Team 1 Main

From CyberSecurity
Revision as of 07:59, 23 October 2005 by Yi-Kai (talk | contribs) (Note on Section 3)

Jump to: navigation, search

Areas - Names

Elena

1.1 Vulnerabilities exposed

1.2 Estimated difficulty

1.3 Estimated cost/feasibility of defending against other similar attacks in the future

1.4 Recommended policy responses


  • 2 Estimated damaged cause by attack on...

Parvez, Jameel

Outline of ideas for section 2, and draft of this section - Jameel, Parvez : Team_1_Sec2

2.1 Home computer

2.2 Corporate computer

2.3 Financial Sector computer


  • 3 Feasibility and strategic value of attach technique to terrorists

Yi-Kai, Pravin

3.1 Scalability (Pravin)

3.2 Technical and Financial resources (Yi-Kai)

3.3 Potential for achieving aims from lectures 1, 2, 3, and/or 5 (Pravin/Yi-Kai)

I'm working on revisions to my sections, and merging together Section 3. Pravin, I think what you wrote for 3.1 actually fits better in 3.3. Some of my section 3.2 overlaps with 3.1. I'll post a draft of Section 3 by tomorrow (Sunday) afternoon. --Yi-Kai


Please refer to the above link for the final merged Section 4.

Home and Corporate - Hema

Financial - Santtu

Please ignore the links below. They are drafts.

4.1 Incentives for installing defenses

4.2 Adequacy of incentives

4.3 Cost-effectiveness

4.4 Lowest cost provider

4.5 Policy levers


  • 5 Programming of attack

Parvez, Santtu