Difference between revisions of "Team 1 Main"
(Reply to Section 1) |
|||
Line 4: | Line 4: | ||
Elena | Elena | ||
+ | |||
+ | The programming assignment used a buffer overflow. But for the report, I think we are considering buffer overflow attacks over a network, combined with other techniques like worms, botnets, etc. --Yi-Kai | ||
+ | |||
* 2 Estimated damaged cause by attack on... | * 2 Estimated damaged cause by attack on... | ||
Parvez, Jameel | Parvez, Jameel |
Revision as of 23:07, 22 October 2005
Areas - Names
- 1 Attack technique
I have a question about exploiting vulnerabilities in computer codes. Are we only using the "buffer overflow attack" or some other techniques?
Elena
The programming assignment used a buffer overflow. But for the report, I think we are considering buffer overflow attacks over a network, combined with other techniques like worms, botnets, etc. --Yi-Kai
- 2 Estimated damaged cause by attack on...
Parvez, Jameel
Outline of ideas for section 2, and draft of this section - Jameel, Parvez : Team_1_Sec2
2.1 Home computer
2.2 Corporate computer
2.3 Financial Sector computer
- 3 Feasibility and strategic value of attach technique to terrorists
Yi-Kai, Pravin
3.1 Scalability (Pravin)
3.2 Technical and Financial resources (Yi-Kai)
3.3 Potential for achieving aims from lectures 1, 2, 3, and/or 5 (Pravin/Yi-Kai)
Hema, Santtu
4.1 Incentives for installing defenses
4.5 Policy levers
- 5 Programming of attack
Parvez, Santtu