Difference between revisions of "Team 7 Main"

From CyberSecurity
Jump to: navigation, search
(Attack Methodology)
(Estimated Attack Feasibility)
Line 22: Line 22:
 
===Estimated Potential Damage===
 
===Estimated Potential Damage===
  
===Estimated Attack Feasibility===
+
===Estimated Attack Value for Terrorist Aims===
  
 
==Details: Defenses==
 
==Details: Defenses==

Revision as of 21:47, 23 October 2005

The assignment mentions four bullets:

  • "A plain English, no jargon description of attack techniques attempted..." etc.
  • "Estimated dollar value of the damage..."
  • "Estimated feasibility and strategic value of the attack technique to a terrorist organization."
  • "Feasibility and cost of defending against such attacks."

These map onto the sections below as follows:

  • The "executive summary" is just a summary of the report; we should leave until the rest is written.
  • The "Attack Methodology" is the first bullet.
  • The first subsection of the "Vulnerability Assessment" is the second bullet.
  • The second subsection of the "Vulnerability Assessment" is the third bullet.
  • The "Details: Defenses" is the fourth bullet.

Executive Summary

Attack Analysis

Methodology

Results

Summary of Defenses

Details: Vulnerability Assessment

Estimated Potential Damage

Estimated Attack Value for Terrorist Aims

Details: Defenses