Evaluate methods and techniques used for cybercrime

Assignment Help Other Subject
Reference no: EM132580784 , Length: word count:2400

CO4515 Trends in Cybercrime - University of Central Lancashire

Assignment - Research Paper

Learning Outcome 1: Critically evaluate methods and techniques used for cybercrime

Learning Outcome 2: Critically analyse the extent to which methods and solutions to cybercrime, proposed in research papers, apply in practice and what are their limitations

Assignment Description

Write a research paper on one of the following topics:

1. Crypto-currencies and Cybercrime.
2. Spams and Cybercrime.

You must write a research paper on the chosen topic.

Stage 1 - Identify the Research Question

After choosing the topic above, your research paper should address one of the following
perspectives:

• Security
• Forensics and law
• Black market

You can choose the topic and the perspective that interests you most. For example, if you are interested in the encryption algorithms used by crypto-currencies then your topic and perspective would be "Crypto-currencies and Cybercrime" and "Security", respectively; however, if you are interested in the tracing and prosecution of those who steal crypto-currencies then you would adopt the "forensics and law" viewpoint.

Once you have identified the perspective that interests you most, identify an appropriate research question. Section 3 contains some suggested research questions, although you can formulate your own research question based upon your own interests. The research question must be agreed with the module tutor before you begin.

Stage 2 - Write a Research Paper

The research paper should contain a maximum of 2400 words (excluding references) and should demonstrate your understanding of the issues relevant to the research question. The paper should clearly answer the research question, and all the content should be relevant to the research question.

The paper is supposed to be a critical evaluation of the literature, rather than a simple repetition of several sources using your own words. This means that you have to summarise, interpret, reflect and be critical about what you have read and about the sources, you actually use.

It is up to you to structure the paper logically and to ensure coherence among sections and paragraphs. The language used should be specific, precise, objective, direct and simple. Do not use colloquial language. Apart from short quotes, use your own words and use short sentences, appropriate for technical writing.

Section 3 - Example Research Questions

This section contains some examples of research questions. This list is not meant to be exhaustive. You may choose a research question not contained in the list but which best suits your background, experience and interest, as long as you agree it with the module tutor.

Topic: Crypto-currencies and Cybercrime

Security
• How do bitcoin botnet-miners, like Miner Botnet [13], operate and what measures can be taken against them?
• What malware, e.g., Cryptolocker [6], have been used by cybercriminals to obtain cryptocurrencies, which vulnerabilities did they exploit and what mitigation can be adopted against them?
• What attack vectors have been used to exploit cryptocurrencies (e.g. Skype [11] and Yahoo [5]), and how to counter them?
• What attacks on cryptocurrencies have been theoretically identified (e.g., Double Spending Attack [9] and Block Discarding Attack [1]) and how could they be avoided/mitigated?
• What has evolved, and what are the differences and similarities between existing (and/or extinct) cryptocurrencies such as Bitcoin, Litecoin, Ripple and Peercoin [15]?
• What incidents affecting cryptocurrencies (e.g. security breaches on Mt. Gox [12] - the largest Bitcoin exchange, and on Bitcoinica [8] online trading site for Bitcoins) show us about risks and possible mitigations?

Forensic & law enforcement
• What methods and techniques are potentially valuable to de-anonymise cryptocurrencies' users (e.g.
Reid and Harrigan [14] proposed one method)?
• What tools, methods and public information can be used to gather intelligence about criminals' use of cryptocurrencies, like Bitcoin, for law enforcement? (e.g. Bitcoin Block Explorer tool.
• What are the challenges that cryptocurrencies pose for digital forensics investigators and law enforcement [7], and which potential directions are most promising to address these challenges?

Black market
• How does anonymity in cryptocurrencies work and how it has been exploited by cybercriminals [2]?
• How do marketplaces, like Silk Road [4], operate and what measures can be adopted against them?
• What are the challenges posed by cryptocurrencies, like Bitcoin, for policymakers and regulators [3], and what advances have been made to address these?
• What do we know about the economics of bitcoins and e-Wallets as used by cybercriminals? (e.g., the economics of bitcoin mining [10])

Topic: Spams and Cybercrime

Security
• Combating web spam (e.g., based on trust rank [16])
• How to detect spam web pages? (e.g., based on content analysis [17])

• How to effectively mitigate email spam? (e.g., based on proactive methods [18, 20])
• Spam detection in social networks (e.g., Twitter [21], MailRank [23])

Forensics and Law enforcement
• Study spam emails with the focus on law enforcement forensic analysis. (e.g., based on data mining techniques approach [22])
• Anti-spam forensics methodologies (e.g., how data mining can help to detect spam domains and their hosts for anti-spam forensic purposes [24])
• Forensic investigation of spam campaign (e.g., [25])

Black market
• Investigate the incentives and economics behind spamming activities (e.g., [26])
• Investigate the entire spam value chain, and the full set of resources employed to monetize spam email (e.g., [27] )

Attachment:- Research Paper.rar

Reference no: EM132580784

Questions Cloud

Explain what socia and family and vocational : Explain what social, family, vocational, Internet, and medical supports you would explore to help with her longer-term stabilization.
Difference between point estimate and confidence interval : What is the difference between a point estimate and a confidence interval?
Identify caterpillar short-term versus long term goals : Identify Caterpillar Inc.'s short-term versus long term goals. Evaluate how mergers and acquisitions in the past 5 years
What think is the role of religion in reinforcing sexism : Describe how religion intersects with other forms of oppression. Analyze what you think is the role of religion in reinforcing sexism, classism, and racism.
Evaluate methods and techniques used for cybercrime : Critically analyse the extent to which methods and solutions to cybercrime, proposed in research papers, apply in practice and what are their limitations
Review strategic management project : Identify Caterpillar Inc.'s short-term versus long term goals. Assess Caterpillar Inc.'s global strategy (
How has the virus impacted the agency : How would this course of action benefit or help a client and or the community. Volunteer Opportunities What are the volunteer opportunities?
Is religion is a force for social change and social justice : Research paper on race, Is religion is a force for social change and social justice, or is religion a force for maintaining the status quo?
Management credibility and underperforming department : The effectiveness of any compensation system to attract, retain and align employee behavior and performance with the objectives of the enterprise

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd