Posts

Showing posts from November, 2020

Case Study (Literature Review)

Internet in China looks different than this one we are used to it. Communist Party is controlling the content, which is uploaded. The Chinese government in 2013 employed around 2 million people just to keep control of the Internet content (Economy, 2018). They also used "Great Firewall", the group of techniques such as blocking IP addresses, filtering URLs and keywords and DNS attacks (Shen, 2019). Chinese people have to use different software such as Internet browser as well. One of the most popular Chinese browsers is QQ Browser. This software is created by Tencent - Chinese Internet giant (Knockel, Senft and Deibert, 2016). Layout and functionality are similar to these browsers, which are using in other parts of the world such as Google Chrome or Safari. However, in comparison to other browsers, in QQ Browser exist a large number of data points, which are not encrypted or can be easily decrypted (Knockel, Senft and Deibert, 2016). A large number of these differences are fo...

Apple iCloud hack in China from 2014 - Case Study (Introduction)

In 2014, Apple iCloud service was hacked in China. It allows collecting the sensitive data, such as AppleID, password and other personal data of iPhone users from the most populous country (Timberg, 2014). It means hackers, who have done this attack may have information about iPhone users such as a list of the contacts, emails and credit cards connected with ApplePay. Moreover, hackers may have access to user's photos, videos. Internet in China looks different than this one we are used to. People are not allowed to access many websites such as Facebook or Twitter, because the Chinese government is censoring much information (Su and Shyong, 2019). Chinese people are using different software as well.   In this case study, I want to show, how lacks in Chinese software lacks in cybersecurity allow the hackers to attack iCloud, the service of Apple, one of the biggest IT company at the world. Secondly, I want to describe the method of attack, which was "man-in-the-mid...

SSL Symmetric Encryption (Diagram 3)

Image
As I mentioned in my previous post, SSL cryptography bases on two different types of encryption, which is Asymmetric encryption and Symmetric encryption . Symmethric Encryption: This type of  encryption, to connect, client and server use only one key, which is using to encrypt and decrypt messages. Symmetric encryption(Author's work)

SSL Asymmetric Encryption (Diagram 2)

Image
SSL Cryptography bases two types of encription, which is Asymmetric Encryption and Symmetric Encryption (Johansen, 2020). Asymetric Encription: This type of encryption is the most popular one, which is using usually. In this technology, client and server to connect use two different keys, public and private. Public key is using only for encryption. It means, anyone can use this key to encrypt the message. Private key is secret and is using only for decryption.   Asymmetric encryption (Author's work) Resources: Johansen, A., 2020. What Is Encryption And How Does It Protect Your Data? . [online] Us.norton.com. Available at: <https://us.norton.com/internetsecurity-privacy-what-is-encryption.html> [Accessed 20 November 2020].

Card payment process (Diagram 1)

Image
 

Opinion about safety (Survey Analysis)

Image
In my questionnaire, I asked people about their feeling of internet safety. The question was "How safe do you feel with using internet services?" Author's work, 1 - not safe, 5 - very safe         As we can see, the majority of the group is feeling safe on the Internet. Only 6 of the responders are feeling completely safe, which is negative, because they may be less focused during using the Internet, which can cause an opportunity to be charmed by hackers. Development of cybersecurity technologies is possibly a reason, why nobody feels completely unsafe on the Internet. Author's work, 1 - not safe, 5 - very safe   However, the general feeling of safety on the Internet is not related to using online payments. As we can see in the diagram, more people are worried about their safety in case of online payments. Comparison of these 2 diagrams may suggest, people are more worried about their money, than their sensitive data such as name, address, location etc.