Story image

CSU to explore Dark Web's underbelly after unprecedented interest from students

16 Feb 2018

IT Masters and Charles Sturt University (CSU) will plunge headfirst into the Dark Web this year, and it appears IT professionals are inherently curious about the ‘controversial’ subject.

The subject is part of a Cyber Security Masters degree and has attracted ‘unprecedented interest’ from IT professionals.

IT Masters director Martin Hale says The Dark Web “is a complex, mysterious and dynamic domain where cyber criminals create, share, buy and sell their wares”.

“It’s a hidden economy where anonymous marketplaces trade in everything from illegal drugs, hacking tools, ransomware scams, personal data, forged documents and industrial secrets.”

The Dark Web is also where the majority of business risks are born, including malware and Denial of Service attacks.

Hale believes that around $72 billion of illegal activity ever year is conducted in Bitcoin – and much of that is connected to activity on the Dark Web.

“Every security manager for every IT organisation would be negligent not to have some understanding of the Dark Web and its potential to impact their operations. One of the best ways to start effectively combating Dark Web threats and cracking down on the illegal marketplaces is to increase the pool of people who have a detailed understanding of what it is and how it operates,” he explains.

The course has apparently struck a chord with those enrolling in the Masters degree, as more than 80% of applicants enrolled in the Dark Web course as their first subject.

It covers a number of topics including an introduction to the Dark Web and its threats; the malicious Dark Net; data analysis of web content; Dark Web forensics; and open source intelligence.

However, the course may never have got off the ground because there was serious internal debate within CSU’s School of Computing and Mathematics about whether the course should even be offered.

“When we proposed running this course, we expected to come up against resistance because of the sensitivity of the subject matter. In the end, however, the school decided that it was important that graduates had an in-depth knowledge of how the cyber-crime economy functions,” explains Hale.

The course will be taught by Dr Rafiqul Islam, leader of the cybersecurity research team at the School of Computing and Mathematics.

“In 2017, the US Department of Defence requested $8 billion in funding to address national security issues relating to internet crime. There is a massive and growing dark economy functioning behind a veil of secrecy enabled by advanced technology and ruthless cyber criminals,” Islam says.

He adds that students will also learn about cyber stalking, hacktivism, fraud, identity theft, and attacks on critical infrastructure. IoT and peer to peer file sharing systems will also be part of the course.

“We will be analysing the online underground economy, the digital currencies it thrives on and cybercrime on the dark web. Students will also delve into the technological and social engineering methods used to undertake such crimes and they will also study dark web forensics and mitigating techniques,” Islam concludes.

Singapore firm to launch borderless open data sharing platform
Singapore-based Ocean Protocol, a decentralised data exchange that promotes data sharing, has revealed details of what could be the kickstart to a global and borderless data economy.
Huawei picks up accolades for software-defined camera ecosystem
"The company's software defined capabilities enable it to future-proof its camera ecosystem and greatly lower the total cost of ownership (TCO), as its single camera system is applicable to a variety of application use cases."
Aussies too lax about IoT security - McAfee
Aussie consumers are at a loss when it comes to securing the increasing number of connected devices in their homes and are often opting to take no action at all.
Barracuda expands MSP security offerings with RMM acquisition
Managed Workplace delivers an RMM platform with security tools and services, such as site security assessments, Office 365 account management, and integrated third-party antivirus.
Flashpoint: APAC companies must factor geopolitics in cyber strategies
The diverse geopolitical and economic interests of the states in the region play a significant role in driving and shaping cyber threat activity against entities operating in APAC.
Expert offers password tips to aid a stress-free sleep
For many cybersecurity professionals, the worries of the day often crawl into night-time routines - LogMeIn says better password practices can help.
SolarWinds extends database anomaly detection
As organisations continue their transition from purely on-premises operations into both private and public cloud infrastructures, adapting their IT monitoring and management capabilities can pose a significant challenge.
NATO picks BlackBerry's encrypted voice technology to secure calls
The NCI Agency acquires, deploys and defends communication systems for NATO's political decision-makers and command centres