Keyword Index and Glossary of Core Ideas: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
(858 intermediate revisions by 7 users not shown)
Line 1: Line 1:
==Glossary of Core Ideas==
{{Header_Message|message=This page is outdated. The keywords function has been deprecated in recent updates of the wiki. If you choose use this index, be advised that it only contains articles that have been uploaded prior to September 2011. For a comprehensive list of article categories please consult the [[Table of Contents]].}}
 
 
==Keyword Index and Glossary of Core Ideas==


===Air-Gapped Network===
===Air-Gapped Network===
Air gapping is a security measure that isolates a secure network from unsecure networks physically, electrically and electromagnetically.   
Air gapping is a security measure that isolates a secure network from unsecure networks physically, electrically and electromagnetically.   


See also: [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Sneakernet Sneakernet]
See also: [[Keyword_Index_and_Glossary_of_Core_Ideas#Sneakernet | Sneakernet]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''
 
===Antivirus===
Software which attempts to identify and delete or isolate [[#Malware |malware]].  Antivirus software may use both a database containing signatures of known threats and heuristics to identify malware.  Usually run as a background service to scan files and email copied to the protected system.


References:
References:
* [[Security_Engineering | Anderson]]
* [[Four Grand Challenges in Trustworthy Computing | Computing Research Association]]
* [[2010 Top Cyber Security Risks Report | HP TippingPoint DVLabs]]
* [[Managing_Information_Risk_and_the_Economics_of_Security | Johnson, E.]]
* [[McAfee Threats Report | McAfee]]
* [[Beyond_Fear | Schneier]]
* [[Symantec Global Internet Security Threat Report | Symantec]]
* [[Trend Micro Annual Report | Trend Micro]]


''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Antivirus===
===Best Practices===
Software which attempts to identify and delete or isolate [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Malware malware].  Antivirus software may use both a database containing signatures of known threats and heuristics to identify malware.  Usually run as a background service to scan files and email copied to the protected system.


References:
The processes, practices, and systems identified in public and private organizations that performed exceptionally well and are widely recognized as improving an organization's performance and efficiency in specific areas. Successfully identifying and applying best practices can reduce business expenses and improve organizational efficiency. [http://www.gao.gov/special.pubs/bprag/bprgloss.htm GAO Glossary]


* [[Hardening_The_Internet | National Infrastructure Advisory Council]]


===Black Hat===
===Black Hat===
A black hat is a computer [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Hacker hacker] who works to harm others (e.g., steal identities, spread computer viruses, install bot software).
A black hat is a computer [[#Hacker | hacker]] who works to harm others (e.g., steal identities, spread computer viruses, install bot software).


See also: [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#White_Hat White Hat]
See also: [[#White_Hat | White Hat]]


References:
References:
* [[Why_Information_Security_is_Hard | Anderson]], [[Security_Engineering | [2]]]


''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Blacklist===
===Blacklist===
A list of computers, IP addresses, user names or other identifiers to block from access to a computing resource.
A list of computers, IP addresses, user names or other identifiers to block from access to a computing resource.


See also: [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Whitelist Whitelist]
See also: [[#Whitelist | Whitelist]]


References:
References:
* [[The_Impact_of_Incentives_on_Notice_and_Take-down | Moore and Clayton]]
* [[The_Economics_of_Online_Crime | Moore et. al.]]
* [[Beyond_Fear | Schneier]]


''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Botnet===
===Botnet===
A portmanteau of robot and network.) Refers to networks of sometimes millions of infected machines that are remotely controlled by malicious actors.  A single infected computer may be referred to as a zombie computer.  The owners of the computer remotely controlled is often unaware of the infection.  The owners of a botnet may use the combined network processing power and bandwidth to send [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#SPAM SPAM], install [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Malware malware] and mount [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Distributed_Denial_of_Service_(DDoS) DDoS] attacks or may rent out the botnet to other malicious actors.
A portmanteau of "robot" and "network." Refers to networks of sometimes millions of infected machines that are remotely controlled by malicious actors.  A single infected computer may be referred to as a zombie computer.  The owners of the computer remotely controlled is often unaware of the infection.  The owners of a botnet may use the combined network processing power and bandwidth to send [[#SPAM | SPAM]], install [[#Malware | malware]] and mount [[#DDoS_Attack | DDoS attacks]] or may rent out the botnet to other malicious actors.


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Emerging_Threats_to_Internet_Security_-_Incentives%2C_Externalities_and_Policy_Implications Bauer and van Eeten]
* [[Why_Information_Security_is_Hard | Anderson]], [[Security_Engineering | [2]]]
* [http://cyber.law.harvard.edu/cybersecurity/World_War_3.0:_Ten_Critical_Trends_for_Cybersecurity Cetron and Davies]
* [[Security_Economics_and_the_Internal_Market | Anderson et. al.]]
* [http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye]
* [[Emerging_Threats_to_Internet_Security_-_Incentives%2C_Externalities_and_Policy_Implications | Bauer and van Eeten]]
* [http://cyber.law.harvard.edu/cybersecurity/Estonia_Three_Years_Later Shackelford]
* [[Models_and_Measures_for_Correlation_in_Cyber-Insurance | Bohme and Kataria]]
* [[Modeling_Cyber-Insurance | Bohme and Schwartz]]
* [[World_War_3.0:_Ten_Critical_Trends_for_Cybersecurity | Cetron and Davies]]
* [[Cyber_War | Clarke]]
* [[Four Grand Challenges in Trustworthy Computing | Computing Research Association]]
* [[An_Inquiry_into_the_Nature_and_Causes_of_the_Wealth_of_Internet_Miscreants | Franklin et. al.]]
* [[An_Introduction_to_Key_Themes_in_the_Economics_of_Cyber_Security | Gandal]]
* [[2010 Top Cyber Security Risks Report | HP TippingPoint DVLabs]]
* [[Managing_Information_Risk_and_the_Economics_of_Security | Johnson, E.]]
* [[Cyber_Operations | Korns]]
* [[Cyberpower and National Security | Kramer et. al]]
* [[McAfee Threats Report | McAfee]]
* [[Hardening_The_Internet | National Infrastructure Advisory Council]]
* [[Toward_a_Safer_and_More_Secure_Cyberspace | National Research Council]]
* [[Cyber_Power | Nye]]
* [[Estonia_Three_Years_Later | Shackelford]]
* [[Schneier_on_Security | Schneier]]
* [[Solving_the_Dilemma_of_State_Responses_to_Cyberattacks | Sklerov]]
* [[Symantec Global Internet Security Threat Report | Symantec]]
* [[The_Underground_Economy | Thomas and Martin]]
* [[Trend Micro Annual Report | Trend Micro]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===''Casus Belli''===
===''Casus Belli''===
Line 44: Line 89:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/The_Government_and_Cybersecurity Bellovin]
* [[The_Government_and_Cybersecurity | Bellovin]]
* [http://cyber.law.harvard.edu/cybersecurity/Cyber_Security_and_Politically%2C_Socially_and_Religiously_Motivated_Cyber_Attacks#Full_Citation Cornish]
* [[A_Proposal_for_an_International_Convention_To_Regulate_the_Use_of_Information_Systems_in_Armed_Conflict | Brown]]
* [[Cyber_Security_and_Politically%2C_Socially_and_Religiously_Motivated_Cyber_Attacks | Cornish]]
* [[Towards_a_Cyberspace_Legal_Regime_in_the_Twenty-First_Century | Dunlap]]
* [[Cyberpower and National Security | Kramer et. al]]
* [[Wired_Warfare | Schmitt]]
* [[Solving_the_Dilemma_of_State_Responses_to_Cyberattacks | Sklerov]]
* [[Armed_Attack_in_Cyberspace | Todd]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Civilian Participation===
===Civilian Participation===
The involvement of non-military persons in warfare.  While civilians have often provided support to the military in kinetic wars, in [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Cyber_Warfare cyber warfare] civilians are able to remotely participate in direct attacks against opponents.    This raises complicated questions of law when the combatants are not uniformed military personnel.  
The involvement of non-military persons in warfare.  While civilians have often provided support to the military in kinetic wars, in [[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Warfare | cyber warfare]] civilians are able to remotely participate in direct attacks against opponents.    This raises complicated questions of law when the combatants are not uniformed military personnel.  


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Amending_The_ECPA_To_Enable_a_Culture_of_Cybersecurity_Research Burstein]
*[[Information_Warfare_and_International_Law_on_the_Use_of_Force | Barkham]]
* [http://cyber.law.harvard.edu/cybersecurity/Cyberspace_and_the_National_Security_of_the_United_Kingdom Cornish et. al.]
* [[A_Proposal_for_an_International_Convention_To_Regulate_the_Use_of_Information_Systems_in_Armed_Conflict | Brown]]
* [http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
* [[Amending_The_ECPA_To_Enable_a_Culture_of_Cybersecurity_Research | Burstein]]
* [[Cyberspace_and_the_National_Security_of_the_United_Kingdom | Cornish et. al]]
* [[The_National_Strategy_for_the_Physical_Protection_of_Critical_Infrastructures_and_Key_Assets | DHS]], [[A Roadmap for Cybersecurity Research | [2]]]
* [[Strategy_for_Homeland_Defense_and_Civil_Support | DoD]]
* [[Applicability_of_the_Additional_Protocols_to_Computer_Network_Attacks | Dörmann]]
* [[Towards_a_Cyberspace_Legal_Regime_in_the_Twenty-First_Century | Dunlap]]
* [[Why_States_Need_an_International_Law_for_Information_Operations | Hollis]]
* [[Wired_Warfare | Schmitt]], [[Computers_and_War | 2]]
* [[Solving_the_Dilemma_of_State_Responses_to_Cyberattacks | Sklerov]]
* [[Armed_Attack_in_Cyberspace | Todd]]
* [[Combatant_Status_and_Computer_Network_Attack | Watts]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Combatant Status===
===Combatant Status===
Line 59: Line 124:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
* [[Does_Information_Security_Attack_Frequency_Increase_With_Vulnerability_Disclosure | Arora et. al.]]
*[[Information_Warfare_and_International_Law_on_the_Use_of_Force | Barkham]]
* [[A_Proposal_for_an_International_Convention_To_Regulate_the_Use_of_Information_Systems_in_Armed_Conflict | Brown]]
* [[Wired_Warfare | Schmitt]], [[Computers_and_War | 2]]
* [[An_Assessment_of_International_Legal_Issues_in_Information_Operations | DoD Office of General Counsel]]
* [[Why_States_Need_an_International_Law_for_Information_Operations | Hollis]]
* [[Armed_Attack_in_Cyberspace | Todd]]
* [[Combatant_Status_and_Computer_Network_Attack | Watts]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''
 
===Communications Privacy Law===
Laws which regulate access to electronic communications.  In the United States, the [http://www.usiia.org/legis/ecpa.html Electronic Communications Privacy Act (ECPA]) protects electronic communications while in transit and prohibits the unlawful access and disclosure of communication contents.
 
References:
* [[Amending_The_ECPA_To_Enable_a_Culture_of_Cybersecurity_Research | Burstein]]
* [[Cybersecurity%2C_Identity_Theft%2C_and_the_Limits_of_Tort_Liability | Johnson, V.]]
* [[Cybersecurity:_Preventing_Terrorist_Attacks_and_Protecting_Privacy_in_Cyberspace | Nojeim]]
* [[Cyber_Power | Nye]]
* [[A_Model_for_When_Disclosure_Helps_Security | Swire]], [[A_Theory_of_Disclosure_for_Security_and_Competitive_Reasons | [2]]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Computer Emergency Response Team===
===Computer Emergency Response Team===
Line 65: Line 151:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Experiences_and_Challenges_with_Using_CERT_Data_to_Analyze_International_Cyber_Security Madnick et al]
* [[Does_Information_Security_Attack_Frequency_Increase_With_Vulnerability_Disclosure | Arora et. al.]]
* [[Securing_Cyberspace_for_the_44th_Presidency | Center for Strategic and International Studies]]
* [[Experiences_and_Challenges_with_Using_CERT_Data_to_Analyze_International_Cyber_Security | Madnick et. al.]]
* [[Impact_of_Software_Vulnerability_Announcements_on_the_Market_Value_of_Software_Vendors | Telang and Wattal]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Computer Network Attack===
===Computer Network Attack===
Line 71: Line 162:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Cyberspace_and_the_National_Security_of_the_United_Kingdom Cornish et. al.]
* [[Security_Engineering | Anderson]]
* [http://cyber.law.harvard.edu/cybersecurity/Information_Security GAO]
* [[The_Economics_of_Information_Security | Anderson and Moore]]
* [http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
* [[Cyber_War | Clarke]]
* [[Critical_Infrastructure_Threats_and_Terrorism | DCSINT]]
* [[The_National_Strategy_for_the_Physical_Protection_of_Critical_Infrastructures_and_Key_Assets | DHS]], [[A Roadmap for Cybersecurity Research | [2]]]
* [[Mission_Impact_of_Foreign_Influence_on_DoD_Software | DoD]], [[Strategy_for_Homeland_Defense_and_Civil_Support | [2]]]
* [[An_Assessment_of_International_Legal_Issues_in_Information_Operations | DoD Office of General Counsel]]
* [[Applicability_of_the_Additional_Protocols_to_Computer_Network_Attacks | Dörmann]]
* [[The_Law_and_Economics_of_Cybersecurity | Grady and Parisi]]
* [[Cyberspace_and_the_National_Security_of_the_United_Kingdom | Cornish et. al.]]
* [[Information_Security | GAO]]
* [[An_Introduction_to_Key_Themes_in_the_Economics_of_Cyber_Security | Gandal]]
* [[Cyber_Operations | Korns]]
* [[Cyberpower and National Security | Kramer et. al]]
* [[McAfee Threats Report | McAfee]]
* [[National_Cyber_Defense_Financial_Services_Workshop_Report | National Cyber Defense Initiative]]
* [[Hardening_The_Internet | National Infrastructure Advisory Council]]
* [[Trust in Cyberspace | National Research Council]]
* [[Federal Plan for Cyber Security and Information Assurance Research and Development | National Science & Tech. Council]]
* [[Critical_Foundations | PCCIP]]
* [[The Cyber War Threat Has Been Grossly Exaggerated | Rotenberg et. al]]
* [[Computers_and_War | Schmitt]], [[Computer_Network_Attack_and_the_Use_of_Force_in_International_Law | [2]]], [[Computer_Network_Attack_and_the_Use_of_Force_in_International_Law | [3]]]
* [[Beyond_Fear | Schneier]]
* [[2010 Data Breach Investigations Report | Verizon]]
* [[Combatant_Status_and_Computer_Network_Attack | Watts]]
* [[The Comprehensive National Cybersecurity Initiative | White House]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Communications Privacy Law===
===COTS Software===
Laws which regulate access to electronic communicationsIn the United States, the [http://www.usiia.org/legis/ecpa.html Electronic Communications Privacy Act (ECPA]) protects electronic communications while in transit and prohibits the unlawful access and disclosure of communication contents.
Commercial Off The Shelf SoftwareSoftware that is prepackaged and sold as a commodity rather than custom written for a specific user/organization or purpose. Examples include operating systems, database management programs, email servers, application servers and office product suites. [[Mission_Impact_of_Foreign_Influence_on_DoD_Software | DoD at 18.]]


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Amending_The_ECPA_To_Enable_a_Culture_of_Cybersecurity_Research Burstein]
* [[A Roadmap for Cybersecurity Research | DHS]]
* [http://cyber.law.harvard.edu/cybersecurity/Cybersecurity%2C_Identity_Theft%2C_and_the_Limits_of_Tort_Liability Johnson]
* [[Mission_Impact_of_Foreign_Influence_on_DoD_Software | DoD]]
* [http://cyber.law.harvard.edu/cybersecurity/Cybersecurity:_Preventing_Terrorist_Attacks_and_Protecting_Privacy_in_Cyberspace Nojeim]
* [[Cyberpower and National Security | Kramer et. al]]  
* [http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye]
* [[Trust in Cyberspace | National Research Council]]
* [[Cyber Security: A Crisis of Prioritization | PITAC]]
* [[2010 Data Breach Investigations Report | Verizon]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Credit Card Fraud===
===Credit Card Fraud===
Theft of goods or services using false or stolen credit card information.
Theft of goods or services using false or stolen credit card information.


See Also: [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Shoulder_Surfing Shoulder Surfing]
See Also: [[#Shoulder_Surfing | Shoulder Surfing]]


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Cybersecurity_in_the_Payment_Card_Industry#Key_Words Epstein and Brown]
* [[Security_Engineering | Anderson]]
* [[Cybersecurity_in_the_Payment_Card_Industry | Epstein and Brown]]
* [[An_Inquiry_into_the_Nature_and_Causes_of_the_Wealth_of_Internet_Miscreants | Franklin et. al.]]
* [[An_Economic_Analysis_of_Notification_Requirements_for_Data_Security_Breaches | Lenard and Rubin]], [[Much_Ado_About_Notification | [2]]]
* [[Examining_the_Impact_of_Website_Take-down_on_Phishing | Moore and Clayton]], [[The_Consequence_of_Non-Cooperation_in_the_Fight_Against_Phishing | [2]]], [[The_Impact_of_Incentives_on_Notice_and_Take-down | [3]]]
* [[The_Economics_of_Online_Crime | Moore et. al.]]
* [[Do_Data_Breach_Disclosure_Laws_Reduce_Identity_Theft | Romanosky et. al.]]
* [[Notification_of_Data_Security_Breaches | Schwartz and Janger]]
* [[The_Underground_Economy | Thomas and Martin]]
* [[Insider_Threat_Study | U.S. Secret Service]]
* [[Beyond_Fear | Schneier]]
* [[A_Model_for_When_Disclosure_Helps_Security | Swire]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Crimeware===
===Crimeware===
Software tools designed to aid criminals in perpetrating online crime.  Refers only to programs not generally considered desirable or usable for ordinary tasks.  Thus, while a criminal may use Internet Explorer in the commission of a [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Cyber_Crime cybercrime], the Internet Explorer application itself would not be considered crimeware.
Software tools designed to aid criminals in perpetrating online crime.  Refers only to programs not generally considered desirable or usable for ordinary tasks.  Thus, while a criminal may use Internet Explorer in the commission of a [[#Cyber_Crime | cybercrime]], the Internet Explorer application itself would not be considered crimeware.


References:
References:
*[http://cyber.law.harvard.edu/cybersecurity/Cybersecurity:_Stakeholder_Incentives%2C_Externalities%2C_and_Policy_Options Bauer and van Eeten], [http://cyber.law.harvard.edu/cybersecurity/Emerging_Threats_to_Internet_Security_-_Incentives%2C_Externalities_and_Policy_Implications 2]
* [[2007_Malware_Report  |Computer Economics]]
*[http://cyber.law.harvard.edu/cybersecurity/Cybersecurity_in_the_Payment_Card_Industry#Key_Words Epstein and Brown]
* [[Cybersecurity | Bauer and van Eeten]], [[Emerging_Threats_to_Internet_Security_-_Incentives%2C_Externalities_and_Policy_Implications | [2]]]
* [[Cybersecurity_in_the_Payment_Card_Industry | Epstein and Brown]]
* [[An_Inquiry_into_the_Nature_and_Causes_of_the_Wealth_of_Internet_Miscreants | Franklin et. al]]
* [[An_Introduction_to_Key_Themes_in_the_Economics_of_Cyber_Security | Gandal]]
* [[An_Economic_Analysis_of_the_Private_and_Social_Costs_of_the_Provision_of_Cybersecurity_and_Other_Public_Security_Goods | Kobayashi]]
* [[Symantec Global Internet Security Threat Report | Symantec]]
* [[Economics_of_Malware | van Eeten and Bauer]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Cyber Crime===
===Cyber Crime===
Line 103: Line 244:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Cybersecurity_in_the_Payment_Card_Industry#Key_Words Epstein and Brown]
* [[Security_Engineering | Anderson]]
* [[Security_Economics_and_the_Internal_Market | Anderson et. al.]]
*[[Cyber-Insurance_Revisited | Bohme]]
* [[Four Grand Challenges in Trustworthy Computing | Computing Research Association]]
* [[The_National_Strategy_for_the_Physical_Protection_of_Critical_Infrastructures_and_Key_Assets | DHS]], [[A Roadmap for Cybersecurity Research | [2]]]
* [[Cybersecurity_in_the_Payment_Card_Industry | Epstein and Brown]]
* [[Research Agenda for the Banking and Finance Sector | FSSCC]]
* [[The_Law_and_Economics_of_Cybersecurity | Grady and Parisi]]
* [[Why_States_Need_an_International_Law_for_Information_Operations | Hollis]]
* [[2010 Top Cyber Security Risks Report | HP TippingPoint DVLabs]]
* [[Managing_Information_Risk_and_the_Economics_of_Security | Johnson, E.]]
* [[Cyber_Operations | Korns]]
* [[Cyberpower and National Security | Kramer et. al]]
* [[McAfee Threats Report | McAfee]]
* [[The_Impact_of_Incentives_on_Notice_and_Take-down | Moore and Clayton]]
* [[The_Economics_of_Online_Crime | Moore et. al.]]
* [[Hardening_The_Internet | National Infrastructure Advisory Council]]
* [[Beyond_Fear | Schneier]], [[Schneier on Security | [2]]]
* [[Solving_the_Dilemma_of_State_Responses_to_Cyberattacks | Sklerov]]
* [[Symantec Global Internet Security Threat Report | Symantec]]
* [[Trend Micro Annual Report | Trend Micro]]
* [[Insider_Threat_Study | U.S. Secret Service]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''
 
===Cyber Security as an Externality===
Economists define externalities as instances where an individual or firm’s actions have
economic consequences for others for which there is no compensation. One important
distinction is between positive and negative externalities. Instances of the latter are most
commonly discussed, such as the environmental pollution caused by a plant, which may
have impacts on the value of neighboring homes. Important examples of positive
externalities are so common in communications networks that there is a class of "network
externalities. For instance, the simple act of installing telephone service to one additional
customer creates positive externalities on everyone on the telephone network because
they can now each reach one additional person.
Several attributes of computer security suggest that it is an externality. Most importantly,
the lack of security on one machine can cause adverse effects on another. The most
obvious example of this is from electronic commerce, where credit card numbers stolen
from machines lacking security are used to commit fraud at other sites.
 
References:
* [[Security_Engineering | Anderson]]
* [[The_Economics_of_Information_Security | Anderson and Moore]]
*[[Cyber-Insurance_Revisited | Bohme]]
* [[Pricing_Security | Camp and Wolfram]], [[Economics_of_Information_Security | 2]]
* [[The_National_Strategy_for_the_Physical_Protection_of_Critical_Infrastructures_and_Key_Assets | DHS]]
* [[An_Introduction_to_Key_Themes_in_the_Economics_of_Cyber_Security | Gandal]]
* [[The_Law_and_Economics_of_Cybersecurity | Grady and Parisi]]
* [[Managing_Information_Risk_and_the_Economics_of_Security | Johnson, E.]]
* [[The_Impact_of_Incentives_on_Notice_and_Take-down | Moore and Clayton]]
* [[Trust in Cyberspace | National Research Council]]
* [[Is_Cybersecurity_a_Public_Good | Powell]]
* [[Beyond_Fear | Schneier]]
* [[Economics_of_Malware | van Eeten and Bauer]]
* [[System_Reliability_and_Free_Riding | Varian]], [[Managing_Online_Security_Risks | 2]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''
 
===Cyber Security as a Public Good===
In economics, a public good is a good that is non-rivalrous and non-excludable. Non-rivalry means that consumption of the good by one individual does not reduce availability of the good for consumption by others; and non-excludability that no one can be effectively excluded from using the good.
 
References:
* [[Security_Engineering | Anderson]]
*[[Cyber-Insurance_Revisited | Bohme]]
* [[Economics_of_Information_Security | Camp and Wolfram]]
* [[Four Grand Challenges in Trustworthy Computing | Computing Research Association]]
* [[The_National_Strategy_for_the_Physical_Protection_of_Critical_Infrastructures_and_Key_Assets | DHS]], [[A Roadmap for Cybersecurity Research | [2]]]
* [[An_Economic_Analysis_of_the_Private_and_Social_Costs_of_the_Provision_of_Cybersecurity_and_Other_Public_Security_Goods | Kobayashi]]
* [[Hardening_The_Internet | National Infrastructure Advisory Council]]
* [[Trust in Cyberspace | National Research Council]]
* [[Cyber Security: A Crisis of Prioritization | PITAC]]
* [[Is_Cybersecurity_a_Public_Good | Powell]]
* [[Beyond_Fear | Schneier]]
* [[System_Reliability_and_Free_Riding | Varian]], [[Managing_Online_Security_Risks | 2]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Cyber Terrorism===
===Cyber Terrorism===
Line 109: Line 325:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/World_War_3.0:_Ten_Critical_Trends_for_Cybersecurity Cetron and Davies]
* [[World_War_3.0:_Ten_Critical_Trends_for_Cybersecurity | Cetron and Davies]]
* [http://cyber.law.harvard.edu/cybersecurity/Critical_Infrastructure_Threats_and_Terrorism DCSINT]
* [[Cyber_War | Clarke]]
* [http://cyber.law.harvard.edu/cybersecurity/Cyber-Apocalypse_Now_-_Securing_the_Internet_Against_Cyberterrorism_and_Using_Universal_Jurisdiction_as_a_Deterrent Gable]
* [[Critical_Infrastructure_Threats_and_Terrorism | DCSINT]]
* [http://cyber.law.harvard.edu/cybersecurity/Terrorist_Capabilities_for_Cyberattack:_Overview_and_Policy_Issues Rollins and Wilson]
* [[The_National_Strategy_for_the_Physical_Protection_of_Critical_Infrastructures_and_Key_Assets | DHS]], [[A Roadmap for Cybersecurity Research | [2]]]
* [http://cyber.law.harvard.edu/cybersecurity/The_Evolving_Landscape_of_Maritime_Cybersecurity Shah]
* [[Strategy_for_Homeland_Defense_and_Civil_Support | DoD]]
* [http://cyber.law.harvard.edu/cybersecurity/Cyber_Terrorism Stohl]
* [[Cyber-Apocalypse_Now_-_Securing_the_Internet_Against_Cyberterrorism_and_Using_Universal_Jurisdiction_as_a_Deterrent | Gable]]
* [[The_Law_and_Economics_of_Cybersecurity | Grady and Parisi]]
* [[Cyber_Operations | Korns]]
* [[Cyberpower and National Security | Kramer et. al]]
* [[Critical_Foundations | PCCIP]]
* [[Terrorist_Capabilities_for_Cyberattack:_Overview_and_Policy_Issues | Rollins and Wilson]]
* [[The Cyber War Threat Has Been Grossly Exaggerated | Rotenberg et. al]]
* [[Beyond_Fear | Schneier]]
* [[The_Evolving_Landscape_of_Maritime_Cybersecurity | Shah]]
* [[Cyber_Terrorism | Stohl]]
* [[The Comprehensive National Cybersecurity Initiative | White House]], [[The National Strategy to Secure Cyberspace | [2]]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Cyber Warfare===
===Cyber Warfare===
Actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption. [http://cyber.law.harvard.edu/cybersecurity/Cyber_War Clarke]
Actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption. [[Cyber_War | Clarke]]


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Cyber_War Clarke]
* [[Security_Engineering | Anderson]]
* [http://cyber.law.harvard.edu/cybersecurity/Cyber_Security_and_Politically%2C_Socially_and_Religiously_Motivated_Cyber_Attacks#Full_Citation Cornish]
* [[A_Proposal_for_an_International_Convention_To_Regulate_the_Use_of_Information_Systems_in_Armed_Conflict | Brown]]
* [http://cyber.law.harvard.edu/cybersecurity/Critical_Infrastructure_Threats_and_Terrorism DCSINT]
* [[Cyber_War | Clarke]]
* [http://cyber.law.harvard.edu/cybersecurity/Global_Cyber_Deterrence Lan]
* [[Cyber_Security_and_Politically%2C_Socially_and_Religiously_Motivated_Cyber_Attacks#Full_Citation | Cornish]]
* [http://cyber.law.harvard.edu/cybersecurity/Estonia_Three_Years_Later Shackelford]
* [[Critical_Infrastructure_Threats_and_Terrorism | DCSINT]]
* [http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
* [[Mission_Impact_of_Foreign_Influence_on_DoD_Software | DoD]]
* [[An_Assessment_of_International_Legal_Issues_in_Information_Operations | DoD Office of General Counsel]]
* [[Applicability_of_the_Additional_Protocols_to_Computer_Network_Attacks | Dörmann]]
* [[Towards_a_Cyberspace_Legal_Regime_in_the_Twenty-First_Century | Dunlap]]
* [[Why_States_Need_an_International_Law_for_Information_Operations | Hollis]]
* [[Cyberpower and National Security | Kramer et. al]]
* [[Global_Cyber_Deterrence | Lan]]
* [[Critical_Foundations | PCCIP]]
* [[The Cyber War Threat Has Been Grossly Exaggerated | Rotenberg et. al]]
* [[Wired_Warfare | Schmitt]], [[Computers_and_War | [2]]], [[Computer_Network_Attack_and_the_Use_of_Force_in_International_Law | [3]]]
* [[Estonia_Three_Years_Later | Shackelford]]
* [[Solving_the_Dilemma_of_State_Responses_to_Cyberattacks | Sklerov]]
* [[Armed_Attack_in_Cyberspace | Todd]]
* [[Combatant_Status_and_Computer_Network_Attack | Watts]]
* [[The Comprehensive National Cybersecurity Initiative | White House]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Data Mining===
===Data Mining===
Line 131: Line 375:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Best_Practices_for_Data_Protection_and_Privacy#Synopsis Besunder]
* [[Best_Practices_for_Data_Protection_and_Privacy#Synopsis | Besunder]]
* [[The_Law_and_Economics_of_Cybersecurity | Grady and Parisi]]
* [[Schneier on Security | Schneier]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Department of Homeland Security===
===Department of Homeland Security===
Line 137: Line 385:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Information_Security GAO]
* [[Cyber_War | Clarke]]
* [[Mission_Impact_of_Foreign_Influence_on_DoD_Software | DoD]], [[Strategy_for_Homeland_Defense_and_Civil_Support | [2]]]
* [[The_National_Strategy_for_the_Physical_Protection_of_Critical_Infrastructures_and_Key_Assets | DHS]], [[A Roadmap for Cybersecurity Research | [2]]]
* [[Information_Security | GAO]]
* [[Cyber_Operations | Korns]]
* [[Cyberpower and National Security | Kramer et. al]]
* [[Hardening_The_Internet | National Infrastructure Advisory Council]]
* [[Cyber Security: A Crisis of Prioritization | PITAC]]
* [[The Cyber War Threat Has Been Grossly Exaggerated | Rotenberg et. al]]
* [[Schneier on Security | Schneier]], [[Schneier on Security | [2]]]
* [[The Comprehensive National Cybersecurity Initiative | White House]], [[The National Strategy to Secure Cyberspace | [2]]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''
 
===DDoS Attack===
The disabling of a targeted website or Internet connection by flooding it with such high levels of Internet traffic that it can no longer respond to normal connection requests.  Often mounted by directing an army of zombie computers (see [[#Botnet | botnet]]) to connect to the targeted site simultaneously.  The targeted site may crash while trying to respond to an overwhelming number of connections requests or it may be disabled because all available bandwidth and/or computing resources are tied up responding to the attack requests.
 
References:
* [[Why_Information_Security_is_Hard | Anderson]], [[Security_Engineering | [2]]]
* [[A_Proposal_for_an_International_Convention_To_Regulate_the_Use_of_Information_Systems_in_Armed_Conflict | Brown]]
* [[Four Grand Challenges in Trustworthy Computing | Computing Research Association]]
* [[Critical_Infrastructure_Threats_and_Terrorism | DCSINT]]
* [[Mission_Impact_of_Foreign_Influence_on_DoD_Software | DoD]]
* [[Towards_a_Cyberspace_Legal_Regime_in_the_Twenty-First_Century | Dunlap]]
* [[An_Inquiry_into_the_Nature_and_Causes_of_the_Wealth_of_Internet_Miscreants | Franklin. et. al]]
* [[2010 Top Cyber Security Risks Report | HP TippingPoint DVLabs]]
* [[Hardening_The_Internet | National Infrastructure Advisory Council]]
* [[National Cyber Leap Year Summit 2009, Co-Chairs' Report | NITRD]]
* [[Is_Cybersecurity_a_Public_Good | Powell]]
* [[The Cyber War Threat Has Been Grossly Exaggerated | Rotenberg et. al]]
* [[Solving_the_Dilemma_of_State_Responses_to_Cyberattacks | Sklerov]]
* [[Toward_a_Safer_and_More_Secure_Cyberspace | National Research Council]], [[Trust in Cyberspace | [2]]]
* [[The National Strategy to Secure Cyberspace | White House]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Digital Pearl Harbor===
===Digital Pearl Harbor===
A cyberwarfare attack similar in scale and surprise to the 1941 attack on Pearl Harbor.  The expression is often invoked by those who argue that a cyber-based attack is either imminent or inevitable and that by not being properly prepared, the United States will suffer significant and unnecessary losses.
A cyberwarfare attack similar in scale and surprise to the 1941 attack on Pearl Harbor.  The expression is often invoked by those who argue that a cyber-based attack is either imminent or inevitable and that by not being properly prepared, the United States will suffer significant and unnecessary losses.
AKA: Electronic Pearl Harbor; Cyber Pearl harbor


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/World_War_3.0:_Ten_Critical_Trends_for_Cybersecurity Cetron and Davies]
* [[World_War_3.0:_Ten_Critical_Trends_for_Cybersecurity | Cetron and Davies]]
* [http://cyber.law.harvard.edu/cybersecurity/Cyber_Terrorism Stohl]
* [[Cyberpower and National Security | Kramer et. al]]
* [[Toward_a_Safer_and_More_Secure_Cyberspace | National Research Council]]
* [[The Cyber War Threat Has Been Grossly Exaggerated | Rotenberg et. al]]
* [[Cyber_Terrorism | Stohl]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===DDoS Attack===
===Disclosure Policy===
The disabling of a targeted website or Internet connection by flooding it with such high levels of Internet traffic that it can no longer respond to normal connection requests.  Often mounted by directing an army of zombie computers (see [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Botnet botnet]) to connect to the targeted site simultaneously.  The targeted site may crash while trying to respond to an overwhelming number of connections requests or it may be disabled because all available bandwidth and/or computing resources are tied up responding to the attack requests.  
A policy that governs the disclosure to clients and other stakeholder by a provider of a computer program or system of defects discovered in those products.  


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Critical_Infrastructure_Threats_and_Terrorism DCSINT]
* [[Does_Information_Security_Attack_Frequency_Increase_With_Vulnerability_Disclosure | Arora et. al.]]
* [[Overcoming_Impediments_to_Information_Sharing | Aviram and Tor]]
* [[Modeling_Cyber-Insurance | Bohme and Schwartz]]
* [[Cyber-Insurance_Metrics_and_Impact_on_Cyber-Security | Clinton]]
* [[The_Price_of_Restricting_Vulnerability_Publications | Granick]]
* [[Managing_Information_Risk_and_the_Economics_of_Security | Johnson, E.]]
* [[An_Economic_Analysis_of_Notification_Requirements_for_Data_Security_Breaches | Lenard and Rubin]], [[Much_Ado_About_Notification | [2]]]
* [[Examining_the_Impact_of_Website_Take-down_on_Phishing | Moore and Clayton]], [[The_Consequence_of_Non-Cooperation_in_the_Fight_Against_Phishing | [2]]], [[The_Impact_of_Incentives_on_Notice_and_Take-down | [3]]]
* [[The_Economics_of_Online_Crime | Moore et. al.]]
* [[Do_Data_Breach_Disclosure_Laws_Reduce_Identity_Theft | Romanosky et. al.]]
* [[Schneier on Security | Schneier]]
* [[Notification_of_Data_Security_Breaches | Schwartz and Janger]]
* [[A_Model_for_When_Disclosure_Helps_Security | Swire]], [[A_Theory_of_Disclosure_for_Security_and_Competitive_Reasons | [2]]]
* [[Impact_of_Software_Vulnerability_Announcements_on_the_Market_Value_of_Software_Vendors | Telang and Wattal]]
* [[Insider_Threat_Study | U.S. Secret Service]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Distributed Denial of Service (DDoS)===
===Distributed Denial of Service (DDoS)===
See: [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#DDoS_Attack DDoS Attack]
See: [[#DDoS_Attack | DDoS Attack]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Dumpster Diving===
===Dumpster Diving===
A method of obtaining  proprietary, confidential or useful information by searching through trash discarded by a target.
A method of obtaining  proprietary, confidential or useful information by searching through trash discarded by a target.


References:
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''
 


===Einstein===
===Einstein===
The operational name of the National Cybersecurity Protection System (NCPS).  Cas created in 2003 by the United States Computer Emergency Readiness Team (US-CERT)14 in order to aid in its ability to help reduce and prevent computer network vulnerabilities across the federal government. The initial version of Einstein provided an automated process for collecting, correlating, and analyzing agencies’ computer network traffic information from sensors installed at their Internet connections. The Einstein sensors collected  
The operational name of the National Cybersecurity Protection System (NCPS).  Was created in 2003 by the United States Computer Emergency Readiness Team (US-CERT)14 in order to aid in its ability to help reduce and prevent computer network vulnerabilities across the federal government. The initial version of Einstein provided an automated process for collecting, correlating, and analyzing agencies’ computer network traffic information from sensors installed at their Internet connections. The Einstein sensors collected  
network flow records15 at participating agencies, which were then analyzed by US-CERT to detect certain types of malicious activity.
network flow records at participating agencies, which were then analyzed by US-CERT to detect certain types of malicious activity.


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Information_Security GAO]
* [[Information_Security | GAO]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===E.U. Cybersecurity===
===E.U. Cybersecurity===
Line 172: Line 480:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Introduction_to_Country_Reports#Key_Words ENISA]
* [[Security_Economics_and_the_Internal_Market | Anderson et. al.]]
* [[Securing_Cyberspace_for_the_44th_Presidency | Center for Strategic and International Studies]]
* [[Introduction_to_Country_Reports | ENISA]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''
 
===Generativity===
Generativity is a system’s capacity to produce unanticipated change through unfiltered contributions from broad and varied audiences.  
 
References:
 
*[[The_Future_of_the_Internet_and_How_To_Stop_It | Zittrain]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Geneva Conventions===
===Geneva Conventions===
Four treaties and three additional protocols that regulates the conduct of hostilities between states and set the standards for humanitarian treatment of the victims of war.
Four treaties and three additional protocols that regulates the conduct of hostilities between states and set the standards for humanitarian treatment of the victims of war.


See also: [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Laws_of_War Laws of War]
See also: [[#Laws_of_War | Laws of War]]


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
* [[A_Proposal_for_an_International_Convention_To_Regulate_the_Use_of_Information_Systems_in_Armed_Conflict | Brown]]
* [[Wired_Warfare | Schmitt]], [[Computers_and_War | 2]]
* [[Applicability_of_the_Additional_Protocols_to_Computer_Network_Attacks | Dörmann]]
* [[Why_States_Need_an_International_Law_for_Information_Operations | Hollis]]
* [[Combatant_Status_and_Computer_Network_Attack | Watts]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Hacker===
===Hacker===
Advanced computer users who spend a lot of time on or with computers and work hard to find vulnerabilities in IT systems. [http://cyber.law.harvard.edu/cybersecurity/Critical_Infrastructure_Threats_and_Terrorism DCSINT]
Advanced computer users who spend a lot of time on or with computers and work hard to find vulnerabilities in IT systems. [[Critical_Infrastructure_Threats_and_Terrorism | DCSINT]]


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Cybersecurity_in_the_Payment_Card_Industry#Key_Words Epstein and Brown]
* [[Security_Engineering | Anderson]]
* [http://cyber.law.harvard.edu/cybersecurity/Critical_Infrastructure_Threats_and_Terrorism DCSINT]
*[[Information_Warfare_and_International_Law_on_the_Use_of_Force | Barkham]]
* [[Cybersecurity_in_the_Payment_Card_Industry | Epstein and Brown]]
* [[Critical_Infrastructure_Threats_and_Terrorism | DCSINT]]
* [[Mission_Impact_of_Foreign_Influence_on_DoD_Software | DoD]]
* [[Cybersecurity%2C_Identity_Theft%2C_and_the_Limits_of_Tort_Liability | Johnson, V.]]
* [[Cyber_Operations | Korns]]
* [[McAfee Threats Report | McAfee]]
* [[Federal Plan for Cyber Security and Information Assurance Research and Development | National Science & Tech. Council]]
* [[Beyond_Fear | Schneier]]
* [[The_Underground_Economy | Thomas and Martin]]
* [[Solving_the_Dilemma_of_State_Responses_to_Cyberattacks | Sklerov]]
* [[Cyber_Terrorism | Stohl]]
* [[A_Model_for_When_Disclosure_Helps_Security | Swire]], [[A_Theory_of_Disclosure_for_Security_and_Competitive_Reasons | [2]]]
* [[Symantec Global Internet Security Threat Report | Symantec]]
* [[Impact_of_Software_Vulnerability_Announcements_on_the_Market_Value_of_Software_Vendors | Telang and Wattal]]
* [[2010 Data Breach Investigations Report | Verizon]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Hacktivism===
===Hacktivism===
Line 193: Line 537:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/World_War_3.0:_Ten_Critical_Trends_for_Cybersecurity Cetron and Davies]
* [[World_War_3.0:_Ten_Critical_Trends_for_Cybersecurity | Cetron and Davies]]
* [http://cyber.law.harvard.edu/cybersecurity/Cyber_Terrorism Stohl]
* [[Cyberpower and National Security | Kramer et. al]]
* [[Cyber_Terrorism | Stohl]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Hacktivist===
===Hacktivist===
Combination of [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Hacker hacker] and activist. Individuals that have a political motive for their activities, and identify that motivation by their actions, such as defacing opponents’ websites with counter-information or disinformation.
A portmanteau of [[#Hacker | "hacker"]] and "activist." Individuals that have a political motive for their activities, and identify that motivation by their actions, such as defacing opponents’ websites with counter-information or disinformation.


