Abstract
The widespread and ubiquitous use of computing technology with the computer network as its base is creating fertile ground for illegal and unauthorized access to digital systems relying on and using the evolving digital technology. Threats and motives for attacks to digital systems are on the rise, unabated by a strong but insufficient response. Hacker tools are becoming more sophisticated and powerful. The threat itself comes in many forms, including viruses, worms, distributed denial of services, electronic bombs, and derives many motives, including revenge, personal gains, hate, and joy rides, to name but a few. This chapter explores the sources and types of these threats, the hacker community groups, the different and changing threat motives, and the management of these threats. Threat awareness is also discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Battling the net security threat, Saturday, 9 Nov, 2002, 08:15 GMT. http://news.bbc.co.uk/2/hi/technology/2386113.stm
The morris worm—30 years since first major attack on the internet. 2 Nov 2018. https://www.fbi.gov/news/stories/morris-worm-30-years-since-first-major-attack-on-internet-110218
The sad take of Chris Pile’s 15 seconds of fame. https://ivanlef0u.fr/repo/madchat/vxdevl/vdat/lgguilt2.htm
Hopper I destructive ‘I LOVE YOU’ computer virus strikes worldwide. CNN Interactive Technology. http://www.cnn.com/2000/TECH/computing/05/04/iloveyou/
Lemon S. Code red worm—“code red worm exploits windows NT flaw”. IDG News Service. https://www.computerworld.com/article/2582725/code-red-worm-exploits-windows-nt-flaw.html
CERT® Advisory CA-2001–19. ‘Code red’ worm exploiting buffer overflow in IIS. https://www.computerworld.com/article/2582725/code-red-worm-exploits-windows-nt-flaw.html
Is IT safe? InfoTrac (1997) Tennessee electronic library. HP Prof 1(12):14–20
Insider abuse of information is biggest security threat, SafeCop says. InfoTrac. Tennessee electronic library. Business Wire. 10 Nov 2000, p 1
Awareness of National Security Issues and Response [ANSIR]. FBI’s intelligence resource program. https://archives.fbi.gov/archives/news/testimony/fbis-ansir-program
Grosso A (2000) The economic espionage ACT: touring the minefields. Commun ACM 43(8):15–18
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2024 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kizza, J.M. (2024). Security Threats and Threat Motives to Computer Networks. In: Guide to Computer Network Security. Texts in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-031-47549-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-47549-8_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-47548-1
Online ISBN: 978-3-031-47549-8
eBook Packages: Computer ScienceComputer Science (R0)