Annotated Bibliography Assignment Solution

Part 1: Annotated Bibliography Article 1

 (1)Hatta, M. (2020). Deep web, dark web, darknet. Annals of Business Administrative Science, 2020, 19(6), 277-292. Retrieved https://www.jstage.jst.go.jp/article/abas/19/6/19_0200908a/_pdf/-char/en   (2) In this article, Masayuki Hatta review the influence of deep web, dark web, dark net on online black market and anonymous virtual currencies. He discussed the differences between the concepts of dark net and onion routing used in dark web in easy-to-understand manner. (3) The term “dark web” has recently become very popular. Unlike the world wide web where the anonymity is not guaranteed, the dark web serves a whole different power. It gives the perfect black market to sell silk, drugs, child pornography, stolen credit cards etc. This research was made with the word in mind to resolve the differences between the myths and reality of onion domain routed websites. (4) The research of Masayuki Hatta, is based on the hypothesis based on 1970s and even today as in concrete terms as IP address is not allocated to the host address is known as dark net. It provided deeper anonymous to government run institutes and political parties which required special registrations to get into the non-existing network according to the normal user. The paper also explains about dark web which is different from dark net, which is more associated with bigger anonymous bodies but dark web is quietly open for everyone with a tor browser installed on their system to connect to onion domain. (5) The article is very useful in many ways as the author described how dark net is used by army related sites which used end to end max level encryption to safe guard privacy from terrorist and information leaking. It refers that even the database is anonymous and cannot be traced to its original location. In case of dark web, the author wrote about tor browser and how it encrypts outgoing onion domains and search the dedicated onion domain’s server and retrieve the dark webpage via Node-to-node onion masking. (6) The limitation of this article was that it was limited to information related to basic and fundamental functionalities of the dark net and dark we, although it justifies the title of the article but it could have been a bit more than only how dark web and dark net is used other than talking about real events taking place in the dark web that slipped into light of FBI. (7) Thus, the author himself indicates that they only provided a simple explanation of the aspects of dark web, dark net and onion nodes, just a glimpse of what’s in the surfaces and he indicates that he wanted to change the perspective hampered by the image that these words have created. Hence, this research needs to be moved forward based on its historical and technical nature. (8)  This article is not the only source of my research but I have compared and contrasted it with few more articles and came to a conclusion that it can add up to the structure of my research.(1) Citation       (2) Introduction   (3) Aims and Research           (4) Scope               (5) Usefulness             (6) Limitations         (7) Conclusions             (8) Reflection

Annotated Bibliography Article 2

(1)May A. Alotaibi1, Mohammed A. AlZain1, Ben Soh2, Mehedi Masud1 and Jehad Al-Amri. Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection. Vol. 11, No. 3, December 2019. Retrieved: https://www.researchgate.net/publication/341113296_Forensics_Dark_Net_Forensic_ Framework_and_Tools_Used_for_Digital_Evidence_Detection   (2) Computer forensics  research is  becoming  more  crucial and vital  in developing and finding  substantial  forensic evidence which help digitally for detection  tools  to  deter  more  alike cyber-attacks.  This paper refers to the  science  of  computer  forensics,  digital evidence detection tools and dark web forensic framework. (3) The aim of this research that it goes in details regarding the computer forensic and the procedure used to recreate the past events using detection tools. It also talks about network forensic and mobile forensics and how investigators use the proper procedure to obtain legal evidence. (4) The scope of forensic evidence is huge as in today’s world everything is digitised and criminals are more on web than in real and arresting these criminals is more difficult as they are very sophisticated with their approach to crime. So dark web forensic framework assists the legal hand to become more empowering and efficient. (5) The  forensic  methods used for as per recommendation in Darknet  forensics are majorly divided into two categories: Bitcoin forensics and TOR forensics. For example winhex is a software that displays original signature files, the investigator can use Winhex to obtain the original file as evidence and when it comes to tor forensics it helps investigator to find ram dumps, hex files, registry changes, network forensics and data base forensics. (6) The limitation of this research is that it has served a purpose of many concepts but it lacked the approach which criminals follow and their tools which would have given better understanding as a forensic dark web framework research paper. (7) this paper refers to some of the methods and tools used by the cyber criminals  to  hide  and  how they increase  their  efforts  to  prevent legal authority from obtaining proofs of their identity and location.  Finally, they have demonstrated some of the tools and software used in the detection of digital evidence. All in all, this paper explores the idea of the digital evidence detection methods that can be a beginning point for managing a  crime scene. (8) This article is not the only source of my research but I have compared and contrasted it with few more articles and came to a conclusion that it can add up to the structure of my research.(1) Citation           (2) Introduction   (3) Aims and Research   (4) Scope       (5) Usefulness       (6) Limitations   (7) Conclusions         (8) Reflection

