TemplateForSources: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 17: Line 17:
==Key Words==  
==Key Words==  


 
[[Keyword_Index_and_Glossary_of_Core_Ideas#Computer_Network_Attack | Computer Network Attack]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#COTS_Software | COTS Software]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Warfare | Cyber Warfare]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Department_of_Homeland_Security | Department of Homeland Security]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#DDoS_Attack | Denial of Service Attacks]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Hacker | Hackers]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Intelligence_Infrastructure.2FInformation_Infrastructure | Intelligence Community]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Malware | Malicious Code (Malware)]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#National_Security | National Security]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Risk_Modeling | Risk Modeling]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Sponsored_Attacks | Sponsored Attacks]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#State_Affiliation | State Affiliation]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Worm | Worm]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Zero-Day_Exploit | Zero-Day Exploit]]


==Synopsis==
==Synopsis==

Revision as of 13:08, 25 June 2010

Full Title of Reference

Full Citation

Citation should be in Bluebook Style. Foe example for an article in a journal:

John Maynard Smith, The Origin of Altruism, 639 Nature 393 (1998). [URL_of_Article_if_Available_Online Web] [Alternate_URL_of_Article AltWeb]

[URL.to.Bibliography_Detailed_Entry BibTeX]

Categorization

  • Issues: Cyberwar; Incentives <- put categories in alphabetical order separated by semicolons

Key Words

Computer Network Attack, COTS Software, Cyber Warfare, Department of Homeland Security, Denial of Service Attacks, Hackers, Intelligence Community, Malicious Code (Malware), National Security, Risk Modeling, Sponsored Attacks, State Affiliation, Worm, Zero-Day Exploit

Synopsis

This could be an abstract from the article.

Additional Notes and Highlights

* Outline key points of interest