Difference between revisions of "Team 1 Main"

From CyberSecurity
Jump to: navigation, search
m
Line 32: Line 32:
 
4.3 Cost-effectiveness
 
4.3 Cost-effectiveness
  
4.4 Lowest cost provider
+
4.4 [[Team_1_Sec4.4 | Lowest cost provider]]
  
 
4.5 [[Team_1_Sec4.5 | Policy levers]]
 
4.5 [[Team_1_Sec4.5 | Policy levers]]

Revision as of 06:08, 22 October 2005

Areas - Names

  • 1 Attack technique

I'll post my part by Saturday morning, Elena

  • 2 Estimated damaged cause by attack on...

Parvez, Jameel

Outline of ideas for section 2, and draft of this section - Jameel, Parvez : Team_1_Sec2

2.1 Home computer

2.2 Corporate computer

2.3 Financial Sector computer

  • 3 Feasibility and strategic value of attach technique to terrorists

Yi-Kai, Pravin

3.1 Scalability (Pravin)

3.2 Technical and Financial resources (Yi-Kai)

3.3 Potential for achieving aims from lectures 1, 2, 3, and/or 5 (Pravin/Yi-Kai)

Hema, Santtu

4.1 Incentives for installing defenses

4.2 Adequacy of incentives

4.3 Cost-effectiveness

4.4 Lowest cost provider

4.5 Policy levers

  • 5 Programming of attack

Parvez, Santtu