Annotated Bibliography Article 3

(1)Dr. Digvijaysinh Rathod. Darknet Forensics. Volume 6, Issue 4, July- August 2017. ISSN 2278-6856 Retrieved: https://www.ijettcs.org/Volume6Issue4/IJETTCS-2017-07-24-29.pdf   (2) Deep web content cannot be indexed by ordinary search engine such as Google, Yahoo and Bing and darknet lies within the deep web which is beyond the reach of normal browsers. It has been intentionally hidden and it is not accessible through standard browser for many security purposes. Although it can be accessed by anyone who has The Onion Router (TOR) browser. (3) The main aim of this research is that it covers the areas of technologies used by deep web and dark net, differences between VPN and Tor, Invisible Internet project I2P, Free anonymous Internet FAI, Free net and zero net. Zeronet is based on torrent technology in combination with bitcoin encryption and nodal routing. (4) The techniques used for darknet forensics it is categorised in two categories: TOR Forensics and Bitcoin Forensics as most of the transactions in dark web occur using bitcoins. RAM forensics is one of the vital important source of evidence that is a part of volatile memory forensics and tools like Belkasoft Ram Capturer will be used to capture dump of RAM and Hex dump that will be used to view hexadecimal view of RAM dump. (5) The techniques used to derive the digital evidence of dark net forensic and registry changes that can lead to the cybercriminal. Network forensics carried by wireshark and network miner extract the provided information related to web traffic. It helped in track of bitcoin forensics as the data left by that after transaction can be used to add assist to the forensic evidence. (6) Dark Web always poses a cyber-security risk to anyone on the Internet. Though accessing the Dark Web to patrol our personal information is never advised, Limiting the sharing of personal information, staying up to date on recent cyber dangers such as ransomware, and taking steps to mitigate risk in the aftermath of high-profile data breaches are all excellent ways to take a proactive approach. (7) On the one hand, darknet has been purposefully buried within the deep web and cannot be searched by search engines; Terrorists, cybercrime criminals, extremist groups, and hate organisations have already begun to use the dark web to perpetrate cybercrime, and this trend is expected to continue. (8)  This article is not the only source of my research but I have compared and contrasted it with few more articles and came to a conclusion that it can add up to the structure of my research(1) Citation       (2) Introduction       (3) Aims and Research         (4) Scope         (5) Usefulness       (6) Limitations       (7) Conclusions         (8) Reflection

Part 2: Discussion

  1. Identify any important issue/s that you believe were not addressed (or not addressed adequately) in the literature.

The dark web, in addition to providing extreme anonymity and protection from authoritarian regimes’ monitoring, supports a developing underground economy used by skilled criminals to smuggle narcotics, stolen identities, child pornography, and other unlawful items and services. And, with untraceable cryptocurrency as the primary means of payment, global collaboration among law enforcement, financial institutions, and regulators is necessary to tighten the screws on criminal activities.

  • Explain why you view this issue/these issues as important.

Aside from illicit behaviour such as money laundering or accessing dark web markets to purchase illegal items, the dark web is also utilised for a variety of entirely legitimate objectives. In fact, despite its bad reputation, the dark web’s appeal has skyrocketed.

Following Edward Snowden’s revelations about the degree of Internet usage monitoring by the UK and US governments in 2013, interest in Tor and the hidden web skyrocketed. Following the discoveries, the number of Tor users increased from one million to an estimated six million.

Many Tor users just browse the surface web using the Tor browser, which has an interface that is quite similar to Firefox, just to name a few.

  • Discuss what you believe to be the most important lesson you have learnt as a result of your literature research.

However, monitoring these sources is difficult, and few systems provide sophisticated coverage. “Deep and black web” refers to a wide range of possible sources, including markets, restricted forums, chat applications, and pasting sites. Few firms have access to all of these sources, and even fewer have the ability to go beyond simple web scraping.

Cybercriminals will not rely on just one site, but will have a presence across several of these sites, ensuring their identity is well-known to any possible customers. However, the existence of escrow services on marketplaces offers a reasonable incentive to trade on these specific platforms. As a result, it is critical to recognise the existence of these new dark web markets.

  • Develop recommendations on how this knowledge will improve the security of your workplace.

Businesses and people may defend themselves against the complete spectrum of cyber security risks mentioned here, as well as the countless more that exist, by deploying protection. Companies that employ cyber security do not have to worry about unauthorised individuals accessing their network or data. It assists them in protecting both their customers and their workers.

Even in the few situations where security does not prevent an attack or breach, it does improve recovery time. Furthermore, businesses will frequently discover that customers and developers are more confidence in goods that have robust cyber security solutions in place.

Universal Assignment (October 2, 2023) Annotated Bibliography Assignment Solution. Retrieved from https://universalassignment.com/annotated-bibliography-assignment/.
"Annotated Bibliography Assignment Solution." Universal Assignment - October 2, 2023, https://universalassignment.com/annotated-bibliography-assignment/
Universal Assignment June 26, 2022 Annotated Bibliography Assignment Solution., viewed October 2, 2023,<https://universalassignment.com/annotated-bibliography-assignment/>
Universal Assignment - Annotated Bibliography Assignment Solution. [Internet]. [Accessed October 2, 2023]. Available from: https://universalassignment.com/annotated-bibliography-assignment/
"Annotated Bibliography Assignment Solution." Universal Assignment - Accessed October 2, 2023. https://universalassignment.com/annotated-bibliography-assignment/
"Annotated Bibliography Assignment Solution." Universal Assignment [Online]. Available: https://universalassignment.com/annotated-bibliography-assignment/. [Accessed: October 2, 2023]
Order Now
No Fields Found.
Universal Assignment (October 2, 2023) Annotated Bibliography Assignment Solution. Retrieved from https://universalassignment.com/annotated-bibliography-assignment/.
"Annotated Bibliography Assignment Solution." Universal Assignment - October 2, 2023, https://universalassignment.com/annotated-bibliography-assignment/
Universal Assignment June 26, 2022 Annotated Bibliography Assignment Solution., viewed October 2, 2023,<https://universalassignment.com/annotated-bibliography-assignment/>
Universal Assignment - Annotated Bibliography Assignment Solution. [Internet]. [Accessed October 2, 2023]. Available from: https://universalassignment.com/annotated-bibliography-assignment/
"Annotated Bibliography Assignment Solution." Universal Assignment - Accessed October 2, 2023. https://universalassignment.com/annotated-bibliography-assignment/
"Annotated Bibliography Assignment Solution." Universal Assignment [Online]. Available: https://universalassignment.com/annotated-bibliography-assignment/. [Accessed: October 2, 2023]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Categories

Get 90%* Discount on Assignment Help

Most Frequent Questions & Answers

Universal Assignment Services is the best place to get help in your all kind of assignment help. We have 172+ experts available, who can help you to get HD+ grades. We also provide Free Plag report, Free Revisions,Best Price in the industry guaranteed.

We provide all kinds of assignmednt help, Report writing, Essay Writing, Dissertations, Thesis writing, Research Proposal, Research Report, Home work help, Question Answers help, Case studies, mathematical and Statistical tasks, Website development, Android application, Resume/CV writing, SOP(Statement of Purpose) Writing, Blog/Article, Poster making and so on.

We are available round the clock, 24X7, 365 days. You can appach us to our Whatsapp number +1 (613)778 8542 or email to info@universalassignment.com . We provide Free revision policy, if you need and revisions to be done on the task, we will do the same for you as soon as possible.

We provide services mainly to all major institutes and Universities in Australia, Canada, China, Malaysia, India, South Africa, New Zealand, Singapore, the United Arab Emirates, the United Kingdom, and the United States.

We provide lucrative discounts from 28% to 70% as per the wordcount, Technicality, Deadline and the number of your previous assignments done with us.

After your assignment request our team will check and update you the best suitable service for you alongwith the charges for the task. After confirmation and payment team will start the work and provide the task as per the deadline.

Yes, we will provide Plagirism free task and a free turnitin report along with the task without any extra cost.

No, if the main requirement is same, you don’t have to pay any additional amount. But it there is a additional requirement, then you have to pay the balance amount in order to get the revised solution.

The Fees are as minimum as $10 per page(1 page=250 words) and in case of a big task, we provide huge discounts.

We accept all the major Credit and Debit Cards for the payment. We do accept Paypal also.

Popular Assignments

Foundations of Communication Assessment 2 Instructions

Discussion task (Total grade – 10%)   Process Work (Steps to complete the task) Answer on the Assessment 2 Submission Document – Do not upload this instruction document. Requirements (important elements to include) lastname_firstname_studentID_COMS_Assess 2_semester_year. Process for Assessment discussion tasks NOTE: If you do not participate in the class discussions then

Read More »

Assessment Two Dos and Don’ts (Internal)

Do: Read the assessment instructions carefully Read the marking rubric carefully Understand the question – break it down Conduct research – record the reference details Read the topic materials about communication theories, forms and factors and refer to them Contribute to the discussions in class or no marks for the

Read More »

Unpacking the Question: Assessment Two

Studying at university requires you to become familiar with strategies to un-pack or breakdown a variety of assessment questions/tasks throughout your studies.  Task Example of integrating the discussion, research and theories. In the group discussion my group members (name them) stated that an advertisement for a beauty product would most

Read More »

MGMT0001 Introduction to Commerce Assessment

MGMT0001 Introduction to Commerce Assessment 2 (worth 30%) Due date:                  2:00pm (AWST) Friday 15th September 2023 Submission:              Via Turnitin assessment submission link (see ‘Assessment 2’ folder in ‘Assessments’ section of Blackboard). Additional Instructions: Part A (42 marks) Nathan is a well-known chef with years of experience cooking various cuisines. After

Read More »

ACCT5011: Accounting Systems in the Digital Age

Practical Assignment Guide, Semester 2, 2023 Due Date for Submission: Monday 11th September 2023 at 5.00 PM Please note that the Folio Assignment for ACCT5011 Accounting Systems in the Digital Age is an individual assessment task worth 30% of your total marks in the unit. Please refer to the online

Read More »

EC229- Review session

Assume two cities, A and B, that can’t trade between them. Each city produces its own coconuts for its local market. If suddenly trade is possible then: D) As we saw in class, the new price will be somewhere between the original price 𝑃_𝐴,𝑃_𝐵. Hence it is impossible for consumers

Read More »

Computing Theory COSC

Computing Theory COSC 1107/1105 Assignment 1: Fundamentals Assessment Type Individual assignment. Submit online via Canvas → As- signments → Assignment 1. Marks awarded for meeting re- quirements as closely as possible. Clarifications/updates may be made via announcements/relevant discussion forums. Due Date Week 6, Sunday 27th August 2023, 11:59pm Marks 125

Read More »

BE279 Applied Statistics and Forecasting

Strategy, Operations, & Entrepreneurship Group Essex Business School Module Code BE279 Module Title Applied Statistics and Forecasting Assessment Type Individual Report (2,000 word) Academic Year 2022/23, Spring Term Submission Deadline Refer to FASER Task Specific Guidance Please note that: Module Learning Outcomes On successful completion of the module, students will

Read More »

Learning Design Tool: Little Learners Level 1 sounds

Learning Design Tool: Little Learners Level 1 sounds. Prepared by Sara Hart Date 30th August, 2023 (feel free to leave this date as it is the AT2 due date) Brief description of Learning Design   Chooseit Maker: Create, edit and play personalised learning activities that can be used in your

Read More »

HUMN1041 PEOPLE, PLACE AND SOCIAL DIFFERENCE ASSIGNMENT

HUMN1041 PEOPLE, PLACE AND SOCIAL DIFFERENCE ASSIGNMENT 1 TEMPLATE This assignment is made up of three (3) parts, plus a reference list and appendix. Marks are allocated for each section, as follows: – 1 mark Please ensure that you provide your answers in this template, and provide a Reference list

Read More »

Model 3 Launch in Australia

Client Information Company Name Tesla Contact Name   Email   Phone Number   Address Level 14, 15 Blue St. North Sydney, NSW 2060 Australia Ad link & image Project Information Project Title Model 3 Launch in Australia Project Description (100 words) Highlight the uniqueness of the car. Show the superior

Read More »

MKT10009 Marketing and the Consumer Experience

School of Business, Law and Entrepreneurship Assessment Task – Assignment 2  MKT10009 Marketing and the Consumer Experience Semester 2, 2023. Assessment Type Analytical Report Associated Unit Learning Outcomes (ULO’s) 2, 3, 4 Group or Individual task Individual Value (%) 25% Due Date Monday 20th September at 10:00 AET – Enterthis

Read More »

ASSIGNMENT – 1st Evaluation

ASSIGNMENT – 1st Evaluation Date of Submission- 4TH SEP 2023 25 MARKS COMPARATIVE PUBLIC LAW Q. You are the new Central Minister for Urban Development who is keen to make major Indian cities as smart cities. You visit different countries like USA, UK, European Countries, Japan and other developed countries

Read More »

Corporate & Financial Due Diligence Report

[Name of the company] Note: Students should keep in mind that application of legal provisions (including Securities Regulations) and analysis of the same is important. Merely putting the facts and figures won’t fetch even a decent mark. Note: Students should only mention the broad area of business. This part should

Read More »

ECON1000 S2 2023 – Marking Guidance and FAQs on GTP

Students will be marked on the extent to which they specifically answer the question and provide clear, logical, well-reasoned and sufficient explanations. Here is a summary breakdown of how marks are allocated in this GTP: Part 1 [15 marks] §  Providing relevant observations from the information provided in the articles

Read More »

ECON1000 S2 2023 – GTP Brief

ECON1000 S2 2023 – GTP Brief A.  Context and Overview The Game Theory Presentation (GTP) is worth 30% of the final mark. GTP is a ‘take-home’ exercise with a set of tasks to do. The GTP is based on Lecture Topics: L1 and L2. You will have twenty (21) days

Read More »

Order #35042 Human Rights Research Essay

Draft due 26th Aug 2,500 words (excluding references and bibliography) Instructions: Structure: Title – The Tigray War: A Critical Analysis of What the Future Holds for Human Rights in the Region What can be done to ensure human rights violations will cease and be prosecuted? Expand on different actors and

Read More »

PMC1000: Applied Pathology

Assessment Task Sheet: Poster Presentation Date: Thursday 31st August 2023 | Weighting: 30% Assessment Task 2 You are required to develop a handout style resource (pamphlet or brochure) on a selected pathological condition which is aimed at first year student paramedics. You will need to use high quality peer reviewed

Read More »

Detailed Information: Reflective Assignment

Indigenous Peoples, Law and Justice Detailed Information: Reflective Assignment Due Date:                   Tuesday 5th September 2023 at 4:00 pm (AWST). Marks:                       30% of the total marks for this unit. Assignment:              The assignment will comprise two questions. Students must answer all parts of both questions. Examinable topics: The cultural immersion exercise and/or

Read More »

Indigenous Peoples, Law and Justice

Indigenous Peoples, Law and Justice Reflective Assignment Questions Instructions: The assignment comprises two questions. Students must answer all parts of both questions. Question 1: The proposed Referendum Question is asking Australians whether the Voice should be established. What is meant by the Voice? In May 2019, Professor Anne Twomey, an

Read More »

Cultural immersion activity

Context of Carrolup To support fellow Australian and truth telling. Third space = a spiritual an mental place, meeting point of many cultures all over the world to communicate and feel safe to merge thought and aspects of everyone’s individual culture to create a sense of what they want the

Read More »

High-Fidelity Mockup Design for a Employer / Company  Review Platform

Demo Task: High-Fidelity Mockup Design for a Employer / Company  Review Platform Project Overview: You are tasked with designing high-fidelity mockups for a  Employer / Company  review platform that serves both employers and employees/users. The platform’s goal is to provide a space where employees can share their experiences and opinions

Read More »

IMPLEMENT AND MONITOR ENVIRONMENTALLY SUSTAINABLE WORK PRACTICES

ASSESSMENT COVER SHEET (Please ensure this cover sheet is completed and attached on top of each assessment) QUALIFICATION CODE AND TITLE:  Certificate IV in Commercial Cookery UNIT CODE: BSBSUS401               TITLE: IMPLEMENT AND MONITOR ENVIRONMENTALLY SUSTAINABLE WORK PRACTICES               Student Number   Student Name   Assessor Name   Assessment Name and

Read More »

Data Analysis and Findings

Qualitative data analysis technique called thematic analysis includes reading the data collection and looking for patterns in the meaning of the data to determine the theme. Making sense of the data is an active reflexive process in which the researcher’s personal experience is important. On Instagram, though, any company can

Read More »

PHE5STL: Systems Thinking and Leadership

Assessment 2: Complex problem briefing paper instructions and submission link PHE5STL: Systems Thinking and Leadership Assessment 2: Complex, or messy, problem briefing paper Assignment type Briefing paper/policy advising paper Weighting 20% Word count / length 1,500 words Note: The word count does not included references however does include in-text citations

Read More »

Assessment 1 Week-6: UML Modelling for a shopping mall

Assessment 1(    ) Information and Rubric Subject Code  ICT505 Subject Name  Software Development Assessment Number and Title  Assessment 1 Week-6: UML Modelling for a shopping mall Assessment Type Lab Activity Length / Duration  45 Minutes Weighting %  10% Total Marks  100 Submission Online Submission Due Date Week-6 (Sunday 23:59) Mode

Read More »

The Geopolitical, Economic and Legal Environment  

Faculty of Business and Law Assignment Brief Mode E and R Regulations Module Title: The Geopolitical, Economic and Legal Environment     Assignment Number 2 Module Code: 7010SSL   Assignment Title Macro Analysis Report Module Leader: Dr. Bentil Oduro   Assignment Credits 10           Release Date:

Read More »

Paragraph Template: TEEL Structure

 With this example from the discussion board, you can see Courtney answered the question with all four elements very clearly. This gives a coherent answer using different kinds of information and academic integrity. Bias is a natural behaviour of tendency to be in favour or against something in particular. From

Read More »

Choosing the Perfect Event Theme

Choosing the Perfect Event Theme Theme selection is crucial to creating a memorable and meaningful graduation celebration for the class. This selection should reflect their accomplishments and identities. Graduation marks the end of a long period of hard work, commitment, and personal growth.  Therefore, choosing a theme that effectively captures

Read More »

Can't Find Your Assignment?

Open chat
1
Free Assistance
Universal Assignment
Hello 👋
How can we help you?