logo

CO4515 - Trends in Cybercrime

10 Pages2226 Words183 Views
   

Trends in Cybercrime (CO4515)

   

Added on  2020-04-21

CO4515 - Trends in Cybercrime

   

Trends in Cybercrime (CO4515)

   Added on 2020-04-21

ShareRelated Documents
Running head: TRENDS IN CYBER CRIMETrends in Cyber CrimeName of the StudentName of the UniversityAuthor’s Note
CO4515 - Trends in Cybercrime_1
1TRENDS IN CYBER CRIME Table of ContentsPart 1................................................................................................................................................2Part 2................................................................................................................................................5Discussion........................................................................................................................................5References........................................................................................................................................7
CO4515 - Trends in Cybercrime_2
2TRENDS IN CYBER CRIME Part 1The Internet Technology has been creating millions of opportunities in the businessworld. The business organizations have been continuously using IT in their business operation.However, there has been many misuses of the Internet uses. One specific class of the anonymoustechnology is an anonymous web browsing that can be initialized by proxy server technique byTor application. There are different use of this technology in the legitimate cases (Kruse 2017).Anonymous web browsing is a technique that helps in hiding information of users. It sendsinformation by a series of routers for hiding the source information. The misuse of informationof users can cause huge loss to an organization or institution. This technique is also in legitimatepurposes. Different business organizations uses this technique in various security purposes.Government have their own IT experts who use this technique for analyzing security protocols ofthe area. A proxy server creates a mediator between the client and server (Khosla and Dubey2016). The user have to log on to the home page of the proxy and enters the URL for accessing.The browser helps in sending request to server through proxy server. It rewrites the URL andresends to the receiver end. Therefore, the security of user is hidden by using proxy server. Tor is a browser that helps in performing the anonymous web browsing over the internet.Tor browser modifies the IP address of user and reflects other duplicate IP address over theserver. Therefore, the original IP address of user is hidden from the source point. As commentedby Broadhurst (2014), tor browser is used for performing all tasks in Dark Web. Tor browser isdifferent from the other normal browser. The application have to be externally installed in theWindows, Linux and Mac. The ethical hacking can be done using Tor browser. It helps indirecting traffic of user in the routers and randomly relays to the internet. Therefore, informationof the user is hidden. The encrypted data enters into the first relay; one layer of encryption is
CO4515 - Trends in Cybercrime_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
(PDF) Understanding online anonymity
|9
|1883
|46

Analysis on Computer Science 2022
|23
|6035
|435

(Sample) The Onion Routing
|6
|1617
|106

Processing of Onion Router
|7
|1051
|57

Cyber Crime - Pros and Cons of Dark Net
|9
|3265
|11

Dark Web and Cybercrime: An Analysis of Theoretical and Cross-Disciplinary Approaches
|9
|2898
|28