See also: [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Hacktivism Hacktivism]
See also: [[#Hacktivism | Hacktivism]]


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Critical_Infrastructure_Threats_and_Terrorism DCSINT]
* [[Critical_Infrastructure_Threats_and_Terrorism | DCSINT]]
* [[McAfee Threats Report | McAfee]]
* [[Cyber_Power | Nye]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Honeypot===
===Honeypot===
A computer, network or other information technology resource set as a trap to attract attacks.  Honeypots may be used to collect metrics (how long does it take for an unprotected system to be breached), to test defenses, to examine methods of attack or to catch attackers.  A honeypot system may also be used to collect [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#SPAM SPAM] so it can be added to a [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Blacklist blacklist].
A computer, network or other information technology resource set as a trap to attract attacks.  Honeypots may be used to collect metrics (how long does it take for an unprotected system to be breached), to test defenses, to examine methods of attack or to catch attackers.  A honeypot system may also be used to collect [[#SPAM | SPAM]] so it can be added to a [[#Blacklist | blacklist]].


References:
References:
* [[Security_Engineering | Anderson]]
* [[Does_Information_Security_Attack_Frequency_Increase_With_Vulnerability_Disclosure | Arora et. al.]]
* [[Models_and_Measures_for_Correlation_in_Cyber-Insurance | Bohme and Kataria]]
* [[A Roadmap for Cybersecurity Research | DHS]]
* [[Managing_Information_Risk_and_the_Economics_of_Security | Johnson, E.]]
* [[Toward_a_Safer_and_More_Secure_Cyberspace | National Research Council]]
* [[Beyond_Fear | Schneier]]
* [[Symantec Global Internet Security Threat Report | Symantec]]
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Identity Fraud/Theft===
===Identity Fraud/Theft===
Line 213: Line 574:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Cybersecurity%2C_Identity_Theft%2C_and_the_Limits_of_Tort_Liability Johnson]
* [[Security_Engineering | Anderson]]
* [[Economics_of_Information_Security | Camp and Wolfram]]
* [[2007_Malware_Report | Computer Economics]]
* [[Cybersecurity%2C_Identity_Theft%2C_and_the_Limits_of_Tort_Liability | Johnson, V.]]
* [[An_Economic_Analysis_of_Notification_Requirements_for_Data_Security_Breaches | Lenard and Rubin]], [[Much_Ado_About_Notification | [2]]]
* [[The_Impact_of_Incentives_on_Notice_and_Take-down | Moore and Clayton]]
* [[The_Economics_of_Online_Crime | Moore et. al.]]
* [[National_Cyber_Defense_Financial_Services_Workshop_Report | National Cyber Defense Initiative]]
* [[The_Underground_Economy | Thomas and Martin]]
* [[Do_Data_Breach_Disclosure_Laws_Reduce_Identity_Theft | Romanosky et. al.]]
* [[Beyond_Fear | Schneier]], [[Schneier on Security | [2]]]
* [[Notification_of_Data_Security_Breaches | Schwartz and Janger]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''
 
===Information Asymmetries===
Information asymmetry deals with the study of decisions in transactions where one party has more or better information than the other. This creates an imbalance of power in transactions which can sometimes cause the transactions to go awry.
 
The software market suffers from the same information asymmetry. Vendors may make claims about the security of their products, but buyers have no reason to trust them. In many cases, even the vendor does not know how secure its software is. So buyers have no reason to pay more for protection, and vendors are disinclined to invest in it.
 
References:
* [[Why_Information_Security_is_Hard | Anderson]]
* [[The_Economics_of_Information_Security | Anderson and Moore]]
* [[Security_Economics_and_the_Internal_Market | Anderson et. al.]]
* [[Overcoming_Impediments_to_Information_Sharing | Aviram and Tor]]
* [[Economics_of_Information_Security | Camp and Wolfram]]
* [[Cyber_War | Clarke]]
* [[Cyber-Insurance_Metrics_and_Impact_on_Cyber-Security | Clinton]]
* [[Towards_a_Cyberspace_Legal_Regime_in_the_Twenty-First_Century | Dunlap]]
* [[The_Price_of_Restricting_Vulnerability_Publications | Granick]]
* [[Managing_Information_Risk_and_the_Economics_of_Security | Johnson, E.]]
* [[Cyber_Operations | Korns]]
* [[Federal Plan for Cyber Security and Information Assurance Research and Development | National Science & Tech. Council]]
* [[Is_Cybersecurity_a_Public_Good | Powell]]
* [[Wired_Warfare | Schmitt]]
* [[Schneier on Security | Schneier]]
* [[Armed_Attack_in_Cyberspace | Todd]]
* [[System_Reliability_and_Free_Riding | Varian]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Intelligence Infrastructure/Information Infrastructure===
===Intelligence Infrastructure/Information Infrastructure===
Line 219: Line 619:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Nuclear_Security Aloise]
* [[Nuclear_Security | Aloise]]
* [http://cyber.law.harvard.edu/cybersecurity/Law_and_War_in_the_Virtual_Era Beard]
*[[Information_Warfare_and_International_Law_on_the_Use_of_Force | Barkham]]
* [http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye]
* [[Law_and_War_in_the_Virtual_Era | Beard]]
* [http://cyber.law.harvard.edu/cybersecurity/Evolving_Cybersecurity_Issues_in_the_Utility_Industry Perkins]
* [[Securing_Cyberspace_for_the_44th_Presidency | Center for Strategic and International Studies]]
* [[Critical_Infrastructure_Threats_and_Terrorism | DCSINT]]
* [[Mission_Impact_of_Foreign_Influence_on_DoD_Software | DoD]]
* [[Cyber_Operations | Korns]]
* [[National_Cyber_Defense_Financial_Services_Workshop_Report | National Cyber Defense Initiative]]
* [[Hardening_The_Internet | National Infrastructure Advisory Council]]
* [[Cyber_Power | Nye]]
* [[Evolving_Cybersecurity_Issues_in_the_Utility_Industry | Perkins]]
* [[The Cyber War Threat Has Been Grossly Exaggerated | Rotenberg et. al]]
* [[Beyond_Fear | Schneier]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''
 
===Information Operations===
Actions taken to affect adversary information and information systems while defending one’s own information and information systems.” Information Operations (IO) can occur during peacetime and at every level of warfare.
Information warfare (IW), by contrast, is IO “conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries” [Joint Chiefs of Staff, Department of Defense, Dictionary of Military and Associated Terms, Joint Publication]
 
References:
* [[Why_States_Need_an_International_Law_for_Information_Operations | Hollis]]
* [[Wired_Warfare | Schmitt]], [[Computers_and_War | [2]]], [[Computer_Network_Attack_and_the_Use_of_Force_in_International_Law | [3]]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Interdependencies===
===Interdependencies===
The inter-connections between supposedly independent but often interdependent systems.
The inter-connections between supposedly independent but often interdependent systems.


See also: [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#SCADA_Systems SCADA Systems]
See also: [[#SCADA_Systems | SCADA Systems]]


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Cybersecurity_and_Economic_Incentives OECD]
* [[The_Economics_of_Information_Security | Anderson and Moore]]
* [http://cyber.law.harvard.edu/cybersecurity/Evolving_Cybersecurity_Issues_in_the_Utility_Industry Perkins]
* [[Overcoming_Impediments_to_Information_Sharing | Aviram and Tor]]
* [http://cyber.law.harvard.edu/cybersecurity/A_Framework_for_Linking_Cybersecurity_Metrics_to_the_Modeling_of_Macroeconomic_Interdependencies Santos et al]
* [[Cyber-Insurance_Revisited | Bohme]]
* [[Models_and_Measures_for_Correlation_in_Cyber-Insurance | Bohme and Kataria]]
* [[Modeling_Cyber-Insurance | Bohme and Schwartz]]
* [[Cyber-Insurance_Metrics_and_Impact_on_Cyber-Security | Clinton]]
* [[Critical_Infrastructure_Threats_and_Terrorism | DCSINT]]
* [[The_National_Strategy_for_the_Physical_Protection_of_Critical_Infrastructures_and_Key_Assets | DHS]], [[A Roadmap for Cybersecurity Research | [2]]]
* [[Research Agenda for the Banking and Finance Sector | FSSCC]]
* [[Cyber Security Research and Development Agenda | Institute for Information Infrastructure Protection]]
* [[National_Cyber_Defense_Financial_Services_Workshop_Report | National Cyber Defense Initiative]]
* [[Trust in Cyberspace | National Research Council]]
* [[National Cyber Leap Year Summit 2009, Co-Chairs' Report | NITRD]]
* [[Cybersecurity_and_Economic_Incentives | OECD]]
* [[Critical_Foundations | PCCIP]]
* [[Evolving_Cybersecurity_Issues_in_the_Utility_Industry | Perkins]]
* [[A_Framework_for_Linking_Cybersecurity_Metrics_to_the_Modeling_of_Macroeconomic_Interdependencies | Santos et. al.]]
* [[Computer_Network_Attack_and_the_Use_of_Force_in_International_Law | Schmitt]]
* [[Beyond_Fear | Schneier]]
* [[Economics_of_Malware | van Eeten and Bauer]]
* [[System_Reliability_and_Free_Riding | Varian]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===International Humanitarian Law===
===International Humanitarian Law===
Line 238: Line 679:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Law_and_War_in_the_Virtual_Era Beard]
*[[Information_Warfare_and_International_Law_on_the_Use_of_Force | Barkham]]
* [http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
* [[Law_and_War_in_the_Virtual_Era | Beard]]
* [[Applicability_of_the_Additional_Protocols_to_Computer_Network_Attacks | Dörmann]]
* [[Armed_Attack_in_Cyberspace | Todd]]
* [[Wired_Warfare | Schmitt]], [[Computers_and_War | 2]]
* [[Solving_the_Dilemma_of_State_Responses_to_Cyberattacks | Sklerov]]
* [[Combatant_Status_and_Computer_Network_Attack | Watts]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Internet Relay Chat (IRC)===
===Internet Relay Chat (IRC)===
Line 245: Line 693:


References:
References:
* [[Security_Engineering | Anderson]]
* [[The_Underground_Economy | Thomas and Martin]]


''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Internet Service Providers===
===Internet Service Providers===
Line 251: Line 702:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/The_Market_Consequences_of_Cybersecurity:_Defining_Externalities_and_Ways_to_Address_Them#Synopsis OECD]
* [[Security_Engineering | Anderson]]
* [[The_Law_and_Economics_of_Cybersecurity | Grady and Parisi]]
* [[Managing_Information_Risk_and_the_Economics_of_Security | Johnson, E.]]
* [[The_Impact_of_Incentives_on_Notice_and_Take-down | Moore and Clayton]]
* [[Hardening_The_Internet | National Infrastructure Advisory Council]]
* [[National Cyber Leap Year Summit 2009, Co-Chairs' Report | NITRD]]
* [[The_Market_Consequences_of_Cybersecurity | OECD]]
* [[Economics_of_Malware | van Eeten and Bauer]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Keylogger===
===Keylogger===
Line 257: Line 717:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Critical_Infrastructure_Threats_and_Terrorism DCSINT]
* [[Security_Engineering | Anderson]]
* [[2007_Malware_Report | Computer Economics]]
* [[Critical_Infrastructure_Threats_and_Terrorism | DCSINT]]
* [[The_Underground_Economy | Thomas and Martin]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''
 
=== Kinetic Attack===
Traditional mode of warfare in which arms are used to kill opponents and/or destroy an opponent's infrastructure.  Usually used to distinguish a cyber attack in which destruction of the opponent's resources is accomplished through targeted information system attacks without resorting to bullets, bombs or explosives.
 
References:
* [[A_Proposal_for_an_International_Convention_To_Regulate_the_Use_of_Information_Systems_in_Armed_Conflict | Brown]]
* [[Why_States_Need_an_International_Law_for_Information_Operations | Hollis]]
* [[Computers_and_War | Schmitt]], [[Computers_and_War | 2]]
* [[An_Assessment_of_International_Legal_Issues_in_Information_Operations | DoD Office of General Counsel]]
* [[Towards_a_Cyberspace_Legal_Regime_in_the_Twenty-First_Century | Dunlap]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Lawfare===
===Lawfare===
Line 263: Line 740:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Law_and_War_in_the_Virtual_Era Beard]
*[[Information_Warfare_and_International_Law_on_the_Use_of_Force | Barkham]]
* [[Law_and_War_in_the_Virtual_Era | Beard]]
* [[A_Proposal_for_an_International_Convention_To_Regulate_the_Use_of_Information_Systems_in_Armed_Conflict | Brown]]
* [[An_Assessment_of_International_Legal_Issues_in_Information_Operations | DoD Office of General Counsel]]
* [[Towards_a_Cyberspace_Legal_Regime_in_the_Twenty-First_Century | Dunlap]]
* [[Armed_Attack_in_Cyberspace | Todd]]
* [[Wired_Warfare | Schmitt]], [[Computer_Network_Attack_and_the_Use_of_Force_in_International_Law | [2]]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Laws of War===
===Laws of War===
Line 269: Line 754:


References:
References:
* [[Information_Warfare_and_International_Law_on_the_Use_of_Force | Barkham]]
* [[Law_and_War_in_the_Virtual_Era | Beard]]
* [[A_Proposal_for_an_International_Convention_To_Regulate_the_Use_of_Information_Systems_in_Armed_Conflict | Brown]]
* [[An_Assessment_of_International_Legal_Issues_in_Information_Operations | DoD Office of General Counsel]]
* [[Applicability_of_the_Additional_Protocols_to_Computer_Network_Attacks | Dörmann]]
* [[Towards_a_Cyberspace_Legal_Regime_in_the_Twenty-First_Century | Dunlap]]
* [[Cyber-Apocalypse_Now | Gable]]
* [[Why_States_Need_an_International_Law_for_Information_Operations | Hollis]]
* [[Cyberpower and National Security | Kramer et. al]]
* [[Cyber_Power | Nye]]
* [[Wired_Warfare | Schmitt]], [[Computers_and_War | [2]]], [[Computer_Network_Attack_and_the_Use_of_Force_in_International_Law | [3]]]
* [[Solving_the_Dilemma_of_State_Responses_to_Cyberattacks | Sklerov]]
* [[Armed_Attack_in_Cyberspace | Todd]]
* [[Combatant_Status_and_Computer_Network_Attack | Watts]]


* [http://cyber.law.harvard.edu/cybersecurity/Law_and_War_in_the_Virtual_Era Beard]
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''
* [http://cyber.law.harvard.edu/cybersecurity/Cyber-Apocalypse_Now_-_Securing_the_Internet_Against_Cyberterrorism_and_Using_Universal_Jurisdiction_as_a_Deterrent Gable]
* [http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye]
* [http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]


===Malware===
===Malware===
Line 279: Line 775:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Critical_Infrastructure_Threats_and_Terrorism DCSINT]
* [[Security_Engineering | Anderson]]
* [http://cyber.law.harvard.edu/cybersecurity/Cybersecurity_in_the_Payment_Card_Industry#Key_Words Epstein and Brown]
* [[A_Proposal_for_an_International_Convention_To_Regulate_the_Use_of_Information_Systems_in_Armed_Conflict | Brown]]
* [[2007_Malware_Report | Computer Economics]]
* [[Four Grand Challenges in Trustworthy Computing | Computing Research Association]]
* [[Critical_Infrastructure_Threats_and_Terrorism | DCSINT]]
* [[A Roadmap for Cybersecurity Research | DHS]]
* [[Mission_Impact_of_Foreign_Influence_on_DoD_Software | DoD]]
* [[Cybersecurity_in_the_Payment_Card_Industry | Epstein and Brown]]
* [[2010 Top Cyber Security Risks Report | HP TippingPoint DVLabs]]
* [[Managing_Information_Risk_and_the_Economics_of_Security | Johnson, E.]]
* [[Cyber_Operations | Korns]]
* [[McAfee Threats Report | McAfee]]
* [[Hardening_The_Internet | National Infrastructure Advisory Council]]
* [[Federal Plan for Cyber Security and Information Assurance Research and Development | National Science & Tech. Council]]
* [[National Cyber Leap Year Summit 2009, Co-Chairs' Report | NITRD]]
* [[The Cyber War Threat Has Been Grossly Exaggerated | Rotenberg et. al]]
* [[Beyond_Fear | Schneier]]
* [[Solving_the_Dilemma_of_State_Responses_to_Cyberattacks | Sklerov]]
* [[Symantec Global Internet Security Threat Report | Symantec]]
* [[The_Underground_Economy | Thomas and Martin]]
* [[Trend Micro Annual Report | Trend Micro]]
* [[Economics_of_Malware | van Eeten and Bauer]]
* [[2010 Data Breach Investigations Report | Verizon]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===National Cybersecurity Strategy (U.S.)===
===National Cybersecurity Strategy (U.S.)===
Line 286: Line 805:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Cyber_Security_and_Regulation_in_the_United_States Lewis]
* [[Cyberpower and National Security | Kramer et. al]]
* [http://cyber.law.harvard.edu/cybersecurity/Cybersecurity:_Current_Legislation%2C_Executive_Branch_Initiatives%2C_and_Options_for_Congress Theohary and Rollins]
* [[Cyber_Security_and_Regulation_in_the_United_States | Lewis]]
* [http://cyber.law.harvard.edu/cybersecurity/Securing_Cyberspace_for_the_44th_Presidency Center for Strategic and International Studies]
* [[Cybersecurity:_Current_Legislation%2C_Executive_Branch_Initiatives%2C_and_Options_for_Congress | Theohary and Rollins]]
* [[Securing_Cyberspace_for_the_44th_Presidency | Center for Strategic and International Studies]]
* [[Critical_Foundations | PCCIP]]
* [[The National Strategy to Secure Cyberspace | White House]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===National Security===
===National Security===
Line 294: Line 818:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Nuclear_Security Aloise]
* [[Nuclear_Security | Aloise]]
* [http://cyber.law.harvard.edu/cybersecurity/Cyberspace_and_the_National_Security_of_the_United_Kingdom Cornish et. al.]
*[[Information_Warfare_and_International_Law_on_the_Use_of_Force | Barkham]]
* [http://cyber.law.harvard.edu/cybersecurity/Terrorist_Capabilities_for_Cyberattack:_Overview_and_Policy_Issues Rollins and Wilson]
* [[Cyberspace_and_the_National_Security_of_the_United_Kingdom | Cornish et. al.]]
* [http://cyber.law.harvard.edu/cybersecurity/Cybersecurity:_Current_Legislation%2C_Executive_Branch_Initiatives%2C_and_Options_for_Congress Theohary and Rollins]
* [[Critical_Infrastructure_Threats_and_Terrorism | DCSINT]]
* [[Mission_Impact_of_Foreign_Influence_on_DoD_Software | DoD]], [[Strategy_for_Homeland_Defense_and_Civil_Support | [2]]]
* [[An_Assessment_of_International_Legal_Issues_in_Information_Operations | DoD Office of General Counsel]]
* [[The_National_Strategy_for_the_Physical_Protection_of_Critical_Infrastructures_and_Key_Assets | DHS]], [[A Roadmap for Cybersecurity Research | [2]]]
* [[Why_States_Need_an_International_Law_for_Information_Operations | Hollis]]
* [[Cyber_Operations | Korns]]
* [[National_Cyber_Defense_Financial_Services_Workshop_Report | National Cyber Defense Initiative]]
* [[Terrorist_Capabilities_for_Cyberattack:_Overview_and_Policy_Issues | Rollins and Wilson]]
* [[Wired_Warfare | Schmitt]], [[Computer_Network_Attack_and_the_Use_of_Force_in_International_Law | [2]]]
* [[Beyond_Fear | Schneier]], [[Schneier on Security | [2]]]
* [[Solving_the_Dilemma_of_State_Responses_to_Cyberattacks | Sklerov]]
* [[Armed_Attack_in_Cyberspace | Todd]]
* [[Cybersecurity:_Current_Legislation%2C_Executive_Branch_Initiatives%2C_and_Options_for_Congress | Theohary and Rollins]]
* [[The Comprehensive National Cybersecurity Initiative | White House]], [[The National Strategy to Secure Cyberspace | [2]]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''
 
===New Normalcy===
New normalcy has become an episodic polict construct in U.S. strategic ideation. National leadership has relied on the new normalcy clarion call to illuminate moments in time when it is understood that the Nation faces not only a severe threat, but also a transcending reorientation. Often invoked in times of national crisis, new normalcy in the American experience signals a cardinal shift in the nature of U.S. security. ["Cyber Operations - The New Balance," Stephen W. Korns]
 
===Notice and Take-down===
Most commonly used to remove infringing web material under copyright law, a notice and take-down regime is a procedure by which an infringing web site is removed from a service provider's (ISP) network, or access to an allegedly infringing website, disabled. Websites violating copyright are subject to notice and take-down, as are phishing websites.
 
References:
* [[Managing_Information_Risk_and_the_Economics_of_Security | Johnson, E.]]
* [[The_Impact_of_Incentives_on_Notice_and_Take-down | Moore and Clayton]]
* [[The_Economics_of_Online_Crime | Moore et. al.]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Organized Crime===
===Organized Crime===
Line 303: Line 855:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Cyberspace_and_the_National_Security_of_the_United_Kingdom Cornish et. al.]
* [[Security_Engineering | Anderson]]
* [http://cyber.law.harvard.edu/cybersecurity/Cybersecurity_in_the_Payment_Card_Industry#Key_Words Epstein and Brown]
* [[Security_Economics_and_the_Internal_Market | Anderson et. al]]
* [[Cyberspace_and_the_National_Security_of_the_United_Kingdom | Cornish et. al.]]
* [[Cybersecurity_in_the_Payment_Card_Industry | Epstein and Brown]]
* [[An_Inquiry_into_the_Nature_and_Causes_of_the_Wealth_of_Internet_Miscreants | Franklin et. al]]
* [[Cyberpower and National Security | Kramer et. al]]
* [[The_Economics_of_Online_Crime | Moore et. al.]]
* [[Federal Plan for Cyber Security and Information Assurance Research and Development | National Science & Tech. Council]]
* [[2010 Data Breach Investigations Report | Verizon]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Outreach and Collaboration===
===Outreach and Collaboration===
Line 310: Line 871:


References:
References:
* [http://cyber.law.harvard.edu/cybersecurity/Introduction_to_Country_Reports#Key_Words ENISA]
* [[Overcoming_Impediments_to_Information_Sharing | Aviram and Tor]]
* [http://cyber.law.harvard.edu/cybersecurity/An_Economic_Analysis_of_the_Private_and_Social_Costs_of_the_Provision_of_Cybersecurity_and_other_Public_Security_Goods Kobayashi]
* [[Pricing_Security | Camp and Wolfram]]
* [http://cyber.law.harvard.edu/cybersecurity/Experiences_and_Challenges_with_Using_CERT_Data_to_Analyze_International_Cyber_Security Madnick et al]
* [[Securing_Cyberspace_for_the_44th_Presidency | Center for Strategic and International Studies]]
* [http://cyber.law.harvard.edu/cybersecurity/Cybersecurity:_Current_Legislation%2C_Executive_Branch_Initiatives%2C_and_Options_for_Congress Theohary and Rollins]
* [[Mission_Impact_of_Foreign_Influence_on_DoD_Software | DoD]], [[Strategy_for_Homeland_Defense_and_Civil_Support | [2]]]
* [[The_National_Strategy_for_the_Physical_Protection_of_Critical_Infrastructures_and_Key_Assets | DHS]], [[A Roadmap for Cybersecurity Research | [2]]]
* [[Introduction_to_Country_Reports | ENISA]]
* [[The_Price_of_Restricting_Vulnerability_Publications | Granick]]
*[[The_Law_and_Economics_of_Cybersecurity | Grady and Parisi]]
* [[An_Economic_Analysis_of_the_Private_and_Social_Costs_of_the_Provision_of_Cybersecurity_and_other_Public_Security_Goods | Kobayashi]]
* [[Experiences_and_Challenges_with_Using_CERT_Data_to_Analyze_International_Cyber_Security | Madnick et. al.]]
* [[The_Consequence_of_Non-Cooperation_in_the_Fight_Against_Phishing | Moore and Clayton]]
* [[National_Cyber_Defense_Financial_Services_Workshop_Report | National Cyber Defense Initiative]]
* [[Cybersecurity:_Current_Legislation%2C_Executive_Branch_Initiatives%2C_and_Options_for_Congress | Theohary and Rollins]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Password Weakness===
===Password Weakness===
Security threats due to easily guessable passwords which protect vital stores of confidential information stored online.
Security threats caused by the use of easily guessable passwords which protect vital stores of confidential information stored online.
 
References:
* [[Security_Engineering | Anderson]]
* [[Cybersecurity%2C_Identity_Theft%2C_and_the_Limits_of_Tort_Liability | Johnson, V.]]
* [[2010 Data Breach Investigations Report | Verizon]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''
 
===Patching===
Patching refers to the installation of a piece of software designed to fix problems  with, or update a computer program or its supporting data. This includes fixing security vulnerabilities and other bugs, and improving the usability  or performance. Though meant to fix problems, poorly designed patches can sometimes introduce new problems. [http://en.wikipedia.org/wiki/Patch_%28computing%29 Wikipedia]


References:
References:
* [[Security_Engineering | Anderson]]
* [[Does_Information_Security_Attack_Frequency_Increase_With_Vulnerability_Disclosure | Arora et. al.]]
* [[Four Grand Challenges in Trustworthy Computing | Computing Research Association]]
* [[Research Agenda for the Banking and Finance Sector | FSSCC]]
* [[2010 Top Cyber Security Risks Report | HP TippingPoint DVLabs]]
* [[Cyber Security Research and Development Agenda | Institute for Information Infrastructure Protection]]
* [[Managing_Information_Risk_and_the_Economics_of_Security | Johnson, E.]]
* [[National Cyber Leap Year Summit 2009, Co-Chairs' Report | NITRD]]
* [[Cyber Security: A Crisis of Prioritization | PITAC]]
* [[Symantec Global Internet Security Threat Report | Symantec]]
* [[Trend Micro Annual Report | Trend Micro]]
* [[2010 Data Breach Investigations Report | Verizon]]


''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Phishing===
===Phishing===
The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
References:
* [[Security_Engineering | Anderson]]
* [[Security_Economics_and_the_Internal_Market | Anderson et. al.]]
* [[Models_and_Measures_for_Correlation_in_Cyber-Insurance | Bohme and Kataria]]
* [[Modeling_Cyber-Insurance | Bohme and Schwartz]],
* [[2007_Malware_Report | Computer Economics]]
* [[Managing_Information_Risk_and_the_Economics_of_Security | Johnson, E.]]
* [[McAfee Threats Report | McAfee]]
* [[Examining_the_Impact_of_Website_Take-down_on_Phishing | Moore and Clayton]], [[The_Consequence_of_Non-Cooperation_in_the_Fight_Against_Phishing | [2]]], [[The_Impact_of_Incentives_on_Notice_and_Take-down | [3]]]
* [[The_Economics_of_Online_Crime | Moore et. al.]]
* [[Hardening_The_Internet | National Infrastructure Advisory Council]]
* [[Schneier on Security | Schneier]]
* [[Symantec Global Internet Security Threat Report | Symantec]]
* [[Trend Micro Annual Report | Trend Micro]]


The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Privacy Law===
===Privacy Law===
[http://cyber.law.harvard.edu/cybersecurity/Best_Practices_for_Data_Protection_and_Privacy#Synopsis Besunder]
Laws which regulate the protection of confidential personal information stored in private records or disclosed to a professional. Also includes laws which regulate the gathering of electronic data in which personal information is accumulated or misappropriated.


===Risk Modeling===
References:
* [[Best_Practices_for_Data_Protection_and_Privacy | Besunder]]
* [[Securing_Cyberspace_for_the_44th_Presidency | Center for Strategic and International Studies]]
* [[A Roadmap for Cybersecurity Research | DHS]]
* [[Strategy_for_Homeland_Defense_and_Civil_Support | DoD]]


[http://cyber.law.harvard.edu/cybersecurity/An_Economic_Analysis_of_the_Private_and_Social_Costs_of_the_Provision_of_Cybersecurity_and_other_Public_Security_Goods Kobayashi]
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


[http://cyber.law.harvard.edu/cybersecurity/Making_the_Best_Use_of_Cybersecurity_Economic_Models Rue and Pfleeger]
===Red Team===
A structured, iterative process executed by trained, educated and practiced team members that provides commanders an independent capability to continuously challenge plans, operations, concepts, organizations and capabilities in the context of the operational environment and from our partners’ and adversaries’ perspectives. See [http://www.tradoc.army.mil/pao/tnsarchives/July05/070205.htm U.S. Army]


[http://cyber.law.harvard.edu/cybersecurity/Metrics_for_Mitigating_Cybersecurity_Threats_to_Networks Schneidewind]
References:
 
* [[Critical_Infrastructure_Threats_and_Terrorism | Deputy Chief of Staff for Intelligence]]
[http://cyber.law.harvard.edu/cybersecurity/A_Framework_for_Linking_Cybersecurity_Metrics_to_the_Modeling_of_Macroeconomic_Interdependencies Santos et al]
* [[Federal Plan for Cyber Security and Information Assurance Research and Development | National Science & Tech. Council]]


[http://cyber.law.harvard.edu/cybersecurity/Nothing_Ventured%2C_Nothing_Gained Geer and Conway]
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Research & Development===
===Research & Development===
Research and development (R&D) addressing cyber security and information infrastructure protection.


[http://cyber.law.harvard.edu/cybersecurity/Toward_a_Safer_and_More_Secure_Cyberspace Commission on Improving Cybersecurity Research in the U. S.]
References:
* [[Pricing_Security | Camp and Wolfram]]
* [[Four Grand Challenges in Trustworthy Computing | Computing Research Association]]
* [[Mission_Impact_of_Foreign_Influence_on_DoD_Software | DoD]]
* [[Research_Agenda_for_the_Banking_and_Finance_Sector | Financial Services Sector Coordinating Council for Critical Infrastructure Protection]]
* [[Nothing_Ventured%2C_Nothing_Gained | Geer and Conway]]
* [[Cyber_Security_Research_and_Development_Agenda | Institute for Information Infrastructure Protection]]
* [[The_Need_for_a_National_Cybersecurity_Research_and_Development_Agenda | Maughan]]
* [[National_Cyber_Defense_Financial_Services_Workshop_Report | National Cyber Defense Initiative]]
* [[Hardening_The_Internet | National Infrastructure Advisory Council]]
* [[Federal Plan for Cyber Security and Information Assurance Research and Development | National Science & Tech. Council]]
* [[National Cyber Leap Year Summit 2009, Co-Chairs' Report | NITRD]]
* [[Critical_Foundations | PCCIP]]
* [[Cyber Security: A Crisis of Prioritization | PITAC]]
* [[Toward_a_Safer_and_More_Secure_Cyberspace | National Research Council]], [[Trust in Cyberspace | [2]]]


[http://cyber.law.harvard.edu/cybersecurity/Research_Agenda_for_the_Banking_and_Finance_Sector Financial Services Sector Coordinating Council for Critical Infrastructure Protection]
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


[http://cyber.law.harvard.edu/cybersecurity/Nothing_Ventured%2C_Nothing_Gained Geer and Conway]
===Risk Modeling===
The creation of a model to estimate risk exposure, policy option efficacy and cost-benefit analysis of a particular threat and solution. See [http://cisac.stanford.edu/publications/how_much_is_enough__a_riskmanagement_approach_to_computer_security/ Soo Hoo, Kevin J.]


[http://cyber.law.harvard.edu/cybersecurity/Hard_Problem_List INFOSEC Research Council]
References:
* [[Models_and_Measures_for_Correlation_in_Cyber-Insurance | Bohme and Kataria]]
* [[Modeling_Cyber-Insurance | Bohme and Schwartz]]
* [[Cyber-Insurance_Metrics_and_Impact_on_Cyber-Security | Clinton]]
* [[Nothing_Ventured%2C_Nothing_Gained | Geer and Conway]]
* [[An_Economic_Analysis_of_the_Private_and_Social_Costs_of_the_Provision_of_Cybersecurity_and_other_Public_Security_Goods | Kobayashi]]
* [[Mission_Impact_of_Foreign_Influence_on_DoD_Software | DoD]]
* [[Managing_Information_Risk_and_the_Economics_of_Security | Johnson, E.]]
* [[National_Cyber_Defense_Financial_Services_Workshop_Report | National Cyber Defense Initiative]]
* [[Making_the_Best_Use_of_Cybersecurity_Economic_Models | Rue and Pfleeger]]
* [[Toward_a_Safer_and_More_Secure_Cyberspace | National Research Council]], [[Trust in Cyberspace | [2]]]
* [[A_Framework_for_Linking_Cybersecurity_Metrics_to_the_Modeling_of_Macroeconomic_Interdependencies | Santos et. al.]]
* [[Metrics_for_Mitigating_Cybersecurity_Threats_to_Networks | Schneidewind]]
* [[Beyond_Fear | Schneier]]
* [[Managing_Online_Security_Risks | Varian]]


[http://cyber.law.harvard.edu/cybersecurity/Cyber_Security_Research_and_Development_Agenda Institute for Information Infrastructure Protection]
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''
 
[http://cyber.law.harvard.edu/cybersecurity/The_Need_for_a_National_Cybersecurity_Research_and_Development_Agenda Maughan]


===SCADA Systems===
===SCADA Systems===
[http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye]
SCADA stands for "supervisory control and data acquisition" and in the cybersecurity context usually refers to industrial control systems that control infrastructure such as electrical power transmission and distribution, water treatment and distribution, wastewater collection and treatment, oil and gas pipelines and large communication systems. The focus is on whether as these systems are connected to the public Internet they become vulnerable to a remote attack.


[http://cyber.law.harvard.edu/cybersecurity/Metrics_for_Mitigating_Cybersecurity_Threats_to_Networks Schneidewind]
References:
* [[Towards_a_Cyberspace_Legal_Regime_in_the_Twenty-First_Century | Dunlap]]
* [[Cyberpower and National Security | Kramer et. al]]
* [[Toward_a_Safer_and_More_Secure_Cyberspace | National Research Council]], [[Trust in Cyberspace | [2]]]
* [[Federal Plan for Cyber Security and Information Assurance Research and Development | National Science & Tech. Council]]
* [[Cyber_Power | Nye]]
* [[Critical_Foundations | PCCIP]]
* [[Cyber Security: A Crisis of Prioritization | PITAC]]
* [[A_Framework_for_Linking_Cybersecurity_Metrics_to_the_Modeling_of_Macroeconomic_Interdependencies | Santos et. al.]]
* [[Metrics_for_Mitigating_Cybersecurity_Threats_to_Networks | Schneidewind]]
* [[The National Strategy to Secure Cyberspace | White House]]


[http://cyber.law.harvard.edu/cybersecurity/A_Framework_for_Linking_Cybersecurity_Metrics_to_the_Modeling_of_Macroeconomic_Interdependencies Santos et al]
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Scareware===
===Scareware===
Software or web site that purports to be security software reporting a threat against a user's computer to convince the user to purchase unneeded software or install malware.
* [[2007_Malware_Report | Computer Economics]]
* [[McAfee Threats Report | McAfee]]
* [[The_Economics_of_Online_Crime | Moore et. al.]]
* [[Symantec Global Internet Security Threat Report | Symantec]]
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Script Kiddie===
===Script Kiddie===
A derogatory term for a [[#Black_Hat | Black Hat]] who uses canned tools and programs written by more skillful [[#Hacker | hackers]] to commit cyber crime without understanding how they work.
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''
===Security Trade-Offs===
There is no single correct level of security; how much security you have depends on what you’re willing to give up in order to get it. This trade-off is, by its very nature, subjective—secu- rity decisions are based on personal judgments. Different people have different senses of what constitutes a threat, or what level of risk is acceptable. What’s more, between different commu- nities, or organizations, or even entire societies, there is no agreed-upon way in which to define threats or evaluate risks, and the modern technological and media-filled world makes these evaluations even harder. [http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 Bruce Schneier]
References:
*[[Cyber-Insurance_Revisited | Bohme]]
* [[Cyber_Operations | Korns]]
* [[Beyond_Fear | Schneier]]
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Shoulder Surfing===
===Shoulder Surfing===
The process of obtaining passwords or other sensitive information by covertly watching an authorized user enter information into a computer system.
References:
* [[Security_Engineering | Anderson]]
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''
===Sneakernet===
Describes the transfer of data between computers or networks that are not physically, electrically or electromagnetically connected requiring information to be shared by physically transporting media contain the shared information from one computer to another.  Initially described systems lacking the technology to network together, now usually refers to systems deliberately isolated for security reasons.
See also: [[#Air-Gapped_Network | Air-Gapped Network]]


===Social Engineering===
===Social Engineering===
* [http://cyber.law.harvard.edu/cybersecurity/The_Market_Consequences_of_Cybersecurity:_Defining_Externalities_and_Ways_to_Address_Them#Synopsis OECD] [http://cyber.law.harvard.edu/cybersecurity/Cybersecurity_and_Economic_Incentive 2]
Conning a human into supplying passwords, computer access or other sensitive information by pretending to be a person with rights to the information or who the target believes they must surrender the information to.


* [http://cyber.law.harvard.edu/cybersecurity/Emerging_Threats_to_Internet_Security_-_Incentives%2C_Externalities_and_Policy_Implications Bauer and van Eeten]
References:
* [[Security_Engineering | Anderson]]
* [[Emerging_Threats_to_Internet_Security_-_Incentives%2C_Externalities_and_Policy_Implications | Bauer and van Eeten]]
* [[Cyber_Power | Nye]]
* [[The_Market_Consequences_of_Cybersecurity:_Defining_Externalities_and_Ways_to_Address_Them | OECD]], [[Cybersecurity_and_Economic_Incentives | [2]]]
* [[Symantec Global Internet Security Threat Report | Symantec]]
* [[Trend Micro Annual Report | Trend Micro]]
* [[2010 Data Breach Investigations Report | Verizon]]


* [http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye]
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Social Network===
===Social Network===
A software application or website that allows a large group of users to interact with each other, often allowing the creation of online portals or identities to share with specific people or the online world at large.
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''
===Software Vulnerability===
A software vulnerablilty refers to the existence of a flaw -- or "bug" -- in software that may allow a third party or program to obtain unauthorized access to the flaw and exploit it. [http://www.spi.dod.mil/tenets.htm U.S. Air Force Software Protection Initiative]
References:
* [[Security_Engineering | Anderson]]
* [[Does Information Security Attack Frequency Increase With Vulnerability Disclosure | Arora et. al.]]
* [[Four Grand Challenges in Trustworthy Computing | Computing Research Association]]
* [[Mission Impact of Foreign Influence on DoD Software | DoD]]
* [[Research Agenda for the Banking and Finance Sector | FSSCC]]
* [[The Price of Restricting Vulnerability Publications | Granick]]
* [[Cyber Security Research and Development Agenda | Institute for Information Infrastructure Protection]]
* [[National_Cyber_Defense_Financial_Services_Workshop_Report | National Cyber Defense Initiative]]
* [[National Cyber Leap Year Summit 2009, Co-Chairs' Report | NITRD]]
* [[Cyber Security: A Crisis of Prioritization | PITAC]]
* [[Toward_a_Safer_and_More_Secure_Cyberspace | National Research Council]], [[Trust in Cyberspace | [2]]]
* [[A_Model_for_When_Disclosure_Helps_Security | Swire]], [[A_Theory_of_Disclosure_for_Security_and_Competitive_Reasons | [2]]]
* [[Impact_of_Software_Vulnerability_Announcements_on_the_Market_Value_of_Software_Vendors | Telang and Wattal]]
* [[Insider_Threat_Study | U.S. Secret Service]]
* [[Economics_of_Malware | van Eeten and Bauer]]
* [[2010 Data Breach Investigations Report | Verizon]]
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===SPAM===
===SPAM===
Unwanted or junk email usually sent indiscriminately in bulk selling illegal or near illegal goods or services.  Even with low response rates and heavy filtering, SPAM can stil be economically viable because of the extremely low costs in sending even huge quantities of electronic messages.  Commonly believed to be named after the [http://www.youtube.com/watch?v=anwy2MPT5RE Monty Python skit] where the breakfast meat Spam overwhelms all other food choices.
References:
* [[Security_Engineering | Anderson]]
* [[Models_and_Measures_for_Correlation_in_Cyber-Insurance | Bohme and Kataria]]
* [[Modeling_Cyber-Insurance | Bohme and Schwartz]]
* [[2010 Top Cyber Security Risks Report | HP TippingPoint DVLabs]]
* [[Managing_Information_Risk_and_the_Economics_of_Security | Johnson, E.]]
* [[McAfee Threats Report | McAfee]]
* [[The_Impact_of_Incentives_on_Notice_and_Take-down | Moore and Clayton]]
* [[The_Economics_of_Online_Crime | Moore et. al.]]
* [[Toward_a_Safer_and_More_Secure_Cyberspace | National Research Council]]
* [[Schneier on Security | Schneier]]
* [[Symantec Global Internet Security Threat Report | Symantec]]
* [[The_Underground_Economy | Thomas and Martin]]
* [[Trend Micro Annual Report | Trend Micro]]
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Sponsored Attacks===
===Sponsored Attacks===
[http://cyber.law.harvard.edu/cybersecurity/The_Government_and_Cybersecurity Bellovin]
[[#Computer_Network_Attack | Computer network attacks]] commissioned by, supported by or carried out by a state or government.
 
Reverences:
* [[The_Government_and_Cybersecurity | Bellovin]]
* [[Mission_Impact_of_Foreign_Influence_on_DoD_Software | DoD]]
* [[Cyber_Operations | Korns]]
* [[National_Cyber_Defense_Financial_Services_Workshop_Report | National Cyber Defense Initiative]]
* [[Beyond_Fear | Schneier]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===State Affiliation===
===State Affiliation===
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
Under the control or command of a recognized state or government.


[http://cyber.law.harvard.edu/cybersecurity/Cyber_Security_and_Politically%2C_Socially_and_Religiously_Motivated_Cyber_Attacks#Full_Citation Cornish]
References:
* [[Cyber_Security_and_Politically%2C_Socially_and_Religiously_Motivated_Cyber_Attacks | Cornish]]
* [[Cyberspace_and_the_National_Security_of_the_United_Kingdom | Cornish et. al.]]
* [[Mission_Impact_of_Foreign_Influence_on_DoD_Software | DoD]]
* [[Cyber-Apocalypse_Now_-_Securing_the_Internet_Against_Cyberterrorism_and_Using_Universal_Jurisdiction_as_a_Deterrent | Gable]]
* [[Managing_Information_Risk_and_the_Economics_of_Security | Johnson, E.]]
* [[National_Cyber_Defense_Financial_Services_Workshop_Report | National Cyber Defense Initiative]]
* [[Armed_Attack_in_Cyberspace | Todd]]
* [[The Cyber War Threat Has Been Grossly Exaggerated | Rotenberg et. al]]
* [[Wired_Warfare | Schmitt]], [[Computers_and_War | 2]]
* [[Solving_the_Dilemma_of_State_Responses_to_Cyberattacks | Sklerov]]
* [[Combatant_Status_and_Computer_Network_Attack | Watts]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''
 
===Tragedy of Commons===
A situation, first described in an influential article written by ecologist Garrett Hardin for the journal Science, in 1968, in which multiple individuals, acting independently, and solely and rationally consulting their own self-interest, will ultimately deplete a shared limited resource even when it is clear that it is not in anyone's long-term interest for this to happen. The term can be applied to any issue related to the management of a shared resource, from energy to the public domain, to cybersecurity.


[http://cyber.law.harvard.edu/cybersecurity/Cyberspace_and_the_National_Security_of_the_United_Kingdom Cornish et. al.]
References:
* [[Why_Information_Security_is_Hard | Anderson]]
* [[Economics_of_Information_Security | Camp and Wolfram]]
* [[Managing_Information_Risk_and_the_Economics_of_Security | Johnson, E.]]
* [[Is_Cybersecurity_a_Public_Good | Powell]]


[http://cyber.law.harvard.edu/cybersecurity/Cyber-Apocalypse_Now_-_Securing_the_Internet_Against_Cyberterrorism_and_Using_Universal_Jurisdiction_as_a_Deterrent Gable]
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Transparency===
===Transparency===
A set of policies, practices and procedures that allow citizens to have accessibility, usability, informativeness, understandability and auditability of information and process held by centers of authority.
A set of policies, practices and procedures that allow citizens to have accessibility, usability, informativeness, understandability and auditability of information and process held by centers of authority. [http://en.wikipedia.org/wiki/Transparency_(social) Wikipedia]


References:
References:
* [[Overcoming_Impediments_to_Information_Sharing | Aviram and Tor]]
* [[Research Agenda for the Banking and Finance Sector | FSSCC]]
* [[An_Economic_Analysis_of_Notification_Requirements_for_Data_Security_Breaches | Lenard and Rubin]], [[Much_Ado_About_Notification | [2]]]
* [[Managing_Information_Risk_and_the_Economics_of_Security | Johnson, E.]]
* [[Cyber_Operations | Korns]]
* [[Do_Data_Breach_Disclosure_Laws_Reduce_Identity_Theft | Romanosky et. al.]]
* [[Beyond_Fear | Schneier]]
* [[A_Model_for_When_Disclosure_Helps_Security | Swire]], [[A_Theory_of_Disclosure_for_Security_and_Competitive_Reasons | [2]]]
* [[Impact_of_Software_Vulnerability_Announcements_on_the_Market_Value_of_Software_Vendors | Telang and Wattal]]
* [[The_Future_of_the_Internet_and_How_To_Stop_It | Zittrain]]


[http://cyber.law.harvard.edu/cybersecurity/Research_Agenda_for_the_Banking_and_Finance_Sector Financial Services Sector Coordinating Council for Critical Infrastructure Protection]
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Trojan===
===Trojan===
[[#Malware | Malware]] which masquerades as some other type of program such as a link to a web site, a desirable image, etc. to trick a user into installing it.  Named for the Ancient Greek legend of the [http://www.mlahanas.de/Greeks/Mythology/TrojanHorse.html Trojan Horse].
References:
* [[Security_Engineering | Anderson]]
* [[2010 Top Cyber Security Risks Report | HP TippingPoint DVLabs]]
* [[Cyber_Operations | Korns]]
* [[McAfee Threats Report | McAfee]]
* [[The_Economics_of_Online_Crime | Moore et. al.]]
* [[Beyond_Fear | Schneier]]
* [[Solving_the_Dilemma_of_State_Responses_to_Cyberattacks | Sklerov]]
* [[Symantec Global Internet Security Threat Report | Symantec]]
* [[Trend Micro Annual Report | Trend Micro]]


''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Virtual Military Technologies===
===Virtual Military Technologies===
[http://cyber.law.harvard.edu/cybersecurity/Law_and_War_in_the_Virtual_Era Beard]
Warfare made possible by advances in remotely controlled or semiautomated military technologies which remove the operator from risk of harm while attacking an opponent.
[http://cyber.law.harvard.edu/cybersecurity/Global_Cyber_Deterrence_Views_from_China Lan]
 
References:
* [[Information_Warfare_and_International_Law_on_the_Use_of_Force | Barkham]]
* [[Law_and_War_in_the_Virtual_Era | Beard]]
* [[Critical_Infrastructure_Threats_and_Terrorism | DCSINT]]
* [[Global_Cyber_Deterrence_Views_from_China | Lan]]
* [[Wired_Warfare | Schmitt]], [[Computers_and_War | 2]]
* [[Critical_Foundations | PCCIP]]
* [[Armed_Attack_in_Cyberspace | Todd]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Virtual Warfare===
===Virtual Warfare===
[http://cyber.law.harvard.edu/cybersecurity/Law_and_War_in_the_Virtual_Era Beard]
 
See: [[#Virtual_Military_Technologies | Virtual Military Technologies]]
 
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===White Hat===
===White Hat===
A white hat is a computer [[#Hacker | hacker]] who works to find and fix computer security risks.  White hat consultants are often hired to attempt to break into their client's network to see if all security holes have been addressed.
See also: [[#Black_Hat | Black Hat]]
References:
* [[Security_Engineering | Anderson]], [[Why_Information_Security_is_Hard | [2]]]
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Whitelist===
===Whitelist===
A list of computers, IP addresses, user names or other identifiers to specifically allow access to a computing resource.  Normally combined with a default "no-access" policy.
A list of computers, IP (Internet Protocol) addresses, user names or other identifiers to specifically allow access to a computing resource.  Normally combined with a default "no-access" policy.


See also: [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Blacklist Blacklist]
See also: [[#Blacklist | Blacklist]]


References:
* [[Security_Engineering | Anderson]]
* [[Symantec Global Internet Security Threat Report | Symantec]]
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Worm===
===Worm===
A type of malware that replicates itself and spreads to other computers through network connections.
References:
* [[Security_Engineering | Anderson]]
* [[Models_and_Measures_for_Correlation_in_Cyber-Insurance | Bohme and Kataria]]
* [[Modeling_Cyber-Insurance | Bohme and Schwartz]]
* [[Mission_Impact_of_Foreign_Influence_on_DoD_Software | DoD]]
* [[2010 Top Cyber Security Risks Report | HP TippingPoint DVLabs]]
* [[Cyber_Operations | Korns]]
* [[Hardening_The_Internet | National Infrastructure Advisory Council]]
* [[Toward_a_Safer_and_More_Secure_Cyberspace | National Research Council]]
* [[National Cyber Leap Year Summit 2009, Co-Chairs' Report | NITRD]]
* [[Beyond_Fear | Schneier]], [[Schneier on Security | [2]]]
* [[Solving_the_Dilemma_of_State_Responses_to_Cyberattacks | Sklerov]]
* [[Symantec Global Internet Security Threat Report | Symantec]]
* [[Trend Micro Annual Report | Trend Micro]]
* [[The_Future_of_the_Internet_and_How_To_Stop_It | Zittrain]]
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''


===Zero-Day Exploit===
===Zero-Day Exploit===
[[#Malware | Malware]] designed to exploit a newly discovered security hole unknown to the software developer.  "Zero-day" refers to the amount of time a developer has between learning of a security hole and the time it becomes public or when [[#Black_Hat | black hat]] [[#Hacker | hackers]] find out about it and try to use the security hole for nefarious purposes.
References:
* [[Security_Engineering | Anderson]]
* [[Does_Information_Security_Attack_Frequency_Increase_With_Vulnerability_Disclosure | Arora et. al.]]
* [[Mission_Impact_of_Foreign_Influence_on_DoD_Software | DoD]]
* [[The_Price_of_Restricting_Vulnerability_Publications | Granick]]
* [[2010 Top Cyber Security Risks Report | HP TippingPoint DVLabs]]
* [[McAfee Threats Report | McAfee]]
* [[Symantec Global Internet Security Threat Report | Symantec]]
* [[Trend Micro Annual Report | Trend Micro]]
''[[Keyword_Index_and_Glossary_of_Core_Ideas#Top | Jump to top of Glossary]]''

Latest revision as of 15:43, 7 August 2012

This page is outdated. The keywords function has been deprecated in recent updates of the wiki. If you choose use this index, be advised that it only contains articles that have been uploaded prior to September 2011. For a comprehensive list of article categories please consult the Table of Contents.


Keyword Index and Glossary of Core Ideas

Air-Gapped Network

Air gapping is a security measure that isolates a secure network from unsecure networks physically, electrically and electromagnetically.

See also: Sneakernet

Jump to top of Glossary

Antivirus

Software which attempts to identify and delete or isolate malware. Antivirus software may use both a database containing signatures of known threats and heuristics to identify malware. Usually run as a background service to scan files and email copied to the protected system.

References:

Jump to top of Glossary

Best Practices

The processes, practices, and systems identified in public and private organizations that performed exceptionally well and are widely recognized as improving an organization's performance and efficiency in specific areas. Successfully identifying and applying best practices can reduce business expenses and improve organizational efficiency. GAO Glossary

Black Hat

A black hat is a computer hacker who works to harm others (e.g., steal identities, spread computer viruses, install bot software).

See also: White Hat

References:

Jump to top of Glossary

Blacklist

A list of computers, IP addresses, user names or other identifiers to block from access to a computing resource.

See also: Whitelist

References:

Jump to top of Glossary

Botnet

A portmanteau of "robot" and "network." Refers to networks of sometimes millions of infected machines that are remotely controlled by malicious actors. A single infected computer may be referred to as a zombie computer. The owners of the computer remotely controlled is often unaware of the infection. The owners of a botnet may use the combined network processing power and bandwidth to send SPAM, install malware and mount DDoS attacks or may rent out the botnet to other malicious actors.

References:

Jump to top of Glossary

Casus Belli

The justification for going to war. From the Latin "casus" meaning "incident" or "event" and "belli" meaning "of war."

References:

Jump to top of Glossary

Civilian Participation

The involvement of non-military persons in warfare. While civilians have often provided support to the military in kinetic wars, in cyber warfare civilians are able to remotely participate in direct attacks against opponents. This raises complicated questions of law when the combatants are not uniformed military personnel.

References:

Jump to top of Glossary

Combatant Status

The legal status of combatants in warfare. Existing law distinguishes between uniformed military and civilian status.

References:

Jump to top of Glossary

Communications Privacy Law

Laws which regulate access to electronic communications. In the United States, the Electronic Communications Privacy Act (ECPA) protects electronic communications while in transit and prohibits the unlawful access and disclosure of communication contents.

References:

Jump to top of Glossary

Computer Emergency Response Team

A group of experts brought together to deal with computer security issues. The Computer Emergency Response Team (CERT) mandate is to develop and promote best management practices and technology applications to “resist attacks on networked systems, to limit damage, and to ensure continuity of critical services.” (Software Engineering Institute 2008). CERT may be formed by governments to handle security at the national level or by academic institutions or individual corporations.

References:

Jump to top of Glossary

Computer Network Attack

Includes actions taken via computer networks to disrupt, deny, degrade, or destroy the information within computers and computer networks and/or the computers/networks themselves. Joint Doctrine for Information Operations JP 3-13 at I-9 (1998)

References:

Jump to top of Glossary

COTS Software

Commercial Off The Shelf Software. Software that is prepackaged and sold as a commodity rather than custom written for a specific user/organization or purpose. Examples include operating systems, database management programs, email servers, application servers and office product suites. DoD at 18.

References:

Jump to top of Glossary

Credit Card Fraud

Theft of goods or services using false or stolen credit card information.

See Also: Shoulder Surfing

References:

Jump to top of Glossary

Crimeware

Software tools designed to aid criminals in perpetrating online crime. Refers only to programs not generally considered desirable or usable for ordinary tasks. Thus, while a criminal may use Internet Explorer in the commission of a cybercrime, the Internet Explorer application itself would not be considered crimeware.

References:

Jump to top of Glossary

Cyber Crime

In its broadest definition, cybercrime includes all crime perpetrated with or involving a computer. Symantec defines it as any crime that is committed using a computer or network, or hardware device. The computer or device may be the agent of the crime, the facilitator of the crime, or the target of the crime. The crime may take place on the computer alone or in addition to other locations. Symantec

References:

Jump to top of Glossary

Cyber Security as an Externality

Economists define externalities as instances where an individual or firm’s actions have economic consequences for others for which there is no compensation. One important distinction is between positive and negative externalities. Instances of the latter are most commonly discussed, such as the environmental pollution caused by a plant, which may have impacts on the value of neighboring homes. Important examples of positive externalities are so common in communications networks that there is a class of "network externalities. For instance, the simple act of installing telephone service to one additional customer creates positive externalities on everyone on the telephone network because they can now each reach one additional person. Several attributes of computer security suggest that it is an externality. Most importantly, the lack of security on one machine can cause adverse effects on another. The most obvious example of this is from electronic commerce, where credit card numbers stolen from machines lacking security are used to commit fraud at other sites.

References:

Jump to top of Glossary

Cyber Security as a Public Good

In economics, a public good is a good that is non-rivalrous and non-excludable. Non-rivalry means that consumption of the good by one individual does not reduce availability of the good for consumption by others; and non-excludability that no one can be effectively excluded from using the good.

References:

Jump to top of Glossary

Cyber Terrorism

A criminal act perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a particular political, social, or ideological agenda. FBI

References:

Jump to top of Glossary

Cyber Warfare

Actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption. Clarke

References:

Jump to top of Glossary

Data Mining

The process of extracting hidden information and correlations from one or more databases or collections of data that would not normally be revealed by a simple database query.

References:

Jump to top of Glossary

Department of Homeland Security

Cabinet level department of the United States assigned, inter alia, the task of protecting against terrorist threats and helping state and local authorities prepare for, respond to and recover from domestic disasters.

References:

Jump to top of Glossary

DDoS Attack

The disabling of a targeted website or Internet connection by flooding it with such high levels of Internet traffic that it can no longer respond to normal connection requests. Often mounted by directing an army of zombie computers (see botnet) to connect to the targeted site simultaneously. The targeted site may crash while trying to respond to an overwhelming number of connections requests or it may be disabled because all available bandwidth and/or computing resources are tied up responding to the attack requests.

References:

Jump to top of Glossary

Digital Pearl Harbor

A cyberwarfare attack similar in scale and surprise to the 1941 attack on Pearl Harbor. The expression is often invoked by those who argue that a cyber-based attack is either imminent or inevitable and that by not being properly prepared, the United States will suffer significant and unnecessary losses.

AKA: Electronic Pearl Harbor; Cyber Pearl harbor

References:

Jump to top of Glossary

Disclosure Policy

A policy that governs the disclosure to clients and other stakeholder by a provider of a computer program or system of defects discovered in those products.

References:

Jump to top of Glossary

Distributed Denial of Service (DDoS)

See: DDoS Attack

Jump to top of Glossary

Dumpster Diving

A method of obtaining proprietary, confidential or useful information by searching through trash discarded by a target.

Jump to top of Glossary

Einstein

The operational name of the National Cybersecurity Protection System (NCPS). Was created in 2003 by the United States Computer Emergency Readiness Team (US-CERT)14 in order to aid in its ability to help reduce and prevent computer network vulnerabilities across the federal government. The initial version of Einstein provided an automated process for collecting, correlating, and analyzing agencies’ computer network traffic information from sensors installed at their Internet connections. The Einstein sensors collected network flow records at participating agencies, which were then analyzed by US-CERT to detect certain types of malicious activity.

References:

Jump to top of Glossary

E.U. Cybersecurity

Discussions relating to cybersecurity of the European Union and of European Union states.

References:

Jump to top of Glossary

Generativity

Generativity is a system’s capacity to produce unanticipated change through unfiltered contributions from broad and varied audiences.

References:

Jump to top of Glossary

Geneva Conventions

Four treaties and three additional protocols that regulates the conduct of hostilities between states and set the standards for humanitarian treatment of the victims of war.

See also: Laws of War

References:

Jump to top of Glossary

Hacker

Advanced computer users who spend a lot of time on or with computers and work hard to find vulnerabilities in IT systems. DCSINT

References:

Jump to top of Glossary

Hacktivism

The nonviolent use of illegal or legally ambiguous digital tools in pursuit of political ends. These tools include web site defacements, redirects, denial-of-service attacks, information theft, web site parodies, virtual sit-ins, virtual sabotage, and software development. Samuel, A.

References:

Jump to top of Glossary

Hacktivist

A portmanteau of "hacker" and "activist." Individuals that have a political motive for their activities, and identify that motivation by their actions, such as defacing opponents’ websites with counter-information or disinformation.

See also: Hacktivism

References:

Jump to top of Glossary

Honeypot

A computer, network or other information technology resource set as a trap to attract attacks. Honeypots may be used to collect metrics (how long does it take for an unprotected system to be breached), to test defenses, to examine methods of attack or to catch attackers. A honeypot system may also be used to collect SPAM so it can be added to a blacklist.

References:

Jump to top of Glossary

Identity Fraud/Theft

The exploitation by malevolent third parties of unwarranted access to clients' or consumers' identities. Often the result of lax data security or privacy measures.

References:

Jump to top of Glossary

Information Asymmetries

Information asymmetry deals with the study of decisions in transactions where one party has more or better information than the other. This creates an imbalance of power in transactions which can sometimes cause the transactions to go awry.

The software market suffers from the same information asymmetry. Vendors may make claims about the security of their products, but buyers have no reason to trust them. In many cases, even the vendor does not know how secure its software is. So buyers have no reason to pay more for protection, and vendors are disinclined to invest in it.

References:

Jump to top of Glossary

Intelligence Infrastructure/Information Infrastructure

The network of computers and communication lines underlying critical services that American society has come to depend on: financial systems, the power grid, transportation, emergency services, and government programs. Information infrastructure includes the Internet, telecommunications networks, “embedded” systems (the built-in microprocessors that control machines from microwaves to missiles), and “dedicated” devices like individual personal computers. Council on Foreign Relations

References:

Jump to top of Glossary

Information Operations

Actions taken to affect adversary information and information systems while defending one’s own information and information systems.” Information Operations (IO) can occur during peacetime and at every level of warfare. Information warfare (IW), by contrast, is IO “conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries” [Joint Chiefs of Staff, Department of Defense, Dictionary of Military and Associated Terms, Joint Publication]

References:

Jump to top of Glossary

Interdependencies

The inter-connections between supposedly independent but often interdependent systems.

See also: SCADA Systems

References:

Jump to top of Glossary

International Humanitarian Law

That part of international law which seek, for humanitarian reasons, to limit the effects of armed conflict. It protects persons who are not or are no longer participating in the hostilities and restricts the means and methods of warfare. International humanitarian law is also known as the law of war or the law of armed conflict. International law is the body of rules governing relations between States. It is contained in agreements between States (treaties or conventions), in customary rules, which consist of State practise considered by them as as legally binding, and in general principles. ICRC

References:

Jump to top of Glossary

Internet Relay Chat (IRC)

A method of real-time Internet communication often used by criminals to buy and sell purloined information such as credit card numbers and personal identity information. IRC chatrooms may be open or private.

References:

Jump to top of Glossary

Internet Service Providers

A company that offers access to the Internet. Internet Service Providers may also provide add-on services such as web hosting, electronic mail, virus scanning, SPAM filtering, etc.

References:

Jump to top of Glossary

Keylogger

Software or hardware that monitors and logs the keystrokes a user types into a computer. The keylogger may store the key sequences locally for later retrieval or send them to a remote location. A hardware keylogger can only be detected by physically inspecting the computer for unusual hardware.

References:

Jump to top of Glossary

Kinetic Attack

Traditional mode of warfare in which arms are used to kill opponents and/or destroy an opponent's infrastructure. Usually used to distinguish a cyber attack in which destruction of the opponent's resources is accomplished through targeted information system attacks without resorting to bullets, bombs or explosives.

References:

Jump to top of Glossary

Lawfare

The use of international law to damage an opponent in a war without use of arms.

References:

Jump to top of Glossary

Laws of War

The body of law that define the legality of using armed force to resolve a conflict (jus ad bellum) and the laws that define the legality of the actual hostilities and related activities (jus in bello).

References:

Jump to top of Glossary

Malware

A variety of computer software designed to infiltrate a user's computer specifically for malicious purposes. Includes, inter alia, computer virus software, botnet software, computer worms, spyware, trojan horses, crimeware and rootkits.

References:

Jump to top of Glossary

National Cybersecurity Strategy (U.S.)

A comprehensive policy to secure America’s digital infrastructure as part of the Administrative Branch's Comprehensive National Cybersecurity Initiative. The goals of the policy are: to establish a front line of defense against current immediate threats; to defend against threats by enhancing U.S. counterintelligence capabilities and; to strengthen the future cybersecurity environment by expanding cyber education and redirecting research and development efforts to define and develop strategies to deter hostile or malicious activity in cyberspace.

References:

Jump to top of Glossary

National Security

Broadly refers to the requirement to maintain the survival of the nation-state through the use of economic, military and political power and the exercise of diplomacy. Wikipedia

References:

Jump to top of Glossary

New Normalcy

New normalcy has become an episodic polict construct in U.S. strategic ideation. National leadership has relied on the new normalcy clarion call to illuminate moments in time when it is understood that the Nation faces not only a severe threat, but also a transcending reorientation. Often invoked in times of national crisis, new normalcy in the American experience signals a cardinal shift in the nature of U.S. security. ["Cyber Operations - The New Balance," Stephen W. Korns]

Notice and Take-down

Most commonly used to remove infringing web material under copyright law, a notice and take-down regime is a procedure by which an infringing web site is removed from a service provider's (ISP) network, or access to an allegedly infringing website, disabled. Websites violating copyright are subject to notice and take-down, as are phishing websites.

References:

Jump to top of Glossary

Organized Crime

Groups having some manner of a formalized structure and whose primary objective is to obtain money through illegal activities. Such groups maintain their position through the use of actual or threatened violence, corrupt public officials, graft, or extortion, and generally have a significant impact on the people in their locales, region, or the country as a whole. FBI

References:

Jump to top of Glossary

Outreach and Collaboration

Working across government and with the private sector to share information on threats and other data, and to develop shared approaches to securing cyberspace. CRS Report for Congress, at 6 (2009).

References:

Jump to top of Glossary

Password Weakness

Security threats caused by the use of easily guessable passwords which protect vital stores of confidential information stored online.

References:

Jump to top of Glossary

Patching

Patching refers to the installation of a piece of software designed to fix problems with, or update a computer program or its supporting data. This includes fixing security vulnerabilities and other bugs, and improving the usability or performance. Though meant to fix problems, poorly designed patches can sometimes introduce new problems. Wikipedia

References:

Jump to top of Glossary

Phishing

The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

References:

Jump to top of Glossary

Privacy Law

Laws which regulate the protection of confidential personal information stored in private records or disclosed to a professional. Also includes laws which regulate the gathering of electronic data in which personal information is accumulated or misappropriated.

References:

Jump to top of Glossary

Red Team

A structured, iterative process executed by trained, educated and practiced team members that provides commanders an independent capability to continuously challenge plans, operations, concepts, organizations and capabilities in the context of the operational environment and from our partners’ and adversaries’ perspectives. See U.S. Army

References:

Jump to top of Glossary

Research & Development

Research and development (R&D) addressing cyber security and information infrastructure protection.

References:

Jump to top of Glossary

Risk Modeling

The creation of a model to estimate risk exposure, policy option efficacy and cost-benefit analysis of a particular threat and solution. See Soo Hoo, Kevin J.

References:

Jump to top of Glossary

SCADA Systems

SCADA stands for "supervisory control and data acquisition" and in the cybersecurity context usually refers to industrial control systems that control infrastructure such as electrical power transmission and distribution, water treatment and distribution, wastewater collection and treatment, oil and gas pipelines and large communication systems. The focus is on whether as these systems are connected to the public Internet they become vulnerable to a remote attack.

References:

Jump to top of Glossary

Scareware

Software or web site that purports to be security software reporting a threat against a user's computer to convince the user to purchase unneeded software or install malware.

Jump to top of Glossary

Script Kiddie

A derogatory term for a Black Hat who uses canned tools and programs written by more skillful hackers to commit cyber crime without understanding how they work.

Jump to top of Glossary

Security Trade-Offs

There is no single correct level of security; how much security you have depends on what you’re willing to give up in order to get it. This trade-off is, by its very nature, subjective—secu- rity decisions are based on personal judgments. Different people have different senses of what constitutes a threat, or what level of risk is acceptable. What’s more, between different commu- nities, or organizations, or even entire societies, there is no agreed-upon way in which to define threats or evaluate risks, and the modern technological and media-filled world makes these evaluations even harder. Bruce Schneier

References:

Jump to top of Glossary

Shoulder Surfing

The process of obtaining passwords or other sensitive information by covertly watching an authorized user enter information into a computer system.

References:

Jump to top of Glossary

Sneakernet

Describes the transfer of data between computers or networks that are not physically, electrically or electromagnetically connected requiring information to be shared by physically transporting media contain the shared information from one computer to another. Initially described systems lacking the technology to network together, now usually refers to systems deliberately isolated for security reasons.

See also: Air-Gapped Network

Social Engineering

Conning a human into supplying passwords, computer access or other sensitive information by pretending to be a person with rights to the information or who the target believes they must surrender the information to.

References:

Jump to top of Glossary

Social Network

A software application or website that allows a large group of users to interact with each other, often allowing the creation of online portals or identities to share with specific people or the online world at large.

Jump to top of Glossary

Software Vulnerability

A software vulnerablilty refers to the existence of a flaw -- or "bug" -- in software that may allow a third party or program to obtain unauthorized access to the flaw and exploit it. U.S. Air Force Software Protection Initiative

References:

Jump to top of Glossary

SPAM

Unwanted or junk email usually sent indiscriminately in bulk selling illegal or near illegal goods or services. Even with low response rates and heavy filtering, SPAM can stil be economically viable because of the extremely low costs in sending even huge quantities of electronic messages. Commonly believed to be named after the Monty Python skit where the breakfast meat Spam overwhelms all other food choices.

References:

Jump to top of Glossary

Computer network attacks commissioned by, supported by or carried out by a state or government.

Reverences:

Jump to top of Glossary

State Affiliation

Under the control or command of a recognized state or government.

References:

Jump to top of Glossary

Tragedy of Commons

A situation, first described in an influential article written by ecologist Garrett Hardin for the journal Science, in 1968, in which multiple individuals, acting independently, and solely and rationally consulting their own self-interest, will ultimately deplete a shared limited resource even when it is clear that it is not in anyone's long-term interest for this to happen. The term can be applied to any issue related to the management of a shared resource, from energy to the public domain, to cybersecurity.

References:

Jump to top of Glossary

Transparency

A set of policies, practices and procedures that allow citizens to have accessibility, usability, informativeness, understandability and auditability of information and process held by centers of authority. Wikipedia

References:

Jump to top of Glossary

Trojan

Malware which masquerades as some other type of program such as a link to a web site, a desirable image, etc. to trick a user into installing it. Named for the Ancient Greek legend of the Trojan Horse.

References:

Jump to top of Glossary

Virtual Military Technologies

Warfare made possible by advances in remotely controlled or semiautomated military technologies which remove the operator from risk of harm while attacking an opponent.

References:

Jump to top of Glossary

Virtual Warfare

See: Virtual Military Technologies

Jump to top of Glossary

White Hat

A white hat is a computer hacker who works to find and fix computer security risks. White hat consultants are often hired to attempt to break into their client's network to see if all security holes have been addressed.

See also: Black Hat

References:

Jump to top of Glossary

Whitelist

A list of computers, IP (Internet Protocol) addresses, user names or other identifiers to specifically allow access to a computing resource. Normally combined with a default "no-access" policy.

See also: Blacklist

References:

Jump to top of Glossary

Worm

A type of malware that replicates itself and spreads to other computers through network connections.

References:

Jump to top of Glossary

Zero-Day Exploit

Malware designed to exploit a newly discovered security hole unknown to the software developer. "Zero-day" refers to the amount of time a developer has between learning of a security hole and the time it becomes public or when black hat hackers find out about it and try to use the security hole for nefarious purposes.

References:

Jump to top of Glossary