Difference between revisions of "Keyword Index and Glossary of Core Ideas"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 55: Line 55:
  
 
===Honeypot===
 
===Honeypot===
 +
 +
===Intelligence Infrastructure/Information Infrastructure===
 +
[http://cyber.law.harvard.edu/cybersecurity/Law_and_War_in_the_Virtual_Era Beard]
 +
 +
[http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye]
 +
 +
===Interdependencies===
 +
[http://cyber.law.harvard.edu/cybersecurity/Cybersecurity_and_Economic_Incentive OECD]
 +
 +
[http://cyber.law.harvard.edu/cybersecurity/A_Framework_for_Linking_Cybersecurity_Metrics_to_the_Modeling_of_Macroeconomic_Interdependencies Santos et al]
  
 
===International Humanitarian Law===
 
===International Humanitarian Law===
Line 74: Line 84:
 
===Network Security===
 
===Network Security===
 
===Phishing===
 
===Phishing===
 +
 +
===Risk Modeling===
 +
[http://cyber.law.harvard.edu/cybersecurity/Making_the_Best_Use_of_Cybersecurity_Economic_Models Rue and Pfleeger]
 +
 +
[http://cyber.law.harvard.edu/cybersecurity/Metrics_for_Mitigating_Cybersecurity_Threats_to_Networks Schneidewind]
 +
 +
[http://cyber.law.harvard.edu/cybersecurity/A_Framework_for_Linking_Cybersecurity_Metrics_to_the_Modeling_of_Macroeconomic_Interdependencies Santos et al]
  
 
===SCADA Systems===
 
===SCADA Systems===
Line 94: Line 111:
  
 
* [http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye]
 
* [http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye]
 +
 +
===Social Network===
  
 
===State Affiliation===
 
===State Affiliation===
Line 105: Line 124:
 
===Zero-Day Exploit===
 
===Zero-Day Exploit===
  
===Social Network===
 
  
  
  
]
 
  
  
  
===Intelligence Infrastructure/Information Infrastructure===
 
  
[http://cyber.law.harvard.edu/cybersecurity/Law_and_War_in_the_Virtual_Era Beard]
 
  
[http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye]
 
  
 
===Lawfare===
 
===Lawfare===
Line 130: Line 144:
  
 
[http://cyber.law.harvard.edu/cybersecurity/Law_and_War_in_the_Virtual_Era Beard]
 
[http://cyber.law.harvard.edu/cybersecurity/Law_and_War_in_the_Virtual_Era Beard]
 
===Interdependencies===
 
[http://cyber.law.harvard.edu/cybersecurity/Cybersecurity_and_Economic_Incentive OECD]
 
 
[http://cyber.law.harvard.edu/cybersecurity/A_Framework_for_Linking_Cybersecurity_Metrics_to_the_Modeling_of_Macroeconomic_Interdependencies Santos et al]
 
 
===Risk Modeling===
 
[http://cyber.law.harvard.edu/cybersecurity/Making_the_Best_Use_of_Cybersecurity_Economic_Models Rue and Pfleeger]
 
 
[http://cyber.law.harvard.edu/cybersecurity/Metrics_for_Mitigating_Cybersecurity_Threats_to_Networks Schneidewind]
 
 
[http://cyber.law.harvard.edu/cybersecurity/A_Framework_for_Linking_Cybersecurity_Metrics_to_the_Modeling_of_Macroeconomic_Interdependencies Santos et al]
 

Revision as of 20:27, 9 June 2010

Glossary of Core Ideas

Air-Gapped Network

Antivirus

Botnet

Shackelford

Bauer and van Eeten

[http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye

Civilian Participation

Watts

Burstein

Combatant Status

Watts

Computer Network Attack

Watts

Communications Privacy Law

Burstein

Nye

Crimeware

Bauer and van Eeten 2

Cyber Terrorism

Shah

Cyber Warfare

Shackelford

Watts

Digital Pearl Harbor

Stohl

Distributed Denial of Service (DDoS)

Dumpster Diving

Geneva Conventions

Watts

Hacker

Hacktivism

Honeypot

Intelligence Infrastructure/Information Infrastructure

Beard

Nye

Interdependencies

OECD

Santos et al

International Humanitarian Law

Watts

Internet Relay Chat (IRC)

Internet Service Providers

OECD

Laws of War

Watts

Beard

Nye

Malware

Network Security

Phishing

Risk Modeling

Rue and Pfleeger

Schneidewind

Santos et al

SCADA Systems

Nye

Schneidewind

Santos et al

Scareware

Script Kiddie

Shoulder Surfing

Social Engineering

Social Network

State Affiliation

Watts

Trojan

Worm

Zero-Day Exploit

Lawfare

Beard

Virtual Military Technologies

Beard

Virtual Warfare

Beard