The Dark Side of the China: The Government, Society and the Great Cannon
Journal Title: Transactions on Networks and Communications - Year 2017, Vol 5, Issue 6
Abstract
The main purpose of this research is to understand the concept of one of the main firewall technology developed within the scope of Golden Shield Project called “Great Cannon” and “Great Firewall” and elaborates the details of this tool in China. The proposed technology deployed in China has claimed to enhance the public safety and country wide national cyber security however there were many other circumstances raised from the legal, ethical and moral issues due to censorship and surveillance of this deployment. The research also elaborates and outlines the effects and technical issues of this deployment since this paper highlights the existing research trends in network security and exposing the current state of the Golden Shield project for the China with its censorship policy.
Authors and Affiliations
Arif Sari, Zakria Abdul Qayyum, Onder Onursal
Water Wave Optimization Algorithm based Congestion Control and Quality of Service Improvement in Wireless Sensor Networks
Many researchers have implemented various machine learning algorithms and verify their results with the existing algorithms to control congestion in Wireless Sensor Networks. The major challenge lies in developing an alg...
Achieving Scalability with Data Owner Anonymity in Cloud Access Control
Cloud computing is a trending technology that enables subscribing organizations to outsource computations and storage, and eliminates the need of purchasing and maintaining the equipment by the organizations themselves....
Advances in Artificial Intelligence Are you sure, we are on the right track?
Over the past decade, AI has made a remarkable progress. It is agreed that this is due to the recently revived Deep Learning technology. Deep Learning enables to process large amounts of data using simplified neuron netw...
An Achievement of High Availability and Low Cost on Data Center Infrastructure
This study is to provide a design of low-cost and high-availability data center infrastructure for small/medium-scale businesses. The basic concept is to establish an infrastructure consisting of primary and backup sides...
Exploiting Cryptocurrency Miners with OSINT Techniques
Collection of intelligence is one of the key elements to organize more sophisticated methods of attacks. Open Source Intelligence (OSINT) is a technique used by attackers for reconnaissance purposes to gather information...