Romil Rawat, V. Mahor, Anjali Rawat, Bhagwati Garg, Shrikant Telang
{"title":"Digital Transformation of Cyber Crime for Chip-Enabled Hacking","authors":"Romil Rawat, V. Mahor, Anjali Rawat, Bhagwati Garg, Shrikant Telang","doi":"10.4018/978-1-7998-6975-7.ch012","DOIUrl":null,"url":null,"abstract":"The heterogeneous digital arena emerged as the open depiction for malicious activities, and cyber criminals and terrorists are targeting the cyber depiction for controlling its operation. In the dark web (DW), diverse illegal hacking communities are using the sensing-chip webnet to transfer their bots for tracking the user activity so that criminal activities could be accomplished like money laundering, pornography, child trafficking, drug trafficking, arms and ammunition trafficking, where professionals could also be hired and contracted for generating flood infringement and ransomware infringement.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-7998-6975-7.ch012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The heterogeneous digital arena emerged as the open depiction for malicious activities, and cyber criminals and terrorists are targeting the cyber depiction for controlling its operation. In the dark web (DW), diverse illegal hacking communities are using the sensing-chip webnet to transfer their bots for tracking the user activity so that criminal activities could be accomplished like money laundering, pornography, child trafficking, drug trafficking, arms and ammunition trafficking, where professionals could also be hired and contracted for generating flood infringement and ransomware infringement.