Trends in Cyber Crime

Verified

Added on  2023/05/30

|9
|2268
|192
AI Summary
This essay discusses the latest trends in cyber crime and explores the impact of cyber crime on privacy and human rights. It critically examines P2P communication technology, Onion Routing technique, and Tor application. The essay also highlights the major aims of worldwide cyber security Agenda and the need for international collaboration to combat cyber terrorism.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: ESSAY 1
TRENDS IN CYBER CRIME
STUDENT DETAILS:
11/13/2018

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
ESSAY 2
PART-I
Conventionally, the right to privacy of communications has been one of the natural rights in most
countries of the world. For an example, law usually gives that e-mail and phone interaction can only be
viewed with direct permission provided by the magistrate. Inappropriately, these regulations are not
present for the net. Even more disturbingly, there is the worldwide trend to organized logging of data
relating to the actions of people online. Maintaining the records of the actions of individuals online are
the stone's throw away from invading on the normal rights of those people to confidentiality.
Consequently, decent manners are required to secure the privacy of communication against viewers. It
must be possible for the people to hide the communication from loggers. In the following parts, P2P
communication technology, Onion Routing technique and Tor application is discussed and critically
examined.
The anonymous P2P communication system is peer-to-peer distributed application in which the nodules
that are required to share sources or members are mysterious or pseudonymous. Onion routing is the
substructure for the personal interaction above the common network. It renders the anonymous
connection, which is strongly unaffected to both overhearing and traffic evaluations. The anonymous
connections of onion routing are bidirectional and nearby real period. It may be used any place outlet
connections may be used (Bossler and Holt, 2015). The onion refers to the data structure, which is cured
as end point location by the onion router. Tor is free software. The term or title is resultant from the
contraction for real software assignment name "Onion Router". Tor technology guides the Internet
traffic through the free, global, undertake connection network comprising more than 7000 conveys to
Document Page
ESSAY 3
conceal the place of users and practice from any person making network scrutiny or examination of the
traffic (Wadhwa and Arora, 2017).
In present time, the Interest in anonymous P2P technology has improved for various causes, sorting
from the wish to share file without showing the recognition of one's network and risking lawsuit to
disbelief in the governments, disquiets over mass investigation and record preservation,
and lawsuits against the bloggers. The Online investigation like recordings and retaining details of net
and mail traffic, can have influences on legal actions. The individuals can be prevented from evaluating
lawful data because they have knowledge of probable investigation and consider that such
communication may be seen as suspicious. As per view of law professor Daniel J. Solove, these
influences damage societies because they decrease the range of standpoints being spoken and
independence level with that to involve in political activities. The sharing of file is the practice of creating
files accessible for other operators to download over net and small network. The copying of copyrighted
materials like songs and pictures is well considered as prohibited thing. More contentious files sharing
chase the p2p technology, in which files are kept and handed out by the personal computer of
operators. Mostly the individuals who involve in sharing of file are also downloading files, which other
operators share. From time to time, these two actions are connected jointly. The peer-to-peer file
sharing is different from the files dealing in that downloading files from the peer-to-peer networks do
not need uploading, even though some networks either render incentive for uploading like credits or
compel file sharing being presently downloaded (Kruse, et. al, 2017).
Document Page
ESSAY 4
Various people, who accept the Tor technology, for the both legitimate purpose and illegitimate
purpose, depend on its securities for the protection. Its usefulness as the sources for personal online
communication has led to the development of net and important hold up from each type of entity. The
technologies behind the structure of Tore and the onion routing technology is the area, which is
continually establishing the new systems to congeal the securities, as numerous groups with changeable
motivations actions look for enter in the network. As per the anonymous nature or scope of Tor
technology, it has attracted not only the people with truthful motive. Certainly, these types of services
also attract the offenders. It has consequence for users of Tor technologies, particularly for the people
who giving the exit nodes (Leukfeldt and Yar, 2016).
Initially, measures should be taken to restrict the misuse as much as probable. Secondly, as not all
misuse may be prohibited, the exit node contributors should be secured from the being held liable for
illegal actions of operators(Bakhsh, Mahmood and Awan, 2016). In the case, where exit nodes were
included in evaluating the illegal contents, there is possibility that the IP address may be logged by laws
implement organization. In Germany, Some lists of occasions are provided by Kai Billen, where servers of
Tor exit node users were detained by police force. It is required by the exit node users to be prepared to
bear some political torture. It can be the subject for Tor exit node users, but definitely not each tap user
will desire to take the risk of having to encourage the law implement organizations of the
incorruptibility. For the reason that as various people as likely require to get motivation to run Tap node,
which relay connection of others to the net server, Tap’s mistreat prospective and in this way, the
threat for exit node users has to be reduced (Levi, 2017).

