Difference between revisions of "Team 1 Main"
From CyberSecurity
Line 22: | Line 22: | ||
* 4 Feasibility and Cost of Defending each of three groups in #2 | * 4 Feasibility and Cost of Defending each of three groups in #2 | ||
− | |||
4.1 Incentives for installing defenses | 4.1 Incentives for installing defenses | ||
− | |||
4.2 Adequacy of incentives | 4.2 Adequacy of incentives | ||
Line 34: | Line 32: | ||
4.5 Policy levers | 4.5 Policy levers | ||
− | + | ||
+ | Hema - Home and Coporate | ||
+ | Santu - Financial | ||
+ | |||
* 5 Programming of attack | * 5 Programming of attack | ||
Parvez, Santtu | Parvez, Santtu |
Revision as of 15:54, 18 October 2005
Areas - Names
- 1 Attack technique
Elena
- 2 Estimated damaged cause by attack on...
Parvez, Jameel
Outline of ideas for section 2 - Jameel : Team_1_Sec2
2.1 Home computer
2.2 Corporate computer
2.3 Financial Sector computer
- 3 Feasibility and strategic value of attach technique to terrorists
Yi-Kai, Pravin
3.1 Scalability
3.2 Technical and Financial resources
3.3 Potential for achieving aims from lectures 1, 2, 3, and/or 5
- 4 Feasibility and Cost of Defending each of three groups in #2
4.1 Incentives for installing defenses
4.2 Adequacy of incentives
4.3 Cost-effectiveness
4.4 Lowest cost provider
4.5 Policy levers
Hema - Home and Coporate Santu - Financial
- 5 Programming of attack
Parvez, Santtu