tas-net-2の日記

自動車整備、修理対応

CH:CyberDeffense:WP29:サイバー攻撃、陸自の情報流出か:DII:NII:SINET5:

CH:CyberDeffense:WP29:サイバー攻撃、陸自の情報流出か:DII:NII:SINET5: - CQF - Yahoo!ブログ

イメージ 1

イメージ 2

イメージ 3

イメージ 4

CH:CyberDeffense:WP29:サイバー攻撃陸自の情報流出か:DII:NII:SINET5:


WP29:
NJ161129p2


http://www.nishinippon.co.jp/import/national/20161128/201611280002_000_m.JPG?1480297622
http://www.nishinippon.co.jp/nnp/national/article/292031



学術情報ネットワークSINETは、日本全国の大学、研究機関等の学術情報基盤として、国立情報学研究所(NII)が構築、運用している情報通信ネットワークです。 2016年4月よりSINET5の運用を開始しました。SINET5とは
NII:
SINET5:
http://broadal.com/wp-content/uploads/2016/11/SINET5.jpg
http://www.nishinippon.co.jp/import/national/20161128/201611280002_000.JPG?1480297622
https://www.sinet.ad.jp





防衛省サイバー攻撃陸自の情報流出か 共同通信が報道
防衛省自衛隊の情報基盤がサイバー攻撃を受け、陸上自衛隊のシステムに侵入されていたことが分かったと、共同通信が伝えた。

侵入されたのは、駐屯地や基地を結ぶネットワーク「防衛情報通信基盤」(DII)(開発は富士通)で、9月ごろに侵入を検知。国家などが関与した組織的攻撃の可能性が高いという。

 防衛大などのPCが不正アクセスを受け、これ踏み台に陸自のシステムに侵入されたとみられるという。

http://www.itmedia.co.jp/news/articles/1611/28/news069.html

 

 

 

 コメント(65)

  

顔アイコン

2016年11月28日 10時16分 更新
防衛省サイバー攻撃陸自の情報流出か 共同通信が報道
防衛省自衛隊の情報基盤がサイバー攻撃を受け、陸上自衛隊のシステムに侵入されていたことが分かったと、共同通信が伝えた。

[ITmedia]
印刷/PDF



通知
ご存知ですか?自宅で最新のITを学べるソフトバンクの大学
石黒不二代氏が語る、ワークスタイル変革に必要なポイント
防衛省自衛隊の情報基盤がサイバー攻撃を受け、陸上自衛隊のシステムに侵入されていたことが分かった――共同通信が配信したこんな記事が、11月28日付けの中日新聞などに掲載された。陸自の内部情報が流出した可能性が高いという。

http://www.itmedia.co.jp/news/articles/1611/28/news069.html

2016/11/29(火) 午前 10:16ogw*og*3 ]

  

顔アイコン

防衛省広報課はITmediaの取材に対し、「現時点ではコメントできない」としている。

共同通信によると、侵入されたのは、駐屯地や基地を結ぶネットワーク「防衛情報通信基盤」(DII)(開発は富士通)で、9月ごろに侵入を検知。国家などが関与した組織的攻撃の可能性が高いという。

防衛大などのPCが不正アクセスを受け、これ踏み台に陸自のシステムに侵入されたとみられるという。DIIはインターネットに接続する「オープン系」と、外部と接続しない「クローズ系」に分かれているが、個々のPCは両方のシステムに接続でき、両系は完全には切り離されていないという。

2016/11/29(火) 午前 10:20ogw*og*3 ]

  

顔アイコン

自衛隊通信システムにサイバー攻撃、侵入か 陸自標的?
福井悠介2016年11月28日11時22分


防衛省自衛隊の情報通信システムがサイバー攻撃を受け、インターネットと接続する一部の回線へ侵入された形跡があることが、防衛省関係者への取材で分かった。これまでも不審なメールが送りつけられることはあったが、システムに直接侵入を図られるのは深刻な事態だとして、調査している。



http://www.asahi.com/articles/ASJCX3CL0JCXUTIL00N.html

2016/11/29(火) 午前 10:23ogw*og*3 ]

  

顔アイコン

同省関係者によると、防衛省外のネットワークともつながっている防衛医科大(埼玉県)のパソコンがまず侵入を受け、そこを通じて今年9月ごろ、防衛省自衛隊の回線へサイバー攻撃があった。陸上自衛隊の情報が狙われた疑いがあるが、陸自は「情報の流出はない」と説明している。

自衛隊の情報通信システムには、インターネットに接続可能な「オープン系」と、部隊の指揮通信など秘密の情報を取り扱うためインターネットなど外部の回線と遮断した「クローズ系」の2種類がある。今回は、「オープン系」への攻撃だったとみられる。

自衛隊サイバー攻撃への対応を強化するため、24時間通信を監視する「サイバー防衛隊」を2014年3月に発足させた。防衛医大や防衛大といった教育機関を含めた監視体制が十分だったか、検討を進める。(福井悠

2016/11/29(火) 午前 10:49ogw*og*3 ]

  

顔アイコン

自衛隊へのサイバー攻撃の経路は?
1.1 第一段階:学術系ネットワークへの侵入
1.2 第二段階:防衛大学or防衛医科大学への侵入
1.3 第三段階:防衛情報通信基盤への侵入
1.4 最終段階:陸自のシステムへの侵入
2 自衛隊へのサイバー攻撃の手法や原因は?
3 日本のセキュリティは弱い?

http://broadal.com/news148/

2016/11/29(火) 午前 11:12ogw*og*3 ]

  

顔アイコン

公開情報が多ければ
技術と認識が高まる。

秘密主義は過去には有効だった?かも知れないが
昨今の事情は必ずしもそうでもない。 その結果
の被害の増大はそれらをものがっているようにも感じる。

2016/11/29(火) 午前 11:16ogw*og*3 ]

  

顔アイコン

チャーチルの言及が、ある部位にわたり、邦訳されてなかった
との言及を目にしたが、本質に気が付くことが大切で、何でも極秘扱いは
国民の多くに損失を与える。


背景に特権主義的な背景が臭う。

バラの香は
特権漂ふ
危うさよ

2016/11/29(火) 午前 11:26ogw*og*3 ]

  

顔アイコン

陸自ネット侵入許す 高度なサイバー攻撃、情報流出か
2016年11月28日02時00分 (更新 11月28日 10時46分)

西日本新聞

防衛省自衛隊の情報基盤で、駐屯地や基地を相互に結ぶ高速・大容量の通信ネットワークがサイバー攻撃を受け、陸上自衛隊のシステムに侵入されていたことが27日、複数の同省関係者の話で分かった。防衛省が構築した堅固なシステムの不備を突く高度な手法と確認された。詳細な記録が残されておらず、被害の全容は判明していないが、陸自の内部情報が流出した可能性が高い。

http://www.nishinippon.co.jp/nnp/national/article/292031

2016/11/29(火) 午前 11:28ogw*og*3 ]

  

顔アイコン

複数の自衛隊高級幹部は「危機的で相当深刻な事態だ。早急に再発防止策を講じる必要がある」と強調。一方、情報セキュリティーを担当する防衛省の斎藤雅一審議官は「個別の案件には答えられない」とコメントした。

防衛省は外部接続を制限するなど防御を強化してきたが、今回はそれを上回る高度な手法から国家などが関与した組織的攻撃の疑いが強い。同省は深刻な事態と判断。9月ごろに確知し、直後にサイバー攻撃への警戒レベルを引き上げた。

関係者によると、攻撃を受けたのは、防衛省自衛隊が共同で利用する通信ネットワーク「防衛情報通信基盤(DII)」。

2016/11/29(火) 午前 11:29ogw*og*3 ]

  

顔アイコン

接続する防衛大と防衛医大のパソコンが不正アクセスの被害に遭ったとみられる。このパソコンを「踏み台」として利用した何者かが、陸自のシステムにも侵入した可能性が高い。防衛省は確知後、防衛省自衛隊全体でインターネット利用を一時禁止した。

