Open Access Open Access  Restricted Access Subscription Access

A Review of TOR Technology in Cyber Security

Dayanand *, Mohini Chauhan, Wilson Jeberson, D. K. Mishra

Abstract


The cyberspace is becoming one of the main elements of vulnerability in national security and has led to a critical situation because the system is always more focused on information sharing and on quick communication all over the world than security. The concept behind the security of the data is the threat of the data corruption. Today, in this world, everything is getting digital and hence the need of more and more data is emerging, giving rise to the new techniques and ideology in the internet world. The digital security is becoming the need of everyone of us. The main objective of this study is to give a new idea for the data security. All the reasons, their techniques, and their conclusions are listed so that we can have a clear view of the objective. The methods defined for securing the data can be legal or illegal because if exploiting someone’s data is illegal then saving the same should not be called illegal. This studydescribes a view of ‘TOR’ technique to make the user able to maintain his/her information on the internet.TOR gives the anonymous path for the data to travel through the different gates of internet. Here, we are going to discuss some of the parameters that will define the security and their effects on our internet surfing.It is important to understand the need of a secure system that can be used to make the secure and safe connections between the source and the destination. Many people,especially the hackers trying to fetch the information from different systems, make the security an important aspect. Sometimes when they want to extract information from many systems at a time then they spread wireless signals through Wi-Fi sources and when they reach in our systems in the form of signals then they in return send the essential information in the form of signal to the hackers.


Keywords


TOR, ARPANET, cyber security, network, circuit

Full Text:

PDF


DOI: https://doi.org/10.37591/ctit.v11i1.792

Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 Current Trends in Information Technology

  • eISSN: 2249-4707
  • ISSN: 2348-7895