Difference between revisions of "Team 1 Main"

From CyberSecurity
Jump to: navigation, search
Line 46: Line 46:
  
 
3.2 is done (follow the link above).  --Yi-Kai
 
3.2 is done (follow the link above).  --Yi-Kai
 +
 +
Yi-kai, I really liked your 3.2. I am going to update the references.
 +
It is ok to split 3.3 but can you make sure that you merge with section you wrote because it should be consistent as far as conclusions are concerned or at least over all theme of section ? If not possible just do whatever best, please free to edit anything you believe is not relevant from my section.
 +
  
 
* 4 [[Team_1_Sec4 | Feasibility and Cost of Defending each of three groups in #2]]
 
* 4 [[Team_1_Sec4 | Feasibility and Cost of Defending each of three groups in #2]]

Revision as of 06:18, 24 October 2005

Areas - Names

Elena

1.1 Vulnerabilities exposed Santtu, Parvez, Elena

1.2 Estimated difficulty Elena

1.3 Estimated feasibility of defending against other similar attacks in the future Elena

1.4 Recommended policy responses Elena

  • 2 Estimated damaged cause by attack on...

Parvez, Jameel

Outline of ideas for section 2, and draft of this section - Jameel, Parvez : Team_1_Sec2

2.1 Home computer

2.2 Corporate computer

2.3 Financial Sector computer


  • 3 Feasibility and strategic value of attach technique to terrorists

Yi-Kai, Pravin

3.1 Scalability (Pravin)

3.2 Technical and Financial resources (Yi-Kai)

3.3 Potential for achieving aims from lectures 1, 2, 3, and/or 5 (Pravin/Yi-Kai)

I'm working on revisions to my sections, and merging together Section 3. Pravin, I think what you wrote for 3.1 actually fits better in 3.3. Some of my section 3.2 overlaps with 3.1. I'll post a draft of Section 3 by tomorrow (Sunday) afternoon. --Yi-Kai

[Pravin] It is ok to have over-lap as far it is appears to one stapled job and consitent theme. I have posted the first draft on section 3.3 let me know your feedback. How is 3.2 going? [Pravin]

I promise, 3.2 is almost done. BTW, for 3.3, I'm thinking of splitting it into two sections, because your version of 3.3 focuses on attacks on critical infrastructure, while my version of 3.3 focuses on "annoyance" attacks (and why a terrorist group might still be interested in such attacks). Is it okay if we split 3.3? Also, could you please add references to your sections, for the quotes and other detailed information that you include? --Yi-Kai

3.2 is done (follow the link above). --Yi-Kai

Yi-kai, I really liked your 3.2. I am going to update the references. It is ok to split 3.3 but can you make sure that you merge with section you wrote because it should be consistent as far as conclusions are concerned or at least over all theme of section ? If not possible just do whatever best, please free to edit anything you believe is not relevant from my section.


Please refer to the above link for the final merged Section 4.

Home and Corporate - Hema

Financial - Santtu

Please ignore the links below. They are drafts.

4.1 Incentives for installing defenses

4.2 Adequacy of incentives

4.3 Cost-effectiveness

4.4 Lowest cost provider

4.5 Policy levers


  • 5 Programming of attack

Parvez, Santtu