Difference between revisions of "Team 1 Main"
(Note on Section 3) |
|||
Line 4: | Line 4: | ||
1.1 [[Team_1_Sec1.1 | Vulnerabilities exposed]] | 1.1 [[Team_1_Sec1.1 | Vulnerabilities exposed]] | ||
+ | Elena, Santtu, Parvez | ||
1.2 [[Team_1_Sect1.2 | Estimated difficulty]] | 1.2 [[Team_1_Sect1.2 | Estimated difficulty]] | ||
+ | Elena | ||
1.3 [[Team_1_Sect1.3 | Estimated cost/feasibility of defending against other similar attacks in the future]] | 1.3 [[Team_1_Sect1.3 | Estimated cost/feasibility of defending against other similar attacks in the future]] | ||
+ | Elena | ||
1.4 [[Team_1_Sect1.4 | Recommended policy responses]] | 1.4 [[Team_1_Sect1.4 | Recommended policy responses]] | ||
+ | Elena | ||
Revision as of 15:20, 23 October 2005
Areas - Names
Elena
1.1 Vulnerabilities exposed Elena, Santtu, Parvez
1.2 Estimated difficulty Elena
1.3 Estimated cost/feasibility of defending against other similar attacks in the future Elena
1.4 Recommended policy responses Elena
- 2 Estimated damaged cause by attack on...
Parvez, Jameel
Outline of ideas for section 2, and draft of this section - Jameel, Parvez : Team_1_Sec2
2.1 Home computer
2.2 Corporate computer
2.3 Financial Sector computer
- 3 Feasibility and strategic value of attach technique to terrorists
Yi-Kai, Pravin
3.1 Scalability (Pravin)
3.2 Technical and Financial resources (Yi-Kai)
3.3 Potential for achieving aims from lectures 1, 2, 3, and/or 5 (Pravin/Yi-Kai)
I'm working on revisions to my sections, and merging together Section 3. Pravin, I think what you wrote for 3.1 actually fits better in 3.3. Some of my section 3.2 overlaps with 3.1. I'll post a draft of Section 3 by tomorrow (Sunday) afternoon. --Yi-Kai
Please refer to the above link for the final merged Section 4.
Home and Corporate - Hema
Financial - Santtu
Please ignore the links below. They are drafts.
4.1 Incentives for installing defenses
4.5 Policy levers
- 5 Programming of attack
Parvez, Santtu