Malicious Internet Use and Homeland Security
نویسندگان
چکیده
The advantages of speed, security and connectivity, which Information Technology brings to businesses and government, are increasingly empowering international terrorist groups. Tools previously only available to national security agencies are increasingly at the disposal of terrorist cells and rogue nations. Powerful encryption methods are now widely available. Anonymizers, which remove the computer's identifying information so that IP addresses are hidden and cookies and scripts are blocked, represent a new advance in Internet technology. These developments raise important questions about the risks of privacy. The Internet offers terrorists an intelligence and reconnaissance tool, giving wide access to logistical data, and as part of the globalization aspect of the Internet cultural resources can benefit terrorist activity, teaching customs and mannerisms of the target society.
منابع مشابه
Mobile Malware Threats and Defenses for Homeland Security
As the population of mobile users grows rapidly, mobile malware targeting smartphones are becoming a new threat to homeland security. So far, many kinds of malicious malwares including monetizing, stealing credentials or rooting have emerged. The latest mobile malwares are especially posing a serious threat to homeland security, because they can zombify phones to be controlled by their command ...
متن کاملA Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
متن کاملCritical Infrastructure Cybersecurity: A Review of Recent Threats and Violations
Most of current industries and their critical infrastructure rely heavily on the Internet for everything. The increase in the online services and operations for various industries has led to an increase in different security threats and malicious activities. In US, the department of homeland security reported recently that there have been 200 attacks on core critical infrastructures in the tran...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملProceedings of The 12 th European Conference on
Most of current industries and their critical infrastructure rely heavily on the Internet for everything. The increasein the online services and operations for various industries has led to an increase in different security threats and maliciousactivities. In US, the department of homeland security reported recently that there have been 200 attacks on core criticalinfrastructures i...
متن کامل