Annotated Bibliography Assignment Solution

Part 1: Annotated Bibliography Article 1

 (1)Hatta, M. (2020). Deep web, dark web, darknet. Annals of Business Administrative Science, 2020, 19(6), 277-292. Retrieved https://www.jstage.jst.go.jp/article/abas/19/6/19_0200908a/_pdf/-char/en   (2) In this article, Masayuki Hatta review the influence of deep web, dark web, dark net on online black market and anonymous virtual currencies. He discussed the differences between the concepts of dark net and onion routing used in dark web in easy-to-understand manner. (3) The term “dark web” has recently become very popular. Unlike the world wide web where the anonymity is not guaranteed, the dark web serves a whole different power. It gives the perfect black market to sell silk, drugs, child pornography, stolen credit cards etc. This research was made with the word in mind to resolve the differences between the myths and reality of onion domain routed websites. (4) The research of Masayuki Hatta, is based on the hypothesis based on 1970s and even today as in concrete terms as IP address is not allocated to the host address is known as dark net. It provided deeper anonymous to government run institutes and political parties which required special registrations to get into the non-existing network according to the normal user. The paper also explains about dark web which is different from dark net, which is more associated with bigger anonymous bodies but dark web is quietly open for everyone with a tor browser installed on their system to connect to onion domain. (5) The article is very useful in many ways as the author described how dark net is used by army related sites which used end to end max level encryption to safe guard privacy from terrorist and information leaking. It refers that even the database is anonymous and cannot be traced to its original location. In case of dark web, the author wrote about tor browser and how it encrypts outgoing onion domains and search the dedicated onion domain’s server and retrieve the dark webpage via Node-to-node onion masking. (6) The limitation of this article was that it was limited to information related to basic and fundamental functionalities of the dark net and dark we, although it justifies the title of the article but it could have been a bit more than only how dark web and dark net is used other than talking about real events taking place in the dark web that slipped into light of FBI. (7) Thus, the author himself indicates that they only provided a simple explanation of the aspects of dark web, dark net and onion nodes, just a glimpse of what’s in the surfaces and he indicates that he wanted to change the perspective hampered by the image that these words have created. Hence, this research needs to be moved forward based on its historical and technical nature. (8)  This article is not the only source of my research but I have compared and contrasted it with few more articles and came to a conclusion that it can add up to the structure of my research.(1) Citation       (2) Introduction   (3) Aims and Research           (4) Scope               (5) Usefulness             (6) Limitations         (7) Conclusions             (8) Reflection

Annotated Bibliography Article 2

(1)May A. Alotaibi1, Mohammed A. AlZain1, Ben Soh2, Mehedi Masud1 and Jehad Al-Amri. Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection. Vol. 11, No. 3, December 2019. Retrieved: https://www.researchgate.net/publication/341113296_Forensics_Dark_Net_Forensic_ Framework_and_Tools_Used_for_Digital_Evidence_Detection   (2) Computer forensics  research is  becoming  more  crucial and vital  in developing and finding  substantial  forensic evidence which help digitally for detection  tools  to  deter  more  alike cyber-attacks.  This paper refers to the  science  of  computer  forensics,  digital evidence detection tools and dark web forensic framework. (3) The aim of this research that it goes in details regarding the computer forensic and the procedure used to recreate the past events using detection tools. It also talks about network forensic and mobile forensics and how investigators use the proper procedure to obtain legal evidence. (4) The scope of forensic evidence is huge as in today’s world everything is digitised and criminals are more on web than in real and arresting these criminals is more difficult as they are very sophisticated with their approach to crime. So dark web forensic framework assists the legal hand to become more empowering and efficient. (5) The  forensic  methods used for as per recommendation in Darknet  forensics are majorly divided into two categories: Bitcoin forensics and TOR forensics. For example winhex is a software that displays original signature files, the investigator can use Winhex to obtain the original file as evidence and when it comes to tor forensics it helps investigator to find ram dumps, hex files, registry changes, network forensics and data base forensics. (6) The limitation of this research is that it has served a purpose of many concepts but it lacked the approach which criminals follow and their tools which would have given better understanding as a forensic dark web framework research paper. (7) this paper refers to some of the methods and tools used by the cyber criminals  to  hide  and  how they increase  their  efforts  to  prevent legal authority from obtaining proofs of their identity and location.  Finally, they have demonstrated some of the tools and software used in the detection of digital evidence. All in all, this paper explores the idea of the digital evidence detection methods that can be a beginning point for managing a  crime scene. (8) This article is not the only source of my research but I have compared and contrasted it with few more articles and came to a conclusion that it can add up to the structure of my research.(1) Citation           (2) Introduction   (3) Aims and Research   (4) Scope       (5) Usefulness       (6) Limitations   (7) Conclusions         (8) Reflection

