Difference between revisions of "Keyword Index and Glossary of Core Ideas"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 4: Line 4:
  
 
===Antivirus===
 
===Antivirus===
 +
 +
===Botnet===
 +
[http://cyber.law.harvard.edu/cybersecurity/Estonia_Three_Years_Later Shackelford]
 +
 +
[http://cyber.law.harvard.edu/cybersecurity/Emerging_Threats_to_Internet_Security_-_Incentives%2C_Externalities_and_Policy_Implications Bauer and van Eeten]
 +
 +
[http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye
  
 
===Civilian Participation===
 
===Civilian Participation===
Line 39: Line 46:
  
 
===Dumpster Diving===
 
===Dumpster Diving===
 +
 +
===Geneva Conventions===
 +
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
 +
 +
===Hacker===
 +
 +
===Hacktivism===
  
 
===Honeypot===
 
===Honeypot===
  
 
===International Humanitarian Law===
 
===International Humanitarian Law===
 
 
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
 
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
  
Line 59: Line 72:
  
 
===Malware===
 
===Malware===
 
+
===Network Security===
 
===Phishing===
 
===Phishing===
  
Line 87: Line 100:
 
===Trojan===
 
===Trojan===
  
 
 
 
 
 
 
 
 
 
 
 
===Geneva Conventions===
 
 
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
 
 
===Network Security===
 
-
 
===International Humanitarian Law===
 
  
 
===Worm===
 
===Worm===
  
 
+
===Zero-Day Exploit===
  
 
===Social Network===
 
===Social Network===
  
===Zero-Day Exploit===
 
 
===Botnet===
 
[http://cyber.law.harvard.edu/cybersecurity/Estonia_Three_Years_Later Shackelford]
 
  
[http://cyber.law.harvard.edu/cybersecurity/Emerging_Threats_to_Internet_Security_-_Incentives%2C_Externalities_and_Policy_Implications Bauer and van Eeten]
 
  
[http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye]
+
]
  
===Hacker===
 
  
===Hacktivism===
 
  
 
===Intelligence Infrastructure/Information Infrastructure===
 
===Intelligence Infrastructure/Information Infrastructure===

Revision as of 20:25, 9 June 2010

Glossary of Core Ideas

Air-Gapped Network

Antivirus

Botnet

Shackelford

Bauer and van Eeten

[http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye

Civilian Participation

Watts

Burstein

Combatant Status

Watts

Computer Network Attack

Watts

Communications Privacy Law

Burstein

Nye

Crimeware

Bauer and van Eeten 2

Cyber Terrorism

Shah

Cyber Warfare

Shackelford

Watts

Digital Pearl Harbor

Stohl

Distributed Denial of Service (DDoS)

Dumpster Diving

Geneva Conventions

Watts

Hacker

Hacktivism

Honeypot

International Humanitarian Law

Watts

Internet Relay Chat (IRC)

Internet Service Providers

OECD

Laws of War

Watts

Beard

Nye

Malware

Network Security

Phishing

SCADA Systems

Nye

Schneidewind

Santos et al

Scareware

Script Kiddie

Shoulder Surfing

Social Engineering

State Affiliation

Watts

Trojan

Worm

Zero-Day Exploit

Social Network

]


Intelligence Infrastructure/Information Infrastructure

Beard

Nye

Lawfare

Beard

Virtual Military Technologies

Beard

Virtual Warfare

Beard

Interdependencies

OECD

Santos et al

Risk Modeling

Rue and Pfleeger

Schneidewind

Santos et al