Monday, February 20, 2017

Geopolitical conflicts may result in cyberattacks publication

Today the growing prevalence of computing devices also growing in profile diversity (smart phones, tablets, routers, switches, firewalls, watches, smart TVs) are fueling a demand in the study of incident response. Many organizations do not know they have been hacked until a third party such as law enforcement informs them. For the last several weeks I've been researching for a project that informs the reader how to do incident response without acting with what one of the people I worked with "a chicken with its head chopped off". Here is a rough outline for this publication:
 
1 Introduction
a) Weigh the pros and cons of security
    i) finding the balance for usable security.
    ii) the only way to prevent a server from being hacked is to fill it up with concrete and dump it into the sea.

2) enablers
a) geopolitical conflicts in "hot zones"
  i) Baltic states
  ii) Middle East,
  iii)Africa
  ix) The Pacific including China and Korea.
 b) weighs out the positives and negatives of bitcoin.

3) Appendixes
  a) Network monitoring
   i) plans for combining OSSIM, ELK, zabbix, Mozdef, MongoDB, Fluentd, and icinga2 using jasper for user interface. This would be based on an earlier presentation "Efficient Network Triage with FOSS

Disclaimer: I do not pretend to know the origins of every conflict the world has faced but think this is a good launch point. Right now from what I've read, there is only the Norton In search of the most dangerous towns in America film, Micah-Sage Bolden's academia article and the World Economic Forum that approaches the geopolitical motives for threats to cybersecurity. For me the big difference between dnsbl, spamhaus, phishtank is that they are mostly based on coming up to solutions for single problem instances such as scams. This means that when their IPs are blocked they shift tactics because there is a lack of cooperation on the part of international law enforcement to take care of the root of the problems. This proposed project is to take a look at the role of geopolitics in the motivation of cybercrime so that we can enhance the online criminology or profiling of the security professionals.

I've been going to a lot of sources not commonly related to network security including the Economic World Form and 19th century Russian Literature sources. Here is a partial list:


