Crypto Currency and Cyber-Crime: Types of Malware, Mitigation Tools and Processes
VerifiedAdded on 2023/05/29
|14
|919
|105
AI Summary
This report described the significance of crypto currency in the field of cyber-crimes and different types of malware. With the help of this investigation readers can expand their skill in the area of cyber-security and crimes.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
CRYPTO CURRENCY AND
CYBER-CRIME
CYBER-CRIME
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
STAGE 1: RESEARCH QUESTION
• The research question for this paper is given by:
• What malware, e.g., Crypto lockers have been used by
cybercriminals to obtain crypto currencies, which
vulnerabilities did they exploit and what mitigation can
be adopted against them?
• The research question for this paper is given by:
• What malware, e.g., Crypto lockers have been used by
cybercriminals to obtain crypto currencies, which
vulnerabilities did they exploit and what mitigation can
be adopted against them?
STAGE 2 – LITERATURE SEARCH &
ANNOTATED BIBLIOGRAPHY
• Higbee, A., (2018) the role of crypto-currency in
cybercrime. Computer Fraud & Security, 2018(7),
pp.13-15.
• This article was written by Higbee in year 2018.
• Purpose of this paper is to evaluate importance of crypto
currency in cyber crime.
ANNOTATED BIBLIOGRAPHY
• Higbee, A., (2018) the role of crypto-currency in
cybercrime. Computer Fraud & Security, 2018(7),
pp.13-15.
• This article was written by Higbee in year 2018.
• Purpose of this paper is to evaluate importance of crypto
currency in cyber crime.
STAGE 2 – LITERATURE SEARCH &
ANNOTATED BIBLIOGRAPHY
• Brown, S.D., (2016) Crypto currency and
criminality: The Bit coin opportunity. The Police
Journal, 89(4), pp.327-339.
• This paper was produced by Brown which is based on
crypto-currency and cyber-criminal.
• The aim of this journal is to analysis the concept of
crypto currency and cyber-crimes.
ANNOTATED BIBLIOGRAPHY
• Brown, S.D., (2016) Crypto currency and
criminality: The Bit coin opportunity. The Police
Journal, 89(4), pp.327-339.
• This paper was produced by Brown which is based on
crypto-currency and cyber-criminal.
• The aim of this journal is to analysis the concept of
crypto currency and cyber-crimes.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
STAGE 2 – LITERATURE SEARCH &
ANNOTATED BIBLIOGRAPHY
• Irwin, A.S. and Milad, G., (2016) the use of crypto-
currencies in funding violent jihad. Journal of
Money Laundering Control, 19(4), pp.407-425.
• The goal of this article is to gather knowledge in area of
cyber-crimes and understand fundamental of crypto-
currencies.
ANNOTATED BIBLIOGRAPHY
• Irwin, A.S. and Milad, G., (2016) the use of crypto-
currencies in funding violent jihad. Journal of
Money Laundering Control, 19(4), pp.407-425.
• The goal of this article is to gather knowledge in area of
cyber-crimes and understand fundamental of crypto-
currencies.
STAGE 3: RESEARCH PAPER
• A crypto currency is defined as a digital asset
which is designed to work as a process to
exchange money one form to another (Ahn, et al.,
2016).
• The aim of this report is to analysis the different
types of malwares used by cybercriminal to hack
the crypto-currency and prevention method to
improve the security of consumer personal data
(Broadhead, 2018).
• A crypto currency is defined as a digital asset
which is designed to work as a process to
exchange money one form to another (Ahn, et al.,
2016).
• The aim of this report is to analysis the different
types of malwares used by cybercriminal to hack
the crypto-currency and prevention method to
improve the security of consumer personal data
(Broadhead, 2018).
LITERATURE REVIEW
• Term cybercrime is defined as an attack in which
hackers use more advanced computer networks
to develop unauthentic servers and transfer to
the networks of consumers to block their personal
data or information (Brown, 2016).
• According to the Broadhead, (2018) term cyber-
crime currently poses an important threat in the
field of information technology because many
consumers use third party application and
unauthentic servers by which they can lose their
personal information.
• Term cybercrime is defined as an attack in which
hackers use more advanced computer networks
to develop unauthentic servers and transfer to
the networks of consumers to block their personal
data or information (Brown, 2016).
• According to the Broadhead, (2018) term cyber-
crime currently poses an important threat in the
field of information technology because many
consumers use third party application and
unauthentic servers by which they can lose their
personal information.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
TYPES OF MALWARE USED BY HACKERS
• There are various types of malware used by
hackers which are described below:
• Crypto locker
• Crypto jacking
• Wanna Cry
• Bot attack
• There are various types of malware used by
hackers which are described below:
• Crypto locker
• Crypto jacking
• Wanna Cry
• Bot attack
MITIGATION TOOLS AND PROCESSES
• Use a full service internet security suite
• Adopt security tools and policies
• Use strong passwords
• Update software on regular basis
• Manage social medial settings
• Adopt high level computer networks
• Use inly authentic servers
• Adopt firewall and encryption (Irwin, and Milad,
2016).
