Analyzing Current Trends in Cyber Crime and Security Measures
VerifiedAdded on 2020/04/21
|10
|2226
|183
Essay
AI Summary
This essay delves into the evolving landscape of cyber crime, focusing on the impact of anonymous web browsing technologies like Tor and their implications for online security. It examines how these technologies are used for both legitimate purposes and malicious activities such as website hacking, phishing, and data gathering. The essay discusses the challenges of profiling users, including IP tracking and cookie usage, and explores various prevention techniques. Furthermore, it highlights the need for improved internet governance and the implementation of robust security measures, including access control, antivirus software, and secure service agreements, to mitigate cyber threats. The discussion addresses the alarming situations created by cyber threats, emphasizing the importance of proactive strategies to safeguard organizations and their data.

Running head: TRENDS IN CYBER CRIME
Trends in Cyber Crime
Name of the Student
Name of the University
Author’s Note
Trends in Cyber Crime
Name of the Student
Name of the University
Author’s Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
TRENDS IN CYBER CRIME
Table of Contents
Part 1................................................................................................................................................2
Part 2................................................................................................................................................5
Discussion........................................................................................................................................5
References........................................................................................................................................7
TRENDS IN CYBER CRIME
Table of Contents
Part 1................................................................................................................................................2
Part 2................................................................................................................................................5
Discussion........................................................................................................................................5
References........................................................................................................................................7

2
TRENDS IN CYBER CRIME
Part 1
The Internet Technology has been creating millions of opportunities in the business
world. The business organizations have been continuously using IT in their business operation.
However, there has been many misuses of the Internet uses. One specific class of the anonymous
technology is an anonymous web browsing that can be initialized by proxy server technique by
Tor application. There are different use of this technology in the legitimate cases (Kruse 2017).
Anonymous web browsing is a technique that helps in hiding information of users. It sends
information by a series of routers for hiding the source information. The misuse of information
of users can cause huge loss to an organization or institution. This technique is also in legitimate
purposes. Different business organizations uses this technique in various security purposes.
Government have their own IT experts who use this technique for analyzing security protocols of
the area. A proxy server creates a mediator between the client and server (Khosla and Dubey
2016). The user have to log on to the home page of the proxy and enters the URL for accessing.
The browser helps in sending request to server through proxy server. It rewrites the URL and
resends to the receiver end. Therefore, the security of user is hidden by using proxy server.
Tor is a browser that helps in performing the anonymous web browsing over the internet.
Tor browser modifies the IP address of user and reflects other duplicate IP address over the
server. Therefore, the original IP address of user is hidden from the source point. As commented
by Broadhurst (2014), tor browser is used for performing all tasks in Dark Web. Tor browser is
different from the other normal browser. The application have to be externally installed in the
Windows, Linux and Mac. The ethical hacking can be done using Tor browser. It helps in
directing traffic of user in the routers and randomly relays to the internet. Therefore, information
of the user is hidden. The encrypted data enters into the first relay; one layer of encryption is
TRENDS IN CYBER CRIME
Part 1
The Internet Technology has been creating millions of opportunities in the business
world. The business organizations have been continuously using IT in their business operation.
However, there has been many misuses of the Internet uses. One specific class of the anonymous
technology is an anonymous web browsing that can be initialized by proxy server technique by
Tor application. There are different use of this technology in the legitimate cases (Kruse 2017).
Anonymous web browsing is a technique that helps in hiding information of users. It sends
information by a series of routers for hiding the source information. The misuse of information
of users can cause huge loss to an organization or institution. This technique is also in legitimate
purposes. Different business organizations uses this technique in various security purposes.
Government have their own IT experts who use this technique for analyzing security protocols of
the area. A proxy server creates a mediator between the client and server (Khosla and Dubey
2016). The user have to log on to the home page of the proxy and enters the URL for accessing.
The browser helps in sending request to server through proxy server. It rewrites the URL and
resends to the receiver end. Therefore, the security of user is hidden by using proxy server.
Tor is a browser that helps in performing the anonymous web browsing over the internet.
Tor browser modifies the IP address of user and reflects other duplicate IP address over the
server. Therefore, the original IP address of user is hidden from the source point. As commented
by Broadhurst (2014), tor browser is used for performing all tasks in Dark Web. Tor browser is
different from the other normal browser. The application have to be externally installed in the
Windows, Linux and Mac. The ethical hacking can be done using Tor browser. It helps in
directing traffic of user in the routers and randomly relays to the internet. Therefore, information
of the user is hidden. The encrypted data enters into the first relay; one layer of encryption is
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
TRENDS IN CYBER CRIME
pulled and sent to next delay. The middle relay pulls another layer of encryption and sends
encrypted data to the last relay.
