You are on page 1of 13

DCO 20119 Professional Issues in Technology

Case Study : Chapter 3 Wildcat Fight Cyberterrorists

What is WildCat?
Made up of computer scientists
Aims to train supporter I terrorists tactics and methods and spread propaganda Conducting a research project about the terrorists content on the Internet Dark Web

Dark Web
Three main stages
1st stage: track and analyze terrorists Internet activities
1. Able to collect Internet communication in different countries 2. Analyze the methods of how the terrorists train their members

Dark Web
Three main stages
2nd stage: Identify the anonymous author of postings and e-mail
1. Analyze the anonymous authors backdrop motive

2. Analyze what kinds of people are more likely to respond to recruitment by terrorist

Dark Web
Three main stages
3rd stage: Analyze the emotions and motive of people who may cause terrorist attack
1. Able to find out people with a hate and rage emotion to social activities who may be threaten to society 2. Determine the attitude of the writer or speaker related to a certain attack

Question 1:

WildCat Q & A

What are the negative ways such tools and technique can be used and affect against citizen? Do you think that this is a reasonable fear?

1. Privacy issue may cause


2. Business confidential content between clients and companies may be exploded 3. Work of Dark Web project is kept secret due to the security reason to prevent terrorists knowing too much about their work

Question 2:

WildCat Q & A

Three positive ways that this technology could be used to improve the performance of organizations or to help us in our daily life

1. Track employees activities which related to the company during their working hours
2. Discover if employees are anonymously posting or emailing data regarding to the organization 3. Improve the recruitment process

Question 3:

WildCat Q & A

Do a web search to find current information about the Dark Web research being carried out at US like the budget, the number of researchers and new tools or techniques theyve developed. 1. Budget is not specified but have received more than $30< funding 2. 38 researchers are employed as in 2012 3. Various multi-lingual data mining, text mining, and web mining techniques to perform different kinds of analysis in this research

Time

Attack

2013 .3
2013 .2

Being attacked South China/ European Korea America China

Remarks

Target

damage

Initiator

TV network Bank

Server crash

Frequent occurrenc e!!

Attack each Xi Zang other official website Magazine, Social website HSBC Server crash Server crash No loss of customer data Financial loss of bank card users

2013 .2

China

America

Figure 1a : Shanghaibased unit of the Peoples Liberation Army 2012. 9 General Staff Department

2012 .10

Russia /Iran

HK

HK (Victim)

China

China

Inside China

Fake banking website

Competitive network security race!!!! Figure 1b : top network security firm

The Measures for protection


Three areas covered to protect the asset
1st protection: Prevention
1. Implement a layered security by using the firewall to separate a Demilitarized Zone (DMZ)
2. Establish the security policy in the company

The Measures for protection


Three areas covered to protect the asset
1st protection: Prevention

The Measures for protection


Three areas covered to protect the asset
2nd protection: Education
1. Increase employees knowledge about the importance of security and gain the awareness of protection 2. Protect the information of company

The Measures for protection


Three areas covered to protect the asset
3rd protection: Respond to the attack
1. Use the Honeypot to attract the perpetrators access for information recording
2. Examine the techniques used and prevent the attackers access again and

You might also like