IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing

POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing
View Sample PDF
Author(s): Nuno Ricardo Mateus-Coelho (Universidade de Trás-os-Montes e Alto Douro, Portugal), Benjamim Ribeiro Fonseca (Universidade de Trás-os-Montes e Alto Douro, Portugal)and António Vieira Castro (Instituto Superior de Engenharia do Porto, Portugal)
Copyright: 2021
Pages: 32
Source title: Handbook of Research on Cyber Crime and Information Privacy
Source Author(s)/Editor(s): Maria Manuela Cruz-Cunha (Polytechnic Institute of Cávado and Ave, Portugal)and Nuno Mateus-Coelho (Lusófona University, Portugal)
DOI: 10.4018/978-1-7998-5728-0.ch023

Purchase

View POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing on the publisher's website for pricing and purchasing information.

Abstract

It has recently been discovered that large companies and nations “observe” their customers and citizens, disregarding any remaining moral and technological lines, being able to listen to telephone conversations and monitoring communications through powerful monitoring and surveillance programs. Elsewhere on the planet, nations in turmoil or wrapped in a cloak of censorship persecute their citizens, controlling them by denying them access to the free web without the threat of repercussions that threatens their dignity. To support the present research, an analysis of platforms that allow anonymous and secure browsing and a study of technologies and programs with potential privacy breach and computer intrusion were performed. The main objective of this work was to analyse the computer monitoring and surveillance technologies, identifying the available tools, trying to find potential solutions, developing and providing a methodology that enhances any desktop, server, or mobile operating system, with characteristics that combat the exposed in this summary.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom