Table of Contents
Revision as of 13:48, 13 May 2010 by WikiSysop (talk | contribs) (New page: ===The Threat and Skeptics=== ===Actors and Incentives=== a. States b. Groups c. Hacktivists d. Terrorists 3. Security Targets a. Public critical infrastru...)
The Threat and Skeptics
Actors and Incentives
a. States b. Groups c. Hacktivists d. Terrorists
3. Security Targets
a. Public critical infrastructure i. .gov ii. .mil b. Private critical infrastructure i. Electrical grid ii. Etc. c. Cloud Computing
4. Metrics 5. Economics of Cybersecurity
a. Risk management and investment b. Incentives
6. Supply Chain Issues 7. Usability/Human Factors 8. Information Sharing 9. Public-Private Cooperation 10. Attribution 11. Identity management 12. Privacy 13. [Security components of classic cyber issues, eg IP] 14. Cybercrime 15. Cyberwar 16. Espionage
a. Government to Government b. Industrial
17. Regulation/Liability 18. Government Organization 19. International Cooperation 20. International Law (including laws of war) 21. Deterrence