However, there has been various illegal uses of the anonymous web browsing over the
internet. There are has been various illegal activities including website hacking, phishing and
illegal information gathering (Reddy and Reddy 2014). Tor web browser has been in common in
all illegal activities over the internet, the hackers uses this application to perform the hacking and
other illegal activities over the internet. As tor browser hides information of the source point.
The hackers remain safe during conducting illegal activities. There has been many cases of the
illegal use of the anonymous web browsing. PayPal and Ebay have faced online hacking of the
user’s account causing huge loss to company. Various malwares and viruses including Ransom
ware are being used for performing the anonymous web browsing activities. The profiling refers
to mapping of activities of users by logging and time (Ablon, Libicki and Golay 2014). This is
mainly performed by tracking the activity of the user over the web. The preservation of caching
and history mechanism helps in building the browsing agents.
As commented by Wadhwa and Arora (2017), there can be various techniques that can be
used for prevention technique from these illegal activities. IP tracking is one of the technique that
are used for tracking the IP address of users. However, the IP address cannot provide proper
information about the user. The use of the Network Address Translator (NAT) techniques helps
in maintaining controlling process of users from performing illegal activities. . The identification
of the users by the help of browsing agent is a good idea as many users uses different computers
having different IP address. On the other hand, Wright (2017) argued that the use of this
technique might be acknowledged to the hackers and they can keep changing their IP addresses
of device. Therefore, this technique might not be suitable in all illegal activities.
TRENDS IN CYBER CRIME
pulled and sent to next delay. The middle relay pulls another layer of encryption and sends
encrypted data to the last relay.
However, there has been various illegal uses of the anonymous web browsing over the
internet. There are has been various illegal activities including website hacking, phishing and
illegal information gathering (Reddy and Reddy 2014). Tor web browser has been in common in
all illegal activities over the internet, the hackers uses this application to perform the hacking and
other illegal activities over the internet. As tor browser hides information of the source point.
The hackers remain safe during conducting illegal activities. There has been many cases of the
illegal use of the anonymous web browsing. PayPal and Ebay have faced online hacking of the
user’s account causing huge loss to company. Various malwares and viruses including Ransom
ware are being used for performing the anonymous web browsing activities. The profiling refers
to mapping of activities of users by logging and time (Ablon, Libicki and Golay 2014). This is
mainly performed by tracking the activity of the user over the web. The preservation of caching
and history mechanism helps in building the browsing agents.
As commented by Wadhwa and Arora (2017), there can be various techniques that can be
used for prevention technique from these illegal activities. IP tracking is one of the technique that
are used for tracking the IP address of users. However, the IP address cannot provide proper
information about the user. The use of the Network Address Translator (NAT) techniques helps
in maintaining controlling process of users from performing illegal activities. . The identification
of the users by the help of browsing agent is a good idea as many users uses different computers
having different IP address. On the other hand, Wright (2017) argued that the use of this
technique might be acknowledged to the hackers and they can keep changing their IP addresses
of device. Therefore, this technique might not be suitable in all illegal activities.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
TRENDS IN CYBER CRIME
Cookies are stored in settings of users who is using Internet services. The browser agent
sends all data and information to the visited websites and store cookies in the local computer. As
argued by Levi (2017), cookies sometimes store only session times of user in a particular
website. Therefore, it becomes difficult to locate the position of hackers. As commented by
Loveday (2016), some cookies act as tracking identifiers called as third party cookies. The
service providers are not able to reason cookies for other users. Therefore, it creates a chance for
tracking the user’s information related to IP address. The use of the cookies can be beneficial for
tracking websites being searched from the source point. The client side management system is
implemented with help of JavaScript technology and filtering. Information assurance is as of
now a test in connection to the Internet. The future reality of expansive scale Radio Frequency
Identification (RFID) organization, worldwide sensor multiplication, and accumulation of
information furthermore, profoundly customized, expanded administrations will require the
legitimate systems for protection and security to additionally adjust. Existing national contrasts
in perspectives with respect to security privileges of natives could flag the selection of an
assortment of ways to deal with these issues in future (Hui, Kim and Wang 2017) In a few
nations, abuse of sensor and increased reality information could turn into a criminal offense.
Similarly, nations may practice their sway to set their own governs about when such information
can be handled and put away by the specialists "for real purposes.
The lack in internet governance has provided lack in providing unity in cybersecurity.
The rise of hacking activities using anonymous web browsing has alerted different companies
and they are focusing on finding new strategies for mitigating these cyber threats. The users have
shown greater transparency in their services and usage of the internet (Leukfeldt and Yar 2016).
The Internet service providers have implemented different strategies for minimizing cyber-
TRENDS IN CYBER CRIME
Cookies are stored in settings of users who is using Internet services. The browser agent
sends all data and information to the visited websites and store cookies in the local computer. As
argued by Levi (2017), cookies sometimes store only session times of user in a particular
website. Therefore, it becomes difficult to locate the position of hackers. As commented by
Loveday (2016), some cookies act as tracking identifiers called as third party cookies. The
service providers are not able to reason cookies for other users. Therefore, it creates a chance for
tracking the user’s information related to IP address. The use of the cookies can be beneficial for
tracking websites being searched from the source point. The client side management system is
implemented with help of JavaScript technology and filtering. Information assurance is as of
now a test in connection to the Internet. The future reality of expansive scale Radio Frequency
Identification (RFID) organization, worldwide sensor multiplication, and accumulation of
information furthermore, profoundly customized, expanded administrations will require the
legitimate systems for protection and security to additionally adjust. Existing national contrasts
in perspectives with respect to security privileges of natives could flag the selection of an
assortment of ways to deal with these issues in future (Hui, Kim and Wang 2017) In a few
nations, abuse of sensor and increased reality information could turn into a criminal offense.
Similarly, nations may practice their sway to set their own governs about when such information
can be handled and put away by the specialists "for real purposes.
The lack in internet governance has provided lack in providing unity in cybersecurity.
The rise of hacking activities using anonymous web browsing has alerted different companies
and they are focusing on finding new strategies for mitigating these cyber threats. The users have
shown greater transparency in their services and usage of the internet (Leukfeldt and Yar 2016).
The Internet service providers have implemented different strategies for minimizing cyber-

5
TRENDS IN CYBER CRIME
attacks in their networks. The qualification amongst legitimate and unlawful movement may
additionally turn out to be progressively obscured, since practices, for example, information
collecting and block attempt, and notoriety control will be significantly more nearly connected
with benefit age. Current nearness between criminal spamming and honest to goodness
displaying strategies, for example, behavioral promoting as of now fills in as a marker for this
(Fonseca and Rosen 2017). The test for administrators will be to portray conditions under which
these exercises may really be led, and to guarantee that quite far these measures are orchestrated
globally. Criminalization will normally moreover require adequate ability to explore, upset and
indict.
Part 2
Discussion
The issues discussed in essay has created alarming situations for organizations in the
market the cyber threats have been major problem in organization. There are various strategies
have been prepared for eradicating these challenges in organizations.
Access Control and Accounting
The control in security of systems in organization has been important for accessing
information system requirements in the cloud-computing environment. The control policies have
been prepared for mitigating the issues in cyber-attacks. Heterogeneity and assorted variety of
administrations, and areas' differing get to prerequisites in distributed computing situations,
request fine-grained get to control arrangements (Akhgar and Brewster 2016). In specific, get to
control administrations ought to be sufficiently adaptable to catch dynamic, setting, or trait or
certification based access prerequisites and to authorize rule of minimum benefit.
TRENDS IN CYBER CRIME
attacks in their networks. The qualification amongst legitimate and unlawful movement may
additionally turn out to be progressively obscured, since practices, for example, information
collecting and block attempt, and notoriety control will be significantly more nearly connected
with benefit age. Current nearness between criminal spamming and honest to goodness
displaying strategies, for example, behavioral promoting as of now fills in as a marker for this
(Fonseca and Rosen 2017). The test for administrators will be to portray conditions under which
these exercises may really be led, and to guarantee that quite far these measures are orchestrated
globally. Criminalization will normally moreover require adequate ability to explore, upset and
indict.
Part 2
Discussion
The issues discussed in essay has created alarming situations for organizations in the
market the cyber threats have been major problem in organization. There are various strategies
have been prepared for eradicating these challenges in organizations.
