>
Fa   |   Ar   |   En
   •شیوه‌‌‌‌‌‌‌‌های زورگیری اینترنتی و ارایه راهکارهای امنیتی  
   
نویسنده عبیری داوود ,d lpln vqh
منبع مطالعات حفاظت و امنيت انتظامي - 1394 - دوره : 10 - شماره : 36 - صفحه:145 -165
چکیده    Extortion, does not happen only in the physical environment of human life, with developing cyber space, extortion also has been transmitted to this space and according to records, documents and reports of active security centers in cyber space area, such as maher center (assistance management and operation coordination center for cyber events), eu cybercrime center, the central bureau of europe police, the us central intelligence agency, federal bureau of investigation (fbi) and other agencies, the number of years that cybercriminal using internet blackmailer bad device in different ways, including , smeary email, directing users to infected links, downloading and installing malicious software, abusing from vulnerabilities, weaknesses or computer bug systems and have infected computer systems in worldwide and force the users to pay amounts by codifying needed data of users, lock the screen along with showing obscene image, threat users based on visiting from illegal sites ( terrorism sites, pornography, child abuse). in some cases, criminals with police cover and announcing some cases as violation of user, threaten and force users to pay penalty and also in some cases with courage and without any cover, force the user to pay specified money because user's computer does not work or required and sensitive data of user, has been codified there fore, user is forced to pay in order to access computer or its information.registered experience has shown, in many cases, even with paying specified money, still unable to access their computer and its data. therefore, awareness of user from criminal's methods, take the necessary measures to prevent infection by black mailer bad devices, problems of cleaning infected computers and prevent to illegal money to criminals are from cases that this article has studied about it. researcher has used from descriptive method and for data collection, had used from library method and has used provided the necessary solutions and suggestions at the end.
کلیدواژه cyber space ,/ security technique ,internet's extortion ,cyber criminals. ,زورگیری اینترنتی ,راهکار امنیتی ,سایت‌های غیر قانونی ,مجرمان سایبری
آدرس دانشگاه آزاد اسلامی, دانشگاه آزاد اسلامی, ایران, دانشگاه صنعتی مالک اشتر, دانشگاه مالک اشتر, ایران
 
     
   
Authors
  
 
 

Copyright 2023
Islamic World Science Citation Center
All Rights Reserved