TemplateForSources: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 40: Line 40:
==Additional Notes and Highlights==
==Additional Notes and Highlights==


'' * Outline key points of interest
'' * Outline key points of interest or other information that does not fit in one of the topics above

Revision as of 13:10, 25 June 2010

Full Title of Reference

Full Citation

Citation should be in Bluebook Style. Foe example for an article in a journal:

John Maynard Smith, The Origin of Altruism, 639 Nature 393 (1998). [URL_of_Article_if_Available_Online Web] [Alternate_URL_of_Article AltWeb]

[URL.to.Bibliography_Detailed_Entry BibTeX]

Categorization

  • Issues: Cyberwar; Incentives <- put categories in alphabetical order separated by semicolons

Key Words

Computer Network Attack, COTS Software, Cyber Warfare, Department of Homeland Security, Denial of Service Attacks, Hackers, Intelligence Community, Malicious Code (Malware), National Security, Risk Modeling, Sponsored Attacks, State Affiliation, Worm, Zero-Day Exploit

<- put keywords in alphabetical order separated by colons and makes sure the glossary entry has a link back to this wiki

Synopsis

This could be an abstract from the article.

Additional Notes and Highlights

* Outline key points of interest or other information that does not fit in one of the topics above