3,440
Views
0
CrossRef citations to date
0
Altmetric
Commentary

Cyber: Also a Domain of War and Terror

 

Notes

1. United Nations Office on Drugs and Crime, Vienna, ‘Comprehensive Study on Cybercrime - Draft’, February 2013.

2. Pierluigi Paganini, ‘The Impact of Cybercrime’, InfoSec Institute, Illinois, February 2013.

3. Holly Ellyatt, ‘The Threat from Cybercrime’, CNBC Report, 13 August 2013, at http://www.cnbc.com/id/100959481# (Accessed December 2, 2014).

4. John Vomhof Jr, ‘Target’s data breach fraud cost could top $1 billion’, Charlotte Business Journal, Feb 3, 2014.

5. PM lauds Israeli prowess at Cybertech 2014 Opening, The Times of Israel, January 27, 2014, at http://www.timesofisrael.com/pm-lauds-israeli-prowess-at-cybertech-2014-opening/ (Accessed December 2, 2014).

6. Bob Ackerman Jr., ‘Stealing the Show: Cybersecurity Stock Valuations on the Rise’, Special to CNBC.com, March 9, 2014.

7. Preet Bharara, ‘Asleep at the Laptop’, Op-Ed, The New York Times, June 3, 2012 at http://www.nytimes.com/2012/06/04/opinion/preventing-a-cybercrime-wave.html?_r=1& (Accessed December 2, 2014).

8. The Cyber Domain - Security and Operations, Special Report, US Department of Defense.

9. Michael Corkery, Jessica Silver-Greenberg and David E. Sanger, ‘Obama Had Security Fears on JPMorgan Data Breach’, The New York Times, October 8, 2014, at http://dealbook.nytimes.com/2014/10/08/cyberattack-on-jpmorgan-raises-alarms-at-white-house-and-on-wall-street/?_php=true&_type=blogs&emc=edit_na_20141008&nlid=55349507&_r=0 (Accessed December 2, 2014).

10. Guy Taylor, ‘Obama’s cybersecurity adviser: Biometrics will replace passwords for safety’s sake’, The Washington Times, October 9, 2014, at http://www.washingtontimes.com/news/2014/oct/9/obamas-cybersecurity-adviser-biometrics-will-repla/ (Accessed December 2, 2014).

11. Craig Timberg and Greg Miller, ‘FBI blasts Apple, Google for locking police out of phones’, The Washington Post, September 25, 2014, at http://www.washingtonpost.com/business/technology/2014/09/25/68c4e08e-4344-11e4-9a15-137aa0153527_story.html (Accessed December 2, 2014).

12. Joe Barnes, ‘Israel utilises its cyber security expertise’, The Financial Times, February 24, 2014, at http://www.ft.com/intl/cms/s/0/8b6e572c-97e7-11e3-8dc3-00144feab7de.html#axzz3KXXT0Je6 (Accessed December 2, 2014).

13. Ari Yashar, ‘Israel’s New “Cyber Gym” Trains Cyber-Warfare’, December 2, 2013, at http://www.israelnationalnews.com/News/News.aspx/174712#.VHre6jSUd3E (Accessed December 2, 2014).

14. Ibid.

16. EC- Council Foundation, ‘The Talent Crisis in InfoSec - An Outlook of the Future of the Indian Information Security Scenario.’

17. Ibid.

18. PTI, ‘India not prepared to handle cyber terrorism threat: EC Council’, Economic Times, February 19, 2014, at http://articles.economictimes.indiatimes.com/2014-02-19/news/47489884_1_cyber-ddos-participants (Accessed December 2, 2014).

19. Jim Eckenrode, ‘Transforming cybersecurity: New approaches for an evolving threat landscape’, Deloitte Center for Financial Services, 2014.

20. Adrian Croft and Peter Apps, ‘NATO websites hit in cyber attack linked to Crimea tension’, Reuters, Mar 16, 2014, at http://www.reuters.com/article/2014/03/16/us-ukraine-nato-idUSBREA2E0T320140316 (Accessed December 2, 2014).

21. David Shamah, ‘Latest viruses could mean “end of world as we know it,” says man who discovered Flame’, The Times of Israel, June 6, 2012, at http://www.timesofisrael.com/experts-we-lost-the-cyber-war-now-were-in-the-era-of-cyber-terror/#ixzz3KQV7Alyw (Accessed December 2, 2014).

Additional information

Notes on contributors

Suryakanthi Tripathi

Suryakanthi Tripathi is a former diplomat and her last posting was as India’s ambassador to Spain. She is the Managing Trustee of India Foundation, a non-political trust that is engaged in social and cultural activities.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.