TheHill. May 15, 2017. Accessed September 08, 2018. http:// thehill.com/blogs/pundits-blog/technology/333026-warren-buffetts-cybersecurity-wake-up-call-are-we-listening.

“Global $181.77 Bn Cyber Security Market to 2021 - Analysis by Type, Technology, Verticals and Applications.” Benzinga. Accessed September 08, 2018. https://www.benzinga.com/pressreleases/17/10/g10185990/ global-181-77-bn-cyber-security-market-to-2021-analysis-by-type-techno

Chapter 1

Finkle, Jim. “Shamoon Virus Returns in New Gulf Cyber Attacks after Fouryear Hiatus.” Reuters. December 01, 2016. Accessed September 08, 2018. https://www.reuters.com/article/us-cyber-saudi-shamoon/shamoon-virus-returns-in-new-gulf-cyber-attacks-after-four-year-hiatus-idUSKBN13Q38B.

Perlroth, Nicole. “In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back.” The New York Times. October 24, 2012. Accessed September 08, 2018. https://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html.

Bumiller, Elisabeth, and Thom Shanker. “Panetta Warns of Dire Threat of Cyberattack on U.S.” The New York Times. October 12, 2012. Accessed September 08, 2018. https://www.nytimes.com/2012/10/12/world/panetta-warns-of-dire-threat-of-cyberattack.html.

The Radicati Group, Inc. Email Statistics Report , 2017-2021

Ponemon Institute, LLC., 2017 Cost of Data Breach Study , June 2017

Newman, Jared. “Sony and George Hotz Settle PS3 Hacking Lawsuit.” Technologizer. May 11, 2014. Accessed September 08, 2018. https://www. technologizer.com/2011/04/11/sony-george-hotz-settle-ps3-hackinglawsuit/.

Tassi, Paul. “Sony Pegs PSN Attack Costs at $170 Million, $3.1B Total Loss for 2011.” Forbes. August 11, 2011. Accessed September 08, 2018. https:// www.forbes.com/sites/insertcoin/2011/05/23/sony-pegs-psn-attackcosts-at-170-million/#23032e9744ca.

Staff, National. “The Arab Spring Country by Country.” The National. June 17, 2011. Accessed September 08, 2018. https://www.thenational.ae/ world/the-arab-spring-country-by-country-1.401358.

Perlroth, Nicole, and Clifford Krauss. “A Cyberattack in Saudi Arabia Had a Deadly Goal. Experts Fear Another Try.” The New York Times. March 15, 2018. Accessed September 08, 2018. https://www.nytimes. com/2018/03/15/technology/saudi-arabia-hacks-cyberattacks.html.

Pagliery, Jose. “The inside Story of the Biggest Hack in History.” CNNtech. August 05, 2015. Accessed September 08, 2018. https://money.cnn. com/2015/08/05/technology/aramco-hack/index.html.

Perlroth, Nicole. “In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back.” The New York Times. October 23, 2012. Accessed September 08, 2018. https://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html.

Schwartz, Matthew J. “Sony Data Breach Cleanup To Cost $171 Million.” Dark Reading. May 23, 2011. Accessed September 08, 2018. https://www. darkreading.com/attacks-and-breaches/sony-data-breach-cleanup-tocost-$171-million/d/d-id/1097898.

Bogart, Nicole. “Timeline: How the Sony Pictures Hacking Scandal Unfolded.” Global News. December 29, 2014. Accessed September 08, 2018. https://globalnews.ca/news/1734198/timeline-how-the-sony-pictures-hacking-scandal-unfolded/.

McKinsey & Company, The Future of Consumer-Led Retail Banking Distribution , September 2017

Chintamaneni, Prasad. “How Banks Are Capitalizing on a New Wave of Big Data and Analytics - SPONSOR CONTENT FROM COGNIZANT.” Harvard Business Review. November 22, 2016. Accessed September 08, 2018. https://hbr.org/sponsored/2016/11/how-banks-are-capitalizing-on-anew-wave-of-big-data-and-analytics.

FOXBusiness. “Equifax Hack: What We Learned.” Fox Business. December 27, 2017. Accessed September 08, 2018. https://www.foxbusiness.com/ markets/equifax-hack-what-we-learned.

“Equifax Now Says 8,000 Canadians May Have Been Affected by Cybersecurity Breach | CBC News.” CBCnews. October 03, 2017. Accessed September 08, 2018. http://www.cbc.ca/news/business/equifax-cyberbreach-impact-1.4317381.

Mathews, Lee. “Equifax Data Breach Impacts 143 Million Americans.” Forbes. September 07, 2017. Accessed September 08, 2018. https:// www.forbes.com/sites/leemathews/2017/09/07/equifax-data-breach-impacts-143-million-americans/#6008843b356f.

Parkinson, Hannah Jane. “Wake Up! Amazon, Google, Apple and Facebook Are Running Our Lives | Hannah Jane Parkinson.” The Guardian. May 12, 2017. Accessed September 08, 2018. https://www.theguardian.com/ commentisfree/2017/may/12/wake-up-amazon-google-apple-facebookrun-our-lives.

McCandless, David. “World’s Biggest Data Breaches & Hacks.” Information Is Beautiful. September 03, 2018. Accessed September 08, 2018. http:// www.informationisbeautiful.net/visualizations/worlds-biggest-databreaches-hacks.

Chapter 2

“About Foundstone.” Antivirus Software, Internet Security, Spyware and Malware Removal | McAfee. Accessed September 08, 2018. https://www. mcafee.com/enterprise/en-us/services/foundstone-services/about.html.

“Hacking Exposed 7: Network Security Secrets and Solutions: Stuart McClure, Joel Scambray, George Kurtz: 9780071780285: Amazon.com: Books.” Amazon. Accessed September 08, 2018. https://www.amazon. com/Hacking-Exposed-Network-Security-Solutions/dp/0071780289/ ref=mt_paperback?_encoding=UTF8&me=&qid=.

Chapter 3

Steinklauber, Kirk. “Data Security Defense in Depth: The Onion Approach to IT Security.” Security Intelligence. January 15, 2015. Accessed September 08, 2018. https://securityintelligence.com/data-security-defense-in-depth-the-onion-approach-to-it-security/.

“Groups.” Introduction and Overview - ATT&CK for Enterprise. Accessed September 08, 2018. https://attack.mitre.org/wiki/Groups.

Lewis, James Andrew. “Economic Impact of Cybercrime.” CSIS | Center for Strategic and International Studies. February 21, 2018. Accessed September 08, 2018. https://www.csis.org/analysis/economic-impact-cybercrime.

Olmstead, Kenneth, and Aaron Smith. “Americans and Cybersecurity.” Pew Research Center: Internet, Science & Tech. January 26, 2017. Accessed September 08, 2018. http://www.pewinternet.org/2017/01/26/americans-and-cybersecurity/.

Lord, Nate. “A History of Ransomware Attacks: The Biggest and Worst Ransomware Attacks of All Time.” Digital Guardian. April 06, 2018. Accessed September 08, 2018. https://digitalguardian.com/blog/history-ransomware-attacks-biggest-and-worst-ransomware-attacks-all-time.

Cox, Joseph. “The World’s First Ransomware Came on a Floppy Disk in 1989.” Motherboard. April 12, 2017. Accessed September 08, 2018. https://motherboard.vice.com/en_us/article/nzpwe7/the-worlds-first-ransomware-came-on-a-floppy-disk-in-1989.

“2017 Cybercrime Report.” Herjavec Group. October 18, 2017. Accessed September 08, 2018. https://www.herjavecgroup.com/cybercrime-report-2017/.

Dearden, Lizzie. “Hacking Group Claims It Took down BBC Website to Test Power before Attacking Isis.” The Independent. January 02, 2016. Accessed September 08, 2018. https://www.independent.co.uk/news/media/ online/bbc-website-down-new-world-hacking-claims-new-years-eve-cyber-attack-was-just-to-test-capabilities-a6793701.html.

Paganini, Pierluigi. “Anti-IS Group ‘New World Hackers’ Claims BBC Website Attack.” Security Affairs. January 02, 2016. Accessed September 08, 2018. https://securityaffairs.co/wordpress/43235/hacking/new-worldhackers-ddos-bbc.htm.

Wright, Kristen. “5 Common WordPress Security Issues.” IThemes. January 16, 2017. Accessed September 08, 2018. https://ithemes.com/2017/01/16/ wordpress-security-issues/.

Chapter 4

“Innovate. Disrupt. Grow.” 2017 International. Report no. 135032-G. December 2017. Accessed September 8, 2018. https://assets.kpmg.com/ content/dam/kpmg/xx/pdf/2017/12/international-annual-review-2017. pdf.

Olmstead, Kenneth, and Aaron Smith. “Americans and Cybersecurity.” Pew Research Center: Internet, Science & Tech. January 26, 2017. Accessed September 08, 2018. http://www.pewinternet.org/2017/01/26/americans-and-cybersecurity/.

“Equifax Hack: What We Learned.” Fox Business. December 27, 2017. Accessed September 08, 2018. https://www.foxbusiness.com/markets/ equifax-hack-what-we-learned.

Sweet, Ken. “Equifax Finds Additional 2.4 Million Americans Impacted by 2017 Breach.” Financial Post. March 01, 2018. Accessed September 08, 2018. https://business.financialpost.com/pmn/business-pmn/equifaxfinds-additional-2-4-million-impacted-by-2017-breach.

Sweet, Ken. “Equifax Collects Your Data, and Then Sells It.” Inc.com. October 06, 2017. Accessed September 08, 2018. https://www.inc.com/associated-press/equifax-data-money.html.

Mastroianni, Brian. “VTech Tablet for Kids Is Easy to Hack, Experts Say.” CBS News. December 04, 2015. Accessed September 08, 2018. https:// www.cbsnews.com/news/vtech-tablet-for-kids-is-easy-to-hack/.

Nichols, Shaun. “VTech Hack Fallout: What Is a Kid’s Privacy Worth? About 22 Cents – FTC.” The Register® - Biting the Hand That Feeds IT. January 08, 2018. Accessed September 08, 2018. https://www.theregister. co.uk/2018/01/08/vtech_ftc_settlement_hacking/.

Mukherjee, Supantha, and Jim Finkle. “Digital Toymaker VTech Hires FireEye to Secure Systems after Hack.” Reuters. December 03, 2015. Accessed September 08, 2018. http://www.reuters.com/article/us-vtech-cyberattack-fireeye/digital-toymaker-vtech-hires-fireeye-to-secure-systems-after-hack-idUSKBN0TM1LE20151203.

Newcomb, Alyssa. “Arrest Made in VTech Toy Security Breach.” ABC News. December 15, 2015. Accessed September 08, 2018. http://abcnews.go.com/Technology/arrest-made-vtech-toy-security-breach/story?id=35776252.

“Facebook, Social Media Privacy, and the Use and Abuse of Data | United States Senate Committee on the Judiciary.” Meeting | Hearings | United States Senate Committee on the Judiciary. Accessed April 14, 2018. https://www.judiciary.senate.gov/meetings/facebook-social-media-privacy-and-the-use-and-abuse-of-data.

Langone, Alix. “What to Know About Facebook’s Cambridge Analytica Problem.” Time. April 4, 2018. Accessed September 08, 2018. http://time. com/5205314/facebook-cambridge-analytica-breach/.

Jenkins, Nash. “Mark Zuckerberg Tells Congress He’s Sorry.” Time. April 10, 2018. Accessed September 08, 2018. http://time.com/5235181/ mark-zuckerberg-facebook-congress-testimony-sorry/.

Chapter 5

“2017 Data Breaches.” Identity Theft Resource Center. Accessed September 08, 2018. https://www.idtheftcenter.org/2017-data-breaches/.

“Number of Internet Users Worldwide 2005-2017.” Statista. Accessed August 08, 2018. https://www.statista.com/statistics/273018/number-of-internet-users-worldwide/.

Khosrowshahi, Dara. “2016 Data Security Incident | Uber Newsroom US.” Uber.com. November 21, 2017. Accessed September 08, 2018. https:// www.uber.com/newsroom/2016-data-incident/.

“Uber Admits Covering up 2016 Hack That Affected Millions | CBC News.” CBCnews. November 22, 2017. Accessed September 08, 2018. http://www. cbc.ca/news/technology/uber-hack-riders-data-cover-up-1.4413154.

“Uber Says 815,000 Canadians Affected by Data Breach as Investigation Launched | CBC News.” CBCnews. December 12, 2017. Accessed September 08, 2018. http://www.cbc.ca/news/technology/uber-data-breachhow-many-1.4444088.

Menn, Joseph, and Dustin Volz. “Exclusive: Uber Paid 20-year-old Florida Man to Keep Data Breach...” Reuters. December 07, 2017. Accessed September 08, 2018. https://www.reuters.com/article/us-uber-cyber-payment-exclusive/exclusive-uber-paid-20-year-old-florida-man-tokeep-data-breach-secret-sources-idUSKBN1E101C.

Cauterucci, Christina. “The Sexism Described in Uber Employee’s Report Is Why Women Leave Tech-Or Don’t Enter at All.” Slate Magazine. February 21, 2017. Accessed September 08, 2018. http://www.slate.com/blogs/xx_ factor/2017/02/21/the_sexism_in_uber_employee_s_report_is_why_women_leave_tech_or_don_t_enter.html.

Levin, Sam. “Female Uber Driver Says Company Did Nothing after Passengers Assaulted Her.” The Guardian. May 01, 2017. Accessed September 08, 2018. https://www.theguardian.com/technology/2017/ may/01/uber-sexual-assault-allegations-female-drivers-san-diego.

Buchanan, Rose Troup. “Former Ashley Madison Employee Claims She Made Hundreds of Fake ‘alluring Female’ Profiles.” The Independent. August 22, 2015. Accessed September 08, 2018. https://www.independent. co.uk/news/ashley-madison-hack-former-employee-claims-she-madehundreds-of-fake-alluring-female-profiles-as-10466900.html.

Zetter, Kim. “Hackers Finally Post Stolen Ashley Madison Data.” Wired. August 18, 2015. Accessed September 08, 2018. https://www.wired. com/2015/08/happened-hackers-posted-stolen-ashley-madison-data/.

Baraniuk, Chris. “Ashley Madison: ‘Suicides’ over Website Hack - BBC News.” BBC. August 24, 2015. Accessed September 08, 2018. https://www. bbc.co.uk/news/technology-34044506.

Goodin, Dan. “Top 100 List Shows Ashley Madison Passwords Are Just as Weak as All the Rest.” Ars Technica. December 9, 2015. Accessed September 08, 2018. https://arstechnica.com/information-technology/2015/09/ new-stats-show-ashley-madison-passwords-are-just-as-weak-as-all-therest/.

Cox, Joseph. “Ashley Madison Hackers Speak Out: ‘Nobody Was Watching’.” Motherboard. August 22, 2015. Accessed September 08, 2018. https://motherboard.vice.com/en_us/article/bmjqyz/ashley-madison-hackers-speak-out-nobody-was-watching.

“2017 Financial Industry Cybersecurity Research Report | SecurityScorecard.” SecurityScorecard. Accessed September 08, 2018. https://securityscorecard.com/resources/2016-financial-industry-cybersecurity-research-report.

Islamchanneltv. “Asia Wired - Bangladesh Cyber Bank Heist (interview with Bill Hau).” YouTube. June 12, 2016. Accessed September 08, 2018. https://www.youtube.com/watch?v=QLRA2HPRmGU. Gopalakrishnan, Raju, and Manuel Mogato. “Bangladesh Bank Official’s Computer Was Hacked to Carry out $81...” Reuters. May 19, 2016. Accessed September 08, 2018. https://www.reuters.com/article/us-cyber-heist-philippines/bangladesh-bank-officials-computer-was-hackedto-carry-out-81-million-heist-diplomat-idUSKCN0YA0CH.

Al-Mahmood, Syed Zain. “Hackers Lurked in Bangladesh Central Bank’s Servers for Weeks.” The Wall Street Journal. March 22, 2016. Accessed September 08, 2018. https://www.wsj.com/articles/hackers-in-bangladesh-bank-account-heist-part-of-larger-breach-1458582678.

Bugge, Axel. “With 4,000 Ransom Attacks a Day, Cyber Crime Threatens Financial Sector: Europol.” Insurance Journal. November 09, 2017. Accessed September 08, 2018. https://www.insurancejournal.com/news/ international/2017/11/09/470794.htm.

Hall, Kat. “NHS Could Have ‘fended Off’ WannaCry by Taking ‘simple Steps’ – Report.” The Register® - Biting the Hand That Feeds IT. October 27, 2017. Accessed September 08, 2018. https://www.theregister. co.uk/2017/10/27/nhs_could_have_fended_off_wannacry_says_nao_report/.