Annotated Bibliography Article 3

(1)Dr. Digvijaysinh Rathod. Darknet Forensics. Volume 6, Issue 4, July- August 2017. ISSN 2278-6856 Retrieved: https://www.ijettcs.org/Volume6Issue4/IJETTCS-2017-07-24-29.pdf   (2) Deep web content cannot be indexed by ordinary search engine such as Google, Yahoo and Bing and darknet lies within the deep web which is beyond the reach of normal browsers. It has been intentionally hidden and it is not accessible through standard browser for many security purposes. Although it can be accessed by anyone who has The Onion Router (TOR) browser. (3) The main aim of this research is that it covers the areas of technologies used by deep web and dark net, differences between VPN and Tor, Invisible Internet project I2P, Free anonymous Internet FAI, Free net and zero net. Zeronet is based on torrent technology in combination with bitcoin encryption and nodal routing. (4) The techniques used for darknet forensics it is categorised in two categories: TOR Forensics and Bitcoin Forensics as most of the transactions in dark web occur using bitcoins. RAM forensics is one of the vital important source of evidence that is a part of volatile memory forensics and tools like Belkasoft Ram Capturer will be used to capture dump of RAM and Hex dump that will be used to view hexadecimal view of RAM dump. (5) The techniques used to derive the digital evidence of dark net forensic and registry changes that can lead to the cybercriminal. Network forensics carried by wireshark and network miner extract the provided information related to web traffic. It helped in track of bitcoin forensics as the data left by that after transaction can be used to add assist to the forensic evidence. (6) Dark Web always poses a cyber-security risk to anyone on the Internet. Though accessing the Dark Web to patrol our personal information is never advised, Limiting the sharing of personal information, staying up to date on recent cyber dangers such as ransomware, and taking steps to mitigate risk in the aftermath of high-profile data breaches are all excellent ways to take a proactive approach. (7) On the one hand, darknet has been purposefully buried within the deep web and cannot be searched by search engines; Terrorists, cybercrime criminals, extremist groups, and hate organisations have already begun to use the dark web to perpetrate cybercrime, and this trend is expected to continue. (8)  This article is not the only source of my research but I have compared and contrasted it with few more articles and came to a conclusion that it can add up to the structure of my research(1) Citation       (2) Introduction       (3) Aims and Research         (4) Scope         (5) Usefulness       (6) Limitations       (7) Conclusions         (8) Reflection

Part 2: Discussion

  1. Identify any important issue/s that you believe were not addressed (or not addressed adequately) in the literature.

The dark web, in addition to providing extreme anonymity and protection from authoritarian regimes’ monitoring, supports a developing underground economy used by skilled criminals to smuggle narcotics, stolen identities, child pornography, and other unlawful items and services. And, with untraceable cryptocurrency as the primary means of payment, global collaboration among law enforcement, financial institutions, and regulators is necessary to tighten the screws on criminal activities.

  • Explain why you view this issue/these issues as important.

Aside from illicit behaviour such as money laundering or accessing dark web markets to purchase illegal items, the dark web is also utilised for a variety of entirely legitimate objectives. In fact, despite its bad reputation, the dark web’s appeal has skyrocketed.

