Difference between revisions of "Keyword Index and Glossary of Core Ideas"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 4: Line 4:
  
 
===Antivirus===
 
===Antivirus===
 +
 +
===Civilian Participation===
 +
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
 +
 +
[http://cyber.law.harvard.edu/cybersecurity/Amending_The_ECPA_To_Enable_a_Culture_of_Cybersecurity_Research Burstein]
  
 
===Combatant Status===
 
===Combatant Status===
Line 48: Line 53:
  
 
===Laws of War===
 
===Laws of War===
 
 
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
 
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
  
Line 58: Line 62:
  
 
===Phishing===
 
===Phishing===
 
===Script Kiddie===
 
 
 
  
 
===SCADA Systems===
 
===SCADA Systems===
Line 71: Line 71:
  
 
===Scareware===
 
===Scareware===
 +
 +
===Script Kiddie===
  
 
===Shoulder Surfing===
 
===Shoulder Surfing===
  
 
===Social Engineering===
 
===Social Engineering===
 
 
* [http://cyber.law.harvard.edu/cybersecurity/The_Market_Consequences_of_Cybersecurity:_Defining_Externalities_and_Ways_to_Address_Them#Synopsis OECD] [http://cyber.law.harvard.edu/cybersecurity/Cybersecurity_and_Economic_Incentive 2]
 
* [http://cyber.law.harvard.edu/cybersecurity/The_Market_Consequences_of_Cybersecurity:_Defining_Externalities_and_Ways_to_Address_Them#Synopsis OECD] [http://cyber.law.harvard.edu/cybersecurity/Cybersecurity_and_Economic_Incentive 2]
  
Line 81: Line 82:
  
 
* [http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye]
 
* [http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye]
 +
 +
===State Affiliation===
 +
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
  
 
===Trojan===
 
===Trojan===
Line 91: Line 95:
  
  
===State Affiliation===
 
  
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
 
  
===Civilian Participation===
 
  
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
 
 
[http://cyber.law.harvard.edu/cybersecurity/Amending_The_ECPA_To_Enable_a_Culture_of_Cybersecurity_Research Burstein]
 
  
 
===Geneva Conventions===
 
===Geneva Conventions===

Revision as of 20:23, 9 June 2010

Glossary of Core Ideas

Air-Gapped Network

Antivirus

Civilian Participation

Watts

Burstein

Combatant Status

Watts

Computer Network Attack

Watts

Crimeware

Bauer and van Eeten 2

Communications Privacy Law

Burstein

Nye

Cyber Terrorism

Shah

Cyber Warfare

Shackelford

Watts

Digital Pearl Harbor

Stohl

Distributed Denial of Service (DDoS)

Dumpster Diving

Honeypot

International Humanitarian Law

Watts

Internet Relay Chat (IRC)

Internet Service Providers

OECD

Laws of War

Watts

Beard

Nye

Malware

Phishing

SCADA Systems

Nye

Schneidewind

Santos et al

Scareware

Script Kiddie

Shoulder Surfing

Social Engineering

State Affiliation

Watts

Trojan

Geneva Conventions

Watts

Network Security

-

International Humanitarian Law

Worm

Social Network

Zero-Day Exploit

Botnet

Shackelford

Bauer and van Eeten

Nye

Hacker

Hacktivism

Intelligence Infrastructure/Information Infrastructure

Beard

Nye

Lawfare

Beard

Virtual Military Technologies

Beard

Virtual Warfare

Beard

Interdependencies

OECD

Santos et al

Risk Modeling

Rue and Pfleeger

Schneidewind

Santos et al