The text of this article is only available as a PDF.

References

ACLU
.
2018
. “
Stingray Tracking Devices: Who’s Got Them
.”
American Civil Liberties Union
. .
Anderson, Tim.
2019
. “
Allowlist, Not Whitelist. Blocklist, Not Blacklist. Goodbye, wtf. Microsoft Scans Chromium Code, Lops Off Offensive Words
.”
The Register
,
Sept.
3
,
2019
. .
Asturias, Diego.
2021
. “
The Most Notorious DDoS Attacks in History—2021 Update
.”
Cloudbric
,
Apr.
21
,
2021
. .
Ball, Molly.
2021
. “
The Secret History of the Shadow Campaign That Saved the 2020 Election
.”
Time
,
Feb.
4
,
2021
. .
Bartholomew, Brian; Guerrero-Saade, Juan Andrés.
2016
. “
Wave Your False Flags! Deception Tactics Muddying Attribution in Targeted Attacks
.”
Virus Bulletin
,
Nov.
2016
. .
Bellovin, Steven M.; Merritt, Michael.
1992
. “
Encrypted Key Exchange: Password-Based Protocols Secure against Dictionary Attacks
.” In
Proceedings 1992 IEEE Symposium on Research in Security and Privacy
,
72
84
. .
Bluetooth SIG, Inc
.
n.d
. “
Origin of the Bluetooth Name
.” Accessed Dec. 12, 2021. .
Boyko, Greg (Warp); Fraizer (Shlonglor), Geoff.
1996
. “
The Smurfs vs Spiderman(Zima), Red Barron, and Void(idiot)
.”
Shlonglor Presents: The Original War 2 Story Page
,
Mar.
8
,
1996
. .
Cantor, Matthew.
2021
. “
Cryptographers Are Not Happy with How You’re Using the Word ‘Crypto’
.”
The Guardian
,
Nov.
18
,
2021
. .
Conti, Mauro; Dragoni, Nicola; Lesyk, Viktor.
2016
. “
A Survey of Man in the Middle Attacks
.” In
IEEE Communications Surveys and Tutorials
18
, no.
3
:
2027
51
. .
CVE
.
n.d
. “
tomcat
” (search results).
CVE Project
. Accessed Dec. 15, 2021. .
Daniel, Brett.
2021
. “
System Hardening: An Easy-t0-Understand Overview
.”
Trenton Systems Blog
,
Apr.
14
,
2021
. .
DarkAlman
.
2020
. “
Why Aren’t Thin Client’s More Popular?
r/sysadmin
,
Aug.
22
,
2020
. .
Debouver, Lucie.
2021
. “
5 Ways to Maximise Hacker Participation in Your Bug Bounty Program
.”
Intigriti
,
Aug.
2
,
2021
. .
DeMillo, Richard; Merritt, Michael.
1983
. “
Protocols for Data Security
.”
Computer
16
, no.
2
(
Mar.
):
39
51
. .
Diffie, Whitfield; Hellman, Martin E..
1977
. “
Exhaustive Cryptanalysis of the NBS Data Encryption Standard
.”
Computer
10
, no.
6
(
June
):
74
84
. .
Dooley, Kevin.
2021
. “
The Pros and Cons of VPN Split Tunneling
.”
Auvik
,
Jan.
12
,
2021
. .
Finjan Team
.
2018
. “
How Honeytokens Are Used to Track Cybercriminals
.”
Finjan Blog
,
May
14
,
2018
. .
Geller, Eric.
2020
. “
Agency to End Use of Technology Terms such as ‘Master’ and ‘Slave’ over Racist Associations
.”
Politico
,
June
25
,
2020
. .
Gillis, Alexander S.
2020
. “
thick client (fat client)
.”
TechTarget
,
Apr.
2020
. .
Graham, James, ed.
2009
.
Cyber Fraud: Tactics, Techniques, and Procedures
.
Boca Raton, Fla.
:
CRC Press
.
Hale, Constance; Scanlon, Jessie.
1999
.
Wired Style: Principle of English Usage in the Digital Age
.
New York
:
Broadway Books
.
Hargreaves, Amy; Chamberlain, James.
2018
. “
The Roles of Red, Blue and Purple Teams
.”
Insights
(blog),
Apr.
24
,
2018
. .
Harken, Harold DallasIII.
1989
. “
An Expert System for Automating Nuclear Strike Aircraft Replacement, Aircraft Beddown, and Logistics Movement for the Theater Warfare Exercise
.”
Master’s thesis
,
Air Force Institute of Technology
. .
Hertzfeld, Andy.
2005
.
Revolution in the Valley: The Insanely Great Story of How the Mac Was Made
.
Sebastopol, Calif.
:
O’Reilly
.
Hicks, C. Dennis.
1983
. “
