CO4515 - Trends in Cybercrime - Crypto currencies & Spams - Forensics and Law - IT and Computer Science Assignment Help

Download Solution Order New Solution
Assignment Task

Assessment on CO4515: Trends in Cybercrime

Learning Outcomes:
This assignment contributes to the assessment of the following module learning outcomes,
LO1 - Critically evaluate methods and techniques used for cybercrime
LO4 - Critically analyze the extent to which methods and solutions to cybercrime, proposed in research papers, apply in practice and what are their limitations

Assignment Description:
Write a research paper on one of the following topics:  

  1. Crypto-currencies and Cybercrime.
  2. Spams and Cybercrime. 

Research Question:
After choosing the topic above, your research paper should address one of the following perspectives:

  1. Security
  2. Forensics and law
  3. Black market

You can choose the topic and the perspective that interests you most. For example, if you are interested in the encryption algorithms used by crypto-currencies then your topic and perspective would be “Crypto-currencies and Cybercrime” and “Security”, respectively; however, if you are interested in the tracing and prosecution of those who steal crypto-currencies then you would adopt the “forensics and law” viewpoint.

Once you have identified the perspective that interests you most, identify an appropriate research question. Section 3 contains some suggested research questions, although you can formulate your research question based upon your interests. The research question must be agreed with the module tutor before you begin. 


Write a Research Paper :
The paper is supposed to be a critical evaluation of the literature, rather than a simple repetition of several sources using your own words. This means that you have to summarise, interpret, reflect and be critical about what you have read and about the sources, you use. 

It is up to you to structure the paper logically and to ensure coherence among sections and paragraphs. The language used should be specific, precise, objective, direct and simple. Do not use colloquial language. Apart from short quotes, use your own words and use short sentences, appropriate for technical writing. 

Suggested structure of the research paper: 

  • Abstract   (very short summary of the paper, motivation, purpose, contribution)
  • Introduction (a summary about the context, the subject area)
  • Analysis of the related works (main body, the structure is based on your creativity)
  • Discussion (your view, opinion, ideas for the future work)
  • Conclusion. 

Example Research Questions:
This section contains some examples of research questions. This list is not meant to be exhaustive. You may choose a research question not contained in the list but which best suits your background, experience, and interest, as long as you agree on it with the module tutor. 


Topic: Crypto-currencies and Cybercrime:
Security

  1. How do bitcoin botnet-miners, like Miner Botnet, operate and what measures can be taken against them?
  2. What malware, e.g., Cryptolocker, has been used by cybercriminals to obtain cryptocurrencies, which vulnerabilities did they exploit and what mitigation can be adopted against them?
  3. What attack vectors have been used to exploit cryptocurrencies, and how to counter them?
  4. What attacks on cryptocurrencies have been theoretically identified and how could they be avoided/mitigated?
  5. What has evolved, and what are the differences and similarities between existing (and/or extinct) cryptocurrencies such as Bitcoin, Litecoin, Ripple, and Peercoin?
  6. What incidents affecting cryptocurrencies show us about risks and possible mitigations?

Forensic & law enforcement:

  • What methods and techniques are potentially valuable to de-anonymize cryptocurrencies’ users?
  • What tools, methods, and public information can be used to gather intelligence about criminals’ use of cryptocurrencies, like Bitcoin, for law enforcement?
  • What are the challenges that cryptocurrencies pose for digital forensics investigators and law enforcement, and which potential directions are most promising to address these challenges?

Black market

  • How does anonymity in cryptocurrencies work and how it has been exploited by cybercriminals?
  • How do marketplaces, like Silk Road, operate and what measures can be adopted against them?
  • What are the challenges posed by cryptocurrencies, like Bitcoin, for policymakers and regulators, and what advances have been made to address these?
  • What do we know about the economics of bitcoins and e-Wallets as used by cybercriminals?

Topic: Spams and Cybercrime
Security

  1. Combating web spam
  2. How to detect spam web pages?
  3. How to effectively mitigate email spam?
  4. Spam detection in social networks

Forensics and Law enforcement

  1. Study spam emails with the focus on law enforcement forensic analysis.
  2. Anti-spam forensics methodologies
  3. Forensic investigation of a spam campaign

Black market

  • Investigate the incentives and economics behind spamming activities
  • Investigate the entire spam value chain, and the full set of resources employed to monetize spam email  

 

This CO4515 - IT and Computer Science Assignment has been solved by our IT and Computer Science experts at My Uni Paper. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our experts are well trained to follow all marking rubrics & referencing style.

Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

Get It Done! Today

Country
Applicable Time Zone is AEST [Sydney, NSW] (GMT+11)
+

Every Assignment. Every Solution. Instantly. Deadline Ahead? Grab Your Sample Now.