防衛大と防衛医大は、全国の大学が参加する学術系のネットワークにも入っている。このネットを経由して攻撃されたもようだ。

DIIはインターネットに接続する「部外系システム」と、関係者が内部情報をやりとりする「部内系システム」に分かれている。電子メールを通じてコンピューターウイルスが入り込むことなどを防ぐため、二つのシステムは分離して運用されている。

ただ、個々のパソコンは両方のシステムに接続し、切り替えながら利用する仕組みで、切り離しは完全ではなかった。

2016/11/29(火) 午前 11:30ogw*og*3 ]

  

顔アイコン

Cyberterrorism

https://en.wikipedia.org/wiki/Cyberterrorism

The website of Air Botswana, defaced by a group calling themselves the "Pakistan Cyber Army"

2016/11/29(火) 午後 2:15ogw*og*3 ]

  

顔アイコン

U.S. military[edit]
The US Department of Defense (DoD) charged the United States Strategic Command with the duty of combating cyberterrorism. This is accomplished through the Joint Task Force-Global Network Operations, which is the operational component supporting USSTRATCOM in defense of the DoD's Global Information Grid.

2016/11/29(火) 午後 2:17ogw*og*3 ]

  

顔アイコン

This is done by integrating GNO capabilities into the operations of all DoD computers, networks, and systems used by DoD combatant commands, services and agencies.
On November 2, 2006, the Secretary of the Air Force announced the creation of the Air Force's newest MAJCOM, the Air Force Cyber Command, which would be tasked to monitor and defend American interest in cyberspace.

2016/11/29(火) 午後 2:18ogw*og*3 ]

  

顔アイコン

The plan was however replaced by the creation of Twenty-Fourth Air Force which became active in August 2009 and would be a component of the planned United States Cyber Command.
On December 22, 2009, the White House named its head of Computer security as

2016/11/29(火) 午後 2:19ogw*og*3 ]

  

顔アイコン

Howard Schmidt to coordinate U.S Government, military and intelligence efforts to repel hackers. He left the position in May, 2012.[18] Michael Daniel was appointed to the position of White House Coordinator of Cyber Security the same week[19] and continues in the position during the second term of the Obama administration.[20]

2016/11/29(火) 午後 2:19ogw*og*3 ]

  

顔アイコン

Estonia and NATO[edit]
Main article: 2007 cyberattacks on Estonia
The Baltic state of Estonia was target to a massive denial-of-service attack that ultimately rendered the country offline and shut out from services dependent on Internet connectivity for three weeks in the spring of 2007. The infrastructure of Estonia including everything from online banking and mobile phone networks to government services and access to health care information was disabled for a time.

2016/11/29(火) 午後 2:21ogw*og*3 ]

  

顔アイコン

The tech-dependent state was in severe problem and there was a great deal of concern over the nature and intent of the attack.
The cyber attack corresponded to an Estonian-Russian dispute over the removal of a bronze statue depicting a World War II-era Soviet soldier from the center of the capital, Tallinn. In the midst of the armed conflict with Russia, Georgia likewise was subject to sustanined and coordinated attacks on its electronic infrastructure in August 2008.

2016/11/29(火) 午後 2:33ogw*og*3 ]

  

顔アイコン

In both of these cases, circumstantial evidence point to coordinated Russian attacks, but attribution of the attacks is difficult; though both the countries point the finger at Moscow, proof establishing legal culpability is lacking.

Estonia joined NATO in 2004, therefore NATO carefully monitored its member state's response to the attack and worried both about escalation and the possibility of cascading effects beyond Estonia's border to other NATO members.

