Difference between revisions of "Team 1 Main"

From CyberSecurity
Jump to: navigation, search
(Add to Section 3)
 
(40 intermediate revisions by 7 users not shown)
Line 1: Line 1:
 
Areas - Names
 
Areas - Names
* 1 Attack technique
+
* 1 [[Team_1_Sec1 | Attack technique]]
 
Elena
 
Elena
 +
 +
1.1 [[Team_1_Sec1.1 | Vulnerabilities exposed]]
 +
Santtu, Parvez, Elena
 +
 +
1.2 [[Team_1_Sect1.2 | Estimated difficulty]]
 +
Elena
 +
 +
1.3 [[Team_1_Sect1.3 | Estimated feasibility of defending against other similar attacks in the future]]
 +
Elena
 +
 +
1.4 [[Team_1_Sect1.4 | Recommended policy responses]]
 +
Elena
 +
 
* 2 Estimated damaged cause by attack on...
 
* 2 Estimated damaged cause by attack on...
 
Parvez, Jameel  
 
Parvez, Jameel  
  
Outline of ideas for section 2 - Jameel : [[Team_1_Sec2]]
+
Outline of ideas for section 2, and draft of this section - Jameel, Parvez : [[Team_1_Sec2]]
  
 
2.1 Home computer
 
2.1 Home computer
Line 12: Line 25:
  
 
2.3 Financial Sector computer
 
2.3 Financial Sector computer
* 3 Feasibility and strategic value of attach technique to terrorists
+
 
 +
 
 +
* 3 [[Team_1_Sec3 | Feasibility and strategic value of attack technique to terrorists]]
 
Yi-Kai, Pravin
 
Yi-Kai, Pravin
  
3.1 Scalability
+
3.1 [[Team_1_Sec3.1 | Scalability]] (Pravin)
 +
 
 +
3.2 [[Team_1_Sec3.2 | Technical and Financial resources]] (Yi-Kai)
 +
 
 +
3.3 [[Team_1_Sec3.3 | Potential for achieving aims from lectures 1, 2, 3, and/or 5]] (Pravin/Yi-Kai)
 +
 
 +
I'm working on revisions to my sections, and merging together Section 3.  Pravin, I think what you wrote for 3.1 actually fits better in 3.3.  Some of my section 3.2 overlaps with 3.1.  I'll post a draft of Section 3 by tomorrow (Sunday) afternoon.  --Yi-Kai
 +
 
 +
[Pravin]
 +
It is ok to have over-lap as far it is appears to one stapled job and consitent theme.
 +
I have posted the first draft on section 3.3 let me know your feedback. How is 3.2 going?
 +
[Pravin]
 +
 
 +
I promise, 3.2 is almost done.  BTW, for 3.3, I'm thinking of splitting it into two sections, because your version of 3.3 focuses on attacks on critical infrastructure, while my version of 3.3 focuses on "annoyance" attacks (and why a terrorist group might still be interested in such attacks).  Is it okay if we split 3.3?  Also, could you please add references to your sections, for the quotes and other detailed information that you include?  --Yi-Kai
 +
 
 +
3.2 is done (follow the link above).  --Yi-Kai
 +
 
 +
Yi-kai, I really liked your 3.2. I am going to update the references.
 +
It is ok to split 3.3 but can you make sure that you merge with section you wrote because it should be consistent as far as conclusions are concerned or at least over all theme of section ? If not possible just do whatever best, please free to edit anything you believe is not relevant from my section. [Pravin]
 +
 
 +
Section 3 is done!  Use the first link above ([[Team_1_Sec3 | Team_1_Sec3]]).  Pravin, I think we can take care of the references when we do the final revision tomorrow.  Also, I fixed up the grammar in your sections, and I added one sentence near the end (about how states are developing information warfare capabilities).  --Yi-Kai
 +
 
 +
 
 +
* 4 [[Team_1_Sec4 | Feasibility and Cost of Defending each of three groups in #2]]
 +
 
 +
Please refer to the above link for the final merged Section 4.
  
