1. R. Y. Fahmida, “GM’s OnStar, Ford Sync, MP3, Bluetooth Possible Attack Vectors for Cars”, e-week.com, IT Security & Network Security News, March 16, 2011 last accessed on July 22, 2012 at
http://www.eweek.com/c/a/Security/GMs-OnStar-Ford-Sync-MP3-Bluetooth-Possible-Attack-Vectors-for-Cars-420601/
.
2. Al Arabiya with Agencies, “Iran denies role in cyberattacks against Gulf oil and gas companies”, Al Arabiya News, Sunday, October 14, 2012 last accessed October 16, 2012 at
http://english.alarabiya.net/articles/2012/10/14/243682.html
.
3. S. Gorman, “Electricity Grid in U.S. Penetrated By Spies”, Wall Street Journal, Technology, April 4, 2009 last accessed on October 17, 2012 at
http://online.wsj.com/article/SB123914805204099085.html
.
4. Executive Order 13010—Critical Infrastructure Protection, Federal Register, July 17, 1996. Vol. 61, No. 138. in Critical Infrastructure and Key Assets: Definition and Identification, CRS Report for Congress, October 1, 2004 last accessed October 16, 2012
http://www.fas.org/sgp/crs/RL32631.pdf
.
5. Sharing Information with the Private Sector, The White House, George W. Bush, n.d. last accessed October 16, 2012 at
http://georgewbush-whitehouse.archives.gov/nsc/infosharing/sectionV.html
.