Difference between revisions of "Table of Contents"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 6: Line 6:
 
====[[Terrorists]]====
 
====[[Terrorists]]====
 
===[[Security Targets]]===
 
===[[Security Targets]]===
====[[Public critical infrastructure]]====
+
====[[Public Critical Infrastructure]]====
=====[[.gov]]=====
+
=====[[Government Networks (.gov)]]=====
=====[[.mil]]=====
+
=====[[Military Networks (.mil)]]=====
====[[Private critical infrastructure]]====
+
====[[Private Critical Infrastructure]]====
 
=====[[Transportation]]=====
 
=====[[Transportation]]=====
=====[[Electrical grid]]=====
+
=====[[Electrical Grid]]=====
=====[[Water, Communications, etc.]]=====
+
=====[[Water, Sewer, etc.]]=====
====[[Cloud Computing]]====
+
====[[Communications]]=====
 +
=====[[Telephone]]=====
 +
=====[[Public Networks]]=====
 +
=====[[Cloud Computing]]=====
 
===[[Metrics]]===
 
===[[Metrics]]===
 
===[[ Economics of Cybersecurity]]===
 
===[[ Economics of Cybersecurity]]===

Revision as of 18:00, 13 May 2010

The Threat and Skeptics

Actors and Incentives

States

Groups

Hacktivists

Terrorists

Security Targets

Public Critical Infrastructure

Government Networks (.gov)
Military Networks (.mil)

Private Critical Infrastructure

Transportation
Electrical Grid
Water, Sewer, etc.

Communications=

Telephone
Public Networks
Cloud Computing

Metrics

Economics of Cybersecurity

Risk management and investment

Incentives

Supply Chain Issues

Usability/Human Factors

Information Sharing

Public-Private Cooperation

Attribution

Identity management

Privacy

Security components of classic cyber issues (e.g. IP)

Cybercrime

Cyberwar

Espionage

Government to Government

Industrial

Regulation/Liability

Government Organization

International Cooperation

International Law (including laws of war)

Deterrence