Difference between revisions of "Team 8 Paper"

From CyberSecurity
Jump to: navigation, search
(start)
 
(outlined)
Line 1: Line 1:
 
I will edit the text and integrate it on this page.
 
I will edit the text and integrate it on this page.
 
At 11:30, I will take the text we have here, PDFify it, and e-mail it, along with the source code, to the TAs.
 
At 11:30, I will take the text we have here, PDFify it, and e-mail it, along with the source code, to the TAs.
 +
 +
 +
== Attack techniques ==
 +
=== Attempt and findings ===
 +
=== Technical discussion ===
 +
 +
== Damage estimation ==
 +
=== Home computer ===
 +
=== Walmart's Corporate VP ===
 +
=== Charles Schwab NYSE ===
 +
 +
== Value to terrorists ==
 +
=== Scalability ===
 +
=== Feasability of acquiring knowledge ===
 +
=== Value for achieving aims of terrorists ===
 +
 +
== Defenses ==
 +
=== Home ===
 +
=== Developer ===
 +
=== Corporate IT ===
 +
=== Public policy ===
 +
 +
== Summary ==

Revision as of 02:27, 25 October 2005

I will edit the text and integrate it on this page. At 11:30, I will take the text we have here, PDFify it, and e-mail it, along with the source code, to the TAs.


Attack techniques

Attempt and findings

Technical discussion

Damage estimation

Home computer

Walmart's Corporate VP

Charles Schwab NYSE

Value to terrorists

Scalability

Feasability of acquiring knowledge

Value for achieving aims of terrorists

Defenses

Home

Developer

Corporate IT

Public policy

Summary