Following Edward Snowden’s revelations about the degree of Internet usage monitoring by the UK and US governments in 2013, interest in Tor and the hidden web skyrocketed. Following the discoveries, the number of Tor users increased from one million to an estimated six million.

Many Tor users just browse the surface web using the Tor browser, which has an interface that is quite similar to Firefox, just to name a few.

  • Discuss what you believe to be the most important lesson you have learnt as a result of your literature research.

However, monitoring these sources is difficult, and few systems provide sophisticated coverage. “Deep and black web” refers to a wide range of possible sources, including markets, restricted forums, chat applications, and pasting sites. Few firms have access to all of these sources, and even fewer have the ability to go beyond simple web scraping.

Cybercriminals will not rely on just one site, but will have a presence across several of these sites, ensuring their identity is well-known to any possible customers. However, the existence of escrow services on marketplaces offers a reasonable incentive to trade on these specific platforms. As a result, it is critical to recognise the existence of these new dark web markets.

  • Develop recommendations on how this knowledge will improve the security of your workplace.

Businesses and people may defend themselves against the complete spectrum of cyber security risks mentioned here, as well as the countless more that exist, by deploying protection. Companies that employ cyber security do not have to worry about unauthorised individuals accessing their network or data. It assists them in protecting both their customers and their workers.

Even in the few situations where security does not prevent an attack or breach, it does improve recovery time. Furthermore, businesses will frequently discover that customers and developers are more confidence in goods that have robust cyber security solutions in place.

Universal Assignment (April 20, 2024) Annotated Bibliography Assignment Solution. Retrieved from https://universalassignment.com/annotated-bibliography-assignment/.
"Annotated Bibliography Assignment Solution." Universal Assignment - April 20, 2024, https://universalassignment.com/annotated-bibliography-assignment/
Universal Assignment June 26, 2022 Annotated Bibliography Assignment Solution., viewed April 20, 2024,<https://universalassignment.com/annotated-bibliography-assignment/>
Universal Assignment - Annotated Bibliography Assignment Solution. [Internet]. [Accessed April 20, 2024]. Available from: https://universalassignment.com/annotated-bibliography-assignment/
"Annotated Bibliography Assignment Solution." Universal Assignment - Accessed April 20, 2024. https://universalassignment.com/annotated-bibliography-assignment/
"Annotated Bibliography Assignment Solution." Universal Assignment [Online]. Available: https://universalassignment.com/annotated-bibliography-assignment/. [Accessed: April 20, 2024]
Order Now
No Fields Found.
Universal Assignment (April 20, 2024) Annotated Bibliography Assignment Solution. Retrieved from https://universalassignment.com/annotated-bibliography-assignment/.
"Annotated Bibliography Assignment Solution." Universal Assignment - April 20, 2024, https://universalassignment.com/annotated-bibliography-assignment/
Universal Assignment June 26, 2022 Annotated Bibliography Assignment Solution., viewed April 20, 2024,<https://universalassignment.com/annotated-bibliography-assignment/>
Universal Assignment - Annotated Bibliography Assignment Solution. [Internet]. [Accessed April 20, 2024]. Available from: https://universalassignment.com/annotated-bibliography-assignment/
"Annotated Bibliography Assignment Solution." Universal Assignment - Accessed April 20, 2024. https://universalassignment.com/annotated-bibliography-assignment/
"Annotated Bibliography Assignment Solution." Universal Assignment [Online]. Available: https://universalassignment.com/annotated-bibliography-assignment/. [Accessed: April 20, 2024]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Categories

Get 90%* Discount on Assignment Help

Most Frequent Questions & Answers

Universal Assignment Services is the best place to get help in your all kind of assignment help. We have 172+ experts available, who can help you to get HD+ grades. We also provide Free Plag report, Free Revisions,Best Price in the industry guaranteed.

We provide all kinds of assignmednt help, Report writing, Essay Writing, Dissertations, Thesis writing, Research Proposal, Research Report, Home work help, Question Answers help, Case studies, mathematical and Statistical tasks, Website development, Android application, Resume/CV writing, SOP(Statement of Purpose) Writing, Blog/Article, Poster making and so on.

We are available round the clock, 24X7, 365 days. You can appach us to our Whatsapp number +1 (613)778 8542 or email to info@universalassignment.com . We provide Free revision policy, if you need and revisions to be done on the task, we will do the same for you as soon as possible.

We provide services mainly to all major institutes and Universities in Australia, Canada, China, Malaysia, India, South Africa, New Zealand, Singapore, the United Arab Emirates, the United Kingdom, and the United States.

We provide lucrative discounts from 28% to 70% as per the wordcount, Technicality, Deadline and the number of your previous assignments done with us.

After your assignment request our team will check and update you the best suitable service for you alongwith the charges for the task. After confirmation and payment team will start the work and provide the task as per the deadline.

Yes, we will provide Plagirism free task and a free turnitin report along with the task without any extra cost.

No, if the main requirement is same, you don’t have to pay any additional amount. But it there is a additional requirement, then you have to pay the balance amount in order to get the revised solution.

The Fees are as minimum as $10 per page(1 page=250 words) and in case of a big task, we provide huge discounts.

We accept all the major Credit and Debit Cards for the payment. We do accept Paypal also.

Popular Assignments

Assignment: Implement five dangerous software errors

Due: Monday, 6 May 2024, 3:00 PM The requirements for assessment 1: Too many developers are prioritising functionality and performance over security. Either that, or they just don’t come from a security background, so they don’t have security in mind when they are developing the application, therefore leaving the business

Read More »

LNDN08003 DATA ANALYTICS FINAL PROJECT

Business School                                                                 London campus Session 2023-24                                                                   Trimester 2 Module Code: LNDN08003 DATA ANALYTICS FINAL PROJECT Due Date: 12th APRIL 2024 Answer ALL questions. LNDN08003–Data Analytics Group Empirical Research Project Question 2-The project (2500 maximum word limit) The datasets for this assignment should be downloaded from the World Development Indicators (WDI)

Read More »

Microprocessor Based Systems: Embedded Burglar Alarm System

ASSIGNMENT BRIEF 2023/24 Microprocessor Based Systems   Embedded Burglar Alarm System Learning Outcomes This assignment achieves the following learning outcomes:   LO 2 -Use software for developing embedded systems in ‘C’ and testing microcontroller systems including the use of design tools such as Integrated Development Environments and In Circuit Debugger.

Read More »

Imagine you are an IT professional and your manager asked you to give a presentation about various financial tools used to help with decisions for investing in IT and/or security

Part 1, scenario: Imagine you are an IT professional and your manager asked you to give a presentation about various financial tools used to help with decisions for investing in IT and/or security. The presentation will be given to entry-level IT and security employees to understand financial investing. To simulate

Read More »

DX5600 Digital Artefact and Research Report

COLLEGE OF ENGINEERING, DESIGN AND PHYSICAL SCIENCES BRUNEL DESIGN SCHOOL DIGITAL MEDIA MSC DIGITAL DESIGN AND BRANDING MSC DIGITAL DESIGN (3D ANIMTION) MSC DIGITAL DESIGN (MOTION GRAPHICS) MSC DIGITAL DESIGN (IMMERSIVE MIXED REALITY) DIGITAL ARTEFACT AND RESEARCH REPORT                                                                 Module Code: DX5600 Module Title: MSc Dissertation Module Leader: XXXXXXXXXXXXXXXXX Assessment Title:

Read More »

Bsc Public Health and Health Promotion (Top up) LSC LONDON

Health and Work Assignment Brief.                 Assessment brief: A case study of 4,000 words (weighted at 100%) Students will present a series of complementary pieces of written work that:   a) analyse the key workplace issues; b) evaluate current or proposed strategies for managing them from a public health/health promotion perspective

Read More »

6HW109 Environmental Management and Sustainable Health

ASSESSMENT BRIEF MODULE CODE: 6HW109 MODULE TITLE: Environmental Management and Sustainable Health MODULE LEADER: XXXXXXXXX ACADEMIC YEAR: 2022-23 1        Demonstrate a critical awareness of the concept of Environmental Management linked to Health 2        Critically analyse climate change and health public policies. 3        Demonstrate a critical awareness of the concept of

