Pirate Bay develops anonymous VPN user protection

Infosecurity ◽  
2009 ◽  
Vol 6 (3) ◽  
pp. 8 ◽  
Author(s):  
Steve Gold
Keyword(s):  
1990 ◽  
Vol 15 (4) ◽  
pp. 375-378 ◽  
Author(s):  
S.José Closs ◽  
Alison J. Tierney
Keyword(s):  

Author(s):  
Joost Poort ◽  
Jorna Leenheer ◽  
Jeroen van der Ham ◽  
Cosmin Dumitru
Keyword(s):  

The main characteristics of Internet harassment (cyberbullying) are investigated in the research. The main features of this phenomenon are considered. The analysis of existing types of cyberbullying and their individual characteristics is made. The examples of legislative acts of different countries is concluded that there is deficiency of relevant rules of low. It is emphasized that anyone can become a victim of in the modern world. At the same time a risk of becoming a victim of cyberbullying does not depend on any factors (for example financial position of victim, his or her age, sex, social position etc.). It is noted that communications that are made in cyberspace provide an opportunity for users to choose information they want to make public carefully and in advance. In most cases it contributes to help people show theirs strengths (for example, when communicating in chats). In results there is often false sympathy between network interlocutors and they trust each other. So the idealization of the partner happens and any his or her information is perceived more sensitive than during direct communication. This effect is successfully used during cyberbullying, when first one person inspires the trust of another and then changes communication tactics, becoming faithless and aggressive. It is emphasized that the cyberbullying phenomenon is very underestimated and that`s why it is a serious problem. The brief overview of existing technologies and means of counteracting this phenomenon is made. The comparison of their effectiveness is made. The standards that modern and effective technology of cyberbullying resistance must meet are systematized. There are examples of successful realization of user protection in most popular social network. It is emphasized that for cyberbullying resistance nowadays in most cases the protection technologies of it is to localize undesirable content in terms of the existence of cyberbullying. Based on the results of this research it is confirmed that the cyberbullying will spread further. This is due to the constant increase in the number of users of new network services and online platforms for communication. For effective defense against cyberbullying it is required the introduction of organizational and technical measures. At the end it is proposed the general assessment of further development of cyberbullying and the ways to improve appropriate countermeasures.


2013 ◽  
pp. 1144-1161
Author(s):  
Johnny Nhan ◽  
Alesandra Garbagnati

Ongoing skirmishes between mainstream Hollywood entertainment conglomerates and Peer-to-Peer (P2P) file-sharing networks recently reached a crescendo when a Swedish court convicted members of the world’s largest BitTorrent, The Pirate Bay, and handed out the stiffest sentence to date.1 Four operators of The Pirate Bay received one year imprisonments and fines totaling $30 million, including confiscation of equipment. While this verdict sent shockwaves amongst P2P networks, piracy remains rampant, and this incident further exacerbated relations between file sharers and Hollywood. In retaliation, supporters of P2P file-sharing attacked websites of the law firms representing the Hollywood studios (Johnson, 2009). This victory by Hollywood studios may be a Pyrrhic defeat in the long run if the studios do not soften their antagonistic relations with the public. This chapter explores structural and cultural conflicts amongst security actors that make fighting piracy extremely difficult. In addition, it considers the role of law enforcement, government, industries, and the general public in creating long-term security models.


Author(s):  
Indranil Bose

Phishing is a new form of online crime where the unsuspecting user is tricked into revealing his/her personal information. It is usually conducted using social engineering or technical deceit–based methods. The various ways in which phishing can take place are described in this chapter. This is followed by a description of key strategies that can be adopted for protection of end users and organizations. The end user protection strategies include desktop protection agents, password management tools, secure e-mail, simple and trusted browser setting, and digital signature. Among corporate protection strategies are such measures as e-mail personalization, mail server authentication, monitoring transaction logs, detecting unusual downloading activities, token based and multifactor authentication, domain monitoring, and Web poisoning. Some of the commercially available and popular anti-phishing products are also described in this chapter.


Sign in / Sign up

Export Citation Format

Share Document