Tuesday, May 5, 2020

Development of Decision Table To Compact Cybercrime For Police

Question: To research and review current literature on web security To research and review current literature on web server technologies To review and analyze current literature on dark Web Developing a decision support table Reviewing and finalizing the decision support table Answer: Artefact (proposed) to be developed (in brief) The artefact to be developed is the decision table which consist of possible actions in the leftmost column with possible impacts of these actions in the top row of the table. The table will be prepared using the freeware technologies. The artefact will be tested using open standards. The performance testing will be done to achieve all possible scenarios of flaws or impacts of techniques used by hackers and also provide instant information of about attack. PROJECT PROPOSAL (Main Section of the Report) Introduction The project is about developing a decision support table so as to ease the work of the police in finding criminals on the deep dark web. Deep Dark Web. The Dark Web refers to a collection of websites which are not publicly visible. They generally hide their IP addresses of servers by the people who run them. They can be visited by web users but are generally very difficult to find out who is behind such websites. Also, most of the websites today are found by search engines. However, the websites in the Dark Web cannot merely be found out by using search engines and simultaneously cannot be indexed by search engines. They hide their identities using tools such as the Tor Encryption tool. Not all of the dark web is engaged in illegal activities however, the Dark Web is the place where many illegal activities take place. Many large cyber attacks recently have their linkages to the Dark Web. As a result it is imperative that the investigation team should consider the Dark Web as one of t he de facto areas to look for these cybcer criminals. The essence of this project is to develop a decision support table which can assist the investigating officers about their investigation process in the Deep Dark Web. The table would become as a reference point for all such future investigations whenever the Dark Web is to be suspected. The table hence holds a place of great importance and must be developed carefully as the Dark Web is a dangerous place and needs a defined set of protocols so as to ensure the investigation goes on smoothly. The intended process to develop the decision table is to research and review the literature firstly on the security architecture of web servers and other web technologies. Apart from this, further research and reviews will be done on recent security incidents and the primary loopholes which were responsible for the mishap. At the same time, research will be done on how the dark web operates and any other relevant literature that helps shed some light on the dark web. Finally, literature review and analysis shall be done on the investigation techniques and digital forensics in order to figure out how to frame the decision support table. Initial Research into sources of information Moscove, S., Simkin, M., Bagranoff, N. and Moscove, S. (1997). Core concepts of accounting information systems. New York: John Wiley. This resource provides a good overview of decision tables and decision tree. The book has been written by authors who possess experience in cybercrime and accounting systems also. They had defined the key areas where decision tables can be proved to be useful. They explain the concepts of decision tables with the help of examples. YORKU, E. (2014). Decision Table-Based Testing. [online] EECS.YORKU.CA. Available at: https://www.eecs.yorku.ca/course_archive/2008-09/W/4313/slides/06-DecisionTableBasedTesting.pdf [Accessed 11 Mar. 2016]. This resource goes one step ahead of the earlier resource. It provides additional information on the terminology along with decisions rules which can be applied to a given scenario. Cruz-Cunha, M. and Portela, I. (2011). Handbook of research on digital crime, cyberspace security, and information assurance. This resource provides an overview on the digital crime and cyberspace. The book provides basic knowledge of the concepts of cybercrime. It specifically takes the example of android where it explains the development and mitigation of android malware. Artefact (proposed) The final artefact will be a decision support table which is essentially complete and covers all types of elements that could provide a methodological approach towards investigation of Dark Web. It would essentially be a highly concentrated version of a textbook detailing investigation techniques for modern cyber crimes. It would help investigators with the action that is to be taken in order to achieve a desired result. The document will be clearly designed document. It would be presented in a simple and easier to understand language. Any issues and redundancies would be eliminated in the final version after evaluating the document with a group of investigators. The final document would be such that it is easier to understand follow for even a non-technological savvy person. To further simplify the document, a glossary list would be included which would have a detailed explanation of any technical terminologies used in the document. The final document thus produce would be a set of protocols that is to be followed whenever a cyber crime is to be investigated on the Dark Web. Thus this document would be the one of the first documents to be referred before any investigation is to be carried. Plan/Schedule (note. dates may vary) WBS Task Name Duration Start Finish Predecessors 1 Artefact - Decision table development 212.5 days Thu 10-03-16 Mon 02-01-17 1.1 Analysis 40 days Thu 10-03-16 Wed 04-05-16 1.1.1 Analysis of cybercrimes 4 wks Thu 10-03-16 Wed 06-04-16 1.1.2 Analysis of cyber cases 4 wks Thu 07-04-16 Wed 04-05-16 3 1.1.3 Analysis of decision tables 2 wks Thu 07-04-16 Wed 20-04-16 3 1.1.4 Analysis of decision rules 2 wks Thu 07-04-16 Wed 20-04-16 3 1.2 Design 55 days Thu 05-05-16 Wed 20-07-16 1.2.1 Shortlist cyber crime scenarios 3 wks Thu 05-05-16 Wed 25-05-16 4,5,6 1.2.2 Frame decision rules for selected scenarios 4 wks Thu 26-05-16 Wed 22-06-16 8 1.2.3 Create decision table 4 wks Thu 23-06-16 Wed 20-07-16 9 1.3 Implementation 65 days Thu 21-07-16 Wed 19-10-16 1.3.1 Analyse freeware Php 3 wks Thu 21-07-16 Wed 10-08-16 10 1.3.2 Analyse freeware database 3 wks Thu 21-07-16 Wed 10-08-16 10 1.3.3 Select IDE 2 wks Thu 11-08-16 Wed 24-08-16 12,13 1.3.4 Develop decision table 8 wks Thu 25-08-16 Wed 19-10-16 14 1.4 Testing 40 days Thu 20-10-16 Wed 14-12-16 1.4.1 Unit testing 2 wks Thu 20-10-16 Wed 02-11-16 15 1.4.2 System testing 2 wks Thu 03-11-16 Wed 16-11-16 17 1.4.3 Performance testing 4 wks Thu 17-11-16 Wed 14-12-16 18 1.5 Install in all police stations 2.5 wks Thu 15-12-16 Mon 02-01-17 19 Following are milestones of the project: Creation of decision table. Development of decision table through coding. Performance testing of code Installation of code in all police stations. References and Bibliography Balduzzi, M. and Ciancaglini, V. (2016).Cybercrime In The Deep Web. [online] gsec.hitb.org. Available at: https://gsec.hitb.org/materials/sg2015/D2%20-%20Marco%20Balduzzi%20and%20Vincenzo%20Ciancaglini%20-%20Cybercrime%20in%20the%20Deep%20Web.pdf [Accessed 11 Mar. 2016]. Chertof, M. and Simon, T. (2015).The Impact of the Dark Web on Internet Governance and Cyber Security. [online] Cigionline. Available at: https://www.cigionline.org/sites/default/files/gcig_paper_no6.pdf [Accessed 11 Mar. 2016]. Ciancaglini, V. and Balduzzi, M. (2013).Deepweb and Cybercrime. [online] Trendmicro. Available at: https://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-deepweb-and-cybercrime.pdf [Accessed 11 Mar. 2016]. Cruz-Cunha, M. and Portela, I. (2011).Handbook of research on digital crime, cyberspace security, and information assurance. Jeffray, C. (2016).Underground web The cybercrime challenge. [online] ASPI. Available at: https://www.aspi.org.au/publications/underground-web-the-cybercrime-challenge/SR77_Underground_web_cybercrime.pdf [Accessed 11 Mar. 2016]. Moscove, S., Simkin, M., Bagranoff, N. and Moscove, S. (1997).Core concepts of accounting information systems. New York: John Wiley. YORKU, E. (2014).Decision Table-Based Testing. [online] EECS.YORKU.CA. Available at: https://www.eecs.yorku.ca/course_archive/2008-09/W/4313/slides/06-DecisionTableBasedTesting.pdf [Accessed 11 Mar. 2016].

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.