Report on Trends in Cyber Crime

Added on - 21 Apr 2020

  • 10

    pages

  • 2226

    words

  • 3

    views

  • 0

    downloads

Showing pages 1 to 3 of 10 pages
Running head: TRENDS IN CYBER CRIMETrends in Cyber CrimeName of the StudentName of the UniversityAuthor’s Note
1TRENDS IN CYBER CRIMETable of ContentsPart 1................................................................................................................................................2Part 2................................................................................................................................................5Discussion........................................................................................................................................5References........................................................................................................................................7
2TRENDS IN CYBER CRIMEPart 1The Internet Technology has been creating millions of opportunities in the businessworld. The business organizations have been continuously using IT in their business operation.However, there has been many misuses of the Internet uses. One specific class of the anonymoustechnology is ananonymous web browsingthat can be initialized byproxy server techniquebyTorapplication. There are different use of this technology in the legitimate cases (Kruse 2017).Anonymous web browsing is a technique that helps in hiding information of users. It sendsinformation by a series of routers for hiding the source information. The misuse of informationof users can cause huge loss to an organization or institution. This technique is also in legitimatepurposes. Different business organizations uses this technique in various security purposes.Government have their own IT experts who use this technique for analyzing security protocols ofthe area. A proxy server creates a mediator between the client and server (Khosla and Dubey2016). The user have to log on to the home page of the proxy and enters the URL for accessing.The browser helps in sending request to server through proxy server. It rewrites the URL andresends to the receiver end. Therefore, the security of user is hidden by using proxy server.Tor is a browser that helps in performing the anonymous web browsing over the internet.Tor browser modifies the IP address of user and reflects other duplicate IP address over theserver. Therefore, the original IP address of user is hidden from the source point. As commentedbyBroadhurst (2014), tor browser is used for performing all tasks in Dark Web. Tor browser isdifferent from the other normal browser. The application have to be externally installed in theWindows, Linux and Mac. The ethical hacking can be done using Tor browser. It helps indirecting traffic of user in the routers and randomly relays to the internet. Therefore, informationof the user is hidden. The encrypted data enters into the first relay; one layer of encryption is
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document