Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
3.7 References
Derived in part from a letter by Severo M. Ornstein, in the Communications of the ACM, Vol 32 No 6, June 1989.)
Virus Writer Christopher Pile (Black Barron) Sent to Jail for 18 Months Wednesday 15 November 1995. http://www.gps.jussieu.fr/comp/VirusWriter.html
Hopper, Ian. “Destructive ‘I LOVE YOU’ Computer virus strikes worldwide”. CNN Interactive Technology. http://www.cnn.com/2000/TECH/computing/05/04/iloveyou/.
“Former student: Bug may have been spread accidentally”. CNN Interactive. http://www.cnn.com/2000/ASIANOWsoutheast/05/11/iloveyou.02/
“Is IT Safe?”. InfoTrac. Tennessee Electronic Library. HP Professional, Dec 1997 Vol 1, No. 12, pg 14–20.
“”Insider Abuse of Information is Biggest Security Threat, SafeCop Says”. InfoTrac. Tennessee Electronic Library. Business Wire. Nov. 0, 2000, pg 1.
Hollows, Phil. “Security Threat Correlation: The Next Battlefield”. eSecurityPlanetcom. http://www.esecurityplanet.com/views/article.php/10752_1501001.
“Battling the Net Security Threat,” Saturday, 9 November, 2002, 08:15 GMT, http://news.bbc.co.uk/2/hi/technology/2386113.stm.
“National Security Threat List”. http://rf-web.tamu.edu/security/SECGUIDE/T1threat/Nstl.htm
“CERT® Advisory CA-2001-19 "Code Red" Worm Exploiting Buffer Overflow In IIS Indexing Service DLL.” http://www.cert.org/advisories/CA-2001-19.html
Rutkowski, Tony. “Internet Survey reaches 109 million host level”. Center for Next Generation Internet. http://www.ngi.org/trends/TrendsPR0102.txt
G-Lock Software. “TCP and UDP port scanning examples.” http://www.glocksoft.com/tcpudpscan.htm
“Awareness of National Security Issues and Response [ANSIR]”. FBI's Intelligence Resource Program. http://www.fas.org/irp/ops/ci/ansir.htm
Andrew Grosso. “The Economic Espionage ACT: Touring the Minefields”. Communications of the ACM, August 2000, 43(8), 15–18.
“ThreatManager ™ — The Real-Time Security Threat Management Suite”. http://www.open.com/responsenetworks/products/threatmanager/threatmanager.htm?ISR1
Department of Homeland Security. http://www.dohs.gov/
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
(2005). Security Threats to Computer Networks. In: Computer Network Security. Springer, Boston, MA. https://doi.org/10.1007/0-387-25228-2_3
Download citation
DOI: https://doi.org/10.1007/0-387-25228-2_3
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-20473-4
Online ISBN: 978-0-387-25228-5
eBook Packages: Computer ScienceComputer Science (R0)