text
stringlengths
4
429
ments+Report/4888892/story.html
Poulsen, K. (2011, May 31). Second Defense Contractor L
3 'Actively Targeted' With RSA SecurID Hacks. Retrieved
June 13, 2011, from Wired: http://www.wired.com/threatlevel/2011/05/l
Reddy, S., Gorman, S., & Perez, E. (2011, June 13). IMF Mum on Details of Network Cyberattack. Retrieved June 13,
2011, from The Wall Street Journal:
http://online.wsj.com/article/SB10001424052702304665904576381973865291928.html
Rivner, U. (2011, April 01). Anatomy of an Attack. Retrieved June 13, 2011, from Speaking of Security: The Official
RSA Blog and Podcast: http://blogs.rsa.com/rivner/anatomy
attack/
Sanger, D., & Markoff, J. (2011, June 11). I.M.F Reports Cyberattack Led to 'Very Major Breach'. Retrieved June 13,
2011, from The New York Times: http://www.nytimes.com/2011/06/12/world/12imf.html
Secdev. (2009, March 29). Tracking GhostNet: Investigating a Cyber Espionage Network. Retrieved June 13, 2011,
from Information Warfare Monitor: http://www.scribd.com/doc/13731776/Tracking
GhostNet
Investigating
Cyber
Espionage
Network
PAGE 11 OF 13
COPYRIGHT
COMMAND FIVE PTY LTD. ALL RIGHTS RESERVED.
Snodgrass, R. (2007, December 14). Cyber attack on LANL outs personal info. Retrieved June 13, 2011, from LANL:
The Rest of the Story: http://lanl
rest
story.blogspot.com/2007/12/cyber
attack
lanl
outs
personal
info.html
The Guardian. (2011, June 13). IMF hit with serious state
sponsored cyber attack. Retrieved June 13, 2011, from
The Sydney Morning Herald: http://www.smh.com.au/technology/security/imf
with
serious
statesponsored
cyber
attack
20110613
lfzm0.html
The Washington Times. (2008, June 12). Hacking on Hill traced to China. Retrieved June 13, 2011, from The
Washington Times: http://www.washingtontimes.com/news/2008/jun/12/hacking
hill
traced
china/
U.S Office of Counterintelligence. (2011, June 14). Stuxnet Worm. Retrieved June 13, 2011, from Spy and Terrorist
Briefing Center: http://www.hanford.gov/oci/ci_spy.cfm?dossier=138
Walid Berissoul et agencies. (2011, March 07). Bercy: la cyber
attaque visait le G20. Retrieved June 13, 2011, from
Europe1: http://www.europe1.fr/France/Cyber
attaque
vise
selon
Bercy
442555/
Zetter, K. (2010, January 14). Google Hack Attack Was Ultra Sophisticated, New Details Show. Retrieved June 13,
2011, from Wired: http://www.wired.com/threatlevel/2010/01/operation
aurora/
PAGE 12 OF 13
COPYRIGHT
COMMAND FIVE PTY LTD. ALL RIGHTS RESERVED.
COPYRIGHT NOTICE
Copyright
Command Five Pty Ltd. All rights reserved.
This document is provided by the copyright holders under the licence
that follows. By obtaining, using, and/or distributing this document you
agree that you have read, understood, and agree to the terms and
conditions that follow.
The names and trademarks of Command Five Pty Ltd may not be
used in advertising or publicity relating to this document or its contents
without specific, prior, written permission.
No permission is given for this document to be used for commercial
purposes or as part of any commercial activity or undertaking,
including, but not limited to, use in or relating to advertising or
publicity, and/or use in support of, or as part of, any pre
sales or sales
activities.
No permission is given to create modified or derivative works. You
may distribute this document in its original form for non
commercial
purposes in accordance with the other terms and conditions stated
herein. Copyright title will at all times remain with the copyright
holders.
All referenced trademarks remain the property of their respective
owners.
THIS DOCUMENT IS PROVIDED
AS IS
FOR INFORMATIONAL
PURPOSES ONLY WITH NO REPRESENTATIONS OR WARRANTIES OF
ANY KIND, INCLUDING BUT NOT LIMITED TO ANY WARRANTY,
EXPRESS OR IMPLIED, OF MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE; WARRANTY OF NON
INFRINGEMENT, OR
TITLE; NOR ANY WARRANTIES PERTAINING TO THE ACCURACY OR
COMPLETENESS OF CONTENT.
ANY OPINIONS EXPRESSED IN THIS DOCUMENT MAY CHANGE
WITHOUT NOTICE AND ARE NOT NECESSARILY THE CONSIDERED
OPINIONS OF COMMAND FIVE PTY LTD, ITS PARTNERS, EMPLOYEES,
OR AFFILIATE ORGANISATIONS. ANY ADVICE OFFERED IN THIS