x

x

La geopolitica dei cyber attacchi – Ransomware e nuove forme di rischio e violenza

The Geopolitics of cyber attacks - Ransomware and new forms of risk and violence
Cacciatore di attimi
Ph. Ermes Galli / Cacciatore di attimi
Continua a leggere l’articolo, accedi o abbonati a Filodiritto.

Abbonati per avere accesso illimitato a tutti i contenuti Premium.

Sei già abbonato? Effettua il Login.

Bibliografia

  1. CHIAPPETTA A., The cybersecurity impacts on geopolitics, 2019, pp. 61-74.
  2. AMBINDER M., Americas new war on terror has gone digital, MSNBC, 2021.

  3. BEAMAN C., Barkworth A., Akande T.D., Hakak S., Khan M.K., Ransomware: Recent advances, analysis, challenges and future research directions, Comput Secur, 2021.

  4. BIEDA D. & HALAWI L., Cyberspace: A Venue for Terrorism, Issues in Information Systems, Vol. 16, Issue III: Embry-Riddle Aeronautical University, 2015.

  5. BROADHEAD S., The Contemporary Cybercrime Ecosystem: A Multi-Disciplinary Overview of the State of Affairs and Developments, Computer Law & Security Review: The International Journal of Technology Law and Practice, 2021.

  6. CHABOT H., Ransomware attacks are on the rise. How worried should we be?, News Northeastern, 2021.

  7. CONNOLLY Y., WALL A & D, The Rise of Crypto-Ransomware in a Changing Cybercrime Landscape: Taxonomising Countermeasures. Computers & Security, 2019, 87.

  8. CORAGGIO G., Attacco hacker, per la Regione Lazio oltre al danno la beffa? Riflettori sul rispetto del GDPR, CorriereComunicazioni, 2021.

  9. Cyberterrorism and Ransomware Attacks, United States: Greenhaven Publishing, 2018.

  10. DAVID B., #BHEU: Ransomware is The New Terrorism, Contends Cyber Expert, infosecurity Group, 2021.

  11. DI CORINTO A., Il cybercrime è la terza economia mondiale. “10 milioni di danni dal secondo”, Italian.tech, 2021.

  12. DICKESON L., “When Does a Cyber Crime Become an Act of Cyber Warfare”, Theses/Capstones/ Creative Projects, 2021, 138.

  13. FERRARO M.F., Ransomware attacks are about to get worse. But there are ways to stop them, CNN Business, 2021.

  14. FIRSTENBERG M., Lessons from 2020: Defeating Targeted Ransomware Attacks at Industrial Sites, Waterfall Security Solutions, 2020.

  15. FOWLER M., The elevation of cyber-crime to terrorism threat status, Darktrace Blog, 2021.

  16. GIANTAS D. & STERGIOU D., From Terrorism to Cyber-Terrorism: The Case of ISIS, SSRN Electronic Journal, 2018.

  17. HAYES K., Ransomware: a growing geopolitical threat. Network Security, 2021, pp. 11-13.

  18. HOUGH P., Understanding Global Security, 2nd Edition, London: Routledge Taylor and Francis Group, 2018.

  19. JEFFERY L., RAMACHANDRAN V., Why ransomware attacks are on the rise and what can be done to stop them, PBS News Hour, 2021.

  20. JOHNSON T., Biden Administration Responds to Geopolitical Cyber Threats, Darkreading, 2021.

  21. JUN J., Opinion | Could Ransomware Become a Geopolitical Weapon? Game Theory Says Yes., Politico, 2021.

  22. JUN J., The Political Economy of Ransomware, War on the Rocks, 2021.

  23. KALAIMANNAN E., SHARON J.K., DUBOSE T. & PINTO A., Influences on ransomwares evolution and predictions for the future challenges, Journal of Cyber Security Technology, 2017.

  24. KAPLAN A., WEIMANN G., Freedom and Terror: Reason and Unreason in Politics, Taylor & Francis, 2011.

  25. KISER S., BALASUNDRAM M., Ransomware: Healthcare Industry at Risk – Journal of Business and Accounting Vol. 4, No. 1, Sam Houston State University, 2021.

  26. LEFFERTS R., An Adaptive Security Strategy Is Critical for Stopping Advanced Attacks, Darkreading, 2021.

  27. MACDONALD S., JARVIS L. & NOURI L., State Cyberterrorism: A Contradiction in Terms?. Journal of Terrorism Research, 6(3), 62-75, 2015.

  28. MARTINO A., CARILE E., I pericoli del ransomware e le indicazioni dellAutorità antiriciclaggio U.S.A. (FinCEN), DirittoBancario, 2020.

  29. MAURYA & KUMAR A.K., NEERAJ & AGRAWAL, ALKA & KHAN, Prof. RAEES, Ransomware Evolution, Target and Safety Measures, International Journal of Computer Sciences and Engineering, 2018, pp. 80-85.

  30. MOHANTA A., VELMURUGAN K., HAHAD M., Preventing Ransomware: Understand, Prevent, and Remediate Ransomware Attacks, United Kingdom: Packt Publishing, 2018

  31. MORRISON S., What you need to know about ransomware and the future of cyberattacks, Vox, 2021.

  32. NAI FOVINO I., BARRY G., CHAUDRON S., COISEL I., DEWAR M., JUNKLEWITZ H., KAMBOURAKIS G., KOUNELIS I., MORTARA B., NORDVIK J.P., SANCHEZ I., BALDINI G., BARRERO G., COISEL I., DRAPER G., DUCH-BROWN N., EULAERTS O., GENEIATAKIS D., JOANNY G., KERCKHOF S., LEWIS A., MARTIN T., NATIVI S., NEISSE R., PAPAMELETIOU D., RAMOS J., REINA V., RUZZANTE G., SPORTIELLO L., STERI G., TIRENDI S., Cybersecurity: our digital anchor, Publications Office of the European Union, Luxembourg, 2020.

  33. Quointellgence, The Importance of Geopolitics for Cyber Threat Intelligence, Blog, 2020.

  34. Quointelligence, Why Geopolitics is Integral to Cyber Threat Intelligence, Blog, 2020.

  35. RAMADHAN I., Cyber-Terrorism in the Context of Proselytizing, Coordination, Security, and Mobility, International Relations Department of Universitas Pertamina, Islamic World and Politics, Vol. 4, No. 2, 2020.

  36. RASHID F.Y., Why Classifying Ransomware as a National Security Threat Matters, Darkreading, 2021.

  37. ROTTIGNI M., GABRINI D., Webinar: Cyber crime, Data Breaches e GDPR: indicazioni pratiche su come far evolvere la gestione del cyber risk, The Innovation Group, 2017.

  38. SZÜCS V., ARÁNYI G., DÁVID A., Introduction of the ARDS - Anti-Ransomware Defense System Model - Based on the Systematic Review of Worldwide Ransomware Attacks, Department of Electrical Engineering and Information Systems, University of Pannonia, 2021.

  39. The Manufacturer, Why manufacturers need to take ransomware and cybersecurity threats very seriously, Partner content, 2021.

  40. Thompson Reuters, Ransomware attacks highlight need for strong cyber security efforts in APAC, 2021.

  41. Trend Micro Research, “Securing the Pandemic-Disrupted Workplace”, report sulle minacce informatiche del primo semestre, 2020.

  42. Trend Micro Research, “Report on Threats Affecting ICS Endpoints”, report sui sistemi di controllo industriali, 2020/21.

  43. VILLEDIEU A.L., Ransomware attack: Can we negotiate with cybercriminals? An endemic phenomenon with exponential growth, CMS (Article published in French in Option Finance on 19/04), 2021.

  44. WALL D.S., 2021, The Transnational Cybercrime Extortion Landscape and the Pandemic, European Law Enforcement Research Bulletin, 2021.

  45. WALL D.S., The Internet as a Conduit for Criminals, Information Technology and the Criminal Justice System, 2005/15, pp. 77-98.

  46. WEIMANN G., How Modern Terrorism Uses the Internet, Washington, United States Institute of Peace, 2004.

  47. WEIMANN G., Cyberterrorism: How Real is the Threat?, United States, United States Institute of Peace, 2004.

  48. WEIMANN G., Terrorism in Cyberspace: The Next Generation, United States, Woodrow Wilson Center Press, 2015.

  49. WESTBROOK A., A Safe Harbor for Ransomware Payments: Protecting Stakeholders, Hardening Targets, and Defending National Security, 2021.

  50. YUCHONG L., QINGHUI L., A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments, Energy Reports, Volume 7, 2021.

  51. ZERZRI M., The Threat of Cyber-terrorism and Recommendations for Countermeasures, Center for Applied Policy Research, 2017.