References
- Samonas, S. and D. Coss, THE CIA STRIKES BACK: REDEFINING CONFIDENTIALITY, INTEGRITY AND AVAILABILITY IN SECURITY. Journal of Information System Security, 2014. 10(3).
- Harris, S., CISSP All-in-One Exam Guide, 6th Edition. 2012: McGraw-Hill Osborne Media. 1456.
- The 2012 Data Breach Investigations Report - VerizonBusiness. 2013 2020/04/22/; Available from: http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf.
- Cost of a Data Breach Report 2020 | IBM. 2020 2020/08/18/; Available from: https://www.ibm.com/security/digital-assets/cost-data-breach-report/#.
- Swinhoe, D. The 15 biggest data breaches of the 21st century. CSO Online 2020 2020/04/17/; Available from: https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-21st-century.html.
- Top 10 Largest Data Breaches. 2020 2020/04/22/; Available from: https://www.securitymagazine.com/articles/92201-top-10-largest-data-breaches.
- Kiesnoski, K. 5 of the biggest data breaches ever. CNBC 2019 2020/08/22/; Available from: https://www.cnbc.com/2019/07/30/five-of-the-biggest-data-breaches-ever.html.
- Adobe Breach Impacted At Least 38 Million Users - Krebs on Security. 2020 2020/08/22/; Available from: https://krebsonsecurity.com/2013/10/adobe-breach-impacted-at-least-38-million-users.
- Scott, C. Protecting Our Members. 2020 2020/08/22/; Available from: https://blog.linkedin.com/2016/05/18/protecting-our-members.
- Sanger, D.E., et al. Marriott Data Breach Is Traced to Chinese Hackers as U.S. Readies Crackdown on Beijing. N.Y. Times 2018 2020/08/22/; Available from: https://www.nytimes.com/2018/12/11/us/politics/trump-china-trade.html.
- Newcomer, E. Uber Paid Hackers to Delete Stolen Data on 57 Million People. Bloomberg 2017 2020/08/22/; Available from: https://www.bloomberg.com/news/articles/2017-11-21/uber-concealed-cyberattack-that-exposed-57-millionpeople-s-data.
- McMillan, R. FriendFinder Investigates Report of Breached Accounts. WSJ 2016 2020/08/22/; Available from: https://www.wsj.com/articles/friendfinder-investigates-report-of-breached-accounts-1479160660.
- Swinhoe, D. The 15 worst data security breaches of the 21st Century - CSO Online - Security and Risk. 2012 2020/08/22/; Available from: http://www.csoonline.com/article/700263/the-15-worst-data-security-breaches-of-the-21st-century.
- Adee, S., The Hunt For The Kill Switch. Spectrum, IEEE, 2008. 45(5): p. 34-39. https://doi.org/10.1109/MSPEC.2008.4505310
- Metz, C., AAA protocols: authentication, authorization, and accounting for the Internet. IEEE Internet Computing, 1999. 3(6): p. 75-79. https://doi.org/10.1109/4236.807015
- Paolini, A., et al., Authentication, Authorization, and Accounting, in Towards Interoperable Research Infrastructures for Environmental and Earth Sciences. 2020, Springer. p. 247-271.
- Aloul, F., S. Zahidi, and W. El-Hajj. Two factor authentication using mobile phones. in 2009 IEEE/ACS International Conference on Computer Systems and Applications. 2009. IEEE.
- El Emam, K., K. Moreau, and E. Jonker, How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials? Journal of Medical Internet Research, 2011. 13(1): p. 13-22. https://doi.org/10.2196/jmir.1335
- Bonneau, J. and Ieee, The science of guessing: analyzing an anonymized corpus of 70 million passwords, in 2012 Ieee Symposium on Security and Privacy. 2012, Ieee: New York. p. 538-552.
- McClure, S., et al., Hacking exposed: network security secrets and solutions. 2009: McGraw-Hill.
- Bursztein, E., M. Martin, and J. Mitchell. Text-based CAPTCHA strengths and weaknesses. in Proceedings of the 18th ACM conference on Computer and communications security. 2011.
- Ducloyer, S., et al. Hardware implementation of a multi-mode hash architecture for MD5, SHA-1 and SHA-2. in Proceedings on the Design and Architectures for Signal and Image Processing Workshop (DASIP'07). 2007. Citeseer.
- Easttom, W., II, Computer Security Fundamentals (2nd Edition). 2011: Pearson IT Certification. 352.
- Kalenderi, M., et al. Breaking the GSM A5/1 cryptography algorithm with rainbow tables and high-end FPGAS. in 22nd International conference on field programmable logic and applications (FPL). 2012. IEEE.
- Theocharoulis, K., I. Papaefstathiou, and C. Manifavas. Implementing rainbow tables in high-end fpgas for super-fast password cracking. in 2010 International Conference on Field Programmable Logic and Applications. 2010. IEEE.
- Kumar, H., et al. Rainbow table to crack password using MD5 hashing algorithm. in 2013 IEEE Conference on Information & Communication Technologies. 2013. IEEE.
- Chou, H.C., et al., PASSWORD CRACKING BASED ON SPECIAL KEYBOARD PATTERNS. International Journal of Innovative Computing Information and Control, 2012. 8(1A): p. 387-402.
- Schweitzer, D., et al., Visualizing keyboard pattern passwords. Information Visualization, 2011. 10(2): p. 127-133. https://doi.org/10.1057/ivs.2010.12
- Weir, M., et al. Password cracking using probabilistic context-free grammars. in 2009 30th IEEE Symposium on Security and Privacy. 2009. IEEE.
- John the Ripper password cracker. 2020 2020/08/22/; Available from: https://www.openwall.com/john.
- Narayanan, A. and V. Shmatikov, Fast dictionary attacks on passwords using time-space tradeoff, in Proceedings of the 12th ACM conference on Computer and communications security. 2005, ACM: Alexandria, VA, USA. p. 364-372.
- Marechal, S., Advances in password cracking. Journal in Computer Virology, 2008. 4(1): p. 73-81. https://doi.org/10.1007/s11416-007-0064-y