Difference between revisions of "Talk:Cyber Criminal Activity"

From CyberSecurity
Jump to: navigation, search
 
Line 1: Line 1:
 +
--[[User:Hema|Hema]] 08:30, 9 November 2005 (PST)We will need a policy student. So I will update the page.
 +
 
[[User:Avichal|Avichal]] 16:05, 8 November 2005 (PST) Hi All. Sorry I've been dormant lately. I had checked with Prof. Ed Lazowaska, and the requirement of having a policy student will not be strictly enforced. Ofcourse that does not mean we will not cover the policy angle, infact we'll probably cover it quite extensively. So let's finalize this group and start working.
 
[[User:Avichal|Avichal]] 16:05, 8 November 2005 (PST) Hi All. Sorry I've been dormant lately. I had checked with Prof. Ed Lazowaska, and the requirement of having a policy student will not be strictly enforced. Ofcourse that does not mean we will not cover the policy angle, infact we'll probably cover it quite extensively. So let's finalize this group and start working.
  
Line 10: Line 12:
  
 
I have been interested in the link between cybercrime and organized crime. I suppose that could contribute to 1 and 4.
 
I have been interested in the link between cybercrime and organized crime. I suppose that could contribute to 1 and 4.
 +
 +
--Fleizach 20:33, 4 November 2005 <b>to those who have joined this group, do you want to close the group at four or five people and start working?</b>

Revision as of 20:41, 10 November 2005

--Hema 08:30, 9 November 2005 (PST)We will need a policy student. So I will update the page.

Avichal 16:05, 8 November 2005 (PST) Hi All. Sorry I've been dormant lately. I had checked with Prof. Ed Lazowaska, and the requirement of having a policy student will not be strictly enforced. Ofcourse that does not mean we will not cover the policy angle, infact we'll probably cover it quite extensively. So let's finalize this group and start working.

Start resarching and thinking of how this topic can be divided in sub-topics. If you know what sub-topics you are interested in, then please inform the group immediately. That way we will avoid any wasteful duplication of effort.

We can possibly break it as it's suggested in the project instructions [1]

  1. describing a particular threat
  2. assessing possible losses in the event of an attack
  3. assessing current vulnerabilities
  4. presenting possible responses, and evaluating the cost-effectiveness of each

I have been interested in the link between cybercrime and organized crime. I suppose that could contribute to 1 and 4.

--Fleizach 20:33, 4 November 2005 to those who have joined this group, do you want to close the group at four or five people and start working?