13Security Threats
Enck, W., Gilbert, P., Chun, B., Cox, L., Jung, J., McDaniel, P., and Sheth, A. 2010.
TaintDroid: An information-ow tracking system for realtime privacy monitor-
ing on smartphones. OSDI.
FBI (Federal Bureau of Investigation). 2012. New e-scams & warnings. http://www.
fbi.gov/scams-safety/e-scams (accessed May 24, 2012).
Georgia Tech. October 18, 2011. Smartphones’ accelerometer can track strokes on
nearby keyboards. http://www.gatech.edu/newsroom/release.html?nid=71506
(retrieved June 21, 2012).
Govindarasu, M., Hahn, A., and Sauer, P. May 2012. Cyber-physical systems
security for smart grid. Power Systems Engineering Research Center,
publication12-02.
Grace, N. 2012. FCC Advisory Committee adopts recommendations to minimize three
major cyber threats, including an anit-bot code of conduct, IP route hijacking indus-
try framework and secure DNS best practices. http://www.fcc.gov/ document/
csric-adopts-recs-minimize-three-major-cyber-threats (retrieved June 22, 2012).
Hewlett-Packard Development Company. March 2013. HP 2012 cyber risk report,
white paper. http://www.hpenterprisesecurity.com/collateral/whitepaper/
HP2012CyberRiskReport_0313.pdf (retrieved April 9, 2013).
Hulburt, G., Voas, J., and Miller, K. 2011. Mobile-app addiction: Threat to security?
ITProfessional 13:9–11.
IBM. September 2011. IBM X-Force 2011 mid-year trend and risk report. http://www-
935.ibm.com/services/us/iss/xforce/trendreports/ (retrieved June 1, 2012).
Internet Crime Complaint Center. 2011. 2011 Internet crime report. http://www.ic3.
gov/media/annualreport/2011_IC3Report.pdf (retrieved December 28, 2012).
Jansen, W., and Grance, T. December 2011. Guidelines on security and privacy in pub-
lic cloud computing. Special publication 800-144, http://csrc.nist.gov/publica-
tions/nistpubs/800-144/SP800-144.pdf.
Kaplan, D. 2008. Google Docs aw could allow others to see personal les. SC
Magazine, September 16, 2008, http://www.scmagazine.com/Google-Docs-
aw-could-allow-others-to-see-personal-les/article/116703/?DCMP=EMC-
SCUS_Newswire (retrieved June 1, 2012).
Laplante, P., and DeFranco, J. 2010. Another ode to paranoia. IT Professional 12:57–59.
Lipson, H. 2002. Tracking and tracing cyber-attacks: Technical challenges and global
policy issues. Special report CMU/SEI-2002-SR-009.
Long, J. 2008. No tech hacking: A guide to social engineering, dumpster diving, and shoulder
surng. Burlington, MA: Syngress.
Luscombe, B. August 2011. 10 Questions for Kevin Mitnick. http://www.time.com/
time/magazine/article/0,9171,2089344-1,00.html (accessed May 18, 2012).
Mandiant. January 2013. APT1 exposing one of China’s cyber espionage units. www.
mandiant.com (retrieved April 10, 2013).
McAfee Labs. 2012. Threats report: First quarter 2012. http://www.mcafee.com/us/
resources/reports/rp-quarterly-threat-q1-2012.pdf (retrieved June 22, 2012).
Mell, P., and Grance, T. September 2011. The NIST denition of cloud com-
puting. Special publication 800-145, http://csrc.nist.gov/publications/
nistpubs/800-145/SP800-145.pdf.
Mitnick, K., and Simon, W. 2002. The art of deception. New York: Wiley Publishing.
Mokey, N. 2010. Wallpaper Apps Swiped Personal Details off android Phones. Digital
Trends, July 19, 2010. http://www.digitaltrends.com/mobile/wallpaper-apps-
swiped-personal-details-off-android-phones/(accessed may 18, 2012).