Access Control and Accounting
The control in security of systems in organization has been important for accessing
information system requirements in the cloud-computing environment. The control policies have
been prepared for mitigating the issues in cyber-attacks. Heterogeneity and assorted variety of
administrations, and areas' differing get to prerequisites in distributed computing situations,
request fine-grained get to control arrangements (Akhgar and Brewster 2016). In specific, get to
control administrations ought to be sufficiently adaptable to catch dynamic, setting, or trait or
certification based access prerequisites and to authorize rule of minimum benefit.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
TRENDS IN CYBER CRIME
Such access control administrations may need to coordinate security assurance
prerequisites communicated through complex tenets. It is essential that entrance control
framework utilized in mists is effortlessly overseen and its benefit dispersion is managed
effectively. It ought to be guaranteed that cloud conveyance models give nonspecific access
control interfaces for appropriate interoperability, which requests an approach unbiased access
control detail furthermore, implementation system that can be utilized to address cross-area get
to issues (Joshi et al., 2004). Using a security mindful structure for get to control and
bookkeeping administrations that is effectively amiable to consistence checking is in this manner
a vital prerequisite which needs prompt consideration from the inquires about.
Use of antivirus software
The use of the antivirus software and firewall have helped in maintaining the security of
the networks from the cyber-attacks. The use of updated firewalls helps in restricting the viruses
and malwares form entering into server of the company (Reddy and Reddy 2014). This software
also help in identifying viruses and malwares in the operating systems of devices that are
connected to a network. Therefore, use of an updated firewall and antivirus is a favorable step for
mitigating security challenges in an organization.
Secure Service Agreement
In cloud computing environments, cloud service providers and service integrators compose
services for their customers. The service integrator provides a platform that lets independent
service providers orchestrate and interwork services and cooperatively provide additional
services that meet customers’ protection requirements. Although many cloud service providers
use the Web Services Description Language (WSDL), the traditional WSDL cannot fully meet
TRENDS IN CYBER CRIME
Such access control administrations may need to coordinate security assurance
prerequisites communicated through complex tenets. It is essential that entrance control
framework utilized in mists is effortlessly overseen and its benefit dispersion is managed
effectively. It ought to be guaranteed that cloud conveyance models give nonspecific access
control interfaces for appropriate interoperability, which requests an approach unbiased access
control detail furthermore, implementation system that can be utilized to address cross-area get
to issues (Joshi et al., 2004). Using a security mindful structure for get to control and
bookkeeping administrations that is effectively amiable to consistence checking is in this manner
a vital prerequisite which needs prompt consideration from the inquires about.
Use of antivirus software
The use of the antivirus software and firewall have helped in maintaining the security of
the networks from the cyber-attacks. The use of updated firewalls helps in restricting the viruses
and malwares form entering into server of the company (Reddy and Reddy 2014). This software
also help in identifying viruses and malwares in the operating systems of devices that are
connected to a network. Therefore, use of an updated firewall and antivirus is a favorable step for
mitigating security challenges in an organization.
Secure Service Agreement
In cloud computing environments, cloud service providers and service integrators compose
services for their customers. The service integrator provides a platform that lets independent
service providers orchestrate and interwork services and cooperatively provide additional
services that meet customers’ protection requirements. Although many cloud service providers
use the Web Services Description Language (WSDL), the traditional WSDL cannot fully meet
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
TRENDS IN CYBER CRIME
requirements of cloud computing services description. In clouds, issues such as quality of
service, price, and SLAs are critical in service search and composition. These issues must be
addressed to describe services and introduce their features, find the best interoperable options,
integrate them without violating the service owner’s policies, and ensure that SLAs are satisfied.
In essence, an automatic and systematic service provisioning and composition framework that
considers security and privacy issues is crucial and needs urgent attention.
TRENDS IN CYBER CRIME
requirements of cloud computing services description. In clouds, issues such as quality of
service, price, and SLAs are critical in service search and composition. These issues must be
addressed to describe services and introduce their features, find the best interoperable options,
integrate them without violating the service owner’s policies, and ensure that SLAs are satisfied.
In essence, an automatic and systematic service provisioning and composition framework that
considers security and privacy issues is crucial and needs urgent attention.

8
TRENDS IN CYBER CRIME
References
Ablon, L., Libicki, M.C. and Golay, A.A., 2014. Markets for cybercrime tools and stolen data:
Hackers' bazaar. Rand Corporation.
Akhgar, B. and Brewster, B. eds., 2016. Combatting cybercrime and cyberterrorism: challenges,
trends and priorities. Springer.
Broadhurst, R., Grabosky, P., Alazab, M., Bouhours, B. and Chon, S., 2014. An analysis of the
nature of groups engaged in cyber crime.
Fonseca, B. and Rosen, J.D., 2017. Cybersecurity in the US: Major Trends and Challenges.
In The New US Security Agenda (pp. 87-106). Springer International Publishing.
Hui, K.L., Kim, S.H. and Wang, Q.H., 2017. Cybercrime deterrence and international legislation:
Evidence from distributed denial of service attacks. MIS Quarterly, 41(2), p.497.
Khosla, P. and Dubey, P., 2016. Survey Paper on Cyber Crime: A Threat to National
Security. IITM Journal of Management and IT, 7(1), pp.62-65.
Kruse, C.S., Frederick, B., Jacobson, T. and Monticone, D.K., 2017. Cybersecurity in healthcare:
A systematic review of modern threats and trends. Technology and Health Care, 25(1), pp.1-10.
Leukfeldt, E.R. and Yar, M., 2016. Applying routine activity theory to cybercrime: A theoretical
and empirical analysis. Deviant Behavior, 37(3), pp.263-280.
Levi, M., 2017. Assessing the trends, scale and nature of economic cybercrimes: overview and
Issues. Crime, Law and Social Change, 67(1), pp.3-20.
TRENDS IN CYBER CRIME
References
Ablon, L., Libicki, M.C. and Golay, A.A., 2014. Markets for cybercrime tools and stolen data:
Hackers' bazaar. Rand Corporation.
Akhgar, B. and Brewster, B. eds., 2016. Combatting cybercrime and cyberterrorism: challenges,
trends and priorities. Springer.
Broadhurst, R., Grabosky, P., Alazab, M., Bouhours, B. and Chon, S., 2014. An analysis of the
nature of groups engaged in cyber crime.
Fonseca, B. and Rosen, J.D., 2017. Cybersecurity in the US: Major Trends and Challenges.
In The New US Security Agenda (pp. 87-106). Springer International Publishing.
Hui, K.L., Kim, S.H. and Wang, Q.H., 2017. Cybercrime deterrence and international legislation:
Evidence from distributed denial of service attacks. MIS Quarterly, 41(2), p.497.
Khosla, P. and Dubey, P., 2016. Survey Paper on Cyber Crime: A Threat to National
Security. IITM Journal of Management and IT, 7(1), pp.62-65.
Kruse, C.S., Frederick, B., Jacobson, T. and Monticone, D.K., 2017. Cybersecurity in healthcare:
A systematic review of modern threats and trends. Technology and Health Care, 25(1), pp.1-10.
Leukfeldt, E.R. and Yar, M., 2016. Applying routine activity theory to cybercrime: A theoretical
and empirical analysis. Deviant Behavior, 37(3), pp.263-280.
Levi, M., 2017. Assessing the trends, scale and nature of economic cybercrimes: overview and
Issues. Crime, Law and Social Change, 67(1), pp.3-20.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9
TRENDS IN CYBER CRIME
Loveday, B.W., 2016. The police force requires radical reform to respond to changing crime
trends.
Reddy, G.N. and Reddy, G.J., 2014. A Study of Cyber Security Challenges and its emerging
trends on latest technologies. arXiv preprint arXiv:1402.1842.
Wadhwa, A. and Arora, N., 2017. A Review on Cyber Crime: Major Threats and
Solutions. International Journal of Advanced Research in Computer Science, 8(5).
Wright, S., 2017. Mythology of Cyber-Crime—Insecurity & Governance in Cyberspace: Some
Critical Perspectives. In Cyberspace (pp. 211-227). Springer International Publishing.
TRENDS IN CYBER CRIME
Loveday, B.W., 2016. The police force requires radical reform to respond to changing crime
trends.
Reddy, G.N. and Reddy, G.J., 2014. A Study of Cyber Security Challenges and its emerging
trends on latest technologies. arXiv preprint arXiv:1402.1842.
Wadhwa, A. and Arora, N., 2017. A Review on Cyber Crime: Major Threats and
Solutions. International Journal of Advanced Research in Computer Science, 8(5).
Wright, S., 2017. Mythology of Cyber-Crime—Insecurity & Governance in Cyberspace: Some
Critical Perspectives. In Cyberspace (pp. 211-227). Springer International Publishing.
1 out of 10
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.