Team 1 Main

From CyberSecurity
Jump to: navigation, search

Areas - Names

Elena

1.1 Vulnerabilities exposed Santtu, Parvez, Elena

1.2 Estimated difficulty Elena

1.3 Estimated feasibility of defending against other similar attacks in the future Elena

1.4 Recommended policy responses Elena

  • 2 Estimated damaged cause by attack on...

Parvez, Jameel

Outline of ideas for section 2, and draft of this section - Jameel, Parvez : Team_1_Sec2

2.1 Home computer

2.2 Corporate computer

2.3 Financial Sector computer


Yi-Kai, Pravin

3.1 Scalability (Pravin)

3.2 Technical and Financial resources (Yi-Kai)

3.3 Potential for achieving aims from lectures 1, 2, 3, and/or 5 (Pravin/Yi-Kai)

I'm working on revisions to my sections, and merging together Section 3. Pravin, I think what you wrote for 3.1 actually fits better in 3.3. Some of my section 3.2 overlaps with 3.1. I'll post a draft of Section 3 by tomorrow (Sunday) afternoon. --Yi-Kai

[Pravin] It is ok to have over-lap as far it is appears to one stapled job and consitent theme. I have posted the first draft on section 3.3 let me know your feedback. How is 3.2 going? [Pravin]

I promise, 3.2 is almost done. BTW, for 3.3, I'm thinking of splitting it into two sections, because your version of 3.3 focuses on attacks on critical infrastructure, while my version of 3.3 focuses on "annoyance" attacks (and why a terrorist group might still be interested in such attacks). Is it okay if we split 3.3? Also, could you please add references to your sections, for the quotes and other detailed information that you include? --Yi-Kai

3.2 is done (follow the link above). --Yi-Kai

Yi-kai, I really liked your 3.2. I am going to update the references. It is ok to split 3.3 but can you make sure that you merge with section you wrote because it should be consistent as far as conclusions are concerned or at least over all theme of section ? If not possible just do whatever best, please free to edit anything you believe is not relevant from my section. [Pravin]

Section 3 is done! Use the first link above ( Team_1_Sec3). Pravin, I think we can take care of the references when we do the final revision tomorrow. Also, I fixed up the grammar in your sections, and I added one sentence near the end (about how states are developing information warfare capabilities). --Yi-Kai


Please refer to the above link for the final merged Section 4.

Home and Corporate - Hema

Financial - Santtu

Please ignore the links below. They are drafts.

4.1 Incentives for installing defenses

4.2 Adequacy of incentives

4.3 Cost-effectiveness

4.4 Lowest cost provider

4.5 Policy levers


  • 5 Programming of attack

Parvez, Santtu