TemplateForSources: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 15: Line 15:
* Approaches: [[Deterrence]]
* Approaches: [[Deterrence]]


==Key Words==  
==Key Words==   <- put keywords in alphabetical order separated by colons and makes sure the glossary has a link back to this wiki


[[Keyword_Index_and_Glossary_of_Core_Ideas#Computer_Network_Attack | Computer Network Attack]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Computer_Network_Attack | Computer Network Attack]],

Revision as of 13:08, 25 June 2010

Full Title of Reference

Full Citation

Citation should be in Bluebook Style. Foe example for an article in a journal:

John Maynard Smith, The Origin of Altruism, 639 Nature 393 (1998). [URL_of_Article_if_Available_Online Web] [Alternate_URL_of_Article AltWeb]

[URL.to.Bibliography_Detailed_Entry BibTeX]

Categorization

  • Issues: Cyberwar; Incentives <- put categories in alphabetical order separated by semicolons

==Key Words== <- put keywords in alphabetical order separated by colons and makes sure the glossary has a link back to this wiki

Computer Network Attack, COTS Software, Cyber Warfare, Department of Homeland Security, Denial of Service Attacks, Hackers, Intelligence Community, Malicious Code (Malware), National Security, Risk Modeling, Sponsored Attacks, State Affiliation, Worm, Zero-Day Exploit

Synopsis

This could be an abstract from the article.

Additional Notes and Highlights

* Outline key points of interest