Hall, Kat. “UK Hospital Meltdown after Ransomware Worm Uses NSA Vuln to Raid IT.” The Register® - Biting the Hand That Feeds IT. May 12, 2017. Accessed September 08, 2018. https://www.theregister.co.uk/2017/05/12/ nhs_hospital_shut_down_due_to_cyber_attack/.

“On the Internet.” FBI. Accessed September 08, 2018. https://www.fbi.gov/ scams-and-safety/on-the-internet.

Vijayan, Jai. “The 7 Most Significant Government Data Breaches.” Dark Reading. November 15, 2016. Accessed September 08, 2018. https://www. darkreading.com/attacks-breaches/the-7-most-significant-governmentdata-breaches/d/d-id/1327468?image_number=1.

“Cybersecurity Resource Center Cybersecurity Incidents.” U.S. Office of Personnel Management. Accessed September 08, 2018. https://www.opm. gov/cybersecurity/cybersecurity-incidents/.

“Foreign Intelligence Surveillance Act.” Wikipedia. Accessed September 08, 2018. https://en.wikipedia.org/wiki/Foreign_Intelligence_Surveillance_ Act.

“Ponemon 2017 State of Endpoint Security Risk Report.” Barkly. Accessed September 08, 2018. https://www.barkly.com/ponemon-2018-endpoint-security-statistics-trends.

Chapter 6

“Safety & Availability (Biologics) - Bovine Spongiform Encephalopathy (BSE) Questions and Answers.” U S Food and Drug Administration Home Page. Accessed September 08, 2018. https://www.fda.gov/biologicsbloodvaccines/safetyavailability/ucm111482.htm.

“Edward Snowden.” Biography.com. February 06, 2018. Accessed September 08, 2018. https://www.biography.com/people/edward-snowden-21262897.

Reed, Jason, Yiru Zhong, Lynn Terwoerds, and Joyce Brocaglia. “The 2017 Global Information Security Workforce Study: Women in Cybersecurity (A Frost & Sullivan White Paper)”. Report. 2017. https://iamcybersafe.org/ wp-content/uploads/2017/03/WomensReport.pdf.

“2017 Cybercrime Report.” Herjavec Group. October 18, 2017. Accessed September 08, 2018. https://www.herjavecgroup.com/cybercrime-report-2017/.

“State of Cybersecurity 2017.” Defense-In-Depth. Accessed September 08, 2018. https://cybersecurity.isaca.org/csx-resources/state-of-cyber-security-2017.

“Kaspersky Lab Study: Most Women Decide against a Career in Cybersecurity before Age 16.” Usa.kaspersky.com. November 8, 2017. Accessed September 08, 2018. https://usa.kaspersky.com/about/press-releases/2017_kaspersky-lab-study-most-women-decide-against-a-careerin-cybersecurity-before-age-16.

Morgan, Steve. “Women Represent 20 Percent Of The Global Cybersecurity Workforce In 2018.” Cybersecurity Ventures. July 21, 2018. Accessed September 08, 2018. https://cybersecurityventures.com/women-in-cybersecurity/.

“Palo Alto Networks and GSUSA Collaborate on Cybersecurity Badges - Girl Scouts.” Girl Scouts of the USA. Accessed September 08, 2018. https://www.girlscouts.org/en/press-room/press-room/news-releases/2017/palo-alto-networks-girl-scouts-collaborate-cybersecurity-badges.html.

Morgan, Steve. “List of Women In Cybersecurity Associations In The U.S. And Internationally.” Cybercrime Magazine. July 21, 2018. Accessed September 08, 2018. https://cybersecurityventures.com/list-of-women-in-cybersecurity-associations-in-the-u-s-and-internationally/.

Chapter 8

“Researchers Find “simple” Way to Hack Amazon Key.” CBS News. November 17, 2017. Accessed September 08, 2018. https://www.cbsnews. com/news/researchers-find-amazon-key-flaw/.

“The Great North America Blackout of 2003.” CBCnews. August 14, 2018. Accessed September 08, 2018. https://www.cbc.ca/archives/the-greatnorth-america-blackout-of-2003-1.4683696.