Notes
- See URL http://www.securityfocus.com http://online.securityfocus.com/archive/1
- See URL http://www.cert.org
- See URL http://www.sans.org
- One estimate of Internet fraud for 2001 is $17.8 million (see URL http://www.computerworld.com/storyba/0,4125,NAV47_STO70007,00.html). The cost of viruses alone for 2001 was an estimated $12.3 billion! (see Note 9) … Therefore, it appears security costs are actually greater than even fraud.
- March 15 . “ How to Plan for the Inevitable ” . In CIO Magazine See URL http://www.cio.com/archive/031502/plan_content.html. Includes incident of security hole and exposure that lead to public media attention
- According to Gartner Group. See URL 2002.html http://www3.gartner.com/1_researchanalysis/focus/predictions
- Per U.S. Census Bureau . March 18 2002 . edition of E-Stats news- letter. See URL http://www.census.gov/estats.htm
- Intel white paper at: http://www.intel.com/network/connectivity/resources/doc_library/white_papers/products/ipsecurity/index.htm
- January 3 2002 . Lax Habits Leave U.S. Open to Cyberattack . Reuters , See URL http://zdnet.com.com/2100-1105-804137.html?legacy=zdnn
- April 7 . Survey: Hacking Often Unreported . MSNBC , See URL http://www.msnbc.com/news/735198.asp?0si=-&cp1=1
- January 3 2002 . Lax Habits Leave U.S. Open to Cyberattack . Reuters , See URL http://zdnet.com.com/2100-1105-804137.html?legacy=zdnn
- Ibid. ,
- January 9 . Study: Hold Vendors Liable for Security Breaches . ExtremeTech , See URL http://www.extremetech.com/article/0,3396,s%253D201%2526a%253D20919,00.asp
- Special thanks to Michael Hines, Purdue University, for his input on this section of the article. © Copyright 2002 CRC Press-All rights reserved.
- January 3 2002 . Lax Habits Leave U.S. Open to Cyberattack . Reuters , See URL http://zdnet.com.com/2100-1105-804137.html?legacy=zdnn
- January 9 . Study: Hold Vendors Liable for Security Breaches . ExtremeTech , See URL http://www.extremetech.com/article/0,3396,s%253D201%2526a%253D20919,00.asp
- April 10 20002 . Microsoft Warns of 10 IIS Flaws . eWeek , See URL http://www.eweek.com/print_article/0,3668,a=25302,00.asp
- There is a technical difference between hackers and crackers. See definitions at http://pcwebopedia.com/TERM/h/hacker.html and http://pcwebopedia.com/TERM/c/crack.html
- The Internet Storm Center is located at http://www.incidents.org
- BIND is one of the name services on the Internet — typically on UNIX, Linux, etc. based systems, although Windows XP does support BIND now.
- See Internet Vulnerability U3 on the Top Twenty list.
- The information for this paragraph came from a Web page at The Internet Storm Center's Web site. The page is located at http://www.incidents.org/isw/iswp.php
- 2000 . How to Eliminate the Top Ten Most Critical Internet Security Threats . Information Systems Control Journal , 4
- The information in this paragraph, and some of the rest of this section, comes from the Top Twenty list (Web page) at http://www.sans.org/top20.htm
- See URL, for the latest list. As of this writing, version 2.502 from January 30, 2002, was the latest list. http://www.sans.org/top20.htm
- The Top 20 Scanner can be downloaded from the Center for Internet Security's Web site at www.cisecurity.org. Several commercial vulnerability scanners may also be used to scan for these vulnerabilities, and the SANS Institute will maintain a list of all scanners that provide a focused Top Twenty scanning function at www.sans.org
- January 3 2002 . Lax Habits Leave U.S. Open to Cyberattack . Reuters , See URL http://zdnet.com.com/2100-1105-804137.html?legacy=zdnn
- March 15 . How to Plan for the Inevitable . CIO Magazine , See URL http://www.cio.com/archive/031502/plan_content.html. Includes incident of security hole and exposure that lead to public media attention