Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
Research Paper on Cybercrime Methods and Techniques
Answered

Section 1 - Learning Outcomes

This assignment contributes to the assessment of the following module learning outcomes,

LO1 - Critically evaluate methods and techniques used for cybercrime

LO2 - Critically analyse the extent to which methods and solutions to cybercrime, proposed in research papers, apply in practice and what are their limitations

Write a research paper on one of the following topics:  

  1. Crypto-currencies and Cybercrime.
  2. Spams and Cybercrime.

You must write a research paper on the chosen topic.

After choosing the topic above, your research paper should address one of the following perspectives:

  • Security
  • Forensics and law
  • Black market

You can choose the topic and the perspective that interests you most. For example, if you are interested in the encryption algorithms used by crypto-currencies then your topic and perspective would be “Crypto-currencies and Cybercrime” and “Security”, respectively; however, if you are interested in the tracing and prosecution of those who steal crypto-currencies then you would adopt the “forensics and law” viewpoint.

Once you have identified the perspective that interests you most, identify an appropriate research question. Section 3 contains some suggested research questions, although you can formulate your own research question based upon your own interests. The research question must be agreed with the module tutor before you begin.

1. The research paper should contain a maximum of 2400 words (excluding references) and should demonstrate your understanding of the issues relevant to the research question. The paper should clearly answer the research question, and all the content should be relevant to the research question.

2. The paper is supposed to be a critical evaluation of the literature, rather than a simple repetition of several sources using your own words. This means that you have to summarise, interpret, reflect and be critical about what you have read and about the sources, you actually use.

3. It is up to you to structure the paper logically and to ensure coherence among sections and paragraphs. The language used should be specific, precise, objective, direct and simple. Do not use colloquial language. Apart from short quotes, use your own words and use short sentences, appropriate for technical writing.

  1. Abstract   (very short summary of the paper, motivation, purpose, contribution)
  2. Introduction (a summary about the context, the subject area)
  3. Analysis of the related works (main body, structure is based on your creativity)
  4. Discussion (your own view, opinion, ideas for the future work)

This section contains some examples of research questions. This list is not meant to be exhaustive. You may choose a research question not contained in the list but which best suits your background, experience and interest, as long as you agree it with the module tutor.

 Security

  • How do bitcoin botnet-miners, like Miner Botnet [13], operate and what measures can be taken against them?
  • What malware, e.g., Cryptolocker [6], have been used by cybercriminals to obtain cryptocurrencies, which vulnerabilities did they exploit and what mitigation can be adopted against them?
  • What attack vectors have been used to exploit cryptocurrencies (e.g. Skype [11] and Yahoo [5]), and how to counter them?
  • What attacks on cryptocurrencies have been theoretically identified (e.g., Double Spending Attack [9] and Block Discarding Attack [1]) and how could they be avoided/mitigated?
  • What has evolved, and what are the differences and similarities between existing (and/or extinct) cryptocurrencies such as Bitcoin, Litecoin, Ripple and Peercoin [15]?
  • What incidents affecting cryptocurrencies (e.g. security breaches on Mt. Gox [12] – the largest Bitcoin exchange, and on Bitcoinica [8] online trading site for Bitcoins) show us about risks and possible mitigations?
  • What methods and techniques are potentially valuable to de-anonymise cryptocurrencies’ users (e.g. Reid and Harrigan [14] proposed one method)?
  • What tools, methods and public information can be used to gather intelligence about criminals’ use of cryptocurrencies, like Bitcoin, for law enforcement?  (e.g. Bitcoin Block Explorer tool – http://blockexplorer.com/)
  • What are the challenges that cryptocurrencies pose for digital forensics investigators and law enforcement [7], and which potential directions are most promising to address these challenges?
  • How does anonymity in cryptocurrencies work and how it has been exploited by cybercriminals [2]?
  • How do marketplaces, like Silk Road [4], operate and what measures can be adopted against them?
  • What are the challenges posed by cryptocurrencies, like Bitcoin, for policymakers and regulators [3], and what advances have been made to address these?
  • What do we know about the economics of bitcoins and e-Wallets as used by cybercriminals? (e.g., the economics of bitcoin mining [10])

 Security

  • Combating web spam (e.g., based on trust rank [16])
  • How to detect spam web pages? (e.g., based on content analysis [17])  
  • How to effectively mitigate email spam? (e.g., based on proactive methods [18, 20])
  • Spam detection in social networks (e.g., Twitter [21], MailRank [23])
  • Study spam emails with the focus on law enforcement forensic analysis. (e.g., based on data mining techniques approach [22])
  • Anti-spam forensics methodologies (e.g., how data mining can help to detect spam domains and their hosts for anti-spam forensic purposes [24])
  • Forensic investigation of spam campaign (e.g., [25])

Learning to write concisely is an important skill to develop and is useful throughout your academic and professional career. Your mark will be penalised heavily if you exceed word or page limit.

Section 2 - Assignment Description

For every 10% you exceed your word limit, you will have 10% of your marks removed until a maximum of 100%. Your page limit does not include references, but does include citations (quotes).

You should use Microsoft Word to complete this assignment. If you use a word processor other than Microsoft Word then you should check to ensure that the document layout is the same as Microsoft Word. Microsoft Word is available on the University network.

Your Word document should be set to the default settings when you open MS Word.

The assignment work should be submitted as a .docx for the assignment submission slot on BlackBoard by the deadline.

Please use in-text citation where required (not enough just listing the references at the end of the), based on the Harvard referencing style.

Except where an extension of the hand-in and/or discussion deadline dates have been approved (using extenuating circumstances forms), lateness penalties will be applied in accordance with University policy as shown in Table 1.

If you believe that there are circumstances that justify an extension of the hand-in deadline for assignment work, you are required to use the Extenuating Circumstances forms (available online based on the EC request procedure via myUCLAN) Extensions are granted when there are serious and exceptional factors outside your control. Everyday occurrences such as colds and hay fever do not normally qualify for extensions. Where possible, requests for extensions should be made before the hand-in date.

The school considers extenuating circumstances to be conditions that significantly impact on your work. Typically these will cover more than one module. Requests for consideration of extenuating circumstances in respect of assignment work submission, should be made using the extenuating circumstances envelope. You are advised to speak to your Course Leader/ pastoral tutors prior to completing these envelopes. Whilst extenuating circumstances are being considered, you are advised to inform relevant staff members, and continue with the assignment.

Extenuating circumstances should be submitted following the guidance on the UCLan website.

The University operates an electronic plagiarism detection service (Turnitin) where your work will be automatically uploaded, stored and cross-referenced against other material. You should be aware that the software searches the World Wide Web, extensive databases of reference material and work submitted by members of the same class to identify duplication.

To avoid accusations of plagiarism, give an in-text citation and provide bibliographic details of any source used in the references list. Remember that you can reuse ideas from different sources but not literal text.

Plagiarism is not acceptable and you will face consequences when it is detected. For detailed information on the procedures relating to plagiarism, please see the current version of the University Academic Regulations.

Reassessment in written examinations and coursework is at the discretion of the Course Assessment Board and is dealt with strictly in accordance with University policy and procedures. Revision classes for referrals will take place during ’reassessment revision, appeals and guidance week’ as marked on the academic calendar.

The mark for the reassessed module is subject to a maximum of 50%.

Please see the UCLAN Academic Regulations and Assessment Handbook for information and penalties related to “unfair means to enhance performance”.

support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close