{"title":"网络战争中暗网作战的机会:在大学环境中考察其功能和存在","authors":"Ferenc Koczka","doi":"10.32565/aarms.2020.1.6","DOIUrl":null,"url":null,"abstract":"Regarding the Internet, individuals expect anonymity and confidentiality, but the authorities expect as much traceability as possible. Individuals are provided with encryption procedures used in internet communication, supported by more and more efficient devices and applications. For law enforcement, the publicity of these procedures could be a serious problem. However, in addition to a well-functioning technical background, conscious use of tools is required to maintain anonymity. In this article I present the necessary techniques to achieve this goal, their operational principles, scopes and points that may enable the technology to be compromised. In the second part of this article, the partial results of my research will be presented, which measures the presence and activity of the darknet; it can provide a basis for carrying out similar investigations and can help develop the protection process.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Opportunities of Darknet Operations in Cyber Warfare: Examining its Functions and Presence in the University Environment\",\"authors\":\"Ferenc Koczka\",\"doi\":\"10.32565/aarms.2020.1.6\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Regarding the Internet, individuals expect anonymity and confidentiality, but the authorities expect as much traceability as possible. Individuals are provided with encryption procedures used in internet communication, supported by more and more efficient devices and applications. For law enforcement, the publicity of these procedures could be a serious problem. However, in addition to a well-functioning technical background, conscious use of tools is required to maintain anonymity. In this article I present the necessary techniques to achieve this goal, their operational principles, scopes and points that may enable the technology to be compromised. In the second part of this article, the partial results of my research will be presented, which measures the presence and activity of the darknet; it can provide a basis for carrying out similar investigations and can help develop the protection process.\",\"PeriodicalId\":297100,\"journal\":{\"name\":\"Academic and Applied Research in Military and Public\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Academic and Applied Research in Military and Public\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.32565/aarms.2020.1.6\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Academic and Applied Research in Military and Public","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32565/aarms.2020.1.6","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Opportunities of Darknet Operations in Cyber Warfare: Examining its Functions and Presence in the University Environment
Regarding the Internet, individuals expect anonymity and confidentiality, but the authorities expect as much traceability as possible. Individuals are provided with encryption procedures used in internet communication, supported by more and more efficient devices and applications. For law enforcement, the publicity of these procedures could be a serious problem. However, in addition to a well-functioning technical background, conscious use of tools is required to maintain anonymity. In this article I present the necessary techniques to achieve this goal, their operational principles, scopes and points that may enable the technology to be compromised. In the second part of this article, the partial results of my research will be presented, which measures the presence and activity of the darknet; it can provide a basis for carrying out similar investigations and can help develop the protection process.