CO4515 Trends In Cyber Crime Assignment-Central Lancashire University UK.

Subject Code & Title : CO4515 Trends In Cyber Crime
Assessment Type : Assignment
Weighting : 60% of the module
Word limit : 2400 words in total (excluding reference list)
Section 1 – Learning Outcomes:
This assignment contributes to the assessment of the following module learning outcomes,
LO1 – Critically evaluate methods and techniques used for cyber crime
LO4 – Critically analyse the extent to which methods and solutions to cyber crime, proposed in research papers, apply in practice and what are their limitations.
CO4515 Trends In Cyber crime Assignment-Central Lancashire University UK.

CO4515 Trends In Cyber crime Assignment

Section 2 – Assignment Description
Write a research paper on one of the following topics:
Crypto-currencies and Cyber crime. Spams and Cybercrime.
You must write a research paper on the chosen topic.

Stage 1 – Identify the Research Question
After choosing the topic above, your research paper should address one of the following perspectives:
a. Security
b. Forensics and law
c. Black market

You can choose the topic and the perspective that interests you most. For example, if you are interested in the encryption algorithms used by crypto-currencies then your topic and perspective would be “Crypto-currencies and Cybercrime” and “Security”, respectively; however, if you are interested in the tracing and prosecution of those who steal crypto-currencies then you would adopt the “forensics and law” viewpoint.

Once you have identified the perspective that interests you most, identify an appropriate research question. Section 3 contains some suggested research questions, although you can formulate your own research question based upon your own interests. The research question must be agreed with the module tutor before you begin.

Stage 2 – Write a Research Paper
The research paper should contain a maximum of 2400 words (excluding references) and should demonstrate your understanding of the issues relevant to the research question. The paper should clearly answer the research question, and all the content should be relevant to the research question.

The paper is supposed to be a critical evaluation of the literature, rather than a simple repetition of several sources using your own words. This means that you have to summarise, interpret, reflect and be critical about what you have read and about the sources, you actually use.

CO4515 Trends In Cyber crime Assignment-Central Lancashire University UK.

CO4515 Trends In Cyber crime Assignment

It is up to you to structure the paper logically and to ensure coherence among sections and paragraphs. The language used should be specific, precise, objective, direct and simple. Do not use colloquial language. Apart from short quotes, use your own words and use short sentences, appropriate for technical writing.

Suggested structure of the research paper:

  1. Abstract (very short summary of the paper, motivation, purpose, contribution)
  2. Introduction (a summary about the context, the subject area)
  3. Analysis of the related works (main body, structure is based on your creativity)
  4. Discussion (your own view, opinion, ideas for the future work)
  5. Conclusion.

Section 3 – Example Research Questions
This section contains some examples of research questions. This list is not meant to be exhaustive.You may choose a research question not contained in the list but which best suits your background,experience and interest, as long as you agree it with the module tutor. Topic: Crypto-currencies and Cyber crime

  • Security
  • How do bitcoin botnet-miners, like Miner Botnet [13], operate and what measures can be taken against them?
  • What malware, e.g., Crypto locker [6], have been used by cyber criminals to obtain crypto currencies,
  • which vulnerabilities did they exploit and what mitigation can be adopted against them?
  • What attack vectors have been used to exploit cryptocurrencies (e.g. Skype [11] and Yahoo [5]), and how to counter them?
  • What attacks on cryptocurrencies have been theoretically identified (e.g., Double Spending Attack [9] and Block Discarding Attack [1]) and how could they be avoided/mitigated?
  • What has evolved, and what are the differences and similarities between existing (and/or extinct)
  • crypto currencies such as Bitcoin, Lite coin, Ripple and Peer coin [15]?
  • What incidents affecting cryptocurrencies (e.g. security breaches on Mt. Gox [12] – the largest Bitcoin
  • exchange, and on Bitcoinica [8] online trading site for Bitcoins) show us about risks and possible mitigations?

Forensic & law enforcement
1.What methods and techniques are potentially valuable to de-anonymise cryptocurrencies’ users (e.g. Reid and Harrigan [14] proposed one method)?
2.What tools, methods and public information can be used to gather intelligence about criminals’ use of cryp to currencies, like Bitcoin, for law enforcement?
What are the challenges that cryptocurrencies pose for digital forensics investigators and law enforcement [7], and which potential directions are most promising to address these challenges?

Black market
i. How does anonymity in cryptocurrencies work and how it has been exploited by cyber criminals [2]?
ii. How do marketplaces, like Silk Road [4], operate and what measures can be adopted against them?
iii. What are the challenges posed by cryptocurrencies, like Bitcoin, for policymakers and regulators [3], and what advances have been made to address these?
iv. What do we know about the economics of bitcoins and e-Wallets as used by cyber criminals? (e.g., the economics of bitcoin mining [10])

Topic: Spams and Cyber crime

1. Combating web spam (e.g., based on trust rank [16])
2. How to detect spam web pages? (e.g., based on content analysis [17])
3. How to effectively mitigate email spam? (e.g., based on proactive methods [18, 20])
4. Spam detection in social networks (e.g., Twitter [21], Mail Rank [23])

Forensics and Law enforcement
1.Study spam emails with the focus on law enforcement forensic analysis. (e.g., based on data mining techniques approach Anti-spam forensics methodologies (e.g., how data mining can help to detect spam domains and their hosts for anti-spam forensic purposes
2. Forensic investigation of spam campaign

Black market

1. Investigate the incentives and economics behind spamming activities (e.g., [26])
2. Investigate the entire spam value chain, and the full set of resources employed to monetize spam email (e.g., [27] )

Section 5 – Submission
Learning to write concisely is an important skill to develop and is useful throughout your academic and professional career. Your mark will be penalised heavily if you exceed word or page limit.

