Beyond command and control: USSOUTHCOM's use of social networking to 'connect and collaborate' during Haiti relief operations

2011 ◽  
Author(s):  
Ricardo Arias
Author(s):  
Ashutosh Singh ◽  
Annie H. Toderici ◽  
Kevin Ross ◽  
Mark Stamp

2014 ◽  
Vol 13 (6) ◽  
pp. 4549-4555
Author(s):  
Miss.Takale Jyoti D

The focus on computer security has increased due to the ubiquitous use of Internet. Botnets are one of the biggest cyber threats. Botnet is a malware controlled by a Botmaster using Command and Control (C&C). Botnet is expanded with infecting fresh computers through social networking sites like facebook, twitter, etc. ZeuS is famous type of botnet for financial gain. It targets bank websites for stealing user’s credentials like password, credit card information,etc. In this paper, an application framework is designed for analysis and detection of ZeuS bot residing on host victim’s machine. The detection phase is based on analysis of bot’s infection stategy means in what way it affects the victims’s pc. All the related files are wiped out from the system in removal phase. The communication between command and control server and the victim machine is analysed in a virtual environment.


2013 ◽  
Vol 29 (1_suppl) ◽  
pp. 369-385 ◽  
Author(s):  
Norio Maki

The author was a participant-observer in the Iwata Prefecture's Emergency Operations Center during the response to the Tohoku-oki earthquake and tsunami. He provides his observations, analysis, and recommendations for the response phase, with an emphasis on command and control and information management. Issues addressed include (1) national coordination, (2) multiple hazard operations, and (3) coordinated relief operations.


Sign in / Sign up

Export Citation Format

Share Document