3.2 Technical and Financial resources
+
Home and Corporate - Hema
  
3.3 Potential for achieving aims from lectures 1, 2, 3, and/or 5
+
Financial - Santtu
  
* 4 Feasibility and Cost of Defending each of three groups in #2
+
Please ignore the links below. They are drafts.
  
4.1 Incentives for installing defenses
+
4.1 [[Team_1_Sec4.1 | Incentives for installing defenses]]
  
4.2 Adequacy of incentives
+
4.2 [[Team_1_Sec4.2 | Adequacy of incentives]]
  
4.3 Cost-effectiveness
+
4.3 [[Team_1_Sec4.3 | Cost-effectiveness]]
  
4.4 Lowest cost provider
+
4.4 [[Team_1_Sec4.4 | Lowest cost provider]]
  
4.5 Policy levers
+
4.5 [[Team_1_Sec4.5 | Policy levers]]
  
Hema - Home and Coporate
 
Santu - Financial
 
  
 
* 5 Programming of attack
 
* 5 Programming of attack
 
Parvez, Santtu
 
Parvez, Santtu

Latest revision as of 07:53, 24 October 2005

Areas - Names

Elena

1.1 Vulnerabilities exposed Santtu, Parvez, Elena

1.2 Estimated difficulty Elena

1.3 Estimated feasibility of defending against other similar attacks in the future Elena

1.4 Recommended policy responses Elena

  • 2 Estimated damaged cause by attack on...

Parvez, Jameel

Outline of ideas for section 2, and draft of this section - Jameel, Parvez : Team_1_Sec2

2.1 Home computer

2.2 Corporate computer

2.3 Financial Sector computer


Yi-Kai, Pravin

3.1 Scalability (Pravin)

3.2 Technical and Financial resources (Yi-Kai)

3.3 Potential for achieving aims from lectures 1, 2, 3, and/or 5 (Pravin/Yi-Kai)

I'm working on revisions to my sections, and merging together Section 3. Pravin, I think what you wrote for 3.1 actually fits better in 3.3. Some of my section 3.2 overlaps with 3.1. I'll post a draft of Section 3 by tomorrow (Sunday) afternoon. --Yi-Kai

[Pravin] It is ok to have over-lap as far it is appears to one stapled job and consitent theme. I have posted the first draft on section 3.3 let me know your feedback. How is 3.2 going? [Pravin]

I promise, 3.2 is almost done. BTW, for 3.3, I'm thinking of splitting it into two sections, because your version of 3.3 focuses on attacks on critical infrastructure, while my version of 3.3 focuses on "annoyance" attacks (and why a terrorist group might still be interested in such attacks). Is it okay if we split 3.3? Also, could you please add references to your sections, for the quotes and other detailed information that you include? --Yi-Kai

3.2 is done (follow the link above). --Yi-Kai

Yi-kai, I really liked your 3.2. I am going to update the references. It is ok to split 3.3 but can you make sure that you merge with section you wrote because it should be consistent as far as conclusions are concerned or at least over all theme of section ? If not possible just do whatever best, please free to edit anything you believe is not relevant from my section. [Pravin]

Section 3 is done! Use the first link above ( Team_1_Sec3). Pravin, I think we can take care of the references when we do the final revision tomorrow. Also, I fixed up the grammar in your sections, and I added one sentence near the end (about how states are developing information warfare capabilities). --Yi-Kai


Please refer to the above link for the final merged Section 4.

Home and Corporate - Hema

Financial - Santtu

Please ignore the links below. They are drafts.

4.1 Incentives for installing defenses

4.2 Adequacy of incentives

4.3 Cost-effectiveness

4.4 Lowest cost provider

4.5 Policy levers


  • 5 Programming of attack

Parvez, Santtu