Difference between revisions of "Keyword Index and Glossary of Core Ideas"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 28: Line 28:
 
===Internet Service Providers===
 
===Internet Service Providers===
 
[http://cyber.law.harvard.edu/cybersecurity/The_Market_Consequences_of_Cybersecurity:_Defining_Externalities_and_Ways_to_Address_Them#Synopsis OECD]
 
[http://cyber.law.harvard.edu/cybersecurity/The_Market_Consequences_of_Cybersecurity:_Defining_Externalities_and_Ways_to_Address_Them#Synopsis OECD]
 +
 +
===Laws of War===
 +
 +
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
 +
 +
[http://cyber.law.harvard.edu/cybersecurity/Law_and_War_in_the_Virtual_Era Beard]
 +
 +
[http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye]
  
 
===Malware===
 
===Malware===
Line 43: Line 51:
  
 
[http://cyber.law.harvard.edu/cybersecurity/A_Framework_for_Linking_Cybersecurity_Metrics_to_the_Modeling_of_Macroeconomic_Interdependencies Santos et al]
 
[http://cyber.law.harvard.edu/cybersecurity/A_Framework_for_Linking_Cybersecurity_Metrics_to_the_Modeling_of_Macroeconomic_Interdependencies Santos et al]
 +
 +
===Scareware===
  
 
===Shoulder Surfing===
 
===Shoulder Surfing===
Line 56: Line 66:
  
 
===Trojan===
 
===Trojan===
 
===Scareware===
 
  
  
===Laws of War===
 
  
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
 
  
[http://cyber.law.harvard.edu/cybersecurity/Law_and_War_in_the_Virtual_Era Beard]
 
  
[http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye]
 
  
 
===Computer Network Attack===
 
===Computer Network Attack===

Revision as of 20:19, 9 June 2010

Glossary of Core Ideas

Air-Gapped Network

Antivirus

Cyber Terrorism

Shah

Cyber Warfare

Shackelford

Watts

Distributed Denial of Service (DDoS)

Dumpster Diving

Honeypot

International Humanitarian Law

Watts

Internet Relay Chat (IRC)

Internet Service Providers

OECD

Laws of War

Watts

Beard

Nye

Malware

Phishing

Script Kiddie

SCADA Systems

Nye

Schneidewind

Santos et al

Scareware

Shoulder Surfing

Social Engineering

Trojan

Computer Network Attack

Watts

Combatant Status

Watts

State Affiliation

Watts

Civilian Participation

Watts

Burstein

Geneva Conventions

Watts

Network Security

-

International Humanitarian Law

Worm

Crimeware

Bauer and van Eeten 2

Antivirus

Social Network

Zero-Day Exploit

Botnet

Shackelford

Bauer and van Eeten

Nye

Hacker

Hacktivism

Intelligence Infrastructure/Information Infrastructure

Beard

Nye

Lawfare

Beard

Virtual Military Technologies

Beard

Virtual Warfare

Beard

Interdependencies

OECD

Santos et al

Risk Modeling

Rue and Pfleeger

Schneidewind

Santos et al

Digital Pearl Harbor

Stohl

Communications Privacy Law

Burstein

Nye