27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Muhammad Naveed<br />

Austalian Taxation Office (2008), ‘Information Security Practices Review’ V2.0, [Online] Available:<br />

http://www.ato.gov.au/content/downloads/COR138560InfoSecurity.pdf [April 2008]<br />

DawnNews (2010), ‘Govt starts securing 36 hacked websites’, [Online] Available:<br />

http://www.dawn.com/2010/11/30/forty-pakistan-government-websites-hacked.html [30 November 2010]<br />

GEO Pakistan (2010), ‘Supreme court website hacked’, [Online] Available: http://www.geo.tv/9-30-<br />

2010/72139.htm [30 September 2010]<br />

Jahanzaib Haque (2010), 'Cyber warfare: Indian hackers take down 36 govt websites', The Express Tribune,<br />

[Online] Available: http://tribune.com.pk/story/84269/cyber-warfare-indian-hackers-take-down-36-govtwebsites/<br />

[01 Dec 2010]<br />

Nmap Reference Guide, [Online] Available: http://nmap.org/book/man.html<br />

PakCert (2005), ‘Defacement Archive of hacked Pakistani Web Sites'’, Pakistan Computer Emergency Response<br />

Team [Online] Available: http://www.pakcert.org/defaced/index.html<br />

PakCert (2008), ‘Defacement Statistics (January 1999 - August 2008)'’, Pakistan Computer Emergency<br />

Response Team [Online] Available: http://www.pakcert.org/defaced/stats.html<br />

Rafael Etges, Walid Hejazi and Alan Lefort (2009), "A Study on Canadian IT Security Practices," ISACA Journal,<br />

2009, vol. 2, pp. 1 – 3 Available:http://www.isaca.org/Journal/Past-Issues/2009/Volume-<br />

2/Documents/jpdf0902-online-a-study.pdf<br />

Syed M. Amir Husain (1998), 'Pakistan needs an Information Warfare capability', Defence Journal, [Online]<br />

Available: http://www.defencejournal.com/july98/pakneeds1.htm<br />

The Express Tribune (2010), ‘36 government sites hacked by 'Indian Cyber Army'’, [Online] Available:<br />

http://tribune.com.pk/story/83967/36-government-websites-hacked-by-indian-cyber-army/ [30 November<br />

2010]<br />

Trend Micro (2009), “Data-stealing Malware on the Rise – Solutions to Keep Businesses and Consumers Safe”,<br />

[Online]<br />

Available:http://us.trendmicro.com/imperia/md/content/us/pdf/threats/securitylibrary/data_stealing_malware_<br />

focus_report_-_june_2009.pdf [June 2009]<br />

United States Environmental Protection Agency – Office of Inspector General (2006), ‘Information Security<br />

Series: Security Practices' Report No. 2006-P-00010, [Online] Available:<br />

http://www.epa.gov/oig/reports/2006/20060131-2006-P-00010.pdf [31 January 2006]<br />

Vorakulpipat, C.; Siwamogsatham, S.; Pibulyarojana, K. (2010) , "Exploring information security practices in<br />

Thailand using ISM-Benchmark," Proceedings of Technology Management for Global Economic Growth<br />

(PICMET), 2010, pp.1-4, 18-22 July 2010<br />

199

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!