Skip to main content

Security Motives and Threats to Computer Networks

  • Chapter
  • First Online:
Guide to Computer Network Security

Part of the book series: Computer Communications and Networks ((CCN))

  • 3142 Accesses

Abstract

In February, 2002, the Internet security watch group CERT Coordination Center first disclosed to the global audience that global networks, including the Internet, phone systems, and the electrical power grid, are vulnerable to attack because of weakness in programming in a small but key network component. The component, an Abstract Syntax Notation One, or ASN.1, is a communication protocol used widely in the Simple Network Management Protocol (SNMP).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Notes

  1. 1.

    Lemos, Rob. “Code Red: Virulent worm calls into doubt our ability to protect the Net,” CNET News.com, July 27, 2001.

References

  1. G-Lock Software. TCP and UDP port scanning examples. http://www.glocksoft.com/tcpudpscan.htm

  2. Rutkowski T, Internet survey reaches 109 million host level. Center for next generation internet. http://www.ngi.org/trends/TrendsPR0102.txt

  3. Battling the net security threat, Saturday, 9 Nov 2002, 08:15 GMT. http://news.bbc.co.uk/2/hi/technology/2386113.stm

  4. Derived in part from a letter by Severo M. Ornstein, Commun ACM, June 1989, 32 (6)

    Google Scholar 

  5. Virus writer Christopher Pile (Black Barron) sent to jail for 18 Months Wednesday 15 November 1995. http://www.gps.jussieu.fr/comp/VirusWriter.html

  6. Hopper I Destructive ‘I LOVE YOU’ Computer virus strikes worldwide. CNN Interactive Technology. http://www.cnn.com/2000/TECH/computing/05/04/iloveyou/

  7. Former student: bug may have been spread accidentally. CNN Interactive. http://www.cnn.com/2000/ASIANOWsoutheast/05/11/iloveyou.02/

  8. National security threat list. http://rf-web.tamu.edu/security/SECGUIDE/T1threat/Nstl.htm

  9. CERT® Advisory CA-2001–19 ‘Code Red’ Worm exploiting buffer overflow In IIS indexing service DLL. http://www.cert.org/advisories/CA-2001–19.html

  10. “Is IT Safe?” InfoTrac. Tennessee electronic library. HP Professional, December 1997, 1(12), 14–20

    Google Scholar 

  11. Insider abuse of information is biggest security threat, SafeCop says. InfoTrac. Tennessee electronic library. Business wire. 10 Nov 2000, p 1

    Google Scholar 

  12. Hollows P, Security threat correlation: the next battlefield. eSecurityPlanetcom. http://www.esecurityplanet.com/views/article.php/10752_1501001

  13. Awareness of National Security Issues and Response [ANSIR]. FBI’s Intelligence resource program. http://www.fas.org/irp/ops/ci/ansir.htm

  14. Grosso A (2000) The economic espionage ACT: touring the minefields. Commun ACM 43(8):15–18

    Article  Google Scholar 

  15. ThreatManager™ – the real-time security threat management suite. http://www.open.com/responsenetworks/products/threatmanager/threatmanager.htm?ISR1

  16. Department of homeland security. http://www.dohs.gov/

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag London

About this chapter

Cite this chapter

Kizza, J.M. (2015). Security Motives and Threats to Computer Networks. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-6654-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-6654-2_3

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-6653-5

  • Online ISBN: 978-1-4471-6654-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics