logo

Assessment of Work and Progress Towards Learning Outcomes

9 Pages2156 Words186 Views
   

Added on  2023-04-05

About This Document

This study material provides an assessment of work and progress towards learning outcomes, focusing on topics such as the dark web, deep web, and surface web. It explores the impact of dark web services, security breaches, and ransomware. Learn about the methods used to protect against ransomware and the spread of ransomware through Bitcoin. Discover how Tor works and the measures to prevent and remove ransomware.

Assessment of Work and Progress Towards Learning Outcomes

   Added on 2023-04-05

ShareRelated Documents
THE ASSESSMENT OF WORK AND PROGRESS TOWARDS LEARNING
OUTCOMES OF QUESTION
1 to 4.
By
Name ----------------------------------------------------------------------------------------
Lecturer
Name -------------------------------------------------------
March/2019.
Assessment of Work and Progress Towards Learning Outcomes_1
Solution.
Task 1.
Description of Dark web service.
The World Wide Web is composed of three main parts that are dark web, deep web and surface
web. According to Finklea( 2017) explained that surface web is accessed by everyone by just
typing in a Uniform resource locator or searching in web browsers for a resource or information
you need or want to use. For example, using Firefox or Google Chrome, you can type in the
URL. The URL of the website user want to access, for example when user want to use Microsoft
websites to download Microsoft word setup. what user need is to type the URL of Microsoft
website and user will be able to access the website to download Microsoft word setup, or user
search using google, yahoo search access to Microsoft website for example by typing a word
“Microsoft website” all information about Microsoft website will be displayed, and user can
click on a link or information user need.
According to Sui, Caverlee and Rudesill (2015) explained that the deep web is the web that you
cannot see. It uses a software called web crawler to index web search engines. Indexing enables
pages to be accessible and visible, to access pages you need URL and login details.
The information on the web which is not indexing on search engines cannot be accessed because
it is invisible. The Deep web has the largest portion size on the web. The Deep web is the biggest
among all other parts of the web (surface and dark web).many organization, companies and
people uses deep web for their daily transactions.According to Tarquin (2019) stated that about
96% of resources on the World Wide Web is being used by Deep web. According to Dickson
(2017) explained that the dark web has a tiny portion of the web that is only visible and accessed
using particular software for example Tor networks. The Dark web is known as Darknet. After
deep web there is dark web. According to Sirull (2019) explained that When Tor Brower is being
not installed on user computer. The user access world wide web, IP address of computer can be
accessed by government agencies which monitor and control the internet or even hackers but
when Tor Browser is installed on user computer all online activities are hidden and cannot
accessible by anyone.
Impact of dark web services.
According to C.M (2018) published and explained well impacts of dark web services.
Organization, company and people who are involved in the wrong, illegal or criminal acts ,for
example scamming, pornography, human traffic, hacking, money laundry and fraud activities
use the dark web to hide or protect themselves from governing bodies which monitors and
controls web.
According to Beep web ,admin(2015) explained that the dark web services has a high capacity to
increase on a number of several harmful activities in the near future, so it needs to be monitored
and controlled.
Assessment of Work and Progress Towards Learning Outcomes_2
Compare and contrast.
According to Sirull (2019) explained that indexing is done on Surface Web while indexing is not
done the Deep Web is mostly being used compare to surface web. The Government
easilymonitor cybercrime on the surface web as compared to the deep web where hackers hide.
Threat analysis.
Operations which are not being controlled on the dark web leads to illegal activities.
According to the FBI from 2016, much money is stolen in the USA about $2.5. There are
uncontrolled activities on web. This activities, are like to occur more in the future.
Atm fraud.
Fraud of money from ATM has evolved from skimmer of magstripe, use of malware and now
hackers fraud on hidden network
Criminals uses pluteus D malware to attack ATM mostly in the USA for short period ATM is
affected .Mostly windows XP.It is good to updates ATM to high version of windows for
example window 7 or window 8 which is not affected by such malware of recent.
Economic loss.
Notpetya malware attacked Maersk one of the leading company in the business of shipping.
It affected Maersk’s network in worldwide and paralyzed the operation of about 76 of their ports
in the world. A lot of business being lost in a short period of time. The Company lost about $200
to 300 million. Personal data was affected and the system went down. The company had to
replace about 4,000 and 45,000 affected computers and workstations respectively
Method used and reason
OnionScan is the best method to be used because it helps to identify websites or systems
“vulnerabilities, misconfigurations, and operational security holes in onion services”.
This act is called Phishing. According to Schneider (2016) explained that Phishing is a method
of fraud of accessing personal information, so it is an act of hacking.
According to Schneider (2016) explained different type of malware in details which includes Trojan
horses, Rootkits, Spyware and Ransomware.
Trojan Horses.
These are harmful software which pretends to be genuine and beneficial programs coming from a
legit source and convince victims to install them. Trojan allows unauthorized people to access
computers and attack computers by obtaining information from users for example login
credentials, financial transactions details and computer IP addresses. It gives room to
cybercrimes.
Examples of Trojan horses are “Magic Lantern”, “FinFisher”, “WARRIOR PRIDE” and “
Blackhole exploit kit”.
Spyware.
Spyware is a program developed to get people’s data or information from people without them
noticing example login details, information on websites and financial truncation of the company.
For example, it is alleged that the Russian government interfered with the USA election to make
president trump a winner. It may have used such kind of spyware if it is true.
Ransomware.
It is the program that denies the user access, takes control of the computer system and requests
the user to pay some money to access the computer again. According to Wilmington Trust
Assessment of Work and Progress Towards Learning Outcomes_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on IT Secuirty (pdf)
|9
|3078
|209

Cyber Crime - Pros and Cons of Dark Net
|9
|3265
|11

Dark Web Vs Deep Web: A Comparative Study
|11
|2384
|189

Dark-Net: The Hidden Side of the Internet
|7
|1982
|419

Cloud Computing: Services, IAM, EC2 Features, RDS Storage
|21
|4846
|30

Ecommerce and Governance Security
|8
|1575
|493