Keyword Index and Glossary of Core Ideas: Difference between revisions
Jump to navigation
Jump to search
Line 105: | Line 105: | ||
===Risk Management=== | ===Risk Management=== | ||
[http://cyber.law.harvard.edu/cybersecurity/Metrics_for_Mitigating_Cybersecurity_Threats_to_Networks Schneidewind] | [http://cyber.law.harvard.edu/cybersecurity/Metrics_for_Mitigating_Cybersecurity_Threats_to_Networks Schneidewind] | ||
[http://cyber.law.harvard.edu/cybersecurity/A_Framework_for_Linking_Cybersecurity_Metrics_to_the_Modeling_of_Macroeconomic_Interdependencies Santos et al] | [http://cyber.law.harvard.edu/cybersecurity/A_Framework_for_Linking_Cybersecurity_Metrics_to_the_Modeling_of_Macroeconomic_Interdependencies Santos et al] | ||
Revision as of 11:54, 9 June 2010
Glossary of Core Ideas
Antivirus
Cyber Terrorism
Cyber Warfare
Distributed Denial of Service (DDoS)
Dumpster Diving
Network Security
Internet Relay Chat (IRC)
Phishing
Script Kiddie
Shoulder Surfing
Honeypot
Social Engineering
Malware
Trojan
Scareware
International Humanitarian Law
Laws of War
Computer Network Attack
Combatant Status
State Affiliation
Civilian Participation
Geneva Conventions
Network Security
-
International Humanitarian Law
Worm
Crimeware
Antivirus
Social Network
Zero-Day Exploit
Botnet
Hacker
Hacktivism
Intelligence Infrastructure/Information Infrastructure
Lawfare
Virtual Military Technologies
Virtual Warfare
=Interdependencies