Keyword Index and Glossary of Core Ideas: Difference between revisions
No edit summary |
No edit summary |
||
Line 6: | Line 6: | ||
References: | References: | ||
===Antivirus=== | ===Antivirus=== | ||
Line 13: | Line 12: | ||
References: | References: | ||
===Black Hat=== | ===Black Hat=== | ||
Line 22: | Line 20: | ||
References: | References: | ||
===Botnet=== | ===Botnet=== | ||
Line 33: | Line 30: | ||
* [http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye] | * [http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye] | ||
* [http://cyber.law.harvard.edu/cybersecurity/Estonia_Three_Years_Later Shackelford] | * [http://cyber.law.harvard.edu/cybersecurity/Estonia_Three_Years_Later Shackelford] | ||
===''Casus Belli''=== | ===''Casus Belli''=== | ||
The justification for going to war. From the Latin "''casus''" meaning "incident" or "event" and "''belli''" meaning "of war." | The justification for going to war. From the Latin "''casus''" meaning "incident" or "event" and "''belli''" meaning "of war." | ||
References: | References: | ||
* [http://cyber.law.harvard.edu/cybersecurity/The_Government_and_Cybersecurity Bellovin] | * [http://cyber.law.harvard.edu/cybersecurity/The_Government_and_Cybersecurity Bellovin] | ||
* [http://cyber.law.harvard.edu/cybersecurity/Cyber_Security_and_Politically%2C_Socially_and_Religiously_Motivated_Cyber_Attacks#Full_Citation Cornish] | * [http://cyber.law.harvard.edu/cybersecurity/Cyber_Security_and_Politically%2C_Socially_and_Religiously_Motivated_Cyber_Attacks#Full_Citation Cornish] | ||
===Civilian Participation=== | ===Civilian Participation=== | ||
Line 52: | Line 45: | ||
* [http://cyber.law.harvard.edu/cybersecurity/Cyberspace_and_the_National_Security_of_the_United_Kingdom Cornish et. al.] | * [http://cyber.law.harvard.edu/cybersecurity/Cyberspace_and_the_National_Security_of_the_United_Kingdom Cornish et. al.] | ||
* [http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts] | * [http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts] | ||
===Combatant Status=== | ===Combatant Status=== | ||
Line 59: | Line 51: | ||
References: | References: | ||
* [http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts] | * [http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts] | ||
===Computer Emergency Response Teams=== | ===Computer Emergency Response Teams=== |
Revision as of 10:23, 16 June 2010
Glossary of Core Ideas
Air-Gapped Network
Air gapping is a security measure that isolates a secure network from unsecure networks physically, electrically and electromagnetically.
References:
Antivirus
Software which attempts to identify and delete or isolate malware. Antivirus software may use both a database containing signatures of known threats and heuristics to identify malware. Usually run as a background service to scan files and email copied to the protected system.
References:
Black Hat
A black hat is a computer hacker who works to harm others (e.g., steal identities, spread computer viruses, install bot software).
See also: White Hat
References:
Botnet
This term is derived from "robot network." Refers to networks of sometimes millions of infected machines that are remotely controlled by malicious actors. A single infected computer may be referred to as a zombie computer. The owners of the computer remotely controlled is often unaware of the infection. The owners of a botnet may use the combined network processing power and bandwidth to send SPAM, install malware and mount DDoS attacks or may rent out the botnet to other malicious actors.
References:
Casus Belli
The justification for going to war. From the Latin "casus" meaning "incident" or "event" and "belli" meaning "of war."
References:
Civilian Participation
The involvement of non-military persons in warfare. While civilians have often provided support to the military in kinetic wars, in cyber warfare civilians are able to remotely participate in direct attacks against opponents. This raises complicated questions of law when the combatants are not uniformed military personnel.
References:
Combatant Status
The legal status of combatants in warfare. Existing law distinguishes between uniformed military and civilian status.
References:
Computer Emergency Response Teams
Computer Network Attack
Includes actions taken via computer networks to disrupt, deny, degrade, or destroy the information within computers and computer networks and/or the computers/networks themselves. Joint Doctrine for Information Operations JP 3-13 at I-9 (1998)
References:
Communications Privacy Law
Crimeware
See also: Malware
Cyber Terrorism
Cyber Warfare
Actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption. (Clarke)
References:
Data Mining
Digital Pearl Harbor
Distributed Denial of Service (DDoS)
DDoS Attack
The disabling of a targeted website or Internet connection by flooding it with such high levels of Internet traffic that it can no longer respond to normal connection requests. Often mounted by directing an army of zombie computers (see botnet) to connect to the targeted site simultaneously. The targeted site may crash while trying to respond to an overwhelming number of connections requests or it may be disabled because all available bandwidth is tied up in responding top the attack.
Dumpster Diving
A method of obtaining proprietary or confidential information by searching through trash discarded by a target.
E.U. Cybersecurity
Geneva Conventions
Hacker
Hacktivism
Honeypot
Intelligence Infrastructure/Information Infrastructure
Interdependencies
International Humanitarian Law
Internet Relay Chat (IRC)
Internet Service Providers
Lawfare
Laws of War
Malware
National Cybersecurity Strategy (U.S.)
National Security
Organized Crime
Outreach and Collaboration
Phishing
The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.