logo

Trends in Cyber Crime

Deliver an essay on anonymous technologies used for legitimate and illegitimate purposes.

9 Pages2268 Words192 Views
   

Added on  2023-05-30

About This Document

This essay discusses the latest trends in cyber crime and explores the impact of cyber crime on privacy and human rights. It critically examines P2P communication technology, Onion Routing technique, and Tor application. The essay also highlights the major aims of worldwide cyber security Agenda and the need for international collaboration to combat cyber terrorism.

Trends in Cyber Crime

Deliver an essay on anonymous technologies used for legitimate and illegitimate purposes.

   Added on 2023-05-30

ShareRelated Documents
Running head: ESSAY 1
TRENDS IN CYBER CRIME
STUDENT DETAILS:
11/13/2018
Trends in Cyber Crime_1
ESSAY 2
PART-I
Conventionally, the right to privacy of communications has been one of the natural rights in most
countries of the world. For an example, law usually gives that e-mail and phone interaction can only be
viewed with direct permission provided by the magistrate. Inappropriately, these regulations are not
present for the net. Even more disturbingly, there is the worldwide trend to organized logging of data
relating to the actions of people online. Maintaining the records of the actions of individuals online are
the stone's throw away from invading on the normal rights of those people to confidentiality.
Consequently, decent manners are required to secure the privacy of communication against viewers. It
must be possible for the people to hide the communication from loggers. In the following parts, P2P
communication technology, Onion Routing technique and Tor application is discussed and critically
examined.
The anonymous P2P communication system is peer-to-peer distributed application in which the nodules
that are required to share sources or members are mysterious or pseudonymous. Onion routing is the
substructure for the personal interaction above the common network. It renders the anonymous
connection, which is strongly unaffected to both overhearing and traffic evaluations. The anonymous
connections of onion routing are bidirectional and nearby real period. It may be used any place outlet
connections may be used (Bossler and Holt, 2015). The onion refers to the data structure, which is cured
as end point location by the onion router. Tor is free software. The term or title is resultant from the
contraction for real software assignment name "Onion Router". Tor technology guides the Internet
traffic through the free, global, undertake connection network comprising more than 7000 conveys to
Trends in Cyber Crime_2
ESSAY 3
conceal the place of users and practice from any person making network scrutiny or examination of the
traffic (Wadhwa and Arora, 2017).
In present time, the Interest in anonymous P2P technology has improved for various causes, sorting
from the wish to share file without showing the recognition of one's network and risking lawsuit to
disbelief in the governments, disquiets over mass investigation and record preservation,
and lawsuits against the bloggers. The Online investigation like recordings and retaining details of net
and mail traffic, can have influences on legal actions. The individuals can be prevented from evaluating
lawful data because they have knowledge of probable investigation and consider that such
communication may be seen as suspicious. As per view of law professor Daniel J. Solove, these
influences damage societies because they decrease the range of standpoints being spoken and
independence level with that to involve in political activities. The sharing of file is the practice of creating
files accessible for other operators to download over net and small network. The copying of copyrighted
materials like songs and pictures is well considered as prohibited thing. More contentious files sharing
chase the p2p technology, in which files are kept and handed out by the personal computer of
operators. Mostly the individuals who involve in sharing of file are also downloading files, which other
operators share. From time to time, these two actions are connected jointly. The peer-to-peer file
sharing is different from the files dealing in that downloading files from the peer-to-peer networks do
not need uploading, even though some networks either render incentive for uploading like credits or
compel file sharing being presently downloaded (Kruse, et. al, 2017).
Trends in Cyber Crime_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Applied Communications
|13
|3246
|440

Man-in-the-Middle Attack | Essay
|10
|2978
|26

Assignment Information Technology Ethics
|9
|1616
|36