Advertisement

Security Motives and Threats to Computer Networks

  • Joseph Migga Kizza
Chapter
Part of the Computer Communications and Networks book series (CCN)

Abstract

In February, 2002, the Internet security watch group CERT Coordination Center first disclosed to the global audience that global networks, including the Internet, phone systems, and the electrical power grid, are vulnerable to attack because of weakness in programming in a small but key network component. The component, an Abstract Syntax Notation One, or ASN.1, is a communication protocol used widely in the Simple Network Management Protocol (SNMP).

Keywords

Security Threat Social Engineering Forensic Analysis Computer Virus Simple Network Management Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    G-Lock Software. TCP and UDP port scanning examples. http://www.glocksoft.com/tcpudpscan.htm
  2. 2.
    Rutkowski T, Internet survey reaches 109 million host level. Center for next generation internet. http://www.ngi.org/trends/TrendsPR0102.txt
  3. 3.
    Battling the net security threat, Saturday, 9 Nov 2002, 08:15 GMT. http://news.bbc.co.uk/2/hi/technology/2386113.stm
  4. 4.
    Derived in part from a letter by Severo M. Ornstein, Commun ACM, June 1989, 32 (6)Google Scholar
  5. 5.
    Virus writer Christopher Pile (Black Barron) sent to jail for 18 Months Wednesday 15 November 1995. http://www.gps.jussieu.fr/comp/VirusWriter.html
  6. 6.
    Hopper I Destructive ‘I LOVE YOU’ Computer virus strikes worldwide. CNN Interactive Technology. http://www.cnn.com/2000/TECH/computing/05/04/iloveyou/
  7. 7.
    Former student: bug may have been spread accidentally. CNN Interactive. http://www.cnn.com/2000/ASIANOWsoutheast/05/11/iloveyou.02/
  8. 8.
  9. 9.
    CERT® Advisory CA-2001–19 ‘Code Red’ Worm exploiting buffer overflow In IIS indexing service DLL. http://www.cert.org/advisories/CA-2001–19.html
  10. 10.
    “Is IT Safe?” InfoTrac. Tennessee electronic library. HP Professional, December 1997, 1(12), 14–20Google Scholar
  11. 11.
    Insider abuse of information is biggest security threat, SafeCop says. InfoTrac. Tennessee electronic library. Business wire. 10 Nov 2000, p 1Google Scholar
  12. 12.
    Hollows P, Security threat correlation: the next battlefield. eSecurityPlanetcom. http://www.esecurityplanet.com/views/article.php/10752_1501001
  13. 13.
    Awareness of National Security Issues and Response [ANSIR]. FBI’s Intelligence resource program. http://www.fas.org/irp/ops/ci/ansir.htm
  14. 14.
    Grosso A (2000) The economic espionage ACT: touring the minefields. Commun ACM 43(8):15–18CrossRefGoogle Scholar
  15. 15.
    ThreatManager™ – the real-time security threat management suite. http://www.open.com/responsenetworks/products/threatmanager/threatmanager.htm?ISR1
  16. 16.
    Department of homeland security. http://www.dohs.gov/

Copyright information

© Springer-Verlag London 2015

Authors and Affiliations

  • Joseph Migga Kizza
    • 1
  1. 1.Department of Computer ScienceUniversity of TennesseeChattanoogaUSA

Personalised recommendations