Advance and Innovative Research

Total Page:16

File Type:pdf, Size:1020Kb

Advance and Innovative Research Volume 8, Issue 1 (II) ISSN 2394 - 7780 January – March 2021 International Journal of Advance and Innovative Research (Conference Special) Indian Academicians and Researchers Association www.iaraedu.com Conference Special Issue International Conference On Emerging Trends in Digital Technologies-2021 (ICETDT- 2021) 9th January 2021 Organized by SVKM’s Usha Pravin Gandhi College of Arts, Science and Commerce Publisher International Journal of Advance and Innovative Research Volume 8, Issue 1: January - March 2021 Amrish R. Patel President, Shree Vile Parle Kelvani Mandal Vile Parle, Mumbai Message Higher Education is an imperative milestone for learners in current times. Indian higher education system is maturing towards its presence in Global Higher Education space. This calls for reformative policy initiatives from stakeholders in curricula, pedagogy, use of technology, partnerships, governance and funding. Encompassing this vision, Usha Pravin Gandhi College has a learner centered paradigm of education where the student is placed in a competitive learning environment of the 21st century to foster excellence, equity and quality. The academic staff at the college constantly commit themselves towards the growth of students to create the desired intellectual, economic and social value. With firm faith in the saying, “Vidhyadhanam Sarvadhanam pradhanam” – knowledge is the only real wealth in this world, I welcome the students of SVKM’s Usha Pravin Gandhi College of Arts, Science and Commerce. I am confident that efforts to excel in the field of higher education through innovative practices, immersed and engaged learning and the inculcation of moral and social values in the learners will continue. May you make the best of these openings to shape your careers and future. Wishing everyone at Usha Pravin Gandhi College of Arts, Science and Commerce all success this new Academic year 2020-21. Amrish R. Patel Dr. Anju Kapoor Principal, Usha Pravin Gandhi College of Art, Science and Commerce Vile Parle, Mumbai Message I am delighted that SVKM’s Usha Pravin Gandhi College of Arts, Science and Commerce is organizing a one-day International Conference on “Emerging Trends in Digital Technologies- 2021(ICETDT-2021) on 9th January 2021 and on this occasion, we are bringing out a souvenir. The theme of the conference is very relevant in the present scenario. Life is changing with continuous development of new technologies. We need to understand these changes in the technologies, their security measures and keep pace with them. Due to the changing scenario of COVID-19, the importance of digital technologies has grown multifold. I believe that the conference will stimulate awareness of latest development and emerging trends in technologies. I am sure that the conference will provide a great opportunity for researchers to present their work, knowledge and experience. I wish this conference a great success and congratulate the organizing committee. Dr. Anju Kapoor International Journal of Advance and Innovative Research Volume 8, Issue 1 (II) January - March 2021 Editor- In-Chief Dr. Tazyn Rahman Members of Editorial Advisory Board Mr. Nakibur Rahman Dr. Mukesh Saxena Ex. General Manager ( Project ) Pro Vice Chancellor, Bongaigoan Refinery, IOC Ltd, Assam University of Technology and Management, Shillong Dr. Alka Agarwal Dr. Archana A. Ghatule Director, Director, Mewar Institute of Management, Ghaziabad SKN Sinhgad Business School, Pandharpur Prof. (Dr.) Sudhansu Ranjan Mohapatra Prof. (Dr.) Monoj Kumar Chowdhury Dean, Faculty of Law, Professor, Department of Business Administration, Sambalpur University, Sambalpur Guahati University, Guwahati Dr. P. Malyadri Prof. (Dr.) Baljeet Singh Hothi Principal, Professor, Government Degree College, Hyderabad Gitarattan International Business School, Delhi Prof.(Dr.) Shareef Hoque Prof. (Dr.) Badiuddin Ahmed Professor, Professor & Head, Department of Commerce, North South University, Bangladesh Maulana Azad Nationl Urdu University, Hyderabad Prof.(Dr.) Michael J. Riordan Dr. Anindita Sharma Professor, Dean & Associate Professor, Sanda University, Jiashan, China Jaipuria School of Business, Indirapuram, Ghaziabad Prof.(Dr.) James Steve Prof. (Dr.) Jose Vargas Hernandez Professor, Research Professor, Fresno Pacific University, California, USA University of Guadalajara,Jalisco, México Prof.(Dr.) Chris Wilson Prof. (Dr.) P. Madhu Sudana Rao Professor, Professor, Curtin University, Singapore Mekelle University, Mekelle, Ethiopia Prof. (Dr.) Amer A. Taqa Prof. (Dr.) Himanshu Pandey Professor, DBS Department, Professor, Department of Mathematics and Statistics University of Mosul, Iraq Gorakhpur University, Gorakhpur Dr. Nurul Fadly Habidin Prof. (Dr.) Agbo Johnson Madaki Faculty of Management and Economics, Faculty, Faculty of Law, Universiti Pendidikan Sultan Idris, Malaysia Catholic University of Eastern Africa, Nairobi, Kenya Dr. Neetu Singh Prof. (Dr.) D. Durga Bhavani HOD, Department of Biotechnology, Professor, Mewar Institute, Vasundhara, Ghaziabad CVR College of Engineering, Hyderabad, Telangana Prof. (Dr.) Shashi Singhal Prof. (Dr.) Aradhna Yadav Professor, Professor, Amity University, Jaipur Krupanidhi School of Management, Bengaluru Prof. (Dr.) Alireza Heidari Prof.(Dr.) Robert Allen Professor, Faculty of Chemistry, Professor California South University, California, USA Carnegie Mellon University, Australia Prof. (Dr.) A. Mahadevan Prof. (Dr.) S. Nallusamy Professor Professor & Dean, S. G. School of Business Management, Salem Dr. M.G.R. Educational & Research Institute,Chennai Prof. (Dr.) Hemant Sharma Prof. (Dr.) Ravi Kumar Bommisetti Professor, Professor, Amity University, Haryana Amrita Sai Institute of Science & Technology, Paritala Dr. C. Shalini Kumar Dr. Syed Mehartaj Begum Principal, Professor, Vidhya Sagar Women’s College, Chengalpet Hamdard University, New Delhi Prof. (Dr.) Badar Alam Iqbal Dr. Darshana Narayanan Adjunct Professor, Head of Research, Monarch University, Switzerland Pymetrics, New York, USA Prof.(Dr.) D. Madan Mohan Dr. Rosemary Ekechukwu Professor, Associate Dean, Indur PG College of MBA, Bodhan, Nizamabad University of Port Harcourt, Nigeria Dr. Sandeep Kumar Sahratia Dr. P.V. Praveen Sundar Professor Director, Sreyas Institute of Engineering & Technology Shanmuga Industries Arts and Science College Dr. S. Balamurugan Dr. Manoj P. K. Director - Research & Development, Associate Professor, Mindnotix Technologies, Coimbatore Cochin University of Science and Technology Dr. Dhananjay Prabhakar Awasarikar Dr. Indu Santosh Associate Professor, Associate Professor, Suryadutta Institute, Pune Dr. C. V.Raman University, Chhattisgath Dr. Mohammad Younis Dr. Pranjal Sharma Associate Professor, Associate Professor, Department of Management King Abdullah University, Saudi Arabia Mile Stone Institute of Higher Management, Ghaziabad Dr. Kavita Gidwani Dr. Lalata K Pani Associate Professor, Reader, Chanakya Technical Campus, Jaipur Bhadrak Autonomous College, Bhadrak, Odisha Dr. Vijit Chaturvedi Dr. Pradeepta Kishore Sahoo Associate Professor, Associate Professor, Amity University, Noida B.S.A, Institute of Law, Faridabad Dr. Marwan Mustafa Shammot Dr. R. Navaneeth Krishnan Associate Professor, Associate Professor, King Saud University, Saudi Arabia Bharathiyan College of Engg & Tech, Puducherry Dr. Mahendra Daiya Dr. G. Valarmathi Associate Professor, Associate Professor, JIET Group of Institutions, Jodhpur Vidhya Sagar Women's College, Chengalpet Dr. Parbin Sultana Dr. M. I. Qadir Associate Professor, Assistant Professor, University of Science & Technology Meghalaya Bahauddin Zakariya University, Pakistan Dr. Kalpesh T. Patel Dr. Brijesh H. Joshi Principal (In-charge) Principal (In-charge) Shree G. N. Patel Commerce College, Nanikadi B. L. Parikh College of BBA, Palanpur Dr. Juhab Hussain Dr. Namita Dixit Assistant Professor, Associate Professor, King Abdulaziz University, Saudi Arabia Shri Ramswaroop Memorial University, Lucknow Dr. V. Tulasi Das Dr. Nidhi Agrawal Assistant Professor, Assistant Professor, Acharya Nagarjuna University, Guntur, A.P. Institute of Technology & Science, Ghaziabad Dr. Urmila Yadav Dr. Ashutosh Pandey Assistant Professor, Assistant Professor, Sharda University, Greater Noida Lovely Professional University, Punjab Dr. M. Kanagarathinam Dr. Subha Ganguly Head, Department of Commerce Scientist (Food Microbiology) Nehru Arts and Science College, Coimbatore West Bengal University of A. & F Sciences, Kolkata Dr. V. Ananthaswamy Dr. R. Suresh Assistant Professor Assistant Professor, Department of Management The Madura College (Autonomous), Madurai Mahatma Gandhi University Dr. S. R. Boselin Prabhu Dr. V. Subba Reddy Assistant Professor, Assistant Professor, SVS College of Engineering, Coimbatore RGM Group of Institutions, Kadapa Dr. A. Anbu Dr. R. Jayanthi Assistant Professor, Assistant Professor, Achariya College of Education, Puducherry Vidhya Sagar Women's College, Chengalpattu Dr. C. Sankar Dr. Manisha Gupta Assistant Professor, Assistant Professor, VLB Janakiammal College of Arts and Science Jagannath International Management School Copyright @ 2020 Indian Academicians and Researchers Association, Guwahati All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, or stored in any retrieval system of any nature without prior written permission. Application for permission for other use of copyright material including permission to reproduce extracts in other published works shall be made to the publishers.
Recommended publications
  • I2P – (K)Eine Alternative Zu Tor
    I2P – (K)Eine Alternative zu Tor 17. Augsburger Linux-Infotag 2018 21.04.2018 I2P – wasn das? • Low Latency Relay Netzwerk • Anonymes Netzwerk • „Black Box“ Tunnel zwischen Client und Server • Internes Netzwerk, fast keine OutProxies • Internationales Entwicklerteam mit ~10 Leuten • Keine Firma, kein Verein, alles rein privat • OpenSource • Start 2003 als Freenet Project Transport Grundsätze von I2P • I2P versteckt nicht die Nutzung von I2P • I2P versteckt die Nutzerspuren in I2P • User soll sicher mit anderen anonym kommunizieren können • Vertraue niemanden anderen, nur dir selber • Selbst regulierendes Netz ohne zentrale Instanzen • OpenSource • Möglichst wenig eigene Crypto – Peer & Academic Review nötig Funktionsweise, Teil 1 • Startup: Seeddatei von fixen Servern (oder alternative Quellen) holen • Connect zu anderen I2P Peers aus der Seeddatei • Aufbau lokaler netDB – Statistiken über bekannte I2P Peers • Inbetriebnahme von lokalen Hidden Services • Jeder Hidden Service erstellt per Default 2 Ein- & 2 Ausgangstunnel • Jeder Tunnel hat per Default 3 Hops • Tunnel werden aus bekannten, fähigen Peers der netDB erstellt • Clients und Server bauen Hidden Services auf Funktionsweise, Teil 2 • Nach Tunnelaufbau publizieren eines Leasesets an FloodFillDB • FloodFillDB: verteilte Datenbank auf ~1000 Peers • LeaseSet: Information welcher Eingangstunnel zu welchem Hidden Service weiterleitet • Client fragt FF-DB nach LeaseSet zu einem Hidden Service • Client sendet Daten an Server, Server antwortet, wenn erfolgreich • Roundtrip mit 12 Hops:
    [Show full text]
  • I2P, the Invisible Internet Projekt
    I2P, The Invisible Internet Projekt jem September 20, 2016 at Chaostreff Bern Content 1 Introduction About Me About I2P Technical Overview I2P Terminology Tunnels NetDB Addressbook Encryption Garlic Routing Network Stack Using I2P Services Using I2P with any Application Tips and Tricks (and Links) Conclusion jem | I2P, The Invisible Internet Projekt | September 20, 2016 at Chaostreff Bern Introduction About Me 2 I Just finished BSc Informatik at BFH I Bachelor Thesis: "Analysis of the I2P Network" I Focused on information gathering inside and evaluation of possible attacks against I2P I Presumes basic knowledge about I2P I Contact: [email protected] (XMPP) or [email protected] (GPG 0x28562678) jem | I2P, The Invisible Internet Projekt | September 20, 2016 at Chaostreff Bern Introduction About I2P: I2P = TOR? 3 Similar to TOR... I Goal: provide anonymous communication over the Internet I Traffic routed across multiple peers I Layered Encryption I Provides Proxies and APIs ...but also different I Designed as overlay network (strictly separated network on top of the Internet) I No central authority I Every peer participates in routing traffic I Provides integrated services: Webserver, E-Mail, IRC, BitTorrent I Much smaller and less researched jem | I2P, The Invisible Internet Projekt | September 20, 2016 at Chaostreff Bern Introduction About I2P: Basic Facts 4 I I2P build in Java (C++ implementation I2Pd available) I Available for all major OS (Linux, Windows, MacOS, Android) I Small project –> slow progress, chaotic documentation,
    [Show full text]
  • Tor - Der Zwiebelrouter Übersicht Client Installieren & Einrichten Serverknoten & Hidden Services Betreiben
    Anonym ins Internet Computerlabor im KuZeB Ubuntu-Workshop 10.9.2007 Kire www.kire.ch Template von Chih-Hao Tsai (chtsai.org) Creative Commons License (by-nc-sa) creativecommons.org/licenses/by-nc-sa/2.5/dee.de Inhaltsverzeichnis Spurensuche im Internet Programmübersicht JAP, I2P, Freenet Tor - der Zwiebelrouter Übersicht Client installieren & einrichten Serverknoten & Hidden Services betreiben 2 Spurensuche Server-Logs Webserver IP-Adresse, Browser, Betriebssystem, Referrer Mailserver Nameserver (DNS) Aufbewahrungspflicht der IP-Zuordnungen CH: 6 Monate durch Provider EU: 6 - 24 Monate Eindeutige Merkmale MAC-Adresse “Einwahl” Cookies & IDs lokaler Computer Cache & Browser-History 3 Programmübersicht JAP - Java Anon Proxy Web-Anonymizer für http, https und ftp TU Dresden, Uni Regensburg und Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein Opensource Plattformunabhängig, da in Java entwickelt benutzt fixe Mix-Kaskaden Verschlüsselung bis zum letzten Knoten der Kaskade neuer kommerzieller Dienste JonDonym 4 Programmübersicht I2P - Invisible Internet Project anonymes / pseudonymes VPN die meisten EntwicklerInnen sind anonym junges Projekt ebenfalls Opensource und Java Datenverkehr bleibt normalerweise im I2P End-zu-End-Verschlüsselung Peer-to-Peer Proxy oder Erweiterungen für vorhandene Clients Firefox (Proxy), Azureus (Erweiterung) Eigene Clients und Server Susimail (Client), jetty (Webserver), Syndie (Foren/Blogs) es kann aber auch ein I2P-Tunnel zu einem Apache Webserver eingerichtet werden 5 Programmübersicht Freenet zensurresistentes
    [Show full text]
  • Invisible Internet Project A.K.A. I2P
