Skip to main content

Cyber Crimes and Hackers

  • Chapter
  • First Online:
Guide to Computer Network Security

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

The greatest threats to the security, privacy, and reliability of computer networks and other related information systems in general are cybercrimes committed by cybercriminals, but most importantly hackers. Judging by the damage caused by past cybercriminal and hacker attacks to computer networks in businesses, governments, and individuals, resulting in inconvenience and loss of productivity and credibility, one cannot fail to see that there is a growing community demand to software and hardware companies to create more secure products that can be used to identify threats and vulnerabilities, to fix problems, and to deliver security solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cybercrime threat “real and growing” http://news.bbc.co.uk/2/hi/science/nature/978163.stm

  2. Glossary of vulnerability testing terminology http://www.ee.oulu.fi/research/ouspg/sage/glossary/

  3. Anatomy of an attack The Economist, February 19–25, 2000

    Google Scholar 

  4. Kizza JM (2003) Social and ethical issues in the information age, 2nd edn. Springer, New York

    Google Scholar 

  5. Louis J. Freeh. FBI Congressional Report on Cybercrime http://www.fbi.gov/congress00/cyber021600.htm

  6. Michelle Slatalla. A brief history of hacking http://tlc.discovery.com/convergence/hackers/articles/history.html

  7. Phone phreaking: the telecommunications underground http://telephonetribute.com/phonephreaking.html

  8. “Timeline of Hacking” http://fyi.cnn.com/fyi/interactive/school.tools/timelines/1999/computer.hacking/frameset.exclude.html

  9. Rosenbaum R. Secrets of the little blue box http://www.webcrunchers.com/crunch/esqart.html

  10. The complete history of hacking http://www.wbglinks.net/pages/history/

  11. Denning PJ (1990) Computers under attack: intruders, worms and viruses. ACM Press, New York

    Google Scholar 

  12. Denning, D. “Activism, Hacktivism, and Cyberterrorisim: The Internet as a Tool or Influencing Foreign Policy http://www.nautilus.og/info-policy/workshop/papers/denning.html

  13. Lemos R. Online vandals smoke New York Times site CNET News.com . http://news.com.com/2009–1001–252754.html

  14. Shachtman N. Hacktivists Stage Virtual Sit-In at WEF Web site AlterNet. http://www.alternet.org/story.html?StoryID=12374

  15. Kizza JM (2001) Computer network security and cyber ethics. North Calorina, McFarland

    Google Scholar 

  16. Forchet K (1994) Computer security management. Boyd & Frasher Publishing

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Kizza, J.M. (2017). Cyber Crimes and Hackers. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-55606-2_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-55606-2_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-55605-5

  • Online ISBN: 978-3-319-55606-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics