Main Page: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
(153 intermediate revisions by 6 users not shown)
Line 1: Line 1:
{{TOCright}}
__NOTOC__
==Introduction==


This Cybersecurity wiki provides a set of evolving resources on cybersecurity, broadly defined, and includes an '''[[Organized by Topic | Annotated Bibliography]]''' on relevant articles and literature, which can be searched in a number of ways. Please see below.
{|align="center" style="text-align:center; background-color:white" class="wikitable" width="100%"
!colspan="5"|Navigation
|-align="center" valign="bottom"
|style="width: 20%"|[[File:toc_icon.svg|105x105px|link=http://cyber.law.harvard.edu/cybersecurity/Table_of_Contents]]<br><b>Table of Contents</b>
|style="width: 20%"|[[File:All_articles3.svg‎|105x105px|link=http://cyber.law.harvard.edu/cybersecurity/Cybersecurity_Annotated_Bibliography]]<br><b>List of All Articles</b>
|style="width: 20%"|[[File:case_studies.svg|105x105px|link=http://cyber.law.harvard.edu/cybersecurity/Category:Case_Studies]]<br><b>Case Studies</b>
|style="width: 20%"|[[File:h2o_icon.svg|105x105px|link=http://h2odev.law.harvard.edu/playlists/633]]<br><b>Suggested Syllabi (H2O)</b>
|style="width: 20%"|[[File:Help_icon4.svg|105x105px|link=http://cyber.law.harvard.edu/cybersecurity/Help]]<br><b>How to Use this Wiki</b>
|}


==Cybersecurity Overview==
==Introduction==
 
This Cybersecurity wiki provides a set of evolving resources on [[Cybersecurity_Overview|cybersecurity, broadly defined]], and includes an '''[[Cybersecurity_Annotated_Bibliography|annotated list]]''' of relevant articles and literature, which can be searched in a number of ways. Please [[#Navigation|see below]]. It is intended as a tool/resource for researchers, technologists, students, policy-makers and others who are interested in cybersecurity issues more broadly. For more information about this first phase of the project, including the team, methodology, and opportunities to contribute, please see [[About|About the Project]].
The term “Cybersecurity” encompasses a range of issues from cybercrime to cyberwarefare. These in turn embrace a diverse set of activities and interests.
 
Cybercrime, for example, can refer to a lone hacker breaking into a single computer to an organized network of computer criminals collecting thousands or millions of credit card numbers and/or personal information records from multiple sources. Responses to cybercrime range from offering incentives to individuals, manufacturers and/or corporations to protect against malware and botnet attacks to decisions about insurance and risk management.
 
Cyberwarfare attacks include covert espionage attacks against secure systems to collect sensitive national security information, distributed attacks against the civilian infrastructure to cause widespread failures of energy and/or communication systems or targeted attacks against military targets with the intent to render offensive and defensive systems inoperable or to take control of systems with the ability to deliver kinetic attacks. These attacks all create complicated questions of attribution and law, as the normal laws of war are of questionable value when applied to threats delivered domestically from a anonymous source in a distant location. In addition, deterrence, offensive actions and defensive response often become blurred in the cyber realm, requiring a fresh look at what policies such as “no first strike” mean in cyberspace.
 
Solutions to these problems will involve addressing questions of economics, incentives, law, legislation, politics, government-private cooperation and international diplomacy. Government, industry, the military and the public must all play a role in deciding how much cybersecurity is needed and who will pay for it. These stakeholders must also address the tradeoffs between privacy and security that often arise in addressing cyber threats. Finally, there needs to be a way to measure the threat and the protections put in place so that the players can make intelligent choices in allocating scare resources.
 
==Key Resources==
 
Our [[Organized by Topic | Annotated Bibliography]] presents and summarizes resources on key issues and themes in Cybersecurity.
 
The [[Organized by Topic#Overview | Table of Contents]] can be searched according to '''Resource Types''', including:
[[Government Reports]], [[Industry Reports]] and [[Books]]. 
 
It can also be searched starting at each of the '''Broad Topics''': [[Organized_by_Topic#Threats_and_Actors | Threats and Actors]], [[Organized_by_Topic#Issues | Issues]], and [[Organized_by_Topic#Approaches | Approaches]].
 
