Abstract
The greatest threats to the security, privacy, and reliability of computer networks and other related information systems in general are cybercrimes committed by cybercriminals, but most importantly hackers. Judging by the damage caused by past cybercriminal and hacker attacks to computer networks in businesses, governments, and individuals, resulting in inconvenience and loss of productivity and credibility, one cannot fail to see that there is a growing community demand to software and hardware companies to create more secure products that can be used to identify threats and vulnerabilities, to fix problems, and to deliver security solutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cybercrime threat “real and growing” http://news.bbc.co.uk/2/hi/science/nature/978163.stm
Glossary of vulnerability testing terminology http://www.ee.oulu.fi/research/ouspg/sage/glossary/
Anatomy of an attack The Economist, February 19–25, 2000
Kizza JM (2003) Social and ethical issues in the information age, 2nd edn. Springer, New York
Louis J. Freeh. FBI Congressional Report on Cybercrime http://www.fbi.gov/congress00/cyber021600.htm
Michelle Slatalla. A brief history of hacking http://tlc.discovery.com/convergence/hackers/articles/history.html
Phone phreaking: the telecommunications underground http://telephonetribute.com/phonephreaking.html
“Timeline of Hacking” http://fyi.cnn.com/fyi/interactive/school.tools/timelines/1999/computer.hacking/frameset.exclude.html
Rosenbaum R. Secrets of the little blue box http://www.webcrunchers.com/crunch/esqart.html
The complete history of hacking http://www.wbglinks.net/pages/history/
Denning PJ (1990) Computers under attack: intruders, worms and viruses. ACM Press, New York
Denning, D. “Activism, Hacktivism, and Cyberterrorisim: The Internet as a Tool or Influencing Foreign Policy http://www.nautilus.og/info-policy/workshop/papers/denning.html
Lemos R. Online vandals smoke New York Times site CNET News.com . http://news.com.com/2009–1001–252754.html
Shachtman N. Hacktivists Stage Virtual Sit-In at WEF Web site AlterNet. http://www.alternet.org/story.html?StoryID=12374
Kizza JM (2001) Computer network security and cyber ethics. North Calorina, McFarland
Forchet K (1994) Computer security management. Boyd & Frasher Publishing
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Kizza, J.M. (2017). Cyber Crimes and Hackers. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-55606-2_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-55606-2_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-55605-5
Online ISBN: 978-3-319-55606-2
eBook Packages: Computer ScienceComputer Science (R0)