http://news.yahoo.com/hackers-may-used-pa-company-hit-target-195942337.html. 7 February 2014. 11 February 2014. Hendler, James. http://www.scientificamerican.com/article/its-times-reform-computer-fraud-abuse-act/.
30 Jan. 2014. Web. 19 Feb. 2014. Erickson, Jo. "Hacker Statistics for 2013: Daily Hacking Occurrences with Major Infrastructures Vulnerable."
This requires an ongoing attention to protect sensitive business and personal information, as well as safeguard national security. In March 2013, the intelligence officials believed cyber-attacks and digital spying are the highest threat to national security. Unauthorized movement or disclosure of sensitive information to a party that is not authorized to have or see the sensitive information is known as data breaching. Between January 2005 and May 2008, there were a total of 227,052,199 records containing sensitive personal information that was involved in security breaches in the United States, according to the nonprofit consumer organization Privacy Rights Clearinghouse. Operation Aurora was first publicly disclosed by Google on January 12, 2010.
“Customer service lines for the company’s own Target Redcard credit cards were in gridlock.” (Burg, 2014) This means that they weren’t evening addressing the cust... ... middle of paper ... ...-million-passwords-reset/ Jamieson, A., & Erin, M. (2013, December 19 ). Millions of Target customers' credit,debit card accounts may be hit by data breach . Retrieved from NBC News: http://www.nbcnews.com/#/business/consumer/millions-target-customers-credit-debit-card-accounts-may-be-hit-f2D11775203 Johnson, K. (2013, May 6). LivingSocial Reveals Cyber-Attack, Notifies 50 Milion, Says No Credit Data Breached. Retrieved from Bloomberg:BNA: http://www.bna.com/livingsocial-reveals-cyberattack-n17179873787/ Wagenseil, P. (2013, March 4).
Available at: [Accessed 21 May 2014]. • Wolak J., et al. (2009). Online “Predators” and Their Victims: Myths, Realities, and Implications for Prevention and Treatment. American Psychologist, 2008;63, 116-118
US Plunges in World Press Freedom Index after NSA Leaks, Attacks on Whistleblowers - RT News. N.p., n.d. Web. 08 Apr. 2014.
Hutcheon, S 2014, “'Dynamite': web inventor warns about dangers of government snooping”, The Sydney Morning Herald, 29 2013, viewed 28th Mar. 14, 9. Kumar, M 2014, “Google Public DNS Server Traffic Hijacked, The Hacker News”, 16th 2014, viewed 28 Mar. 14,
24 September 2013. http://www.motherjones.com/kevin-drum/2013/09/somebody-stole-7-milliseconds-federal-reserve. 16 April 2014. Greenwald, Glenn. How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations. 24 February 2014. https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/.
30 Apr. 2014. . ZHENGCHUAN, XU, HU QING, and ZHANG CHENGHONG. "Why Computer Talents Become Computer Hackers." Communications Of The ACM 56.4 (2013): 64-74.