Introduction to Cyber Security



Yüklə 1,12 Mb.
səhifə69/72
tarix07.01.2024
ölçüsü1,12 Mb.
#210959
1   ...   64   65   66   67   68   69   70   71   72
Introduction-cyber-security

Luks Manager allows easy, on-the-fly strong encryption of volumes with an user-friendly interface. We highly recommend that you install this tool before you start storing important data on your Android device and use the Encrypted Volumes that the Luks Manager provides to store all your data.
Virtual Private Network(VPN) Security

A VPN provides an encrypted tunnel through the internet between your device and a VPN server. This is called a tunnel, because unlike other encrypted traffic, like https, it hides all services, protocols, and contents. A VPN connection is set up once, and only terminates when you decide.
Note that since all your traffic goes through the proxy or VPN server, an intermediary only needs to have access to the proxy to analyze your activities. Therefore it is important to carefully choose amongst proxy services and VPN services. It is also advisable to use different proxies and/or VPNs since distributing your data streams reduces the impact of a compromised service.

ACTIVITIES





  1. Find out more about jailbreaking over internet.

  2. Find and use the feature of “off-the –record” option in your chat application and observe what difference it makes.

  3. Download and use Skype to make a video call to your friend.

  4. Find out more about ObscuraCam over internet.



RECOMENDED VIDEOS




https://www.youtube.com/watch?v=KCObM4PBTVk https://www.youtube.com/watch?v=V8bCyRCqK0k

References


Barry M. Leiner, V. G. (s.j.). Brief History of the Internet. Onttrek Dec. 20, 2015 uit http://www.internetsociety.org/internet/what-internet/history-internet/brief-history-internet available under Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.


Bunting, S., & Wei, W. (2006). The Official EnCE: EnCase Certified ExaminorStudy Guide.
Wiley Publishing Inc.

Castillo, F. (2007). Reshipping Fraud - A Home Business Con.


C-DAC. (2014). National Intelligence Grid : NATGRID.


CERT-In. (2014). Indian Computer Emergency Response Team.


Chander, M. (2013). National Critical Information Infrastructure Protection Centre (NCIIPC): Role, Charter & Responsibilities.


Chowdhury, S., Nair, S., & Johnson. (2008). The curious case of Ken Haywood. The Indian Express.
Cone, M. (2011, Dec. 17). How to Configure Your Mac's Firewall. Onttrek Oct. 24, 2015 uit MACINSTRUCT: http://www.macinstruct.com/node/165 available under Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Cyber Crime Investigation Cell, Mumbai. (s.j.). Onttrek Dec. 20, 2015 uit http://cybercellmumbai.gov.in/
(2014). CYBER CRIME, CYBER SECURITY AND RIGHT TO PRIVACY. New Delhi: LOK SABHA SECRETARIAT.
CYBER SECURITY MANIFESTO 2.0. (2012, Oct. 01). Onttrek Sep. 26, 2015 uit
cybersecuritymanifesto: http://cybersecuritymanifesto.com/


Email tips. (s.j.). Onttrek Oct. 29, 2015 uit Digital Survival: https://survival.tacticaltech.org/internet/email/tips available under a Creative Commons Attribution-Share Alike 3.0 Unported License.
Farberov, S. (2014). Russian hackers attacked US financial system stealing gigabytes of data in suspected retaliation for Ukraine sanctions. Mail Online.
Fisher, M. (2013). Syrian hackers claim AP hack that tipped stock market by $136 billion. Is it terrorism? The Washington Post.
Gallagher, S. (2013, Oct. 02). We are not who we are. Onttrek Sep. 26, 2015 uit Security Blog: https://securityblog.redhat.com/tag/two-factor-authentication/ available under a Creative Commons Attribution-ShareAlike 3.0 Unported License.
Glass, E. (2003). The NTLM Authentication Protocol and Security Support Provider. Onttrek Sep. 26, 2015 uit Sourceforge: http://davenport.sourceforge.net/ntlm.html available under permission by the owner to use, copy, modify, and distribute this document for any purpose and without any fee.
Gollin, G. (2003). Unconventional University Diplomas from Online Vendors: Buying a Ph.D.University That Doesn’t Exist.
Gonsalves, A. (2014). How hackers used Google to steal corporate data.
www.infoworld.com.

Gordon, S., & Ford, R. (2003). Cyberterrorism? Onttrek Dec. 20, 2015 uit http://www.symantec.com/avcenter/reference/cyberterrorism.pdf


(1998). How Email Works. In P. Grall, How Internet Works (bl. 85). Que Corporation.

Gupta, A. (2011, March 01). Digital Forensic Analysis Using BackTrack,


Yüklə 1,12 Mb.

Dostları ilə paylaş:
1   ...   64   65   66   67   68   69   70   71   72




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin