Crypto Currency and Cyber-Crime: Types of Malware, Mitigation Tools and Processes

Verified

Added on  2023/05/29

|14
|919
|105
AI Summary
This report described the significance of crypto currency in the field of cyber-crimes and different types of malware. With the help of this investigation readers can expand their skill in the area of cyber-security and crimes.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
CRYPTO CURRENCY AND
CYBER-CRIME

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
STAGE 1: RESEARCH QUESTION
The research question for this paper is given by:
What malware, e.g., Crypto lockers have been used by
cybercriminals to obtain crypto currencies, which
vulnerabilities did they exploit and what mitigation can
be adopted against them?
Document Page
STAGE 2 – LITERATURE SEARCH &
ANNOTATED BIBLIOGRAPHY
Higbee, A., (2018) the role of crypto-currency in
cybercrime. Computer Fraud & Security, 2018(7),
pp.13-15.
This article was written by Higbee in year 2018.
Purpose of this paper is to evaluate importance of crypto
currency in cyber crime.
Document Page
STAGE 2 – LITERATURE SEARCH &
ANNOTATED BIBLIOGRAPHY
Brown, S.D., (2016) Crypto currency and
criminality: The Bit coin opportunity. The Police
Journal, 89(4), pp.327-339.
This paper was produced by Brown which is based on
crypto-currency and cyber-criminal.
The aim of this journal is to analysis the concept of
crypto currency and cyber-crimes.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
STAGE 2 – LITERATURE SEARCH &
ANNOTATED BIBLIOGRAPHY
Irwin, A.S. and Milad, G., (2016) the use of crypto-
currencies in funding violent jihad. Journal of
Money Laundering Control, 19(4), pp.407-425.
The goal of this article is to gather knowledge in area of
cyber-crimes and understand fundamental of crypto-
currencies.
Document Page
STAGE 3: RESEARCH PAPER
A crypto currency is defined as a digital asset
which is designed to work as a process to
exchange money one form to another (Ahn, et al.,
2016).
The aim of this report is to analysis the different
types of malwares used by cybercriminal to hack
the crypto-currency and prevention method to
improve the security of consumer personal data
(Broadhead, 2018).
Document Page
LITERATURE REVIEW
Term cybercrime is defined as an attack in which
hackers use more advanced computer networks
to develop unauthentic servers and transfer to
the networks of consumers to block their personal
data or information (Brown, 2016).
According to the Broadhead, (2018) term cyber-
crime currently poses an important threat in the
field of information technology because many
consumers use third party application and
unauthentic servers by which they can lose their
personal information.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
TYPES OF MALWARE USED BY HACKERS
There are various types of malware used by
hackers which are described below:
Crypto locker
Crypto jacking
Wanna Cry
Bot attack
Document Page
MITIGATION TOOLS AND PROCESSES
Use a full service internet security suite
Adopt security tools and policies
Use strong passwords
Update software on regular basis
Manage social medial settings
Adopt high level computer networks
Use inly authentic servers
Adopt firewall and encryption (Irwin, and Milad,
2016).
Document Page
MITIGATION TOOLS
Authentication:
Use of authentic servers is one of the common technique
to control and manage the malware and data breach
issues.
it provide a way to improve the security and privacy of
the computers and networks by proving authentication.
Firewall technology:
Firewall is an advanced computer technology which is a
combination of hardware and software that has ability to
decrease the rate of security risks and malware attacks.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
DRAWBACKS OF THAT MITIGATION
Security in the authentication is completely
depended on the confidentiality and the strength
of the password.
It does not provide any strong identity check and
uses only password based system.
Firewall does not protect devices from the insider
attacks due to which users can lose their personal
information and mainly it occurs in the crypto
currencies.
Document Page
OVERCOME THAT DRAWBACKS
The issue of passwords in the authentication can
be handled and decreased by using the high level
passwords that involve characters, numeric and
special character.
To avoid the insider attacks in the firewall
individuals can use the antivirus and
cryptography technologies that have potential to
identify the malware and fraud signals from the
computer system.
Document Page
CONCLUSION
This report described the significance of crypto
currency in the field of cyber-crimes and different
types of malware.
With the help of this investigation readers can
expand their skill in the area of cyber-security and
crimes.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REFERENCES
Ahn, G.J., Doupe, A., Zhao, Z. and Liao, K., (2016) Ransomware
and cryptocurrency: partners in crime. In Cybercrime Through
an Interdisciplinary Lens, 12(1), pp. 119-140.
Broadhead, S., (2018) The contemporary cybercrime
ecosystem: A multi-disciplinary overview of the state of affairs
and developments. Computer Law & Security Review, 34(6),
pp.1180-1196.
Brown, S.D., (2016) Crypto currency and criminality: The Bit
coin opportunity. The Police Journal, 89(4), pp.327-339.
Higbee, A., (2018) the role of crypto-currency in
cybercrime. Computer Fraud & Security, 2018(7), pp.13-15.
Irwin, A.S. and Milad, G., (2016) the use of crypto-currencies in
funding violent jihad. Journal of Money Laundering
Control, 19(4), pp.407-425.
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]