Difference between revisions of "Team 7 Main"
From CyberSecurity
Keunwoo Lee (talk | contribs) (→Attack Methodology) |
Keunwoo Lee (talk | contribs) (→Estimated Attack Feasibility) |
||
Line 22: | Line 22: | ||
===Estimated Potential Damage=== | ===Estimated Potential Damage=== | ||
− | ===Estimated Attack | + | ===Estimated Attack Value for Terrorist Aims=== |
==Details: Defenses== | ==Details: Defenses== |
Revision as of 21:47, 23 October 2005
The assignment mentions four bullets:
- "A plain English, no jargon description of attack techniques attempted..." etc.
- "Estimated dollar value of the damage..."
- "Estimated feasibility and strategic value of the attack technique to a terrorist organization."
- "Feasibility and cost of defending against such attacks."
These map onto the sections below as follows:
- The "executive summary" is just a summary of the report; we should leave until the rest is written.
- The "Attack Methodology" is the first bullet.
- The first subsection of the "Vulnerability Assessment" is the second bullet.
- The second subsection of the "Vulnerability Assessment" is the third bullet.
- The "Details: Defenses" is the fourth bullet.