Terorisme siber: Perbedaan antara revisi

Konten dihapus Konten ditambahkan
k bentuk baku
InternetArchiveBot (bicara | kontrib)
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0.9.3
 
(7 revisi perantara oleh 4 pengguna tidak ditampilkan)
Baris 30:
 
== Bacaan lebih lanjut ==
* {{cite book | author=Alexander, Yonah Swetman, Michael S. | title=Cyber Terrorism and Information Warfare: Threats and Responses | url=https://archive.org/details/cyberterrorismin0000unse | publisher=Transnational Publishers Inc.,U.S. | year=2001 | isbn=1-57105-225-9}}
* Bibi van Ginkel, [http://www.icct.nl/publications/icct-commentaries/the-internet-as-hiding-place-of-jihadi-extremists "The Internet as Hiding Place of Jihadi Extremists" (International Centre for Counter-Terrorism – The Hague, 2012)] {{Webarchive|url=https://web.archive.org/web/20141029203936/http://www.icct.nl/publications/icct-commentaries/the-internet-as-hiding-place-of-jihadi-extremists |date=2014-10-29 }}
* {{cite book | author=Colarik, Andrew M. | title=Cyber Terrorism: Political and Economic Implications | publisher=Idea Group, U.S. | year=2006 | isbn=1-59904-022-0}}
* {{cite journal | last1 = Hansen | first1 = James V. | last2 = Benjamin Lowry | first2 = Paul | last3 = Meservy | first3 = Rayman | last4 = McDonald | first4 = Dan | year = 2007 | title = Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection | ssrn = 877981 | journal = Decision Support Systems | volume = 43 | issue = 4| pages = 1362–1374 | doi = 10.1016/j.dss.2006.04.004 }}
* {{cite book | author=Verton, Dan | title=Black Ice: The Invisible Threat of Cyber-terrorism | url=https://archive.org/details/blackiceinvisibl0000vert | publisher=Osborne/McGraw-Hill, U.S. | year=2003 | isbn=0-07-222787-7}}
* {{cite book | author=Weimann, Gabriel | title=Terror on the Internet: The New Arena, the New Challenges | url=https://archive.org/details/terroroninternet00weim | publisher=United States Institute of Peace, U.S. | year=2006 | isbn=1-929223-71-4}}
* {{cite web |last=Blau |first= John |date=November 2004 |title=The battle against cyberterror |work=NetworkWorld |accessdate=March 20, 2005 |url=http://www.nwfusion.com/supp/2004/cybercrime/112904terror.html}}
* {{cite web |last=Gross |first= Grant |date=Nov 2003 |title=Cyberterrorist attack would be more sophisticated that past worms, expert says |publisher=ComputerWorld |accessdate=March 17, 2005 |url=http://www.computerworld.com/securitytopics/security/story/0,10801,86857,00.html}}
Baris 42:
* U.S. Army Cyber Operations and Cyber Terrorism Handbook 1.02
* {{cite web |last=Rayamajhi |first=shreedeep |date= 2009 |title=Research Paper -A Synopsis on Cyber Terrorism and Warfare |publisher= Scribd |accessdate= |url=https://www.scribd.com/document/24366844/Research-Paper-A-Synopsis-on-Cyber-Terrorism-and-Warfare-by-Shreedeep-Rayamajhi}}
* {{cite book| title=Cyberterrorism| url=https://archive.org/details/cyberterrorism0000chin| author=Jacqueline Ching| publisher=Rosen Pub Group| year=2010| isbn=1-4358-8532-5}}
* Rolón, Darío N., (2013) [http://de.scribd.com/doc/215756732/Dario-N-Rolon-Vigilancia-informatica-y-responsabilidad-penal-de-proveedores-de-internet Control, vigilancia y respuesta penal en el ciberespacio], Latinamerican´s new security thinking, Clacso.
* {{cite book|last1=Costigan|first1=Sean|title=Cyberspaces and Global Affairs|date=2012|publisher=Ashgate|isbn=978-1-4094-2754-4|url=http://www.ashgate.com/isbn/9781409427544|access-date=2017-07-02|archive-date=2015-04-02|archive-url=https://web.archive.org/web/20150402101032/http://www.ashgate.com/isbn/9781409427544|dead-url=yes}}
 
== Pranala luar ==
Baris 50:
=== Umum ===
* [https://fas.org/irp/crs/RL32114.pdf CRS Report for Congress – Computer Attack and Cyber Terrorism] – 17/10/03
* [http://antivirus.about.com/library/weekly/aa090502a.htm Cyber-Terrorism: Propaganda or Probability?] {{Webarchive|url=https://web.archive.org/web/20110724183823/http://antivirus.about.com/library/weekly/aa090502a.htm |date=2011-07-24 }}
* [http://www.abc.net.au/rn/scienceshow/stories/2007/1885902.htm#transcript How terrorists use the Internet] Wawancara ABC Australia dengan Profesor [[Hsinchun Chen]]
* [http://www.dc3.mil Department of Defense Cyber Crime Center]
* [http://www.defcon.org defcon.org] {{Webarchive|url=https://web.archive.org/web/20190928033849/https://www.defcon.org/ |date=2019-09-28 }}
* [http://www.racd.org/ RedShield Association- Cyber Defense] {{Webarchive|url=https://web.archive.org/web/20170623014516/http://racd.org/ |date=2017-06-23 }}
* Cyber Infrastructure Protection – Strategic Studies Institute
* [http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubID=1067 strategicstudiesinstitute.army.mil]
Baris 61:
 
=== Berita ===
* [https://www.fbi.gov/news/stories/2014/october/cyber-security-task-force-takes-whole-government-approach/ Cyber Security Task Force Takes ‘Whole Government’ Approach] {{Webarchive|url=https://web.archive.org/web/20160602221423/https://www.fbi.gov/news/stories/2014/october/cyber-security-task-force-takes-whole-government-approach |date=2016-06-02 }} [[FBI]], 20 Oktober 2014
* [http://news.bbc.co.uk/1/hi/world/americas/6197446.stm BBC News – US warns of al-Qaeda cyber threat] – 01/12/06
* [http://news.bbc.co.uk/1/hi/technology/2850541.stm BBC News – Cyber terrorism 'overhyped'] – 14/03/03
Baris 67:
{{Authority control}}
 
{{DEFAULTSORT:siber, Terorisme}}
[[Kategori:Perang dunia maya]]
[[Kategori:Kejahatan dunia maya]]
[[Kategori:Terorisme menurut metode]]
[[Kategori:Serangan dunia maya]]
 
 
{{ti-stub}}