Talk:Cyber Criminal Activity

From CyberSecurity
Revision as of 00:05, 9 November 2005 by Avichal (talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Avichal 16:05, 8 November 2005 (PST) Hi All. Sorry I've been dormant lately. I had checked with Prof. Ed Lazowaska, and the requirement of having a policy student will not be strictly enforced. Ofcourse that does not mean we will not cover the policy angle, infact we'll probably cover it quite extensively. So let's finalize this group and start working.

Start resarching and thinking of how this topic can be divided in sub-topics. If you know what sub-topics you are interested in, then please inform the group immediately. That way we will avoid any wasteful duplication of effort.

We can possibly break it as it's suggested in the project instructions [1]

  1. describing a particular threat
  2. assessing possible losses in the event of an attack
  3. assessing current vulnerabilities
  4. presenting possible responses, and evaluating the cost-effectiveness of each

I have been interested in the link between cybercrime and organized crime. I suppose that could contribute to 1 and 4.