Difference between revisions of "Keyword Index and Glossary of Core Ideas"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 4: Line 4:
  
 
===Antivirus===
 
===Antivirus===
 +
 +
===Combatant Status===
 +
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
 +
 +
===Computer Network Attack===
 +
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
  
 
===Cyber Terrorism===
 
===Cyber Terrorism===
 
 
[http://cyber.law.harvard.edu/cybersecurity/The_Evolving_Landscape_of_Maritime_Cybersecurity Shah]
 
[http://cyber.law.harvard.edu/cybersecurity/The_Evolving_Landscape_of_Maritime_Cybersecurity Shah]
  
Line 57: Line 62:
  
 
===Social Engineering===
 
===Social Engineering===
 
  
 
* [http://cyber.law.harvard.edu/cybersecurity/The_Market_Consequences_of_Cybersecurity:_Defining_Externalities_and_Ways_to_Address_Them#Synopsis OECD] [http://cyber.law.harvard.edu/cybersecurity/Cybersecurity_and_Economic_Incentive 2]
 
* [http://cyber.law.harvard.edu/cybersecurity/The_Market_Consequences_of_Cybersecurity:_Defining_Externalities_and_Ways_to_Address_Them#Synopsis OECD] [http://cyber.law.harvard.edu/cybersecurity/Cybersecurity_and_Economic_Incentive 2]
Line 72: Line 76:
  
  
===Computer Network Attack===
 
 
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
 
  
===Combatant Status===
 
 
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
 
  
 
===State Affiliation===
 
===State Affiliation===

Revision as of 20:20, 9 June 2010

Glossary of Core Ideas

Air-Gapped Network

Antivirus

Combatant Status

Watts

Computer Network Attack

Watts

Cyber Terrorism

Shah

Cyber Warfare

Shackelford

Watts

Distributed Denial of Service (DDoS)

Dumpster Diving

Honeypot

International Humanitarian Law

Watts

Internet Relay Chat (IRC)

Internet Service Providers

OECD

Laws of War

Watts

Beard

Nye

Malware

Phishing

Script Kiddie

SCADA Systems

Nye

Schneidewind

Santos et al

Scareware

Shoulder Surfing

Social Engineering

Trojan

State Affiliation

Watts

Civilian Participation

Watts

Burstein

Geneva Conventions

Watts

Network Security

-

International Humanitarian Law

Worm

Crimeware

Bauer and van Eeten 2

Antivirus

Social Network

Zero-Day Exploit

Botnet

Shackelford

Bauer and van Eeten

Nye

Hacker

Hacktivism

Intelligence Infrastructure/Information Infrastructure

Beard

Nye

Lawfare

Beard

Virtual Military Technologies

Beard

Virtual Warfare

Beard

Interdependencies

OECD

Santos et al

Risk Modeling

Rue and Pfleeger

Schneidewind

Santos et al

Digital Pearl Harbor

Stohl

Communications Privacy Law

Burstein

Nye