Difference between revisions of "Keyword Index and Glossary of Core Ideas"
Jump to navigation
Jump to search
Line 8: | Line 8: | ||
A black hat is a computer hacker who works to harm others (e.g., steal identities or spreading computer viruses). | A black hat is a computer hacker who works to harm others (e.g., steal identities or spreading computer viruses). | ||
+ | |||
+ | References: | ||
===Botnet=== | ===Botnet=== | ||
− | [http://cyber.law.harvard.edu/cybersecurity/Estonia_Three_Years_Later Shackelford] | + | * [http://cyber.law.harvard.edu/cybersecurity/Estonia_Three_Years_Later Shackelford] |
− | [http://cyber.law.harvard.edu/cybersecurity/Emerging_Threats_to_Internet_Security_-_Incentives%2C_Externalities_and_Policy_Implications Bauer and van Eeten] | + | * [http://cyber.law.harvard.edu/cybersecurity/Emerging_Threats_to_Internet_Security_-_Incentives%2C_Externalities_and_Policy_Implications Bauer and van Eeten] |
− | [http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye] | + | * [http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Nye] |
===Civilian Participation=== | ===Civilian Participation=== |
Revision as of 20:38, 9 June 2010
Glossary of Core Ideas
Air-Gapped Network
Antivirus
Black Hat
A black hat is a computer hacker who works to harm others (e.g., steal identities or spreading computer viruses).
References:
Botnet
Civilian Participation
Combatant Status
Computer Network Attack
Communications Privacy Law
Crimeware
Cyber Terrorism
Cyber Warfare
Digital Pearl Harbor
Distributed Denial of Service (DDoS)
Dumpster Diving
Geneva Conventions
Hacker
Hacktivism
Honeypot
Intelligence Infrastructure/Information Infrastructure
Interdependencies
International Humanitarian Law
Internet Relay Chat (IRC)
Internet Service Providers
Lawfare
Laws of War
Malware
Network Security
Phishing
The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.