Keyword Index and Glossary of Core Ideas: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 83: | Line 83: | ||
===Virtual Military Technologies=== | ===Virtual Military Technologies=== | ||
[http://cyber.law.harvard.edu/cybersecurity/Law_and_War_in_the_Virtual_Era | [http://cyber.law.harvard.edu/cybersecurity/Law_and_War_in_the_Virtual_Era Beard] | ||
===Virtual Warfare=== | ===Virtual Warfare=== | ||
===Risk Aversion=== | |||
[http://cyber.law.harvard.edu/cybersecurity/Metrics_for_Mitigating_Cybersecurity_Threats_to_Networks Schneidewind] | |||
===Digital Pearl Harbor=== | ===Digital Pearl Harbor=== | ||
[http://cyber.law.harvard.edu/cybersecurity/Cyber_Terrorism:_A_Clear_and_Present_Danger%2C_the_Sum_of_All_Fears%2C_Breaking_Point_or_Patriot_Games Stohl] | [http://cyber.law.harvard.edu/cybersecurity/Cyber_Terrorism:_A_Clear_and_Present_Danger%2C_the_Sum_of_All_Fears%2C_Breaking_Point_or_Patriot_Games Stohl] |
Revision as of 11:19, 9 June 2010
Glossary of Core Ideas
Antivirus
Cyber Terrorism
Cyber Warfare
Phishing
Internet Relay Chat (IRC)
Distributed Denial of Service (DDoS)
Dumpster Diving
Script Kiddie
Shoulder Surfing
Honeypot
Social Engineering
Malware
Trojan
Scareware
International Humanitarian Law
Laws of War
Computer Network Attack
Combatant Status
State Affiliation
Civilian Participation
Geneva Conventions