Paranoid operative system methodology for anonymous & secure web browsing, doctoral project
Resumo
Recently the world knew by the media, that its leading nations follow closely their citizens, disregarding any moral and technological threshold, that internal and external security agencies in the USA and Europe closely follow telephone conversations, e-mail, web traffic of their counterparts, using powerful monitoring and surveillance programs. In other corners of the globe nations in turmoil or wrapped in the cloak of censorship persecute and deny uncontrolled web access without harmful repercussions to their citizens.
This work is a research-in-progress project and consists in showing the research done so far to develop a methodology. This consists in the construction of an operative system with an academic scientific source that permits a secure and anonymous use of the web. For such methodology, first is required to comprehend and get acquaintance with the technologies that controls usage of web consumers, solutions that enable and grant some anonymity and security in web traffic.
Texto Completo:
PDF (English)Referências
Assange J. (2013). “The spy files”: https://twitter.com/wikileaks/status/342812446534283264
Barcena M., Wueest C. (2015). “Insecurity of the internet of things,” Symantec, Tech. Report: https://www.symantec.com/content/dam/symantec/docs/white-papers/insecurity-in-the-internet-of-things-en.pdf
Bessa P. (2015). “Dados dos utilizadores do euromilhões.com roubados”: http://pplware.sapo.pt/informacao/alerta-dados-dosutilizadores-do-euromilhoes-com-roubados
Boavida F., Bernardes M., Vapi P. (2013). Administração de Redes Informáticas, FCA.
Carpenter T. (2011). Microsoft Windows Operating System Essentials, 1st ed., John Wiley and Sons.
Coelho N. (2017) Vodafone security bulletin for ransomware WannaCry. Vodafone Portugal Internal Bulletin.
Deibert R., Palfrey J., Rohozinski R., Zittrain J., Stein J. G. (2008). Access Denied: The Practice and Policy of Global Internet Filtering, MIT Press.
Kuruvilla S., Lee C., Gallagher M. (2011). From Iron Rice Bowl to Informalization: Markets, Workers, and the State in a Changing China, 1st ed, Cornell University Press.
Locati F. (2015). OpenStack Cloud Security, Packt Publishing Ltd.
Lopez J., Ray I., Crispo B. (2015). Risks and Security of Internet and Systems: 9th International Conference, CRiSIS 2014, Trento, Italy, Revised Selected Papers, Springer.
Moore R. (2014). Cybercrime: Investigating High-Technology Computer Crime, Routledge.
Murugesan S. (2009). Handbook of Research on Web 2.0, 3.0, and X.0., 1st ed., Information Science Reference.
O’Day P. (2013). NSA Surveillance: How it’s happening and why you should care, Pacific University of Oregon.
O’Reilly T. (2009). What is Web 2.0, 1st ed., O’Reilly Media Inc.
Raymond E. (1996). New Hacker’s Dictionary, MIT Press.
Santos P., Bessa R., Pimentel C. (2008). CyberWar – O Fenómeno, as tecnologias e os atores, 1st ed., FCA.
Shea B. (2002). Have You Locked the Castle Gate, 1st ed., Addison-Wesley Professional.
Shelly G. B., Campbell J. (2014). Discovering the Internet: Complete, 5th ed., Cengage Learning.
Stats I. L. (2015). Data referent to internet usage in 2015: http://www.Internetlivestats.com/watch/Internet-users.
Walker H. (2009). Ed., Improving Internet Access to Help Small Business Compete in a Global Economy, 1st ed., Nova Science Publishers.
Zwicky E., Cooper S., Chapman B. (2000). Building Internet Firewalls, 1st ed., O’Reilly Media Inc.
Zúquete A. (2014). Segurança em Redes Informáticas, FCA.
DOI: http://dx.doi.org/10.18803/capsi.v17.127-143
Apontamentos
- Não há apontamentos.