Annotated Bibliography Assignment Solution

Part 1: Annotated Bibliography Article 1

 (1)Hatta, M. (2020). Deep web, dark web, darknet. Annals of Business Administrative Science, 2020, 19(6), 277-292. Retrieved https://www.jstage.jst.go.jp/article/abas/19/6/19_0200908a/_pdf/-char/en   (2) In this article, Masayuki Hatta review the influence of deep web, dark web, dark net on online black market and anonymous virtual currencies. He discussed the differences between the concepts of dark net and onion routing used in dark web in easy-to-understand manner. (3) The term “dark web” has recently become very popular. Unlike the world wide web where the anonymity is not guaranteed, the dark web serves a whole different power. It gives the perfect black market to sell silk, drugs, child pornography, stolen credit cards etc. This research was made with the word in mind to resolve the differences between the myths and reality of onion domain routed websites. (4) The research of Masayuki Hatta, is based on the hypothesis based on 1970s and even today as in concrete terms as IP address is not allocated to the host address is known as dark net. It provided deeper anonymous to government run institutes and political parties which required special registrations to get into the non-existing network according to the normal user. The paper also explains about dark web which is different from dark net, which is more associated with bigger anonymous bodies but dark web is quietly open for everyone with a tor browser installed on their system to connect to onion domain. (5) The article is very useful in many ways as the author described how dark net is used by army related sites which used end to end max level encryption to safe guard privacy from terrorist and information leaking. It refers that even the database is anonymous and cannot be traced to its original location. In case of dark web, the author wrote about tor browser and how it encrypts outgoing onion domains and search the dedicated onion domain’s server and retrieve the dark webpage via Node-to-node onion masking. (6) The limitation of this article was that it was limited to information related to basic and fundamental functionalities of the dark net and dark we, although it justifies the title of the article but it could have been a bit more than only how dark web and dark net is used other than talking about real events taking place in the dark web that slipped into light of FBI. (7) Thus, the author himself indicates that they only provided a simple explanation of the aspects of dark web, dark net and onion nodes, just a glimpse of what’s in the surfaces and he indicates that he wanted to change the perspective hampered by the image that these words have created. Hence, this research needs to be moved forward based on its historical and technical nature. (8)  This article is not the only source of my research but I have compared and contrasted it with few more articles and came to a conclusion that it can add up to the structure of my research.(1) Citation       (2) Introduction   (3) Aims and Research           (4) Scope               (5) Usefulness             (6) Limitations         (7) Conclusions             (8) Reflection

Annotated Bibliography Article 2

(1)May A. Alotaibi1, Mohammed A. AlZain1, Ben Soh2, Mehedi Masud1 and Jehad Al-Amri. Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection. Vol. 11, No. 3, December 2019. Retrieved: https://www.researchgate.net/publication/341113296_Forensics_Dark_Net_Forensic_ Framework_and_Tools_Used_for_Digital_Evidence_Detection   (2) Computer forensics  research is  becoming  more  crucial and vital  in developing and finding  substantial  forensic evidence which help digitally for detection  tools  to  deter  more  alike cyber-attacks.  This paper refers to the  science  of  computer  forensics,  digital evidence detection tools and dark web forensic framework. (3) The aim of this research that it goes in details regarding the computer forensic and the procedure used to recreate the past events using detection tools. It also talks about network forensic and mobile forensics and how investigators use the proper procedure to obtain legal evidence. (4) The scope of forensic evidence is huge as in today’s world everything is digitised and criminals are more on web than in real and arresting these criminals is more difficult as they are very sophisticated with their approach to crime. So dark web forensic framework assists the legal hand to become more empowering and efficient. (5) The  forensic  methods used for as per recommendation in Darknet  forensics are majorly divided into two categories: Bitcoin forensics and TOR forensics. For example winhex is a software that displays original signature files, the investigator can use Winhex to obtain the original file as evidence and when it comes to tor forensics it helps investigator to find ram dumps, hex files, registry changes, network forensics and data base forensics. (6) The limitation of this research is that it has served a purpose of many concepts but it lacked the approach which criminals follow and their tools which would have given better understanding as a forensic dark web framework research paper. (7) this paper refers to some of the methods and tools used by the cyber criminals  to  hide  and  how they increase  their  efforts  to  prevent legal authority from obtaining proofs of their identity and location.  Finally, they have demonstrated some of the tools and software used in the detection of digital evidence. All in all, this paper explores the idea of the digital evidence detection methods that can be a beginning point for managing a  crime scene. (8) This article is not the only source of my research but I have compared and contrasted it with few more articles and came to a conclusion that it can add up to the structure of my research.(1) Citation           (2) Introduction   (3) Aims and Research   (4) Scope       (5) Usefulness       (6) Limitations   (7) Conclusions         (8) Reflection

Annotated Bibliography Article 3

(1)Dr. Digvijaysinh Rathod. Darknet Forensics. Volume 6, Issue 4, July- August 2017. ISSN 2278-6856 Retrieved: https://www.ijettcs.org/Volume6Issue4/IJETTCS-2017-07-24-29.pdf   (2) Deep web content cannot be indexed by ordinary search engine such as Google, Yahoo and Bing and darknet lies within the deep web which is beyond the reach of normal browsers. It has been intentionally hidden and it is not accessible through standard browser for many security purposes. Although it can be accessed by anyone who has The Onion Router (TOR) browser. (3) The main aim of this research is that it covers the areas of technologies used by deep web and dark net, differences between VPN and Tor, Invisible Internet project I2P, Free anonymous Internet FAI, Free net and zero net. Zeronet is based on torrent technology in combination with bitcoin encryption and nodal routing. (4) The techniques used for darknet forensics it is categorised in two categories: TOR Forensics and Bitcoin Forensics as most of the transactions in dark web occur using bitcoins. RAM forensics is one of the vital important source of evidence that is a part of volatile memory forensics and tools like Belkasoft Ram Capturer will be used to capture dump of RAM and Hex dump that will be used to view hexadecimal view of RAM dump. (5) The techniques used to derive the digital evidence of dark net forensic and registry changes that can lead to the cybercriminal. Network forensics carried by wireshark and network miner extract the provided information related to web traffic. It helped in track of bitcoin forensics as the data left by that after transaction can be used to add assist to the forensic evidence. (6) Dark Web always poses a cyber-security risk to anyone on the Internet. Though accessing the Dark Web to patrol our personal information is never advised, Limiting the sharing of personal information, staying up to date on recent cyber dangers such as ransomware, and taking steps to mitigate risk in the aftermath of high-profile data breaches are all excellent ways to take a proactive approach. (7) On the one hand, darknet has been purposefully buried within the deep web and cannot be searched by search engines; Terrorists, cybercrime criminals, extremist groups, and hate organisations have already begun to use the dark web to perpetrate cybercrime, and this trend is expected to continue. (8)  This article is not the only source of my research but I have compared and contrasted it with few more articles and came to a conclusion that it can add up to the structure of my research(1) Citation       (2) Introduction       (3) Aims and Research         (4) Scope         (5) Usefulness       (6) Limitations       (7) Conclusions         (8) Reflection

Part 2: Discussion

  1. Identify any important issue/s that you believe were not addressed (or not addressed adequately) in the literature.

The dark web, in addition to providing extreme anonymity and protection from authoritarian regimes’ monitoring, supports a developing underground economy used by skilled criminals to smuggle narcotics, stolen identities, child pornography, and other unlawful items and services. And, with untraceable cryptocurrency as the primary means of payment, global collaboration among law enforcement, financial institutions, and regulators is necessary to tighten the screws on criminal activities.

  • Explain why you view this issue/these issues as important.

Aside from illicit behaviour such as money laundering or accessing dark web markets to purchase illegal items, the dark web is also utilised for a variety of entirely legitimate objectives. In fact, despite its bad reputation, the dark web’s appeal has skyrocketed.

Following Edward Snowden’s revelations about the degree of Internet usage monitoring by the UK and US governments in 2013, interest in Tor and the hidden web skyrocketed. Following the discoveries, the number of Tor users increased from one million to an estimated six million.

Many Tor users just browse the surface web using the Tor browser, which has an interface that is quite similar to Firefox, just to name a few.

  • Discuss what you believe to be the most important lesson you have learnt as a result of your literature research.

However, monitoring these sources is difficult, and few systems provide sophisticated coverage. “Deep and black web” refers to a wide range of possible sources, including markets, restricted forums, chat applications, and pasting sites. Few firms have access to all of these sources, and even fewer have the ability to go beyond simple web scraping.

Cybercriminals will not rely on just one site, but will have a presence across several of these sites, ensuring their identity is well-known to any possible customers. However, the existence of escrow services on marketplaces offers a reasonable incentive to trade on these specific platforms. As a result, it is critical to recognise the existence of these new dark web markets.

  • Develop recommendations on how this knowledge will improve the security of your workplace.

Businesses and people may defend themselves against the complete spectrum of cyber security risks mentioned here, as well as the countless more that exist, by deploying protection. Companies that employ cyber security do not have to worry about unauthorised individuals accessing their network or data. It assists them in protecting both their customers and their workers.

Even in the few situations where security does not prevent an attack or breach, it does improve recovery time. Furthermore, businesses will frequently discover that customers and developers are more confidence in goods that have robust cyber security solutions in place.

Universal Assignment (February 9, 2023) Annotated Bibliography Assignment Solution. Retrieved from https://universalassignment.com/annotated-bibliography-assignment/.
"Annotated Bibliography Assignment Solution." Universal Assignment - February 9, 2023, https://universalassignment.com/annotated-bibliography-assignment/
Universal Assignment June 26, 2022 Annotated Bibliography Assignment Solution., viewed February 9, 2023,<https://universalassignment.com/annotated-bibliography-assignment/>
Universal Assignment - Annotated Bibliography Assignment Solution. [Internet]. [Accessed February 9, 2023]. Available from: https://universalassignment.com/annotated-bibliography-assignment/
"Annotated Bibliography Assignment Solution." Universal Assignment - Accessed February 9, 2023. https://universalassignment.com/annotated-bibliography-assignment/
"Annotated Bibliography Assignment Solution." Universal Assignment [Online]. Available: https://universalassignment.com/annotated-bibliography-assignment/. [Accessed: February 9, 2023]
Order Now
No Fields Found.
Universal Assignment (February 9, 2023) Annotated Bibliography Assignment Solution. Retrieved from https://universalassignment.com/annotated-bibliography-assignment/.
"Annotated Bibliography Assignment Solution." Universal Assignment - February 9, 2023, https://universalassignment.com/annotated-bibliography-assignment/
Universal Assignment June 26, 2022 Annotated Bibliography Assignment Solution., viewed February 9, 2023,<https://universalassignment.com/annotated-bibliography-assignment/>
Universal Assignment - Annotated Bibliography Assignment Solution. [Internet]. [Accessed February 9, 2023]. Available from: https://universalassignment.com/annotated-bibliography-assignment/
"Annotated Bibliography Assignment Solution." Universal Assignment - Accessed February 9, 2023. https://universalassignment.com/annotated-bibliography-assignment/
"Annotated Bibliography Assignment Solution." Universal Assignment [Online]. Available: https://universalassignment.com/annotated-bibliography-assignment/. [Accessed: February 9, 2023]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Get 90%* Discount on Assignment Help

Most Frequent Questions & Answers

Universal Assignment Services is the best place to get help in your all kind of assignment help. We have 172+ experts available, who can help you to get HD+ grades. We also provide Free Plag report, Free Revisions,Best Price in the industry guaranteed.

We provide all kinds of assignmednt help, Report writing, Essay Writing, Dissertations, Thesis writing, Research Proposal, Research Report, Home work help, Question Answers help, Case studies, mathematical and Statistical tasks, Website development, Android application, Resume/CV writing, SOP(Statement of Purpose) Writing, Blog/Article, Poster making and so on.

We are available round the clock, 24X7, 365 days. You can appach us to our Whatsapp number +1 (613)778 8542 or email to info@universalassignment.com . We provide Free revision policy, if you need and revisions to be done on the task, we will do the same for you as soon as possible.

We provide services mainly to all major institutes and Universities in Australia, Canada, China, Malaysia, India, South Africa, New Zealand, Singapore, the United Arab Emirates, the United Kingdom, and the United States.

We provide lucrative discounts from 28% to 70% as per the wordcount, Technicality, Deadline and the number of your previous assignments done with us.

After your assignment request our team will check and update you the best suitable service for you alongwith the charges for the task. After confirmation and payment team will start the work and provide the task as per the deadline.

Yes, we will provide Plagirism free task and a free turnitin report along with the task without any extra cost.

No, if the main requirement is same, you don’t have to pay any additional amount. But it there is a additional requirement, then you have to pay the balance amount in order to get the revised solution.

The Fees are as minimum as $10 per page(1 page=250 words) and in case of a big task, we provide huge discounts.

We accept all the major Credit and Debit Cards for the payment. We do accept Paypal also.

Popular Assignments

BSBWOR502 – Lead and manage team effectiveness

BSBWOR502 – Lead and manage team effectiveness The BSBWOR502 – Lead and manage team effectiveness is a unit of the resource training. Also, it is competency training that helps aspiring team leaders build the necessary skills. Since team leadership in the workplace requires many abilities, this unit provides an approach

Read More »

BUSN 732 Writing Assignment 2

Description This assignment gives you an opportunity to read, summarize, and analyze material to be presented in a short report. Specifically, you are asked to read the five assigned articles on the Canadian Pension Plan (CPP) and make notes on the pros and cons of pension adoption discussed in each

Read More »

Assignment 2: Recorded Presentation

Weighting Percentage: 45% The purpose of this assessment task is to link an Aboriginal and / or Torres Strait Islander artwork with an issue that relates to health and wellbeing of Aboriginal and Torres Strait Islander people and explore the associated cultural and historical factors.  Each student is required to plan, create and submit

Read More »

Assignment 2 Research Proposal

ASSIGNMENT TWO GUIDE The Research Proposal This document contains everything you need to know for your second assignment. Please make sure to read this in full prior to asking any questions on Moodle. Below are the key things covered and the corresponding page numbers for easy access. Assignment 2 Research

Read More »

NUR133 ASSESSMENT 2 – Digital Presentation

NUR133 ASSESSMENT 2 – Digital Presentation (500 words + 10-minute presentation) TASK Select a service or program designed to improve the health outcomes of Aboriginal and/or Torres Strait Islander people and prepare a poster presentation that could be used to develop a brief, engaging education session for your peers. In

Read More »

MGMT2007 Organisational Behaviour

2021, MGMT2007 Organisational Behaviour 3,000-word Major Essay Pick ONE of these major essay questions to write an essay: Topic 1: Dealing with problems in an organisation under organisational change Example Scenario: Organisation X has implemented some drastic organisational changes recently. As a result, some of its employees have been laid

Read More »

NSB204 MENTAL HEALTH: Self and Others

Assessment Task 2 Assessment name: Case Study Task description: This assignment aims to help you to begin to use your professional and clinical judgement to think like nurses working in a mental health setting and/or in relation to the mental health needs of people regardless of the setting.   Choose

Read More »

MBA600 Business Report Individual written analysis

Assessment 2 Information Subject Code: MBA600 Subject Name: Capstone: Strategy Assessment Title: Assessment Type: Length: Business Report Individual written analysis 2000 words (+/- 10% allowable range) Weighting: 35% Total Marks: Submission: 100 Online Due Date: Week 10 Your task Using the same organisation from the first assessment, individually, you are

Read More »

HNN300 Child and Adolescent Health Assessment

Task 1: Written Assignment 1500 words (40%) Purpose of assessment task Childhood immunisation is a critical public health intervention that helps protect health and support normal development in infants, children, and young people. This assignment is designed to help you to analyse data, assess risk, and to develop skills to

Read More »

Importance of Aboriginal language

Due Date: 12 hrs   Format/Length: 800 words written Purpose: To explore, deconstruct and analyses the importance of Aboriginal language(s) in a contemporary context.  Task: You are to select an Aboriginal language initiative to research and develop your knowledge and understanding on the importance of keeping languages alive. This can

Read More »

Diverse Populations and Nursing Practice Reports

WORD LIMIT – 2500 – no introduction and conclusion required 7 headings required – headings, text-citations,                1200 words 1) Social determinants of health – 300 words 2) Health inequalities – 300 words 3) Health inequities – 300 words 4) Health outcomes – 300 words 1200 words 5) Application of

Read More »

Chronic Diseases

Introduction: The term “chronic disease” is increasingly often used by patients, healthcare professionals, researchers, etc. This term is defined differently by each person, and each definition encompasses a different set of medical disorders. Last but not least, the World Health Organization asserts that chronic illnesses are not contagious. They progress

Read More »

3. REPORT – Essay

STUDENT INSTRUCTIONS You are required to write a report as outlined in the assessment instruction and criteria listed below. It is important to ensure you read all aspects of the assessment topics and discuss any areas that require clarification with your assessor. Where there is a word limit it is

Read More »

Quality Areas 2 and 5 of the National Quality Standard

Access and review each of the Quality Areas in the ACECQA website, and for each of the given elements, provide one requirement that the element requires from an early years learning centre. You can access the page on the Quality Areas of the NQS using the link below: Quality Area

Read More »

