Difference between revisions of "Team 1 Main"

From CyberSecurity
Jump to: navigation, search
 
Line 22: Line 22:
  
 
* 4 Feasibility and Cost of Defending each of three groups in #2
 
* 4 Feasibility and Cost of Defending each of three groups in #2
Hema, Santtu
 
  
 
4.1 Incentives for installing defenses
 
4.1 Incentives for installing defenses
  
Santtu
 
 
4.2 Adequacy of incentives
 
4.2 Adequacy of incentives
  
Line 34: Line 32:
  
 
4.5 Policy levers
 
4.5 Policy levers
Santtu
+
 
 +
Hema - Home and Coporate
 +
Santu - Financial
 +
 
 
* 5 Programming of attack
 
* 5 Programming of attack
 
Parvez, Santtu
 
Parvez, Santtu

Revision as of 15:54, 18 October 2005

Areas - Names

  • 1 Attack technique

Elena

  • 2 Estimated damaged cause by attack on...

Parvez, Jameel

Outline of ideas for section 2 - Jameel : Team_1_Sec2

2.1 Home computer

2.2 Corporate computer

2.3 Financial Sector computer

  • 3 Feasibility and strategic value of attach technique to terrorists

Yi-Kai, Pravin

3.1 Scalability

3.2 Technical and Financial resources

3.3 Potential for achieving aims from lectures 1, 2, 3, and/or 5

  • 4 Feasibility and Cost of Defending each of three groups in #2

4.1 Incentives for installing defenses

4.2 Adequacy of incentives

4.3 Cost-effectiveness

4.4 Lowest cost provider

4.5 Policy levers

Hema - Home and Coporate Santu - Financial

  • 5 Programming of attack

Parvez, Santtu