Difference between revisions of "Keyword Index and Glossary of Core Ideas"
|Line 49:||Line 49:|
Refers to the involvement of non-military
Refers to the involvement of non-military in warfare. While civilians have often supported the military in kinetic wars, in [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Cyber_Warfare cyber warfare] civilians are able to remotely participate in direct attacks against opponents. This raises complicated questions of what law applies when combatants are not uniformed military personnel.
Revision as of 17:53, 15 June 2010
Glossary of Core Ideas
Air gapping is a security measure that isolates a secure network from unsecure networks physically, electrically and electromagnetically.
Software which attempts to identify and delete or isolate malware. Antivirus software may use both a database containing signatures of known threats and heuristics to identify malware. Usually run as a background service to scan files and email copied to the protected system.
A black hat is a computer hacker who works to harm others (e.g., steal identities, spread computer viruses, install bot software).
See also: White Hat
This term is derived from "robot network." Refers to networks of sometimes millions of infected machines that are remotely controlled by malicious actors. A single infected computer may be referred to as a zombie computer. The owners of the computer remotely controlled is often unaware of the infection. The owners of a botnet may use the combined network processing power and bandwidth to send SPAM, install malware and mount DDoS attacks or may rent out the botnet to other malicious actors.
The justification for going to war. From the Latin "casus" meaning "incident" or "event" and "belli" meaning "of war."
Refers to the involvement of non-military persons in warfare. While civilians have often supported the military in kinetic wars, in cyber warfare civilians are able to remotely participate in direct attacks against opponents. This raises complicated questions of what law applies when combatants are not uniformed military personnel.
Computer Network Attack
Communications Privacy Law
Actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption. (Clarke)
Digital Pearl Harbor
Distributed Denial of Service (DDoS)
Intelligence Infrastructure/Information Infrastructure
International Humanitarian Law
Internet Relay Chat (IRC)
Internet Service Providers
Laws of War
The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.