Read More »

PROFESSIONAL SECURE NETWORKS COCS71196

PROFESSIONAL SECURE NETWORKS– Case Study Assessment Information Module Title: PROFESSIONAL SECURE NETWORKS   Module Code: COCS71196 Submission Deadline: 10th May 2024 by 3:30pm Instructions to candidates This assignment is one of two parts of the formal assessment for COCS71196 and is therefore compulsory. The assignment is weighted at 50% of

Read More »

CYBERCRIME FORENSIC ANALYSIS – COCS71193

CYBERCRIME FORENSIC ANALYSIS – COCS71193 Assignment Specification Weighted at 100% of the module mark. Learning Outcomes being assessed by this portfolio. Submission Deadline: Monday 6th May 2024, 1600Hrs. Requirements & Marking Scheme General Guidelines: This is an individual assessment comprised of four parts and is weighted at 100% of the

Read More »

Social Media Campaigns (SMC) Spring 2024 – Winter 2024

Unit: Dynamic Websites Assignment title: Social Media Campaigns (SMC) Spring 2024 – Winter 2024 Students must not use templates that they have not designed or created in this module assessment. This includes website building applications, free HTML5 website templates, or any software that is available to them to help with

Read More »

ABCJ3103 NEWS WRITING AND REPORTING Assignment

ASSIGNMENT/ TUGASAN _________________________________________________________________________ ABCJ3103 NEWS WRITING AND REPORTING PENULISAN DAN PELAPORAN BERITA JANUARY 2024 SEMESTER SPECIFIC INSTRUCTION / ARAHAN KHUSUS Jawab dalam bahasa Melayu atau bahasa Inggeris. Jumlah patah perkataan: 2500 – 3000 patah perkataan tidak termasuk rujukan. Hantar tugasan SEKALI sahaja dalam PELBAGAIfail. Tugasan ini dihantar secara ONLINE. Tarikh

Read More »

ABCM2103 INFORMATION TECHNOLOGY, MEDIA AND SOCIETY Assignment

ASSIGNMENT/ TUGASAN _________________________________________________________________________ ABCM2103 INFORMATION TECHNOLOGY, MEDIA AND SOCIETY TEKNOLOGI MAKLUMAT, MEDIA DAN MASYARAKAT JANUARY 2021 SPECIFIC INSTRUCTION / ARAHAN KHUSUS Jawab dalam Bahasa Melayu atau Bahasa Inggeris. Jumlah patah perkataan : 2500 – 3000 patah perkataan tidak termasuk rujukan. Hantar tugasan SEKALI sahaja dalam SATU fail. Tugasan ini dihantar

Read More »

ABCR3203 COMMUNICATION LAW Assignment

ASSIGNMENT/ TUGASAN _________________________________________________________________________ ABCR3203 COMMUNICATION LAW UNDANG-UNDANG KOMUNIKASI JANUARY 2024 SEMESTER SPECIFIC INSTRUCTION / ARAHAN KHUSUS Jawab dalam Bahasa Melayu atau Bahasa Inggeris. Jumlah patah perkataan : 2500 – 3000 patah perkataan tidak termasuk rujukan. Hantar tugasan SEKALI sahaja dalam SATU fail. Tugasan ini dihantar secara ONLINE. Tarikh penghantaran        :

Read More »

ORGANISATIONAL STRATEGY PLANNING AND MANAGEMENT ASSIGNMENT

POSTGRADUATE DIPLOMA IN BUSINESS MANAGEMENT ORGANISATIONAL STRATEGY PLANNING AND MANAGEMENT ASSIGNMENT NOTE: At postgraduate level, you are expected to substantiate your answers with evidence from independent research. INTRODUCTION TO THE ASSIGNMENT • This assignment consists of FOUR compulsory questions. Please answer all of them. • When you answer, preferably use

Read More »