• Use a full service internet security suite
• Adopt security tools and policies
• Use strong passwords
• Update software on regular basis
• Manage social medial settings
• Adopt high level computer networks
• Use inly authentic servers
• Adopt firewall and encryption (Irwin, and Milad,
2016).
MITIGATION TOOLS
• Authentication:
• Use of authentic servers is one of the common technique
to control and manage the malware and data breach
issues.
• it provide a way to improve the security and privacy of
the computers and networks by proving authentication.
• Firewall technology:
• Firewall is an advanced computer technology which is a
combination of hardware and software that has ability to
decrease the rate of security risks and malware attacks.
• Authentication:
• Use of authentic servers is one of the common technique
to control and manage the malware and data breach
issues.
• it provide a way to improve the security and privacy of
the computers and networks by proving authentication.
• Firewall technology:
• Firewall is an advanced computer technology which is a
combination of hardware and software that has ability to
decrease the rate of security risks and malware attacks.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
DRAWBACKS OF THAT MITIGATION
• Security in the authentication is completely
depended on the confidentiality and the strength
of the password.
• It does not provide any strong identity check and
uses only password based system.
• Firewall does not protect devices from the insider
attacks due to which users can lose their personal
information and mainly it occurs in the crypto
currencies.
• Security in the authentication is completely
depended on the confidentiality and the strength
of the password.
• It does not provide any strong identity check and
uses only password based system.
• Firewall does not protect devices from the insider
attacks due to which users can lose their personal
information and mainly it occurs in the crypto
currencies.
OVERCOME THAT DRAWBACKS
• The issue of passwords in the authentication can
be handled and decreased by using the high level
passwords that involve characters, numeric and
special character.
• To avoid the insider attacks in the firewall
individuals can use the antivirus and
cryptography technologies that have potential to
identify the malware and fraud signals from the
computer system.
• The issue of passwords in the authentication can
be handled and decreased by using the high level
passwords that involve characters, numeric and
special character.
• To avoid the insider attacks in the firewall
individuals can use the antivirus and
cryptography technologies that have potential to
identify the malware and fraud signals from the
computer system.
CONCLUSION
• This report described the significance of crypto
currency in the field of cyber-crimes and different
types of malware.
• With the help of this investigation readers can
expand their skill in the area of cyber-security and
crimes.
• This report described the significance of crypto
currency in the field of cyber-crimes and different
types of malware.
• With the help of this investigation readers can
expand their skill in the area of cyber-security and
crimes.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
REFERENCES
• Ahn, G.J., Doupe, A., Zhao, Z. and Liao, K., (2016) Ransomware
and cryptocurrency: partners in crime. In Cybercrime Through
an Interdisciplinary Lens, 12(1), pp. 119-140.
• Broadhead, S., (2018) The contemporary cybercrime
ecosystem: A multi-disciplinary overview of the state of affairs
and developments. Computer Law & Security Review, 34(6),
pp.1180-1196.
• Brown, S.D., (2016) Crypto currency and criminality: The Bit
coin opportunity. The Police Journal, 89(4), pp.327-339.
• Higbee, A., (2018) the role of crypto-currency in
cybercrime. Computer Fraud & Security, 2018(7), pp.13-15.
• Irwin, A.S. and Milad, G., (2016) the use of crypto-currencies in
funding violent jihad. Journal of Money Laundering
Control, 19(4), pp.407-425.
• Ahn, G.J., Doupe, A., Zhao, Z. and Liao, K., (2016) Ransomware
and cryptocurrency: partners in crime. In Cybercrime Through
an Interdisciplinary Lens, 12(1), pp. 119-140.
• Broadhead, S., (2018) The contemporary cybercrime
ecosystem: A multi-disciplinary overview of the state of affairs
and developments. Computer Law & Security Review, 34(6),
pp.1180-1196.
• Brown, S.D., (2016) Crypto currency and criminality: The Bit
coin opportunity. The Police Journal, 89(4), pp.327-339.
• Higbee, A., (2018) the role of crypto-currency in
cybercrime. Computer Fraud & Security, 2018(7), pp.13-15.
• Irwin, A.S. and Milad, G., (2016) the use of crypto-currencies in
funding violent jihad. Journal of Money Laundering
Control, 19(4), pp.407-425.
1 out of 14
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.