National Health and Medical Research Council

Element Underpinning regulation from National Regulations Requirement of the regulation Underpinning section from the ECSNL Requirements of the section Element 2.1.1: Wellbeing and comfort         Element 2.2.1: Supervision         Element 5.1.1: Positive educator to child interactions         Element 5.2.2: Self-regulation  

Read More »

International Health and Development

Assessment Brief Module title: International Health and Development Assessment Point: First assessment point Assessment task: PART A: PowerPoint Presentation: 15 slides PART B: Word document: 1000-word count limit script for the slides Submission deadline: Please consult the VLE. Submission procedure: Please submit via the submission link on the VLE. Submission

Read More »

Outline the historical development of the policy

Outline the historical development of the policy including other linked policies highlighting key changes The Disability Support Pension is Australia’s universal health insurance scheme that guarantees all people who are unable to work due to a physical, mental, or intellectual disability financial help, which is a payment administered by Centrelink (Legal Services

Read More »

 SITHCCC027 – Prepare dishes using basic methods of cookery

Student Name  Student ID  Unit Name   SITHCCC027 – Prepare dishes using basic methods of cookery Practical Date  Submission Date  Student Declaration ☐ Student Plagiarism Declaration: By submitting this assessment to the college, I declare that this assessment task is original and has not been copied or taken from another source

Read More »

SITHCCC027 – Prepare dishes using basic methods of cookery

Student Name    Student ID   Blc01102 Unit Name   SITHCCC027 – Prepare dishes using basic methods of cookery Practical Date   07/02/2023 Submission Date    Student Declaration ☒ Student Plagiarism Declaration: By submitting this assessment to the college, I declare that this assessment task is original and has not been copied or

Read More »

Resource – Health promotion resource

ASSESSMENT:-             Resource – Health promotion resource Due date: – 10th August 2021   Length: – N/A Type of Collaboration:-                Individual Assessment Details It is the nurse’s role to provide information and education to enhance people’s control over their health (NMBA, 2016). The purpose of this assessment is to produce a

Read More »

The Aged Care Royal Commission Final Report

Discussion PAPER Assignment References 8 Australian Harvard 800 words  due 10th august The Aged Care Royal Commission Final Report titled Care, Dignity and Respect has now been released. The report calls for significant reforms to Australia’s aged care system. The final report also makes 148 recommendations for reform. In this

Read More »

HC3131 Business Research Project

Assessment Details and Submission Guidelines Trimester T2 2021 Unit Code HC3131 Unit Title Business Research Project Assessment Type 1, Topic Approval, Presentation Assessment Title Topic Approval Purpose of the assessment (with ULO Mapping) 1.Clearly identify your chosen topic, having carried out some basic review of available secondary data to secure

Read More »

Cases: Assessment Task 2

Case 1 Tina Tina is 18 years old and lives with her grandmother, older brother and two younger sisters. At present no one has a full-time job with both the grandmother and older brother currently on welfare. The two younger sisters currently enrolled in high school. Tina’s mother lives in

Read More »

NURBN3030 Supplementary Assessment

Written Case Study Report Application of health assessment, planning, implementation and evaluation of professional nursing care to a clinical deterioration patient scenario Due date:         As specified by the Course Coordinator Weighting:       Students must achieve a Pass grade (50%) for the Supplementary Assessment to achieve a Pass grade overall for the

Read More »

Competitive Advantage Video Project

Assessment 1 Information Subject Code: MBA600 Subject Name: Capstone: Strategy Assessment Title: Assessment Type: Length: Competitive Advantage Video Project Individual video recording 10 minutes (no more) Weighting: 25% Total Marks: Submission: 100 Online Due Date: Week 6 Your task Individually, you are required to record a 10-minute video, in which

Read More »

Analysis of Foundational Theory of Management

Class: Day and Time   Lecturer name   Student name / ID   ASSESSMENT 1 (30%) Written – Individual   Due:  Week 4 – Sunday, 15 August 2021 @ 23:59 Analysis of Foundational Study of Management – in the context of contemporary multidisciplinary business This assessment task is designed to address

Read More »

Relating the Class to World Events

Submit your assignment soon Even though your assignment is due on Aug 23, 4:59 PM AEST, try to submit it 1 or 2 days early if you can. Submitting early gives you a better chance of getting the peer reviews you need in time. Topic: Relating the Class to World

Read More »

Can't Find Your Assignment?

Open chat
1
Free Assistance
Universal Assignment
Hello 👋
How can we help you?