The comprehensive '''List of Articles''' is available here: [[Comprehensive Index]]
 
To search via specific '''Key Words''', please review our [[Keyword Index and Glossary of Core Ideas]]  
 
References can be accessed in a standard bibliographic format ([http://www.bibtex.org/ BibTeX]) here: [http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography Bibliography]
 
==Ongoing Work==


Additional articles for consideration are listed here: [[Suggested References to Add to Wiki]]
If you have feedback, comments, or suggested additional readings/resources, please contact: [mailto:cybersecurity-feedback@cyber.law.harvard.edu cybersecurity-feedback@cyber.law.harvard.edu].<br>


==About the Project==
Prior to suggesting material for inclusion in the wiki, please consult the [[Submitting Feedback]] page.


These resources have been assembled by a team at the [http://cyber.law.harvard.edu/ Berkman Center for Internet & Society], with support from..
==Navigation==
===Table of Contents===
The quickest way to get started is by using the [[Table of Contents]] as a guide to searching articles by type or category. Some of the articles have wiki entries which include a synopsis, full bibliographic information, and additional relevant notes.


==Templates and Wiki Tools==
===List of All Articles===
You might also wish to consult the [[Cybersecurity Annotated Bibliography|list of all articles]] and use the [[Help#How_to_Use_the_Filter|filtering tool]] to receive customized search results by type, category, or a free text search term.


[[TemplateForSources | Template for Sources]]
===Case Studies===
The [[:Category:Case Studies|Case Studies]] page presents a list of selected case studies with short summaries and links to related literature such as news articles and investigative reports.


[[Guidelines for adding Bibliography entries]]
===Selected Syllabi (H2O)===
The [http://h2odev.law.harvard.edu/playlists/633 Suggested Syllabi] section uses the [http://cyber.law.harvard.edu/research/h2o H2O] platform to feature a selection of playlists for instruction. H2O is a Web-based platform for creating, editing, organizing, consuming, and sharing course materials. Using [http://cyber.law.harvard.edu/research/h2o H2O], professors may freely develop and collate course materials by selecting modules from a wide — and growing — repository and edit those modules to the sections that are most relevant to their particular pedagogy and approach.


Wiki [http://meta.wikimedia.org/wiki/Help:Contents User's Guide]
===How to Use this Wiki===
For a full explanation of how to browse the wiki, please consult the [[Help]] page.

Latest revision as of 11:20, 31 August 2012


Navigation
Toc icon.svg
Table of Contents
All articles3.svg
List of All Articles
Case studies.svg
Case Studies
H2o icon.svg
Suggested Syllabi (H2O)
Help icon4.svg
How to Use this Wiki

Introduction

This Cybersecurity wiki provides a set of evolving resources on cybersecurity, broadly defined, and includes an annotated list of relevant articles and literature, which can be searched in a number of ways. Please see below. It is intended as a tool/resource for researchers, technologists, students, policy-makers and others who are interested in cybersecurity issues more broadly. For more information about this first phase of the project, including the team, methodology, and opportunities to contribute, please see About the Project.

If you have feedback, comments, or suggested additional readings/resources, please contact: cybersecurity-feedback@cyber.law.harvard.edu.

Prior to suggesting material for inclusion in the wiki, please consult the Submitting Feedback page.

Navigation

Table of Contents

The quickest way to get started is by using the Table of Contents as a guide to searching articles by type or category. Some of the articles have wiki entries which include a synopsis, full bibliographic information, and additional relevant notes.

List of All Articles

You might also wish to consult the list of all articles and use the filtering tool to receive customized search results by type, category, or a free text search term.

Case Studies

The Case Studies page presents a list of selected case studies with short summaries and links to related literature such as news articles and investigative reports.

Selected Syllabi (H2O)

The Suggested Syllabi section uses the H2O platform to feature a selection of playlists for instruction. H2O is a Web-based platform for creating, editing, organizing, consuming, and sharing course materials. Using H2O, professors may freely develop and collate course materials by selecting modules from a wide — and growing — repository and edit those modules to the sections that are most relevant to their particular pedagogy and approach.

How to Use this Wiki

For a full explanation of how to browse the wiki, please consult the Help page.