Works  Consulted
  
Adinolfi, Joseph, and Ryan Vlastelica. "Bitcoin Could Soar If the Winklevoss ETF Is 
Approved." MarketWatch. Marketwatch, 11 Jan. 2017. Web. 07 Feb. 2017.
Atkinson, Rick. An Army at Dawn: The War in North Africa, 1942-1943. Detroit, MI: Thorndike, a Part of Gale, Cengage Learning, 2013. Print.
Beck, Glenn. It IS About Islam: Exposing the Truth About ISIS, Al Qaeda, Iran, and the Caliphate. San Francisco: IDream, 2015. Print.
"The Bitcoin Gospel (vpro Backlight Documentary)." YouTube. N.p., 01 Nov. 2015. 
Web. 07 Feb. 2017.
"Bitcoin Price | BTC USD." Investing.com. N.p., n.d. Web. 07 Feb. 2017. 
Bolden, Micah-Sage. "Theorizing Cybercrime: Applying Routine Activities Theory." Academia.edu - Share Research. N.p., n.d. Web. 20 Feb. 2017. 
Bousfield, Jonathan. The Rough Guide to Estonia, Latvia & Lithuania. New York: Rough Guides, 2011. Print.
Corera, Gordon. Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage. New York: Pegasus, 2016. Print.
Fuller, Alexandra. Don't Let's Go to the Dogs Tonight: An African Childhood. London: Picador, 2015. Print.
Http://facebook.com/CBSMinnesota. "Good Question: How Much Foreign Aid Does The 
U.S. Give?" WCCO CBS Minnesota. N.p., n.d. Web. 07 Feb. 2017.
Fuller, Alexandra. Scribbling the Cat: Travels with an African Soldier. London: Picador, 2014. Print.
Geissinger, Eric. Virtual Billions: The Genius, the Drug Lord, and the Ivy League Twins behind the Rise of Bitcoin. Amherst, NY: Prometheus, 2016. Print.
Gerges, Fawaz A. ISIS: A History. Princeton: Princeton UP, 2016. Print.
Gertz, Bill. Iwar: War and Peace in the Information Age. Place of Publication Not Identified: Simon & Schuster, 2017. Print.
Hamburg, Gary. "The Rise and Fall of Soviet Communism." Great Lectures. Claremont McKenna College, Claremont, CA. Lecture.
Hatch, Steven. Snowball in a Blizzard: A Physician's Notes on Uncertainty in Medicine. New York: Basic , a Member of the Perseus Group, 2016. Print.
 Imam, Vannary. When Elephants Fight. St Leonards, N.S.W.: Allen & Unwin, 2000. Print.
 "In Search of The Most Dangerous Town On the Internet - Episode 1." YouTube. N.p., 17 June 2015. Web. 20 Feb. 2017.
Knapp, Liza. "He Modern Scholar: The Giants of Russian Literature: Turgenev, Dostoevsky, Tolstoy and Chekhov." The Modern Scholar. Lecture.
Lamb, David. The Africans. London: Mandarin, 1990. Print.
Lekuton, Joseph, and Herman J. Viola. Facing the Lion: Growing up Maasai on the African Savanna. Washington, D.C.: National Geographic, 2005. Print.
""Mathematics. The Mother of Bitcoin ?" - NOVA Documentary." YouTube. N.p., 28 
Sept. 2016. Web. 07 Feb. 2017.
Mitchell, Charlie. Hacked: The inside Story of America's Struggle to Secure Cyberspace. Lanham: Rowman & Littlefield, 2016. Print.
Moorhouse, Roger. The Devils' Alliance: Hitler's Pact with Stalin, 1939-41. London: Vintage, 2016. Print.
Newman, Lily Hay. "Meet Some Real International Hackers." Slate Magazine. N.p., 17 June 2015. Web. 20 Feb. 2017. 
Porter, Richard D., and Ruth A. Judson. The Location of U.S. Currency: How Much Is 
Abroad? (n.d.): n. pag. Federal Reserve, 1996. Web. 7 Feb. 2017.
 Popper, Nathaniel. Digital Gold: Bitcoin and the inside Story of the Misfits and Millionaires Trying to Reinvent Money. New York, NY: Harper, 2016. Print.
"Scramble for Africa." Wikipedia. Wikimedia Foundation, n.d. Web. 07 Feb. 2017. 
Rappaport, Helen. Caught in the Revolution: Petrograd, Russia, 1917-- a World on the Edge. New York: St. Martin's, 2017. Print.
Rogoff, Kenneth S. The Curse of Cash. Princeton: Princeton UP, 2016. Print.
Smele, Jonathan. "The Russian Revolution: From Tsarism to Bolshevism." Queen Mary of London. England, London. Lecture. 
"Syrian Electronic Army Redirects Gigya, Briefly Compromises Media Sites on 
Thanksgiving Day." SC Magazine US. N.p., 29 Nov. 2014. Web. 07 Feb. 2017.
Tapscott, Don, and Alex Tapscott. Blockchain Revolution How the Technology behind Bitcoin Is Changing Money, Business and the World. NY, NY: Portfolio/Penguin, 2016. Print. 
"The Most Dangerous Town on the Internet - Video." The Guardian. Guardian News and Media, 10 Mar. 2016. Web. 20 Feb. 2017. 
Vickery, Kenneth. "African Experience: From "Lucy" to Mandela." Great Lectures. University of North Carolina, North Carolina. 22 Oct. 2015.
Tester, Cala, and Derek Martin. Microsoft Virtual Academy. Microsoft, 19 Jan. 2017. 
Web.
"Understanding Targeted Attacks: Goals and Motives." Understanding Targeted Attacks: Goals and Motives - Security News - Trend Micro USA. N.p., n.d. Web. 20 Feb. 2017.
Vigna, Paul, and Michael J. Casey. The Age of Cryptocurrency How Bitcoin and Digital Money Are Challenging the Global Economic Order. New York, NY: St. Martin's, 2015. Print. 
"What Security Professionals Can Learn From Epidemiologists." Government Info Security News, Training, Education - GovInfoSecurity. N.p., n.d. Web. 20 Feb. 2017. 
WorldEconomicForum. "Africa 2016 - How Can We Combat Cyber-crime in Africa?" YouTube. YouTube, 15 May 2016. Web. 20 Feb. 2017. 
Young, Bob. "Data Breach Exposes Info for 400,000 Community Health Plan Members."
The Seattle Times. Seattle Times, 21 Dec. 2016. Web. 07 Feb. 2017.
 

No comments:

Post a Comment