Romil Rawat, V. Mahor, Anjali Rawat, Bhagwati Garg, Shrikant Telang
{"title":"面向芯片黑客的网络犯罪数字化转型","authors":"Romil Rawat, V. Mahor, Anjali Rawat, Bhagwati Garg, Shrikant Telang","doi":"10.4018/978-1-7998-6975-7.ch012","DOIUrl":null,"url":null,"abstract":"The heterogeneous digital arena emerged as the open depiction for malicious activities, and cyber criminals and terrorists are targeting the cyber depiction for controlling its operation. In the dark web (DW), diverse illegal hacking communities are using the sensing-chip webnet to transfer their bots for tracking the user activity so that criminal activities could be accomplished like money laundering, pornography, child trafficking, drug trafficking, arms and ammunition trafficking, where professionals could also be hired and contracted for generating flood infringement and ransomware infringement.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Digital Transformation of Cyber Crime for Chip-Enabled Hacking\",\"authors\":\"Romil Rawat, V. Mahor, Anjali Rawat, Bhagwati Garg, Shrikant Telang\",\"doi\":\"10.4018/978-1-7998-6975-7.ch012\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The heterogeneous digital arena emerged as the open depiction for malicious activities, and cyber criminals and terrorists are targeting the cyber depiction for controlling its operation. In the dark web (DW), diverse illegal hacking communities are using the sensing-chip webnet to transfer their bots for tracking the user activity so that criminal activities could be accomplished like money laundering, pornography, child trafficking, drug trafficking, arms and ammunition trafficking, where professionals could also be hired and contracted for generating flood infringement and ransomware infringement.\",\"PeriodicalId\":382999,\"journal\":{\"name\":\"Handbook of Research on Advancing Cybersecurity for Digital Transformation\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Handbook of Research on Advancing Cybersecurity for Digital Transformation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/978-1-7998-6975-7.ch012\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-7998-6975-7.ch012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Digital Transformation of Cyber Crime for Chip-Enabled Hacking
The heterogeneous digital arena emerged as the open depiction for malicious activities, and cyber criminals and terrorists are targeting the cyber depiction for controlling its operation. In the dark web (DW), diverse illegal hacking communities are using the sensing-chip webnet to transfer their bots for tracking the user activity so that criminal activities could be accomplished like money laundering, pornography, child trafficking, drug trafficking, arms and ammunition trafficking, where professionals could also be hired and contracted for generating flood infringement and ransomware infringement.