Difference between revisions of "Team 1 Main"

From CyberSecurity
Jump to: navigation, search
(Reply to Section 1)
Line 1: Line 1:
 
Areas - Names
 
Areas - Names
 
* 1 Attack technique
 
* 1 Attack technique
I have a question about exploiting vulnerabilities in computer codes. Are we only using the "buffer overflow attack" or some other techniques?
 
  
Elena
+
1.1 Vulnerabilities exposed
 +
 
 +
[[Team_1_Sec1.1 | Vulnerabilities exposed]]
 +
 
 +
1.2 Estimated difficulty
 +
 
 +
1.3 Estimated cost/feasibility of defending against other similar attacks in the future
 +
 
 +
1.4 Recommended policy responses
  
The programming assignment used a buffer overflow.  But for the other sections of the report, I think we are considering buffer overflow attacks over a network, combined with other techniques like worms, botnets, etc.  If you want, I can write about some of these more general attacks.  --Yi-Kai
 
  
 
* 2 Estimated damaged cause by attack on...
 
* 2 Estimated damaged cause by attack on...

Revision as of 04:38, 23 October 2005

Areas - Names

  • 1 Attack technique

1.1 Vulnerabilities exposed

Vulnerabilities exposed

1.2 Estimated difficulty

1.3 Estimated cost/feasibility of defending against other similar attacks in the future

1.4 Recommended policy responses


  • 2 Estimated damaged cause by attack on...

Parvez, Jameel

Outline of ideas for section 2, and draft of this section - Jameel, Parvez : Team_1_Sec2

2.1 Home computer

2.2 Corporate computer

2.3 Financial Sector computer

  • 3 Feasibility and strategic value of attach technique to terrorists

Yi-Kai, Pravin

3.1 Scalability (Pravin)

3.2 Technical and Financial resources (Yi-Kai)

3.3 Potential for achieving aims from lectures 1, 2, 3, and/or 5 (Pravin/Yi-Kai)

Hema, Santtu

4.1 Incentives for installing defenses

4.2 Adequacy of incentives

4.3 Cost-effectiveness

4.4 Lowest cost provider

4.5 Policy levers

  • 5 Programming of attack

Parvez, Santtu