Voice Teleconferencing—A Wide Variety of Demanding Transmission and Control Solutions
.” In
Proceedings 3: 1983 IEEE Miliary Communications Conference
,
608
14
. .
Hohman, Maura.
2021
. “
True Life: I’m a Millennial and I Don’t Know Most of the New Words Merriam-Webster Just Added
.”
LX (NBC Universal)
,
Oct.
28
,
2021
. .
Hunt, Edward.
2012
. “
US Government Computer Penetration Programs and the Implications for Cyberwar
.”
IEEE Annals of the History of Computing
34
, no.
3
(
July–Sept.
):
4
21
. .
Hunter and Ready Inc
.
1983
. “
Get a Bug If You Find a Bug
” (advertisement).
Computer Design
,
Aug.
1983
,
183
. .
Iarchy, Roy.
2018
. “
iOS Trustjacking—A Dangerous New iOS Vulnerability
.”
Symantec Enterprise Blogs
,
Apr.
18
,
2018
. .
Johnson, Josh.
n.d
. “
SEC586: Blue Team Operations: Defensive PowerShell
” (
course description
).
SANS Institute
. .
Kan, Michael.
2020
. “
Apple to Remove ‘Master/Slave’ and ‘Blacklist’ Terms from Coding Platforms
.”
PC Magazine
,
July
17
,
2020
. .
Knoxville News-Sentinel
.
1936
. “
Dempster-Made Ashe Cans Tried
.”
Nov.
11
,
1936
,
19
.
Loshin, Peter.
1998
.
Personal Encryption Clearly Explained
.
San Diego, Calif.
:
AP Professional
.
McCargo, Herman.
2020
. “
How to Hire a Server Hardening IT Consultant to Improve Security
.” ,
Aug.
29
,
2020
. .
Miller, Barton.
2018
.
Foreword to Fuzzing for Software Security Testing and Quality Assurance, by Ari Takanen, Jared DeMott, Charlie Miller, and Atte Kettunen
,
xv
xvi
. 2nd ed.
Boston
:
Artech
.
Mills, C. Wright.
1958
. “
Man in the Middle: The Designer
.”
Industrial Design
,
Nov.
1958
.
Reprinted in Power, Politics and People: The Collected Essays of C. Wright Mills, edited by Irving Louis Horowitz, 374–86. New York: Ballantine, 1961
.
NIST
.
2016
. “
Back to Basics: What’s Multi-Factor Authentication—and Why Should I Care?
Cybersecurity Insights
(blog),
June
16
,
2016
.
National Institute of Standards and Technology
. .
OWASP
.
2021
. “
Top 10
.”
Open Web Application Security Project
. .
Paar, Christof; Pelzl, Jan.
2009
.
Understanding Cryptography: A Textbook for Students and Practitioners
.
Berlin
:
Springer
.
Pete (@oldmanpete)
.
2017
. “
Blue Team Fundamentals
.”
SecurityBytes
,
Feb.
15
,
2017
. .
Raymond, Eric, ed.
2003
. “
snarf
.”
Jargon File
. .
Rosenblatt, Seth.
2016
. “
Bug Bounties Break Out beyond Tech
.”
The Parallax View
,
Mar.
4
,
2016
. .
Tan, Ricky.
2020
. “
What’s It Like as a Red Team Operator? (w/Chris M.)
.”
Cyberstatial (channel)
. .
TechTarget
.
n.d
. “
red teaming
.” Accessed Dec. 15, 2021. .
Emma, W..
2020
. “
Terminology: It’s Not Black and White
.”
National Cyber Security Centre
,
Apr.
30
,
2020
. .
Ware, Willis H.
1967
. “
Security and Privacy in Computer Systems
.”
RAND P-3544
,
Apr.
1967
. .
Zimmer, Ben.
2013
. “
‘Cyber’ Dons a Uniform
.”
Wall Street Journal
,
June
28
,
2013
. .
Zimmer, Ben.
2016
. “
Encryption, From Nazis to iPhones
.”
Wall Street Journal
,
Mar.
18
,
2016
.
831
2000
.
Zimmer, Ben.
2020
. “
‘Mole’: John le Carré’s Fiction Burrows Its Way Into the Real World
.”
Wall Street Journal
,
Dec.
17
,
2020
. .
Zimmer, Ben.
2021a
. “
‘Crypto’: Hidden From View, Yet on Everyone’s Lips
.”
Wall Street Journal
,
Feb.
18
,
2021
. .
Zimmer, Ben.
2021b
. “
‘Hijacking’: From the Theft of Bootleg Liquor to Taking Jets in Flight
.”
Wall Street Journal
,
May
28
,
2021
. .
Zwicky, Arnold.
2010
. “
Libfixes
.”
Arnold Zwicky’s Blog
,
Jan.
28
,
2010
. .

Article PDF first page preview

Article PDF first page preview

Supplementary data