03.07.2015 Views

third Cyber Security Assessment Netherlands - NCSC

third Cyber Security Assessment Netherlands - NCSC

third Cyber Security Assessment Netherlands - NCSC

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

[40: Olson 2012] Parmy Olson: We are Anonymous. An inside report into the notorious hackers movement<br />

[41: Olsthoorn 2010] Peter Olsthoorn: The power of Google - does Google work for you or do you work for Google (Dutch)<br />

http://www.demachtvangoogle.nl/<br />

[42: PNAS 2013] Proceedings of the National Academy of Sciences: Private traits and attributes are predictable from<br />

digital records of human behavior<br />

http://www.pnas.org/content/early/2013/03/06/1218772110.full.pdf+html<br />

[43: Quocirca 2013] Quocirca: Next Generation Data Centre Index – Cycle III<br />

http://www.quocirca.com/media/reports/032013/811/Oracle%20NGD%20report%20final%20<br />

March%202013.pdf<br />

[44: Rid 2012] Rid, T.: <strong>Cyber</strong> War Will Not Take Place, in: P. Ducheine, F. Osinga, J. Soeters (red): <strong>Cyber</strong> Warfare – Critical<br />

Perspectives<br />

[45: Central government 2012] Central government: coalition agreement ‘Build Bridges’ (Dutch)<br />

http://www.rijksoverheid.nl/regering/documenten-en-Publication no.:rapporten/2012/10/29/<br />

regeerakkoord.html<br />

[46: Sophos 2012] Sophos: <strong>Security</strong> Threat Report 2012<br />

[47: Stol 2013] Stol, W.: Victimisation in a digital society (Dutch)<br />

[48: Symantec 2013] Symantec: Internet <strong>Security</strong> Threat Report 2013<br />

[49: TNO 2012] TNO: IT confidence and security monitor<br />

[50: TM 2013] Trend Micro: 2012 Mobile Threat and <strong>Security</strong> Roundup<br />

[51: TM 2012] Trend Micro: Russian Underground 101<br />

http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-russianunderground-101.pdf<br />

[52: UT 2012] University of Twente: Internet Use trend report (Dutch)<br />

http://www.utwente.nl/ctit/cfes/docs/Rapporten/2012_Trendrapport_Internetgebruik.pdf<br />

[53: UvA 2012] University of Amsterdam: Cloud services in higher education and research and the USA Patriot Act (Dutch)<br />

[54: Verizon 2012] Verizon: Data Breach Investigations Report 2012<br />

[55: VU 2012] VU Amsterdam: Memory Errors: The Past, the Present, and the Future, 12 September 2012<br />

http://www.few.vu.nl/~herbertb/papers/memerrors_raid12.pdf<br />

[56: Wellmann 2001] Wellmann, B.: Physical place and cyber place: The Rise of Personalized Networking<br />

[57: WODC 2012] B-J. Koops e.a., Crime and detection in the clouds. Sticking points and opportunities with cloud<br />

computing for Dutch detection (Dutch)<br />

http://www.wodc.nl/onderzoeksdatabase/cloud-computing.aspx<br />

[58: WEF 2012] World Economic Forum: Risk and Responsibility in a Hyperconnected World: Principles and Guidelines<br />

[59: WRR 2011] WRR: WRR report 86: iOverheid (Dutch)<br />

http://www.wrr.nl/Publication no.:Publication no.:article/ioverheid/<br />

101

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!