Difference between revisions of "Keyword Index and Glossary of Core Ideas"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 22: Line 22:
  
 
* [http://cyber.law.harvard.edu/cybersecurity/World_War_3.0:_Ten_Critical_Trends_for_Cybersecurity Cetron and Davies]
 
* [http://cyber.law.harvard.edu/cybersecurity/World_War_3.0:_Ten_Critical_Trends_for_Cybersecurity Cetron and Davies]
 +
 +
===Casus Belli===
 +
 +
[http://cyber.law.harvard.edu/cybersecurity/The_Government_and_Cybersecurity Bellovin]
 +
 +
[http://cyber.law.harvard.edu/cybersecurity/Cyber_Security_and_Politically%2C_Socially_and_Religiously_Motivated_Cyber_Attacks#Full_Citation Cornish]
 +
  
 
===Civilian Participation===
 
===Civilian Participation===
Line 71: Line 78:
 
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
 
[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Watts]
  
 +
===Data Mining===
  
 +
[http://cyber.law.harvard.edu/cybersecurity/Best_Practices_for_Data_Protection_and_Privacy#Synopsis Besunder]
  
 
===Digital Pearl Harbor===
 
===Digital Pearl Harbor===
Line 123: Line 132:
  
 
===Malware===
 
===Malware===
 +
 +
 +
===National Security===
 +
[http://cyber.law.harvard.edu/cybersecurity/Cyberspace_and_the_National_Security_of_the_United_Kingdom Cornish et. al.]
 +
 +
[http://cyber.law.harvard.edu/cybersecurity/Terrorist_Capabilities_for_Cyberattack:_Overview_and_Policy_Issues Rollins and Wilson]
  
 
===Organized Crime===
 
===Organized Crime===
Line 167: Line 182:
  
 
===Social Network===
 
===Social Network===
 +
 +
==Sponsored Attacks===
 +
[http://cyber.law.harvard.edu/cybersecurity/The_Government_and_Cybersecurity Bellovin]
  
 
===State Affiliation===
 
===State Affiliation===
Line 188: Line 206:
  
 
===Zero-Day Exploit===
 
===Zero-Day Exploit===
 
===Casus Belli===
 
 
[http://cyber.law.harvard.edu/cybersecurity/The_Government_and_Cybersecurity Bellovin]
 
 
[http://cyber.law.harvard.edu/cybersecurity/Cyber_Security_and_Politically%2C_Socially_and_Religiously_Motivated_Cyber_Attacks#Full_Citation Cornish]
 
 
===Sponsored Attacks===
 
[http://cyber.law.harvard.edu/cybersecurity/The_Government_and_Cybersecurity Bellovin]
 
 
===Data Mining===
 
 
[http://cyber.law.harvard.edu/cybersecurity/Best_Practices_for_Data_Protection_and_Privacy#Synopsis Besunder]
 
 
=
 
 
 
===National Security===
 
 
[http://cyber.law.harvard.edu/cybersecurity/Cyberspace_and_the_National_Security_of_the_United_Kingdom Cornish et. al.]
 
 
[http://cyber.law.harvard.edu/cybersecurity/Terrorist_Capabilities_for_Cyberattack:_Overview_and_Policy_Issues Rollins and Wilson]
 

Revision as of 13:36, 14 June 2010

Glossary of Core Ideas

Air-Gapped Network

Antivirus

Black Hat

A black hat is a computer hacker who works to harm others (e.g., steal identities or spreading computer viruses).

See also:

  • White Hat

References:

Botnet

Casus Belli

Bellovin

Cornish


Civilian Participation

Watts

Burstein

Cornish et. al.

Combatant Status

Watts

Computer Network Attack

Watts

Cornish et. al.

Communications Privacy Law

Burstein

Nye

Nojeim

Crimeware

Bauer and van Eeten 2

Cyber Terrorism

Shah

Cetron and Davies

Rollins and Wilson

Cyber Warfare

Actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption. (Clarke)

References:

Clarke

Cornish

Lan

Shackelford

Watts

Data Mining

Besunder

Digital Pearl Harbor

Stohl

Cetron and Davies

Distributed Denial of Service (DDoS)

Dumpster Diving

Geneva Conventions

Watts

Hacker

Hacktivism

Cetron and Davies

Honeypot

Intelligence Infrastructure/Information Infrastructure

Beard

Nye

Interdependencies

OECD

Santos et al

International Humanitarian Law

Watts

Internet Relay Chat (IRC)

Internet Service Providers

OECD

Lawfare

Beard

Laws of War

Watts

Beard

Nye

Malware

National Security

Cornish et. al.

Rollins and Wilson

Organized Crime

Cornish et. al.


Phishing

The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

Privacy Law

Besunder

Risk Modeling

Rue and Pfleeger

Schneidewind

Santos et al

Research & Development

Maughan

SCADA Systems

Nye

Schneidewind

Santos et al

Scareware

Script Kiddie

Shoulder Surfing

Social Engineering

Social Network

Bellovin

State Affiliation

Watts

Cornish

Cornish et. al.

Trojan

Virtual Military Technologies

Beard Lan

Virtual Warfare

Beard

Worm

Zero-Day Exploit