Difference between revisions of "Team 8 Paper"
From CyberSecurity
(start) |
(outlined) |
||
Line 1: | Line 1: | ||
I will edit the text and integrate it on this page. | I will edit the text and integrate it on this page. | ||
At 11:30, I will take the text we have here, PDFify it, and e-mail it, along with the source code, to the TAs. | At 11:30, I will take the text we have here, PDFify it, and e-mail it, along with the source code, to the TAs. | ||
+ | |||
+ | |||
+ | == Attack techniques == | ||
+ | === Attempt and findings === | ||
+ | === Technical discussion === | ||
+ | |||
+ | == Damage estimation == | ||
+ | === Home computer === | ||
+ | === Walmart's Corporate VP === | ||
+ | === Charles Schwab NYSE === | ||
+ | |||
+ | == Value to terrorists == | ||
+ | === Scalability === | ||
+ | === Feasability of acquiring knowledge === | ||
+ | === Value for achieving aims of terrorists === | ||
+ | |||
+ | == Defenses == | ||
+ | === Home === | ||
+ | === Developer === | ||
+ | === Corporate IT === | ||
+ | === Public policy === | ||
+ | |||
+ | == Summary == |
Revision as of 02:27, 25 October 2005
I will edit the text and integrate it on this page. At 11:30, I will take the text we have here, PDFify it, and e-mail it, along with the source code, to the TAs.