SECURITY ANALYSIS OF PROTECTED AND ANONYMOUS BROWSERS

Author(s):  
Юрий Юрьевич Громов ◽  
Олег Владимирович Трубиенко ◽  
Павел Игоревич Карасев ◽  
Кирилл Александрович Желобенко

Индустрия браузеров существует в основном за счет косвенных источников финансирования, поэтому создатели браузеров должны заботиться о привлекательности предлагаемого продукта. При выборе браузера пользователь руководствуется соображениями красоты, удобства и скорости работы. Большинство пользователей в современном мире не являются технически подготовленными, это обычные люди, которые подбирают товары в магазинах или общаются в соцсетях и т. п. Они имеют смутные представления об информационной безопасности и часто пренебрегают ею либо, наоборот, начинают бояться вмешательства в частную жизнь и не знают, как себя обезопасить или как проверить ее обеспечение. Поэтому основная ответственность обеспечения информационной безопасности лежит на создателях браузера и зависит от их добросовестности и компетенции. Одна из задач специалистов по информационной безопасности - помогать улучшать сервисы с точки зрения их безопасности. С этой целью в работе проведен анализ безопасности четырех браузеров, которые были изначально представлены как браузеры для безопасного и анонимного пользования. Задача обзора и анализа заключается в определении наиболее безопасного и конфиденциального инструмента для веб-серфинга, а также выявления содержания в этих браузерах вредоносных кодов. The browser industry is largely driven by indirect funding, so browser makers should be concerned about the attractiveness of the product they offer. When choosing a browser, the user is guided by considerations of beauty, convenience and speed of work. Most users in the modern world are not technically trained, they are ordinary people who pick up products in stores or communicate on social networks, etc. They have a vague idea of information security, and often neglect it, or, on the contrary, begin to fear interference with their privacy and do not know how to protect themselves or how to check its provision. Therefore, the main responsibility for ensuring information security lies with the creators of the browser and depends on their integrity and competence. One of the tasks of information security professionals is to help improve services in terms of their security. To this end, the work carried out a security analysis of four browsers that were originally presented as browsers for safe and anonymous use. The task of the survey and analysis is to determine the most secure and confidential tool for web surfing, as well as to identify the content of malicious codes in these browsers.

2019 ◽  
pp. 6-12
Author(s):  
Dmitry Tershukov

In the modern world, knowledge and awareness have become the most important products, services have taken the lead, the global information space is rapidly developing, while modern information technologies represent not only new opportunities in solving various problems, but also create fundamentally new challenges and threats. The emergence of new information technologies and systems, the development and expansion of the functions of social networks, the introduction of a variety of services in social networks and their algorithmization have created tools for turning the historical process of human development from uncontrollable to manageable and even projected, there are opportunities to create a reality that does not correspond to reality, to influence the mass consciousness of millions of people around the world. Currently, specialists in the field of information security require knowledge and skills that are at the intersection of various fields of knowledge: information technology, psychology, political science, law, criminology. Meanwhile, graduates of technical universities do not always have sufficient knowledge and skills to properly assess the actions of the violator of information security, to understand the political component of the problems of information security. Graduates of humanities universities are not sufficiently versed in the specifics of threats to information security, the physical nature of the channels of information leakage. The way out of this situation can be the use of a system of retraining and advanced training of specialists in information protection.


1989 ◽  
Vol 28 (2) ◽  
pp. 120-149 ◽  
Author(s):  
Ned Landsman

The most persistent difficulty confronting historical interpreters of popular religion in the early modern world is that of establishing the relationship between ideas enunciated by religious leaders and those held by their hearers. The causes of that uncertainty are obvious; where historical materials for the former are plentiful, sources that address the latter are far more difficult to obtain. The great majority of evidence that we have concerning lay religiosity derives from clerical rather than lay sources, and most of it tells us more about religious behavior than belief. Even those rare accounts we have that purport to narrate the spiritual experiences of ordinary people tend to be both unrepresentative and stylized, to the point where the ultimate implications of such materials for understanding popular belief often are far from certain.Problems of documentation lead to equally significant but less often noted distortions in perspective. Where they have lacked adequate source materials for recovering the mental world of the laity, historians almost by necessity have had to approach their task as one of ascertaining the portion and proportion of the expressions of the ministry that lay men and women adopted. Thus deviations from clerical orthodoxy can only be understood as indicative either of a lack of intellectual sophistication on the part of the laity, or, at best, of a latent “folk” worldview that remains almost inaccessible to historical description. Yet there is ample documentation in the historical record that the laity possessed a rather remarkable capacity to integrate seemingly disparate beliefs and actively forge their own understandings of the delivered message and create their own religious symbols.


2017 ◽  
Vol 47 (2) ◽  
pp. 574
Author(s):  
I.D. Mariolakos ◽  
Ε. Manoutsoglou

Mt Olympus is the highest mountain of Greece (2918 m.) and one of the most important and well known locations of the modern world. This is related to its great cultural significance, since the ancient Greeks considered this mountain as the habitat of their Gods, ever since Zeus became the dominant figure of the ancient Greek religion and consequently the protagonist of the cultural regime. Before the generation of Zeus, Olympus was inhabited by the generation of Cronus. In this paper we shall refer to a lesser known mythological reference which, in our opinion, presents similarities to the geotectonic evolution of the wider area of Olympus. According to Apollodorus and other great authors, the God Poseidon and Iphimedia had twin sons, the Aloades, namely Otus and Ephialtes, who showed a tendency to gigantism. When they reached the age of nine, they were about 16 m. tall and 4.5 m. wide. Having then realized their powers, because of their gigantic proportions, they decided to climb Olympus and fight the Gods, exile Zeus and the others, and wed two Goddesses. Otus was to marry Hera and Ephialtes Artemis. But they did not know how to climb such a high mountain, so they decided to construct a “ladder”, by putting mount Ossa on top of mount Olympus and mount Pelion on top of Ossa. This description coincides with the geological and tectonic evolution of the wider Olympus area. But, these complex tectonic processes were completed about 8 – 10 m.a., i.e. millions of years before the appearance of humans, therefore it is impossible that these morphotectonic processes were witnessed by man, so the similarities between the myth of Aloades and the tectonic evolution of the area must be purely coincidental. But are they, or is there more here?


2015 ◽  
Vol 8 (25) ◽  
Author(s):  
Joon Tae Ahn ◽  
Soonsuk Kim ◽  
Junghan Lee ◽  
Myung Gon Kim ◽  
Gil Hong Park ◽  
...  

Author(s):  
К. В. К. В. Захаренко

In our state there are a number of complex problems in the field of information security that require urgent and radical solution. That’s why theoretical, methodological and political research of the problem of information security in Ukraine, which is experiencing a crisis phase of its development, is becoming especially relevant today. In order to develop an effective system of national information security, a detailed study of the experience of the leading countries of the world, which carry out effective information protection of their states and citizens, is necessary. Today there are national information security systems that have really proven their effectiveness and structural and functional perfection. Indeed, the successful development of a democratic state and civil society is possible only if the information resources are properly used and the state policy is implemented, which would ensure a high level of national information security. In the modern world, the basic principles and tools for the formation of effective information protection of the national security space have been developed already. At the same time, Ukraine needs to apply adequately the foreign experience of the most successful countries in this regard, correctly transforming it taking into account national specificity and the unique role of Ukraine in modern geopolitics. As an important indicator of the protection of citizens, society and state, information security is an integral part of national security. Therefore, its determination mainly focuses on preventing harmful effects that may result in various information threats, as well as eliminating and overcoming those effects with the least possible harm to society and humans. In this aspect, the study of not only the philosophical and phenomenological and socio-psychological determinants of information security of citizens, but also political and legal resources and mechanisms of protection of the information space of the state in the conditions of the functioning of the global information society acquires a special significance. А content analysis of the notion «information security» as a form of national security aimed at ensuring human rights and freedoms in relation to free information access, creation and implementation of secure information technologies and protection of the property rights of all participants of information activities, includes consideration of possible diversions in this area, especially at the international level. Today there is a situation of incompleteness of formation and fragmentary filling of the information space content of the country and the legislative base in our society. The efficiency of the information weapon itself has increased too quickly due to the rapid information circulation and the spread of information networks. As a result, mass media forms the «mass» person of our time, in turn this fact displaces traditional direct contacts, by dissociating people and replacing them by computers and television. At the same time it gives rise to apathy, uncritical attitude and indifference, it complicates the adequate orientation, causing the social disorientation. Informative safety has the human measuring. Therefore an important role in opposition to destructive external and internal informative influences is played by education of citizens. Her proper level called to provide the state and civil society. An in fact uneducated population easily is under destructive influence of informative threats of the modern global world. Unfortunately, Ukraine, does not have sufficient resources and technologies for adequate opposition to the external threats. Taking into account it strategy of forming of the national system of informative safety of our state can be only the maximal leveling of destructive influences from the side of external informative threats. To the end it is necessary to carry out democratic reforms Ukraine, generate civil society, to provide functioning of the legal state and increase of political and civil culture of population. At the same time it is necessary to bear reformers in a mind, that global nature of informative society predetermines rapid transformation of external threats in internal, converting them into permanent calls which are opened out within the limits of national in a civilized manner-informative and socio-political space. Besides modern global informative systems, mass medias, network facilities do a limit between external and internal threats almost unnoticeable.


2021 ◽  
Vol 6 ◽  
pp. 268-275
Author(s):  
Anastasia V. Sitskaya ◽  
Valeria A. Tabakaeva ◽  
Valentin V. Selifanov

The modern world can be characterized by a huge amount of information and computerization of all spheres of human activity. But one of the most valuable information can be considered the information that concerns financial organizations. There are incidents of information security in financial organizations that can lead not only to the violation of the interests of an individual client, but also to the crisis of the financial market of the entire country. Information security audit allows you to detect violations in the organization's information system in a timely manner, which significantly increases the security of information. Often, timely and rapid receipt of a qualitative and quantitative assessment of the level of security allows you to avoid an incident. To improve the accuracy of estimates and reduce the time of their receipt, the application "Audit57580" was developed, the relevance of which is discussed in detail in the article.


Author(s):  
Yushi Shen ◽  
Yale Li ◽  
Ling Wu ◽  
Shaofeng Liu ◽  
Qian Wen

This chapter is about guidance and implementation prepared by the Cloud Security Alliance (CSA) Security as a Service (SecaaS) workgroup, which is made up of users and practitioners in the field of information security. In preparing this implementation guide, input has been sought from experts throughout Europe, the Middle East, and the United States. A lot of professional judgment and experience are applied in the architecture, engineering, and implementation of a Security Information and Event Management (SIEM) guide to ensure that it logs the information necessary to successfully increase visibility and remove ambiguity, surrounding the security events and risks that an organization faces. By providing SIEM as a service under SecaaS, the provider has to be able to accept log and event information, customer information and event feeds, and conduct information security analysis, correlation, and support incident response. By providing flexible real-time access to SIEM information, it allows the party consuming the SIEM service to identify threats acting against their environment cloud. This identification then allows for the appropriate action and response to be taken to protect or mitigate the threat. The simple step of increasing visibility and removing ambiguity is a powerful tool to understanding the information security risks that an organization is facing.


Sign in / Sign up

Export Citation Format

Share Document