Solution: Scenario 1, Mirror therapy in patients post stroke

Title: Scenario 1, Mirror therapy in patients post stroke Part 1 : Summary Ramachandran and colleagues developed mirror therapy to treat amputees’ agony from phantom limbs. Patients were able to feel their amputated limb without experiencing any pain by presenting them a mirror image of their healthy arm. Since then,

Read More »

Solution: Exploring the Dominance of Silence

Slide 1: Title – Exploring the Dominance of Silence The title, “Exploring the Dominance of Silence,” sets the stage for a deep dive into the portrayal of silence in Philip K. Dick’s “Do Androids Dream of Electric Sheep?” Our presentation will dissect the literary techniques used by the author to

Read More »

Solution: Assessment: Critical Reflection S2 2023

The policies that hampered the cultural survival of Indigenous groups have a major effect on their health (Coffin, 2007). Cultural isolation can cause an identity crisis and a sense of loss, which can exacerbate mental health problems. Indigenous people have greater rates of chronic illness and impairment due to historical

Read More »

Solution: The Market – Product and Competition Analysis

Section 1: The Market – Product and Competition Analysis Industry and Competition Analysis: The baking mix market is very competitive, but My Better Batch is entering it anyhow. The prepackaged baking mixes sold in this market allow busy people to have bakery-quality products on the table quickly without sacrificing quality

Read More »

Solution: PDCA model for Riot

Student Name: Student ID: University Name: Date: Learning Outcome 1: Engage actively in recognizing a new product/service for Riot and detect the vital tasks required for its effective growth. In this comprehensive learning outcome, Riot’s progress towards innovation superiority is characterized by a deliberate scheme that draws on components from

Read More »

Solution: EDEN 100 – ASSIGNMENT 1

Part 1: Reflections on the Register Variables Use the questions in Column 1 and analyse the sample oral interactions provided under the assessment tile. The transcript for Viv’s conversation is provided on pages 4-5. Probe Questions  Link to readings and theory Interaction 1 Interaction 2 PART 1 – ANALYSING THE

Read More »

Solution: TCP/IP Questions

Table of Contents Question 1. 1 1. IPSec datagram protocol 1 2. Source and destination IP addresses in original IP datagram.. 1 3. Source and destination IP addresses in new IP header 2 4. Protocol number in the protocol field of the new IP header 2 5. Information and Bob.

Read More »

Solution: Fundamentals of Employment Assistance Program and Counselling

ASSESSMENT 3 Subject: Fundamentals of Employment Assistance Program and Counselling Case study Question 1 a)     Major Issues for Theo that could be addressed in counselling: b)    Issues to Address First in Short-Term Counselling:             The cognitive processes of memory, focus, and decision-making are all impacted by insufficient sleep. Such cognitive

Read More »

Solution: EQUITY AND INCLUSION IN EARLY CHILDHOOD IN AUSTRALIA

Written Policy Recommendation Name: Student Number: Email: Date: Introduction: The early years of a child’s life are important for their holistic development, making early childhood education a foundation for their future accomplishments. Nevertheless, guaranteeing equality and inclusion in early childhood education stays a major problem in our society. This policy

Read More »

Solution: Report Health Issue

Table of Contents Executive Summary                                                                                                   3 Introduction                                                                                                                5 Examination of the Chosen Health Issue in the Context of Lambeth                        5 Application of Health Inequality Framework and Analysis of Determinants: Psychotropic Drug Use in Lambeth                                                                           6 Exploration and Discussion of Strategies to Manage Psychotropic Drug Use in Lambeth                                                                                                                        7 Conclusion                                                                                                                  8

Read More »

Solution: Section III: Marketing

Section III: Marketing Channels for Advertising: Understanding Who Makes Baking Product Purchase Decisions is Crucial for My Better Batch’s Business Success (Sampson et al, 2017). Home bakers may make up a disproportionate share of the decision-makers in the UK. As a result, My Better Batch has to target people, especially

Read More »

Can't Find Your Assignment?

Open chat
1
Free Assistance
Universal Assignment
Hello 👋
How can we help you?