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
ESSAY 5
There are some major aims of worldwide cyber security Agenda, make on five work fields like Legal
measures, technological and practical measures, managerial structures, Capacity building, and
International assistance (Taylor, Fritsch and Liederbach, 2014). The battle against cybercrime requires
the inclusive process. It is provided that technological measures alone may not stop crimes, it is
dangerous that laws implement organizations are permitted to examine and act against cyber-crime
successfully (Singh, 2014). Technological and practical measures makes focus on major actions to
encourage the acceptance of improved strategies for enhancing the protections and management of
risk in cyber space, involving authorization systems, procedures and norms. The managerial structures
focus on the avoidance, discovery, reaction to and disaster administration of cyber-attack, involving the
security of dangerous data infrastructure system (Williams and Levi, 2017). The capacity building makes
focus on detailing approaches for capacity creating tools to develop alertness, relocate expertise and
improve cyber security on the public policies program. Lastly, the international assistance focuses on
international collaboration, conversation and organization in trading with cyber terrorization. The
establishment of sufficient legislations and within the approach the establishment of the cyber-crime
related legal structure is the important part of the cyber security strategies. It needs first the essential
substantive criminal law requirements to criminalize act like the computer fraud, illegal right of entry,
data intervention, copyright violation and children pornography (Ngo and Jaishankar, 2017).
PART-II Contribution to online discussion
Document Page
ESSAY 6
It is right to say that at present, the cyber-crimes like hacking can be made with relative ease, secrecy,
and on worldwide level. It presents important issues to user, business, lawmakers and legal
organizations. However, it is argued that the main issues to be considered are the level of crime, the
ease of access net; the secrecy assisted by cyber space, information portability, ever-widening expansion
of net, and international reach of technologies, and in turn, cybercrimes. The main reason cited for state
not requiring to help on challenge is wish to keep their independence, making confrontation to global
body directing them how to legalize in specific area. It is argued by Bendovschi, 2015, that every person
must take these legal actions and other actions as may be essential to develop as criminal offence under
common law, when committed deliberately and without rights, input, alteration, deletion, or
suppression of computer data, resulting in inauthentic data with intention that it be acted for legal
purpose as if it were genuine, in spite of whether or not data is readable and comprehensible in directly.
The use of anonymous technologies by cyber-criminals is complete violation of right to privacy of
individuals. One might say that the right to privacy is very significant usual necessity of every individual
as it makes the limitations nearby the people wherever entry of the other individual is limited. But
question is raised that is it fair to restrict the individuals to access the sites. The right to privacy forbids
intervention or interruption in the private life of other people. These laws, rules and regulations restrict
the individuals to use internet or particular sites. The use of laden, vague words has, certainly, had far-
reaching cost, as the government is using formless internal and external fears as opinions to validate the
great investments in cyber arms and mass observation scheme, and ever greater governmental control
of the Internet and their citizens. It is provided to give rise to the idea that all response is correct and
legal. It might seem that these issues are compounded by facts that various strategies related to cyber
Document Page
ESSAY 7
security make tools to encourage huge data sharing between private entities and government to permit
enhanced answers to cyber security fear. It is stated by People’s Republic of China (PRC), that there
should be restriction to access site to stop the cyber-crimes. But, here the point to be argued is that it
contravenes the rights of other genuine individuals. To the extent, it is a predictable approaches or
strategies in the multi-shareholder area, in which the actors hold part of data that is required to
productively detect and counter fears. Though, where close private-public relations, involving the data
sharing, develop without sufficient protections, it may easily lead to the violation of human rights. Thus,
there are certain cyber-crimes that are related to the individual’s personal properties or the private
material then the respondent may be accused of violation of the human rights (Akhgar and Brewster,
2016).

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ESSAY 8
References
Akhgar, B., and Brewster, B. (2016) Combatting cybercrime and cyberterrorism: challenges, trends and
priorities. New York: Springer.
Bakhsh, M., Mahmood, A., and Awan, I.I. (2016) A comparative analysis of cybercrime and cyberlaws in
Islamic Republic of Pakistan, Kingdom of Saudi Arabia, and the United Arab Emirates. Imam Journal of
Applied Sciences, 1(1), p. 9.
Bendovschi, A. (2015) Cyber-attacks–trends, patterns and security countermeasures. Procedia
Economics and Finance, 28, pp. 24-31.
Bossler, A., and Holt, T.J. (2015) Cybercrime in progress: Theory and prevention of technology-enabled
offenses. New York: Routledge.
Kruse, C.S., Frederick, B., Jacobson, T., and Monticone, D.K. (2017) Cybersecurity in healthcare: A
systematic review of modern threats and trends. Technology and Health Care, 25(1), pp. 1-10.
Leukfeldt, E.R., and Yar, M. (2016) Applying routine activity theory to cybercrime: A theoretical and
empirical analysis. Deviant Behavior, 37(3), pp. 263-280.
Levi, M. (2017) Assessing the trends, scale and nature of economic cybercrimes: overview and
issues. Crime, Law and Social Change, 67(1), pp. 3-20.
Document Page
ESSAY 9
Ngo, F., and Jaishankar, K. (2017) Commemorating a Decade in Existence of the International Journal of
Cyber Criminology: A Research Agenda to Advance the Scholarship on Cyber Crime. International
Journal of Cyber Criminology, 11(1).
Singh, D. (2014) Emerging Trends in Cyber-Crimes. Global Journal of Enterprise Information System, 6(4),
pp. 29-32.
Taylor, R.W., Fritsch, E.J., and Liederbach, J. (2014) Digital crime and digital terrorism. USA: Prentice Hall
Press.
Wadhwa, A., and Arora, N. (2017) A Review on Cyber Crime: Major Threats and Solutions. International
Journal of Advanced Research in Computer Science, 8(5).
Williams, M.L., and Levi, M. (2017) Cybercrime prevention. Handbook of crime prevention and
community safety, pp. 454-469.
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]