20
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Emerging Patterns and Threat Scenarios on the Information Frontier

Pages 169-173 | Published online: 26 Mar 2015

REFERENCES

  • Dorothy F. Denning, Information Warfare and Security, Addison Wesley Longman Inc., Massachusetts, 1999, p.280. Also read pp.214–216 for a detailed account on the methodology employed by the Morris worm (exploiting a flaw in the Unix Sendmail daemon) to perform a buffer overflow attack.
  • Izhar Lev & Michael Knights, Computer Viruses: E- biological Warfare, Janes Intelligence Review, March 2001.
  • Cited in TA Balasubramanian ”Time to call the corporate virus busters”, Economic Times, New Delhi, 20 Sep 2001.
  • Carolyn Meinel, Code Red for the Web, Scientific American, October 2001
  • Ibid, As quoted by David Moore, Senior Technical Manager at California based Cooperative Association for Internet Data Analysis
  • Ibid. Also visit www.incidents.org for details.
  • For more details of the MSN incident see Prashant Bakshi, Microsoft Hacker trouble, Financial Express. New Delhi, November 8 2000. Accessible at www.financialexpress.com
  • Alvin Toffler, War and Anti War: Survival at the Dawn of the 21st Century
  • n.5
  • Yashwant Deva, Secure or perish (Ocean Books, New Delhi, 2001), pp 63–84.
  • ‘Cyberterrorism’—Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services, US House of Representatives by Dorothy F. Denning, Georgetown University. Also see Dorothy Denning, N.2, pp.68–76.
  • James Adams, Virtual Defense, Foreign Affairs, May / June 2001. Also see by the same author, The Next World War (Simon & Schuster, New York, 1998), pp. 187–91.
  • Report warns of Al Qaeda's potential Cyber Capabilities, News Article, dated January 09, 2002 at www.infowar.com.
  • Ibid.
  • CSI/FBI survey 2001 can be downloaded from the CSI website www.gocsi.com

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.