Keyword Index and Glossary of Core Ideas: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
== | ==Glossary of Core Ideas== | ||
== | === Phishing === | ||
== | === Internet Relay Chat (IRC) === | ||
== | === Distributed Denial of Service (DDoS) === | ||
== | === Dumpster Diving === | ||
==Cyber Warfare== | === Script Kiddie === | ||
===Cyber Warfare=== | |||
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts] | [http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts] | ||
== Shoulder Surfing == | === Shoulder Surfing == | ||
==Cyber Terrorism== | ===Cyber Terrorism=== | ||
==Honeypot== | ===Honeypot=== | ||
==Social Engineering== | ===Social Engineering=== | ||
==Malware== | ===Malware=== | ||
==Trojan== | ===Trojan=== | ||
==Scareware== | ===Scareware=== | ||
==International Humanitarian Law== | ===International Humanitarian Law=== | ||
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts] | [http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts] | ||
==Laws of War== | ===Laws of War=== | ||
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts] | [http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts] | ||
==Computer Network Attack== | ===Computer Network Attack=== | ||
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts] | [http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts] | ||
==Combatant Status== | ===Combatant Status=== | ||
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts] | [http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts] | ||
==State Affiliation== | ===State Affiliation=== | ||
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts] | [http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts] | ||
==Civilian Participation== | ===Civilian Participation=== | ||
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts] | [http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts] | ||
==Geneva Conventions== | ===Geneva Conventions=== | ||
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts] | [http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts] | ||
== | ===Worm=== | ||
==Crimeware== | ===Crimeware=== | ||
==Antivirus== | ===Antivirus=== | ||
==Social Network== | ===Social Network=== | ||
==Zero-Day Exploit== | ===Zero-Day Exploit=== | ||
==Botnet== | ===Botnet=== | ||
==Hacker== | ===Hacker=== | ||
==Hacktivism== | ===Hacktivism=== | ||
==Intelligence Infrastructure/Information Infrastructure== | ===Intelligence Infrastructure/Information Infrastructure=== | ||
==Lawfare== | ===Lawfare=== | ||
==Virtual Military Technologies== | ===Virtual Military Technologies=== | ||
[http://cyber.law.harvard.edu/cybersecurity/Law_and_War_in_the_Virtual_Era#Key_Words Beard] | [http://cyber.law.harvard.edu/cybersecurity/Law_and_War_in_the_Virtual_Era#Key_Words Beard] | ||
==Virtual Warfare== | ===Virtual Warfare=== |
Revision as of 11:08, 9 June 2010
Glossary of Core Ideas
Phishing
Internet Relay Chat (IRC)
Distributed Denial of Service (DDoS)
Dumpster Diving
Script Kiddie
Cyber Warfare
= Shoulder Surfing
Cyber Terrorism
Honeypot
Social Engineering
Malware
Trojan
Scareware
International Humanitarian Law
Laws of War
Computer Network Attack
Combatant Status
State Affiliation
Civilian Participation
Geneva Conventions