    Introduction More I2P Gimme something The end . Invisible Internet Project a.k.a. I2P Antonis Kouzoupis Athens CryptoParty #0 November 11, 2012 Antonis Kouzoupis I2P Introduction More I2P Gimme something The end . Outline Introduction More I2P Key Concepts Sending a Message Gimme something Applications Installation The end References Thank you! Antonis Kouzoupis I2P Introduction More I2P Gimme something The end . I2P is • an anonymous network (Captain Obvious) • a decentralized resilient network • scalable • end-to-end encrypted • in active development since Feb 2003 • mostly written in Java • currently in version 0.9.3 • open source • not Tor Antonis Kouzoupis I2P Introduction More I2P Gimme something The end . Key Concepts It's essential to clarify some key concepts: • Router • Destination • Tunnel • netDb • Garlic routing Antonis Kouzoupis I2P Introduction More I2P Gimme something The end . Router • The software that every I2P node should run • The \thing" that participates in the network • Traffic routing • Transportation • Encryption { Decryption Antonis Kouzoupis I2P Introduction More I2P Gimme something The end . Destination • Cryptographic identifiers • Anonymous Endpoints • Associated with applications • Destinations are connected to routers • Each user will have several local destinations on their router Antonis Kouzoupis I2P Introduction More I2P Gimme something The end . Tunnel • A unidirectional path through routers • Layered encryption is used { each of the routers can decrypt only one layer • Two types of tunnels: • Inbound Inbound tunnels bring messages to the tunnel creator. First router is the Inbound Endpoint and the last one is the Inbound Gateway • Outbound Outbound tunnels send messages away from the tunnel creator. First router is the Outbound Gateway and the last one is the Outbound Endpoint Antonis Kouzoupis I2P Introduction More I2P Gimme something The end .
    [Show full text]
  • Un Paseo Por La Deep Web
    Un paseo por la Deep Web Jordi Cots Sanfeliu MISTIC Ad hoc Victor Garcia Font Jorge Chinea López 31/12/2018 i Esta obra está sujeta a una licencia de Creative Commons Reconocimiento-NoComercial-CompartirIgual 4.0 Internacional ii FICHA DEL TRABAJO FINAL Título del trabajo: TFM – Un paseo por la Deep Web Nombre del autor: Jordi Cots Sanfeliu Nombre del consultor/a: Victor Garcia Font Nombre del PRA: Nombre y dos apellidos Fecha de entrega (mm/aaaa): 01/2019 Titulación: MISTIC Área del Trabajo Final: Ad hoc Idioma del trabajo: Español Palabras clave Deep web, anonimato, dark net Resumen del Trabajo (máximo 250 palabras): Con la finalidad, contexto de aplicación, metodología, resultados i conclusiones del trabajo. Paralelamente al Internet tal y como se conoce hoy en día, coexiste también la red denominada Internet profunda (Deep Web), Internet invisible o Internet oculta. En el presente documento, se definirán estos conceptos, además de realizar una aproximación teórica sobre los diferentes medios de acceso a lo que se conoce como la Internet profunda o Deep Web, como son Freenet, Tor y I2P, mediante los cuales se pretende conseguir una navegación anónima a la Deep Web. Esta aproximación será de tipo técnica-práctica controlada, accediendo a la Internet profunda a través de estos medios de acceso, mediante un laboratorio preparado para maximizar la seguridad, el cual se describirá en el presente documento, así como el tipo de tecnologías que conforman las herramientas y los medios de acceso. En definitiva, el objetivo de este proyecto es mostrar el acceso a la Deep Web desde un entorno controlado y usando un punto de vista teórico-práctico, para poder analizar las características de este tipo de redes y contenidos.
    [Show full text]
  • Anonimato Y Evasión Vs SIEM TFM(MCS)
    Escola Tècnica Superior d’Enginyeria Electrònica i Informàtica La Salle Treball Final de Màster Màster en Ciberseguretat Anonimato y Evasión vs SIEM Alumne Professor Ponent Abel Pozo Pujol Nico Esposito (Deloitte) ACTA DE L'EXAMEN DEL TREBALL FI DE MÀSTER Reunit el Tribunal qualificador en el dia de la data, l'alumne D. Abel Pozo Pujol va exposar el seu Treball de Fi de Màster, el qual va tractar sobre el tema següent: Anonimato y Evasión vs SIEM Acabada l'exposició i contestades per part de l'alumne les objeccions formulades pels Srs. membres del tribunal, aquest valorà l'esmentat Treball amb la qualificació de Barcelona VOCAL DEL TRIBUNAL VOCAL DEL TRIBUNAL PRESIDENT DEL TRIBUNAL Resumen Los Ciberdelincuentes cada día son más sofisticados y utilizan todos los recursos disponibles para conseguir sus propósitos. La utilización de redes de anonimato para ocultar su identidad y las técnicas de evasión avanzadas para sobrepasar los controles instalados por Gobiernos y Organizaciones es el principal objetivo de ellos. En este documento veremos cómo funcionan éstas redes de anonimato y las diferentes técnicas de evasión utilizadas. Por último, veremos cómo mitigar este tipo de amenazas mediante los denominados SIEM, desplegando casos de uso específicos. Índice Resumen Índice 1. Introducción ........................................................................................................ 1 2. Objetivos ............................................................................................................. 2 3. Redes Anónimas ................................................................................................
    [Show full text]
  • A Real-World Case Study Using I2P
    Technische Universit¨at Munchen¨ Fakult¨at fur¨ Informatik Lehrstuhl fur¨ Netzarchitekturen und Netzdienste Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P Masterarbeit in Informatik durchgefuhrt¨ am Lehrstuhl fur¨ Netzarchitekturen und Netzdienste Fakult¨at fur¨ Informatik Technische Universit¨at Munchen¨ von Michael Herrmann M¨arz 2011 Technische Universit¨at Munchen¨ Fakult¨at fur¨ Informatik Lehrstuhl fur¨ Netzarchitekturen und Netzdienste Auswirkung auf die Anonymit¨at von performanzbasierter Peer-Auswahl bei Onion-Routern: Eine Fallstudie mit I2P { Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P Masterarbeit in Informatik durchgefuhrt¨ am Lehrstuhl fur¨ Netzarchitekturen und Netzdienste Fakult¨at fur¨ Informatik Technische Universit¨at Munchen¨ von Michael Herrmann Aufgabensteller und Betreuer: Christian Grothoff, PhD (UCLA) Tag der Abgabe: 29. M¨arz 2011 Ich versichere, dass ich die vorliegende Arbeit selbst¨andig verfasst und nur die angegebenen Quellen und Hilfsmittel verwendet habe. I assure the single handed composition of this thesis only supported by declared resources. Garching, den 29 M¨arz 2011 Acknowledgment: This thesis is based on a paper with the same title from Michael Herrmann and Christian Grothoff, published at Privacy Enhancing Technologies Symposium (PETS) 2011. I thank my advisor Christian Grothoff for the possibility to work with him on this thesis and his great support. Not only was working with him very inspiring, he also pushed me to do the best I possibly can. Also I thank Katie Haus and Nathan Evans. Katie for her great work on the pictures in this thesis and her amazing patience to get them exactly as I wanted them to be.
    [Show full text]
  • Link to Pages 1-107 and the Index
    Surveillance and the Art of Digital Camouflage Second Edition Michael Anders January 2021 2 I wrote this book with great admiration for Edward Snowden, Hans and Sophie Scholl, and all the other people who can tell right from wrong and who are brave enough to speak out within striking distance of the monster. 3 You see the cover picture of the first German edition of this book titled: "Submarine Communication in the Estuary of the Data Kraken" (in German: "U-Boot Kommunikation im Revier des Datenkraken"). Here the Data Kraken stands for the big "be all ears" corporations like Alphabet (Google), Apple, Alibaba, Microsoft, Facebook, and government snooping agencies like the NSA, GCHQ, or the German BfV. I wrote this book for laypeople using computers for communicating with friends or for securely browsing the Internet. Compared to a system used at the workplace and administered by the employer’s IT-staff, using the private computer has higher security risks but allows for substantially more options and chances regarding techniques to protect your privacy. The book will teach you how to use this freedom and to seize these chances. You will be able to safeguard your private com- munication much better against eavesdropping and message manipulation by criminal organizations or even by nation-state agencies than workplace communication using your employer’s systems. The author: Prof.Dr. Michael Anders is a physicist and teaches at the University of Applied Sciences Wedel. For many years, the author served as dean of the Department of Industrial Engineering. He taught seminars on online anonymity, Darknet, and encryption.
