Your task in this assessment is to write a research report. This assessment is designed to demonstrate your familiarity with the underlying complex technology and industry terminology that will help you leverage the Dark Web and analyse data discovery to strengthen your security position. It will also start your journey towards gaining the knowledge to establish relevant policies and procedures based on research and fact-finding foundations. Please refer to the marking guide when preparing your report to see what criteria and standards will be used to assess your work and your

GET ALL YOUR ACADEMIC HELP AT ESSAYLINK.NET

Assessment item 4 – Research report
Value: 15%
Due Date: 03-Oct-2021 Return Date: 25-Oct-2021 Group Assessment: No
Submission method options: EASTS (online) TASK
Your task in this assessment is to write a research report. Please refer to the marking guide when preparing your report to see what criteria and standards will be used to assess your work and your progress towards Learning Outcomes 1, 3,4,5 and 6.
Research report: Total of 15 Marks Task
Your task in this assessment is to write a research report. This assessment is designed to demonstrate your familiarity with the underlying complex technology and industry terminology that will help you leverage the Dark Web and analyse data discovery to strengthen your security position. It will also start your journey towards gaining the knowledge to establish relevant policies and procedures based on research and fact-finding foundations.
Please refer to the marking guide when preparing your report to see what criteria and standards will be used to assess your work and your progress towards Learning Outcomes 1, 3, 4, 5 and 6
Your report will consist of two parts:
Part 1: Annotated Bibliography
Refer to the following resources to help you set up your annotated bibliography
What is an annotated bibliography: https://owll.massey.ac.nz/assignment-types/annotated- bibliography.php
Sample annotated bibliography: https://owll.massey.ac.nz/sample-assignments/sample-annotated- bibliography.php
A set of topics* is listed below. Choose one topic you are really interested in or is closely related to your professional practice.
You are required to conduct a literature search on a topic of your choice. You should choose at least three research papers, journal articles or conference papers). To start you off, you will include the following article.
Hatta, M. (2020). Deep web, dark web, darknet. Annals of Business Administrative Science, 2020, 19(6), 277-292. Retrieved https://www.jstage.jst.go.jp/article/abas/19/6/19_0200908a/_pdf/-char/en
Topics Set*:
Cybersecurity threat landscape during COVID-19

Malware as a Service (MaaS) during the COVID-19 pandemic. Cyber-Warfare, Attacks and Defences in the Australian Context ToR Network
Crypto market and Cryptocurrencies Dark Web forensics
The security impact of COVID-19 on social media Bay pointe Security Consulting (BPSC)
CIA (Code Injection Attack) Social engineering
Data exfiltration Network traffic analysis
* (You are allowed to select a different topic (not in the list) that is related to the subject but, in that case, please let your Lecturer/subject coordinator know prior to your assessment)
Part 2: Discussion
From your annotated bibliography answer the following discussion questions:
Identify any important issue/s that you believe were not addressed (or not addressed adequately) in the literature.
Explain why you view this issue/these issues as important.
Discuss what you believe to be the most important lesson you have learnt as a result of your literature research.
Develop recommendations on how this knowledge will improve the security of your workplace. RATIONALE
This assessment task will work towards assessing the following learning outcome/s:
be able to differentiate between theoretical and cross-disciplinary approaches to the dark web.
be able to distinguish and classify the forms of cybercriminal activity through the dark web, and the technological and social engineering methods used to undertake such crimes.
be able to investigate assumptions about the behaviour and role of offenders and victims in the dark web.
be able to analyse and assess the impact of cybercrime, along with the mitigating techniques used to defend against cybercrime.
be able to discuss, analyse and apply dark web-related research and applications. MARKING CRITERIA AND STANDARDS
Marking criteria

Assessable Components HD DI CR PS
Provide
your research report on the chosen topic with supportive literature (at least 3 sources) about the challenges, problems, relevant technologies, applications of the technologies, clarify vague areas and research questions.

Maximum marks:15 Learning outcomes- 1,6 Demonstrate an ability to survey the literature. A concise summary that is logically structured, integrates and links information into a cohesive and coherent piece of analysis and consistently uses correct to the selected topic, terminologies with sophisticated language. Demonstrate an ability to survey the literature. A concise summary that is logically structured to create a cohesive and coherent piece of analysis that consistently uses correct forensic terminologies. Demonstrates an ability to survey the literature. A concise summary that is generally logically structured to create a comprehensive but, mainly descriptive piece of analysis. Some use of correct forensic terminologies. Demonstrate an ability to survey the literature. A concise summary which is partially structured into loosely linked rudimentary sentences to create a comprehensive, descriptive piece of analysis.
Some use of correct forensic terminologies.
Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Discuss why you view this issue/these issues as important.
Maximum marks:10 Learning outcome-6 Comprehensiv e knowledge of the topic and an in- depth explanation of the issues that were not addressed. Reasonable knowledge of the topic and a comprehensiv e explanation of the issues that were not addressed; Provided factual/conceptual knowle dge of the topic and an overall explanation of the issues that were not addressed; Limited knowled ge of the topic and a basic explanation of the issues that were not addressed;

Reflect on what you believe to be the most important lesson you have learnt as a result of these discussions.
Maximum marks:10 Learning outcomes-3,6 The reflection is an in-depth analysis of the learning experience, the value of the derived learning to self and the enhancement of the student’s appreciation for the issues surrounding the topic. The reflection is a reasonable analysis of the learning experience, the value of the derived learning to self and the enhancement of the student’s appreciation for the issues surrounding the topic. The reflection is a reasonable analysis of the learning experience, with some analysis of the value of the derived learning to self. The reflection attempts a basic analysis of the learning experience, but the value of the derived learning to self is vague.
Develop recommendatio ns for the safety of IT infrastructure of the workplace
Maximum marks:10 Learning outcomes-1,5,6 Comprehensiv e knowledge and an in- depth explanation of the recommendati on of the issues with supporting evidence. Reasonable knowledge and an in- depth explanation of the recommendati on of the issues with supporting evidence. Provided factual/conceptual knowledge and an in- depth explanation of the recommendation of the issues with supporting evidence. Limited knowledge and an in-depth explanation of the recommendation of the issues with supporting evidence.
Provide references (at least three) using APA
6th referencing system including in- text citations.
Maximum marks:5 Faultless referencing, including
reference list and in-text citations.
High quality references. Very good referencing, including
reference list and
in-text citations.
High quality references. Good referencing, including reference list and in-text citations.
Good quality references. Evidence of rudimentary
referencing skills.
A mix of good and
poor quality references.
PRESENTATION

• Your submission must be in a form readable by Microsoft Word or PDF/Acrobat format and submit it via EASTS.
• Your answers to the questions should be precise but complete and informative. The guideline about the expected length of your reports in terms of the number of words is 1500 – 2000;
• A cover page (outside the page limit) must be included and should contain relevant identifying information.
REQUIREMENTS
For this assessment, you are required to use APA referencing to acknowledge the sources that you have used in preparing your assessment. Please refer to the CSU referencing guide http://student.csu.edu.au/study/referencing-at-csu. In addition, a very useful tool for you to use that demonstrates how to correctly use in-text referencing and the correct way to cite the reference in your reference list can be found at https://apps.csu.edu.au/reftool/apa-7

GET ALL YOUR ACADEMIC HELP AT ESSAYLINK.NET