For every 10% you exceed your word limit, you will have 10% of your marks removed until a maximum of 100%. Your page limit does not include references, but does include citations (quotes).You should use Microsoft Word to complete this assignment. If you use a word processor other than Microsoft Word then you should check to ensure that the document layout is the same as Microsoft Word. Microsoft Word is available on the University network.

Your Word document should be set to the default settings when you open MS Word. The assignment work should be submitted as a .docx for the assignment submission slot on Black Board by the deadline.
Please use in-text citation where required (not enough just listing the references at the end of the), based on the Harvard referencing style 1 .

Section 6 – Late Submission Except where an extension of the hand-in and/or discussion deadline dates have been approved (using extenuating circumstances forms), lateness penalties will be applied in accordance with University policy as shown in Table 1 2.

Section 7 – Extenuating Circumstances
If you believe that there are circumstances that justify an extension of the hand-in deadline for assignment work, you are required to use the Extenuating Circumstances forms (available online based on the EC request procedure via my UCLAN 3 ) Extensions are granted when there are serious and exceptional factors outside your control. Everyday occurrences such as colds and hay fever do not normally qualify for extensions. Where possible, requests for extensions should be made before the hand-in date.

The school considers extenuating circumstances to be conditions that significantly impact on your work. Typically these will cover more than one module. Requests for consideration of extenuating circumstances in respect of assignment work submission, should be made using the extenuating circumstances envelope.You are advised to speak to your Course Leader/ pastoral tutors prior to completing these envelopes.Whilst extenuating circumstances are being considered, you are advised to inform relevant staff members, and continue with the assignment. Extenuating circumstances should be submitted following the guidance on the UC Lan website 4 .

Section 8 – Unfair Means to Enhance Performance
The University operates an electronic plagiarism detection service (Turnitin) where your work will be automatically uploaded, stored and cross-referenced against other material. You should be aware that
the software searches the World Wide Web, extensive databases of reference material and work submitted by members of the same class to identify duplication. To avoid accusations of plagiarism, give an in-text citation and provide bibliographic details of any source used in the references list. Remember that you can reuse ideas from different sources but not literal text.

Plagiarism is not acceptable and you will face consequences when it is detected. For detailed information on the procedures relating to plagiarism, please see the current version of the University Academic Regulations 5 .

Section 10 – Reassessed Work
Reassessment in written examinations and coursework is at the discretion of the Course Assessment Board and is dealt with strictly in accordance with University policy and procedures. Revision classes for referrals will take place during ’reassessment revision, appeals and guidance week’ as marked on the academic calendar.

Research Paper To be awarded a failing grade (less than 50%) your work will not have met the required standard. The following (non-exhaustive) list contains examples that may cause your work to fail.
1. Used very low quality/number of sources/no main findings/results identified/no critical reasoning
2. Very badly structured, no paragraphs/sections/subsections, or badly structured, very few (and long) paragraphs/sections/subsections.
3. Very badly written cannot understand\ many typos and grammatical issues
4. No or very limited in-text citation or not Harvard style at all.
To be awarded a pass mark (52, 55, 58) your work will be of a competent standard.
5. Used acceptable quality/number of sources/acceptable quality discussion of main findings/results identified/contain critical reasoning but missing some or contain unnecessary parts
6. Acceptable structure, some paragraphs sections/subsections but still miss some sections/subsections/paragraphs
7. Acceptable sentences\may contain few typos and grammatical issues\understandable writing skill
8. Acceptable number and style of in-text citations, but several may be inappropriate.
Your research paper structure and writing style (compact/focused) will be used to determine whether you receive a low (52), mid (55) or high (58) pass grade. To be awarded a merit grade (62, 65, 68) your work will be of a very good standard.

You must also:-
1.Used high quality/number of sources/identified main findings/results identified/compact critical reasoning
2. Well structured, but not perfect logically
3. Good sentences\ but lacks of ”professional” writing skill (not sufficiently focused/compact)
4. High number and appropriate in-text citations, but also some unnecessary. Reference list is good but could contains more high impact journals. Your research paper structure and writing style (professional compact focused) will be used to determine whether you receive a low (62), mid (65) or high (68) merit grade.To be awarded a distinctive grade (74, 81, 89, 96, 100) your work will be of an excellent standard.

CO4515 Trends In Cyber crime Assignment-Central Lancashire University UK.

CO4515 Trends In Cyber crime Assignment

You must also:-
1. Used very high quality/number of sources/identified main findings/results identified/clear & compact critical reasoning.
2. Well and logically structured with all the necessary paragraphs, section\subsections.
3. Very well-written\ professional and compact, clear.
4. Very high number and appropriate in-text citations and outstanding reference list with high impact journal papers.

ORDER This CO4515 Trends In Cyber crime Assignment NOW And Get Instant Discount

Order Your Assignment



PGBM150 Innovation Entrepreneurship And Technology Transfer Assignment –