Difference between revisions of "Keyword Index and Glossary of Core Ideas"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 159: Line 159:
  
 
===Data Mining===
 
===Data Mining===
 +
 +
[http://cyber.law.harvard.edu/cybersecurity/Best_Practices_for_Data_Protection_and_Privacy#Synopsis Besunder]
  
 
===Privacy Law===
 
===Privacy Law===

Revision as of 15:31, 11 June 2010

Glossary of Core Ideas

Air-Gapped Network

Antivirus

Black Hat

A black hat is a computer hacker who works to harm others (e.g., steal identities or spreading computer viruses).

References:

Botnet

Civilian Participation

Watts

Burstein

Combatant Status

Watts

Computer Network Attack

Watts

Communications Privacy Law

Burstein

Nye

Nojeim

Crimeware

Bauer and van Eeten 2

Cyber Terrorism

Shah

Cyber Warfare

Actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption. (Clarke)

References:

Clarke

Shackelford

Watts

Digital Pearl Harbor

Stohl

Distributed Denial of Service (DDoS)

Dumpster Diving

Geneva Conventions

Watts

Hacker

Hacktivism

Honeypot

Intelligence Infrastructure/Information Infrastructure

Beard

Nye

Interdependencies

OECD

Santos et al

International Humanitarian Law

Watts

Internet Relay Chat (IRC)

Internet Service Providers

OECD

Lawfare

Beard

Laws of War

Watts

Beard

Nye

Malware

Network Security

Phishing

The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

Risk Modeling

Rue and Pfleeger

Schneidewind

Santos et al

SCADA Systems

Nye

Schneidewind

Santos et al

Scareware

Script Kiddie

Shoulder Surfing

Social Engineering

Social Network

State Affiliation

Watts

Trojan

Virtual Military Technologies

Beard

Virtual Warfare

Beard

Worm

Zero-Day Exploit

Casus Belli

Bellovin

Bellovin

Data Mining

Besunder

Privacy Law