Difference between revisions of "Team 1 Main"
From CyberSecurity
(Section 3.3) |
|||
Line 12: | Line 12: | ||
2.3 Financial Sector computer | 2.3 Financial Sector computer | ||
+ | |||
* 3 Feasibility and strategic value of attach technique to terrorists | * 3 Feasibility and strategic value of attach technique to terrorists | ||
Yi-Kai, Pravin | Yi-Kai, Pravin | ||
− | 3.1 Scalability | + | 3.1 Scalability (Pravin) |
− | 3.2 Technical and Financial resources | + | 3.2 Technical and Financial resources (Yi-Kai) |
− | 3.3 Potential for achieving aims from lectures 1, 2, 3, and/or 5 | + | 3.3 [[Team_1_Sec3.3 | Potential for achieving aims from lectures 1, 2, 3, and/or 5]] (Pravin/Yi-Kai) |
* 4 [[Team_1_Sec4 | Feasibility and Cost of Defending each of three groups in #2]] | * 4 [[Team_1_Sec4 | Feasibility and Cost of Defending each of three groups in #2]] |
Revision as of 06:07, 20 October 2005
Areas - Names
- 1 Attack technique
Elena
- 2 Estimated damaged cause by attack on...
Parvez, Jameel
Outline of ideas for section 2 - Jameel : Team_1_Sec2
2.1 Home computer
2.2 Corporate computer
2.3 Financial Sector computer
- 3 Feasibility and strategic value of attach technique to terrorists
Yi-Kai, Pravin
3.1 Scalability (Pravin)
3.2 Technical and Financial resources (Yi-Kai)
3.3 Potential for achieving aims from lectures 1, 2, 3, and/or 5 (Pravin/Yi-Kai)
Hema, Santtu
4.1 Incentives for installing defenses
4.2 Adequacy of incentives
4.3 Cost-effectiveness
4.4 Lowest cost provider
4.5 Policy levers
Hema - Home and Coporate
Santtu - Financial
- 5 Programming of attack
Parvez, Santtu