Difference between revisions of "Keyword Index and Glossary of Core Ideas"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 14: Line 14:
  
 
[http://cyber.law.harvard.edu/cybersecurity/Cybersecurity:_Stakeholder_Incentives%2C_Externalities%2C_and_Policy_Options Bauer and van Eeten] [http://cyber.law.harvard.edu/cybersecurity/Emerging_Threats_to_Internet_Security_-_Incentives%2C_Externalities_and_Policy_Implications 2]
 
[http://cyber.law.harvard.edu/cybersecurity/Cybersecurity:_Stakeholder_Incentives%2C_Externalities%2C_and_Policy_Options Bauer and van Eeten] [http://cyber.law.harvard.edu/cybersecurity/Emerging_Threats_to_Internet_Security_-_Incentives%2C_Externalities_and_Policy_Implications 2]
 +
 +
===Communications Privacy Law===
 +
[http://cyber.law.harvard.edu/cybersecurity/Amending_The_ECPA_To_Enable_a_Culture_of_Cybersecurity_Research Burstein]
 +
 +
[http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye]
  
 
===Cyber Terrorism===
 
===Cyber Terrorism===
Line 22: Line 27:
  
 
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
 
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
 +
 +
===Digital Pearl Harbor===
 +
 +
[http://cyber.law.harvard.edu/cybersecurity/Cyber_Terrorism:_A_Clear_and_Present_Danger%2C_the_Sum_of_All_Fears%2C_Breaking_Point_or_Patriot_Games Stohl]
  
 
===Distributed Denial of Service (DDoS)===
 
===Distributed Denial of Service (DDoS)===
Line 148: Line 157:
  
 
[http://cyber.law.harvard.edu/cybersecurity/A_Framework_for_Linking_Cybersecurity_Metrics_to_the_Modeling_of_Macroeconomic_Interdependencies Santos et al]
 
[http://cyber.law.harvard.edu/cybersecurity/A_Framework_for_Linking_Cybersecurity_Metrics_to_the_Modeling_of_Macroeconomic_Interdependencies Santos et al]
 
===Digital Pearl Harbor===
 
 
[http://cyber.law.harvard.edu/cybersecurity/Cyber_Terrorism:_A_Clear_and_Present_Danger%2C_the_Sum_of_All_Fears%2C_Breaking_Point_or_Patriot_Games Stohl]
 
 
===Communications Privacy Law===
 
 
[http://cyber.law.harvard.edu/cybersecurity/Amending_The_ECPA_To_Enable_a_Culture_of_Cybersecurity_Research Burstein]
 
 
[http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye]
 

Revision as of 20:22, 9 June 2010

Glossary of Core Ideas

Air-Gapped Network

Antivirus

Combatant Status

Watts

Computer Network Attack

Watts

Crimeware

Bauer and van Eeten 2

Communications Privacy Law

Burstein

Nye

Cyber Terrorism

Shah

Cyber Warfare

Shackelford

Watts

Digital Pearl Harbor

Stohl

Distributed Denial of Service (DDoS)

Dumpster Diving

Honeypot

International Humanitarian Law

Watts

Internet Relay Chat (IRC)

Internet Service Providers

OECD

Laws of War

Watts

Beard

Nye

Malware

Phishing

Script Kiddie

SCADA Systems

Nye

Schneidewind

Santos et al

Scareware

Shoulder Surfing

Social Engineering

Trojan

State Affiliation

Watts

Civilian Participation

Watts

Burstein

Geneva Conventions

Watts

Network Security

-

International Humanitarian Law

Worm

Social Network

Zero-Day Exploit

Botnet

Shackelford

Bauer and van Eeten

Nye

Hacker

Hacktivism

Intelligence Infrastructure/Information Infrastructure

Beard

Nye

Lawfare

Beard

Virtual Military Technologies

Beard

Virtual Warfare

Beard

Interdependencies

OECD

Santos et al

Risk Modeling

Rue and Pfleeger

Schneidewind

Santos et al