Abstract
In February, 2002, the Internet security watch group CERT Coordination Center first disclosed to the global audience that global networks, including the Internet, phone systems, and the electrical power grid, are vulnerable to attack because of weakness in programming in a small but key network component. The component, an Abstract Syntax Notation One, or ASN.1, is a communication protocol used widely in the Simple Network Management Protocol (SNMP).
Notes
- 1.
Lemos, Rob. “Code Red: Virulent worm calls into doubt our ability to protect the Net,” CNET News.com, July 27, 2001.
References
G-Lock Software. TCP and UDP port scanning examples. http://www.glocksoft.com/tcpudpscan.htm
Rutkowski T, Internet survey reaches 109 million host level. Center for next generation internet. http://www.ngi.org/trends/TrendsPR0102.txt
Battling the net security threat, Saturday, 9 Nov 2002, 08:15 GMT. http://news.bbc.co.uk/2/hi/technology/2386113.stm
Derived in part from a letter by Severo M. Ornstein, Commun ACM, June 1989, 32 (6)
Virus writer Christopher Pile (Black Barron) sent to jail for 18 Months Wednesday 15 November 1995. http://www.gps.jussieu.fr/comp/VirusWriter.html
Hopper I Destructive ‘I LOVE YOU’ Computer virus strikes worldwide. CNN Interactive Technology. http://www.cnn.com/2000/TECH/computing/05/04/iloveyou/
Former student: bug may have been spread accidentally. CNN Interactive. http://www.cnn.com/2000/ASIANOWsoutheast/05/11/iloveyou.02/
National security threat list. http://rf-web.tamu.edu/security/SECGUIDE/T1threat/Nstl.htm
CERT® Advisory CA-2001–19 ‘Code Red’ Worm exploiting buffer overflow In IIS indexing service DLL. http://www.cert.org/advisories/CA-2001–19.html
“Is IT Safe?” InfoTrac. Tennessee electronic library. HP Professional, December 1997, 1(12), 14–20
Insider abuse of information is biggest security threat, SafeCop says. InfoTrac. Tennessee electronic library. Business wire. 10 Nov 2000, p 1
Hollows P, Security threat correlation: the next battlefield. eSecurityPlanetcom. http://www.esecurityplanet.com/views/article.php/10752_1501001
Awareness of National Security Issues and Response [ANSIR]. FBI’s Intelligence resource program. http://www.fas.org/irp/ops/ci/ansir.htm
Grosso A (2000) The economic espionage ACT: touring the minefields. Commun ACM 43(8):15–18
ThreatManager™ – the real-time security threat management suite. http://www.open.com/responsenetworks/products/threatmanager/threatmanager.htm?ISR1
Department of homeland security. http://www.dohs.gov/
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag London
About this chapter
Cite this chapter
Kizza, J.M. (2015). Security Motives and Threats to Computer Networks. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-6654-2_3
Download citation
DOI: https://doi.org/10.1007/978-1-4471-6654-2_3
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-6653-5
Online ISBN: 978-1-4471-6654-2
eBook Packages: Computer ScienceComputer Science (R0)