2016/11/29(火) 午後 2:34ogw*og*3 ]

  

顔アイコン

In 2008, directly as a result of the attacks, NATO opened a new center of excellence on cyberdefense to conduct research and training on cyber warfare in Tallinn.[21]


https://en.wikipedia.org/wiki/Cyberterrorism

2016/11/29(火) 午後 2:35ogw*og*3 ]

  

顔アイコン

China[edit]
The Chinese Defense Ministry confirmed the existence of an online defense unit in May 2011. Composed of about thirty elite internet specialists, the so-called "Cyber Blue Team," or "Blue Army," is officially claimed to be engaged in cyber-defense operations, though there are fears the unit has been used to penetrate secure online systems of foreign governments.[22][23]

2016/11/29(火) 午後 2:39ogw*og*3 ]

  

顔アイコン

Examples[edit]
An operation can be done by anyone anywhere in the world, for it can be performed thousands of miles away from a target. An attack can cause serious damage to a critical infrastructure which may result in casualties.[24] Attacking an infrastructure can be power grids, monetary systems, dams, media, and personal information.[1]
Some attacks are conducted in furtherance of political and social objectives, as the following examples illustrate:

2016/11/29(火) 午後 2:41ogw*og*3 ]

  

顔アイコン

In 1996, a computer hacker allegedly associated with the White Supremacist movement temporarily disabled a Massachusetts ISP and damaged part of the ISP's record keeping system. The ISP had attempted to stop the hacker from sending out worldwide racist messages under the ISP's name. The hacker signed off with the threat, "you have yet to see true electronic terrorism. This is a promise."

2016/11/29(火) 午後 2:42ogw*og*3 ]

  

顔アイコン

In 1998, Spanish protesters bombarded the Institute for Global Communications (IGC) with thousands of bogus e-mail messages. E-mail was tied up and undeliverable to the ISP's users, and support lines were tied up with people who couldn't get their mail. The protestors also spammed IGC staff and member accounts, clogged their Web page with bogus credit card orders, and threatened to employ the same tactics against organizations using IGC services.

2016/11/29(火) 午後 2:43ogw*og*3 ]

  

顔アイコン

They demanded that IGC stop hosting the Web site for the Euskal Herria Journal, a New York-based publication supporting Basque independence. Protestors said IGC supported terrorism because a section on the Web pages contained materials on the terrorist group ETA, which claimed responsibility for assassinations of Spanish political and security officials, and attacks on military installations. IGC finally relented and pulled the site because of the "mail bombings."

2016/11/29(火) 午後 2:44ogw*og*3 ]

  

顔アイコン

In 1998, ethnic Tamil guerrillas attempted to disrupt Sri Lankan embassies by sending large volumes of e-mail. The embassies received 800 e-mails a day over a two-week period. The messages read "We are the Internet Black Tigers and we're doing this to disrupt your communications." Intelligence authorities characterized it as the first known attack by terrorists against a country's computer systems.[25]

2016/11/29(火) 午後 2:45ogw*og*3 ]

  

顔アイコン

During the Kosovo conflict in 1999, NATO computers were blasted with e-mail bombs and hit with denial-of-service attacks by hacktivists protesting the NATO bombings. In addition, businesses, public organizations, and academic institutes received highly politicized virus-laden e-mails from a range of Eastern European countries, according to reports.

2016/11/29(火) 午後 2:48ogw*og*3 ]

  

顔アイコン

Web defacements were also common. After the Chinese Embassy was accidentally bombed in Belgrade[citation needed], Chinese hacktivists posted messages such as "We won't stop attacking until the war stops!" on U.S. government Web sites.

2016/11/29(火) 午後 2:49ogw*og*3 ]

  

顔アイコン

Since December 1997, the Electronic Disturbance Theater (EDT) has been conducting Web sit-ins against various sites in support of the Mexican Zapatistas. At a designated time, thousands of protestors point their browsers to a target site using software that floods the target with rapid and repeated download requests. EDT's software has also been used by animal rights groups against organizations said to abuse animals.

2016/11/29(火) 午後 2:50ogw*og*3 ]

  

顔アイコン

Electrohippies, another group of hacktivists, conducted Web sit-ins against the WTO when they met in Seattle in late 1999. These sit-ins all require mass participation to have much effect, and thus are more suited to use by activists than by terrorists.[12]

2016/11/29(火) 午後 2:51ogw*og*3 ]

  

顔アイコン

In 2000, a Japanese Investigation revealed that the government was using software developed by computer companies affiliated with Aum Shinrikyo, the doomsday sect responsible for the sarin gas attack on the Tokyo subway system in 1995. "The government found 100 types of software programs used by at least 10 Japanese government agencies, including the Defense Ministry, and more than 80 major Japanese companies, including Nippon Telegraph and Telephone."[26]

2016/11/29(火) 午後 2:59ogw*og*3 ]

  

顔アイコン

Following the discovery, the Japanese government suspended use of Aum-developed programs out of concern that Aum-related companies may have compromised security by breaching firewalls. gaining access to sensitive systems or information, allowing invasion by outsiders, planting viruses that could be set off later, or planting malicious code that could cripple computer systems and key data system.[27]

2016/11/29(火) 午後 3:00ogw*og*3 ]

  

顔アイコン

In March 2013, the New York Times reported on a pattern of cyber attacks against U.S. financial institutions believed to be instigated by Iran as well as incidents affecting South Korean financial institutions that originate with the North Korean government.[15]

2016/11/29(火) 午後 3:02ogw*og*3 ]

  

顔アイコン

In August 2013, media companies including the New York Times, Twitter and the Huffington Post lost control of some of their websites Tuesday after hackers supporting the Syrian government breached the Australian Internet company that manages many major site addresses.

2016/11/29(火) 午後 3:05ogw*og*3 ]

  

顔アイコン

The Syrian Electronic Army, a hacker group that has previously attacked media organisations that it considers hostile to the regime of Syrian president Bashar al-Assad, claimed credit for the Twitter and Huffington Post hacks in a series of Twitter messages. Electronic records showed that NYTimes.com, the only site with an hours-long outage, redirected visitors to a server controlled by the Syrian group before it went dark.[28]

2016/11/29(火) 午後 3:06ogw*og*3 ]

  

顔アイコン

Pakistani Cyber Army is the name taken by a group of hackers who are known for their defacement of websites, particularly Indian, Chinese, and Israeli companies and governmental organizations, claiming to represent Pakistani nationalist and Islamic interests.[29]

2016/11/29(火) 午後 3:07ogw*og*3 ]

  

顔アイコン

The group is thought to have been active since at least 2008,[30] and maintains an active presence on social media, especially Facebook. Its members have claimed responsibility for the hijacking of websites belonging to Acer,[31] BSNL,[32] India's CBI, Central Bank, and the State Government of Kerala.[33][34]

2016/11/29(火) 午後 3:08ogw*og*3 ]

  

顔アイコン

Sabotage[edit]
Non-political acts of sabotage have caused financial and other damage. In 2000, disgruntled employee Vitek Boden caused the release of 800,000 litres of untreated sewage into waterways in Maroochy Shire, Australia.[35][36]

2016/11/29(火) 午後 3:23ogw*og*3 ]

  

顔アイコン

More recently, in May 2007 Estonia was subjected to a mass cyber-attack in the wake of the removal of a Russian World War II war memorial from downtown Tallinn.

2016/11/29(火) 午後 3:25ogw*og*3 ]

  

顔アイコン

The attack was a distributed denial-of-service attack in which selected sites were bombarded with traffic to force them offline; nearly all Estonian government ministry networks as well as two major Estonian bank networks were knocked offline; in addition, the political party website of Estonia's current Prime Minister Andrus Ansip featured a counterfeit letter of apology from Ansip for removing the memorial statue.

2016/11/29(火) 午後 3:26ogw*og*3 ]

  

顔アイコン

Despite speculation that the attack had been coordinated by the Russian government, Estonia's defense minister admitted he had no conclusive evidence linking cyber attacks to Russian authorities. Russia called accusations of its involvement "unfounded," and neither NATO nor European Commission experts were able to find any conclusive proof of official Russian government participation.[37]

2016/11/29(火) 午後 3:28ogw*og*3 ]

  

顔アイコン

In January 2008 a man from Estonia was convicted for launching the attacks against the Estonian Reform Party website and fined.[38][39]

During the Russia-Georgia War, on 5 August 2008, three days before Georgia launched its invasion of South Ossetia, the websites for OSInform News Agency and OSRadio were hacked.

2016/11/29(火) 午後 3:29ogw*og*3 ]

  

顔アイコン

The OSinform website at osinform.ru kept its header and logo, but its content was replaced by a feed to the Alania TV website content. Alania TV, a Georgian government supported television station aimed at audiences in South Ossetia, denied any involvement in the hacking of the websites. Dmitry Medoyev, at the time the South Ossetian envoy to Moscow, claimed that Georgia was attempting to cover up information on events which occurred in the lead up to the war.[40]

2016/11/29(火) 午後 3:30ogw*og*3 ]

  

顔アイコン

One such cyber attack caused the Parliament of Georgia and Georgian Ministry of Foreign Affairs websites to be replaced by images comparing Georgian president Mikheil Saakashvili to Adolf Hitler.[41] Other attacks involved denials of service to numerous Georgian and Azerbaijani websites,[42] such as when Russian hackers allegedly disabled the servers of the Azerbaijani Day.Az news agency.[43]

2016/11/29(火) 午後 3:31ogw*og*3 ]

  

顔アイコン

Website defacement and denial of service[edit]
Even more recently, in October 2007, the website of Ukrainian president Viktor Yushchenko was attacked by hackers. A radical Russian nationalist youth group, the Eurasian Youth Movement, claimed responsibility.[44][45]

https://en.wikipedia.org/wiki/Cyberterrorism

2016/11/29(火) 午後 3:32ogw*og*3 ]

  

顔アイコン

In 1999 hackers attacked NATO computers. The computers flooded them with email and hit them with a denial of service (DoS). The hackers were protesting against the NATO bombings of the Chinese embassy in Belgrade. Businesses, public organizations and academic institutions were bombarded with highly politicized emails containing viruses from other European countries.[46]

2016/11/29(火) 午後 3:32ogw*og*3 ]

  

顔アイコン

References[edit]
^ Jump up to: a b Matusitz, Jonathan (April 2005). "Cyberterrorism:". American Foreign Policy Interests. 2: 137–147.
Jump up ^ "India Quarterly : a Journal of International Affairs". 42-43. Indian Council of World Affairs. 1986: 122. The difficulty of defining terrorism has led to the cliche that one man's terrorist is another man's freedom fighter

2016/11/29(火) 午後 4:21ogw*og*3 ]

  

顔アイコン

Jump up ^ What is cyberterrorism? Even experts can't agree at the Wayback Machine (archived November 12, 2009). Harvard Law Record. Victoria Baranetsky. November 5, 2009.


"Latest viruses could mean ‘end of world as we know it,’ says man who discovered Flame", The Times of Israel, June 6, 2012
Jump up ^

2016/11/29(火) 午後 4:26ogw*og*3 ]

  

顔アイコン

"Cyber espionage bug attacking Middle East, but Israel untouched — so far", The Times of Israel, June 4, 2013
Jump up ^ Harper, Jim. "There's no such thing as cyber terrorism". RT. Retrieved 5 November 2012.
Jump up

http://oai.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA439217
Jump up ^ White, Kenneth C. (1998). Cyber-terrorism: Modern mayhem. U.S. Army War College. Retrieved 13 March 2015. ^

2016/11/29(火) 午後 4:26ogw*og*3 ]

  

顔アイコン

Cyberterrorism National Conference of State Legislatures.
^ Jump up to: a b Gable, Kelly A. "Cyber-Apocalypse Now: Securing the Internet against Cyberterrorism and Using Universal Jurisdiction as a Deterrent" Vanderbilt Journal of Transnational Law, Vol. 43, No. 1

2016/11/29(火) 午後 4:27ogw*og*3 ]

  

顔アイコン

Anderson, Kent (October 13, 2010). "Virtual Hostage: Cyber terrorism and politically motivated computer crime". The Prague Post. Retrieved 2010-10-14.
^ Jump up to: a b Dorothy E. Denning (May 23, 2000). "Cyberterrorism". cs.georgetown.edu. Archived from the original on March 10, 2014. Retrieved June 19, 2016.
Jump up ^ "Top 10 events that may end the human race". Yahoo News. Oct 27, 2010. Retrieved 2010-11-01.

2016/11/29(火) 午後 4:31ogw*og*3 ]

  

顔アイコン

Costigan, Sean (25 January 2015). "Cyber terrorism must be jointly tackled". Sunday Guardian. Retrieved 12 March 2015.
^ Jump up to: a b Perlroth, Nicole; Sanger, David E. (28 March 2013). "Corporate Cyberattacks, Possibly State-Backed, Now Seek to Destroy Data". The New York Times.
Jump up ^ [1], William L. Tafoya,Ph.D.,"Cyber Terror", FBI Law Enforcement Bulletin (FBI.gov), November 2011

2016/11/29(火) 午後 4:33ogw*og*3 ]

  

顔アイコン

"White House shifts Y2K focus to states, CNN (Feb. 23, 1999)". CNN. 23 February 1999. Retrieved 25 September 2011.
Jump up ^ Chabrow, Eric. Obama Cybersecurity Coordinator Resigns. GovInfoSecurity.com, May 17, 2012. Accessed: Feb. 11, 2014.
Jump up ^ White House Names New Cybersecurity Chief. BreakingGov.com May 17, 2012. Accessed: Feb. 11, 2014.
Jump up ^ McDonald, Ryan.White House Security Chief Warns. Baltimore Biz Journal. January 29, 2014. Access date: Feb. 11, 2014.

2016/11/29(火) 午後 4:34ogw*og*3 ]

  

顔アイコン

Maryann Cusimano Love. (2011). Beyond Sovereignty: Issues for a Global Agenda. Wadsworth, Cengage Learning.
Jump up ^ Yu, Eileen (27 May 2011). "China dispatches online army". ZDNet Asia. Retrieved 3 June 2011. Geng Yansheng, spokesperson for China's Defense Ministry, was quoted to say that the PLA set up the cyberwar unit, or 'cyber blue team', to support its military training and upgrade the army's Internet security defense.

2016/11/29(火) 午後 4:35ogw*og*3 ]

  

顔アイコン

China Confirms Existence of Elite Cyber-Warfare Outfit the 'Blue Army'". Fox News. 26 May 2011. Retrieved 3 June 2011. China set up a specialized online 'Blue Army' unit that it claims will protect the People's Liberation Army from outside attacks, prompting fears that the crack team was being used to infiltrate foreign governments' systems.
Jump up ^ Ayers, Cynthia (September 2009). "The Worst is Yet To Come". Futurist: 49.

2016/11/29(火) 午後 4:36ogw*og*3 ]

  

顔アイコン

Denning, Dorothy (Autumn 2000). "Cyberterrorism: The Logic Bomb versus the Truck Bomb". Global Dialogue. 2 (4). Retrieved 20 August 2014.
Jump up ^ Maryann Cusimano Love, Public-Private Partnerships and Global Problems: Y2K and Cybercrime. Paper Presented at the International Studies Association, Hong Kong, July 2001.
Jump up ^ Calvin Sims, "Japan Software Suppliers Linked to Sect," The New York Times (March 2, 2000): A6.

2016/11/29(火) 午後 4:38ogw*og*3 ]

  

顔アイコン

http://www.thedailystar.net/beta2/news/new-york-times-twitter-hacked-by-syrian-group/
Jump up ^ "Pakistan Cyber Army (PCA) – Hacking Indian Websites, Promoting Pakistani Interests In Cyber Space And Nurturing Pakistani Hackers | The Cyber & Jihad Lab". cjlab.memri.org. Retrieved 2016-05-28.
Jump up ^ "

2016/11/29(火) 午後 4:39ogw*og*3 ]

  

顔アイコン

Debugging the Pakistan Cyber Army: From Pakbugs to Bitterbugs - ThreatConnect | Enterprise Threat Intelligence Platform". ThreatConnect | Enterprise Threat Intelligence Platform. 2014-10-06. Retrieved 2016-05-28.

2016/11/29(火) 午後 4:40ogw*og*3 ]

  

顔アイコン

India; Censorship; China; Japan; Apple; Reg man says '拜拜' to Honkers, ponders Asia's future role in tech world; month, Acer founder Shih to step down for second time next; themselves, Script fools n00b hackers into hacking. "Pakistan Cyber Army declares war on Chinese, Bangladeshi sites". Retrieved 2016-05-28.

2016/11/29(火) 午後 4:41ogw*og*3 ]

  

顔アイコン

Saxena, Anupam (2011-07-28). "BSNL Website Hacked By Pakistan Cyber Army: Report". MediaNama. Retrieved 2016-05-28.
Jump up ^ "Hacked by 'Pakistan cyber army', CBI website still not restored". NDTV.com. Retrieved 2016-05-28.

2016/11/29(火) 午後 5:00ogw*og*3 ]

  

顔アイコン

'Indian websites are more vulnerable to cyber attacks from Pakistan-based hackers on major events' | Latest Tech News, Video & Photo Reviews at BGR India". www.bgr.in. Retrieved 2016-05-28.
Jump up ^ "Malicious Control System Cyber Security Attack Case Study–Maroochy Water Services, Australia" (PDf). csrc.nist.gov.
Jump up ^ "Hacker jailed for reverse sewage". The Register. October 31, 2001.

2016/11/29(火) 午後 5:06ogw*og*3 ]

  

顔アイコン

Estonia has no evidence of Kremlin involvement in cyber attacks
Jump up ^ "Estonia fines man for 'cyber war'". BBC. 2008-01-25. Retrieved 2008-02-23.
Jump up ^ Leyden, John (2008-01-24). "Estonia fines man for DDoS attacks". The Register. Retrieved 2008-02-22.

2016/11/29(火) 午後 5:11ogw*og*3 ]

  

顔アイコン

S.Ossetian News Sites Hacked". Tbilisi: Civil Georgia. 5 August 2008. Retrieved 26 January 2009.
Jump up ^ Wentworth, Travis (12 August 2008). "You've Got Malice: Russian nationalists waged a cyber war against Georgia. Fighting back is virtually impossible.". Newsweek. Retrieved 26 January 2009.
Jump up ^ Markoff, John (13 August 2008). "Before the Gunfire, Cyberattacks". The New York Times. Retrieved 26 January 2009.

2016/11/29(火) 午後 5:12ogw*og*3 ]

  

顔アイコン

Today.az (11 August 2008). Russian intelligence services undertook large scale attack against Day.Az server
Jump up ^ http://news.kievukraine.info/2007/10/russian-nationalists-claim.html
Jump up ^ Russian nationalists claim responsibility for attack on Yushchenko's Web site International Herald Tribune

2016/11/29(火) 午後 5:13ogw*og*3 ]

  

顔アイコン

Hackers attack U.S. government Web sites in protest of Chinese embassy bombing". CNN. Retrieved 2010-04-30. (See also Chinese embassy bombing)

https://en.wikipedia.org/wiki/Cyberterrorism

2016/11/29(火) 午後 5:15ogw*og*3 ]

  

顔アイコン

サイエンスミュージアムネット
science-net.kahaku.go.jp/
サイエンスミュージアムネットは、全国の科学系博物館の情報や、自然史系の標本に関する情報を検索できるポータルサイトです。一般の方や研究者の方が共にご利用いただける、情報を横断的に検索できるシステムです。
研究員・学芸員検索 · このサイトについて · 協力博物館・科学館・大学一覧 · 検索

2017/4/16(日) 午前 10:30ogw*og*3 ]

 

 

トラックバックされた記事

  
Cyber Attack:SWIFT:

Cyber Attack:SWIFT: ロシアの銀行、サイバー攻撃などで21億7千万円被害  2017年に、ロシアの銀行がサイバー攻撃などによりおよそ21億7000万円が盗み取られる被害にあったことが明らかになりました。  ロシア中央銀行によりますと、2017年、ハッカーによるサイバー攻撃などの不正な資金の取引により、ロシアの銀行でおよそ21億7000万円が盗みとられたということです。  中でも、海外の銀行間の送金などで巨額の取引を行う決済システム「SWIFT」もサイバー

2018/2/20(火) 午前 7:11 [ CQF ]

トラックバック先の記事