    [Show full text]
  • Un Paseo Por La Deep Web
    UN PASEO POR LA DEEP WEB TFM en empresa: INCIBE Máster Interuniversitario de Seguridad de las Tecnologías de la Información y las Comunicaciones Jorge ÁLVAREZ RODRÍGUEZ Jorge CHINEA LÓPEZ Víctor GARCIA FONT 30 de diciembre de 2018 Esta obra está sujeta a una licencia de Reconocimiento-NoComercial-CompartirIgual 3.0 España de Creative Commons A Patricia, a Nira. FICHA DEL TRABAJO FINAL Título del trabajo: Un paseo por la Deep Web Nombre del autor: Jorge ÁLVAREZ RODRÍGUEZ Nombre del consultor/a: Jorge CHINEA LÓPEZ Nombre del PRA: Víctor GARCIA FONT Fecha de entrega: 12/2018 Máster Interuniversitario en Seguridad de Titulación: las Tecnologías de la Información y de las Comunicaciones Área del Trabajo Final: TFM en empresa: INCIBE Idioma del trabajo: Castellano Palabras clave: Deep Web Resumen del Trabajo: “Un paseo por la Deep Web” presenta de forma clara y ordenada los principales aspectos que rodean a la conocida como Internet profunda. Partiendo de la definición de la Deep Web, se observan las diferencias entre Surface Web, Dark Web y Darknet. Sentadas las bases de lo que es cada ecosistema se hace un repaso por las Darknets más conocidas, así como otras que empiezan a aflorar. Las más populares, Tor, Freenet e I2P, son analizadas en profundidad, determinando sus principales características y su modo de trabajo y comparando las tres, esgrimiendo sus ventajas y sus inconvenientes. Una vez que ya se ha accedido a la Dark Web, el siguiente paso es descubrir que hay en estas redes, sus contenidos y los servicios que ofrecen y aprovechar para desterrar la idea de que la Dark Web solo está llena de ciberdelincuentes, sino que hay muchas más posibilidades y forma de uso totalmente licitas, eso sí, con la característica común de guardar el anonimato y privacidad del usuario.
    [Show full text]
  • Privacy-Handbuch
    Privacy-Handbuch German Privacy Foundation 27. April 2011 bündnis für politik- und meinungsfreiheit Spurenarm Surfen mit Mozilla Firefox, E-Mails verschlüsseln mit Thunderbird, Anonymisierungsdienste nutzen und Daten verschlüsseln für WINDOWS + Linux Privacy-Handbuch Erste Auflage: 50 Stück, April 2010 Aktuelle Version: https://www.awxcnx.de/handbuch.htm Redaktion: German Privacy Foundation https://www.privacyfoundation.de/ Herausgeber: bündnis für politik- und meinungsfreiheit c/o AStA der FH Frankfurt Kleiststrasse 5 60318 Frankfurt/Main Telefon: +49 177 4127987 E-Mail: [email protected] Web: http://www.pm-buendnis.de Inhaltsverzeichnis 1 Vorwort8 2 Scroogled9 3 Angriffe auf die Privatsphäre 24 3.1 Beispiel Google........................... 25 3.2 User-Tracking............................ 33 3.3 History Sniffing........................... 35 3.4 Geotagging.............................. 36 3.5 Überwachungen im Internet.................... 38 3.6 Rechtsstaatliche Grundlagen.................... 44 3.7 Ich habe doch nichts zu verbergen................ 45 4 Digitales Aikido 49 4.1 Nachdenken............................. 50 4.2 Ein Beispiel............................. 54 4.3 Kommunikations-Analyse..................... 57 5 Spurenarm Surfen 61 5.1 Auswahl des Webbrowsers.................... 62 5.2 Datensparsame Suchmaschinen.................. 62 5.2.1 Firefox konfigurieren.................... 65 5.3 Cookies................................ 66 5.3.1 Mozilla Firefox konfigurieren............... 68 5.3.2 Super-Cookies in Firefox.................. 70 5.3.3 Flash-Cookies verwalten.................. 70 5.4 JavaScript.............................. 71 5.4.1 NoScript für Mozilla Firefox............... 72 5.5 Werbung und HTML-Wanzen................... 74 5.5.1 Adblock für Mozilla Firefox................ 75 5.6 History Sniffing vermeiden.................... 75 5.7 Risiko Plugins............................ 76 5.7.1 PDF Reader Plugins.................... 76 3 Inhaltsverzeichnis 5.7.2 Flash und Silverlight.................... 78 5.8 HTTPS nutzen...........................
    [Show full text]
  • Fakultät Informatik
    Fakultät Informatik TUD-FI09-04-April 2009 Stefan Kopsell¨ Technische Berichte Karsten Loesing (Eds.) Technical Reports Institut fur¨ Systemarchitektur ISSN 1430-211X Extended Abstracts of the Fourth Privacy Enhancing Technologies Convention (PET-CON 2009.1) Technische Universität Dresden Fakultät Informatik D−01062 Dresden Germany URL: http://www.inf.tu−dresden.de/ Preface PET-CON, the Privacy Enhancing Technologies Convention, is a forum for researchers, students, developers, and other interested people to discuss novel research, current development and techniques in the area of Privacy Enhancing Technologies. PET-CON was first conceived in June 2007 at the 7th International PET Symposium in Ottawa, Canada. The idea was to set up a bi-annual convention in or nearby Germany to be able to meet more often than only once a year at some major conference. The First PET-CON took place on August 16, 2007 in Frankfurt (on the Main), Ger- many. There were participants from four German universities. The Second PET-CON was held on February 11, 2008 in Aachen, Germany. This was the first time that we ac- cepted submissions, provided reviews, and published a booklet of Extended Abstracts. The Third PET-CON took place on September 30, 2008 in Darmstadt, Germany. There were no written submissions and no review process, but instead lively discussions of work in progress at the convention. This Fourth PET-CON will be held on March 24– 25, 2009 in Dresden, Germany. Apparently, we accepted written submissions this time. Submitting a contribution was not mandatory for participating in PET-CON, and no submissions were rejected. All submissions were gratefully revised by three anony- mous reviewers each.
    [Show full text]
  • Privacy-Handbuch
    Privacy-Handbuch Spurenarm Surfen mit Mozilla Firefox, E-Mail mit Thunderbird, chatten und verschlüsselt telefonieren, Anonymisierungsdienste nutzen und Daten verschlüsseln für WINDOWS + Linux 2. Oktober 2021 Inhaltsverzeichnis 1 Scroogled 7 2 Angriffe auf die Privatsphäre 17 2.1 Big Data - Kunde ist der, der bezahlt........................ 18 2.1.1 Google..................................... 18 2.1.2 Weitere Datensammler............................ 24 2.2 Techniken der Datensammler............................ 26 2.3 Tendenzen auf dem Gebiet des Tracking...................... 31 2.4 Crypto War 3.0..................................... 34 2.5 Fake News Debatte.................................. 37 2.5.1 Der Kampf gegen Fake News........................ 38 2.5.2 Fake News Beispiele............................. 39 2.5.3 Medienkompetenztraining......................... 43 2.5.4 Fake News oder Propaganda - was ist der Unterschied?........ 44 2.6 Geotagging....................................... 44 2.7 Kommunikationsanalyse............................... 47 2.8 Überwachungen im Internet............................. 49 2.9 Terrorismus und der Ausbau der Überwachung................. 55 2.10 Ich habe doch nichts zu verbergen......................... 59 3 Digitales Aikido 63 3.1 Nachdenken...................................... 64 3.2 Ein Beispiel...................................... 67 3.3 Schattenseiten der Anonymität........................... 68 3.4 Wirkungsvoller Einsatz von Kryptografie..................... 69 4 Spurenarm Surfen 72 4.1 Auswahl
    [Show full text]