This is the mobile-friendly web version of the original article.
St. Cloud State University
theRepository at St. Cloud State
Culminating Projects in Information Assurance, Department of Information Systems
6-2021
Judith N’Gumah [Email]xc7934wv ‘at’ go.minnstate.edu
Video: St. Cloud State University (SCSU) - Campus Tour (St. Cloud MN USA)
Recommended Citation N’Gumah, Judith, “Evaluating Security in Cryptocurrency Wallets” (2021). Culminating Projects in Information Assurance. 115. https://repository.stcloudstate.edu/msia_etds/115
This Starred Paper is brought to you for free and open access by the Department of Information Systems at theRepository at St. Cloud State. It has been accepted for inclusion in Culminating Projects in Information Assurance by an authorized administrator of theRepository at St. Cloud State. For more information, please contact [email protected].
Abstract
The number of users who are interested in trading Cryptocurrency is tremendously increasing, however, some users of cryptocurrency wallets do not know how to protect themselves or how to use a wallet with high protection. The objective of this paper is to propose a framework to enable users to evaluate the security and privacy of cryptocurrencies wallets. This framework will provide users with a list of attributes that define the degree of user protection in cryptocurrency wallets. This work aims to improve security and privacy in cryptocurrency wallets and enable users of these platforms to interact safely.
Table of Contents
List of Tables
List of Figures
Chapter
- I. Introduction
- Introduction
- Problem Statement
- Nature and Significance of the Problem
- Objective of the Study
- Study Questions/Hypotheses
- Limitations of the Study
- Definition of Terms
- Summary
- II. Background and Review of Literature
- Introduction
- Background Related to the Problem
- Literature Related to the Problem
- Literature Related to the Methodology
- Summary
- III. Methodology
- Introduction
- Design of the Study
- Data Collection
- Summary
- IV. Data Presentation and Analysis
- Introduction
- Data Presentation
- Data Analysis
- Summary
- V. Results, Conclusion, and Recommendations
- Introduction
- Results
- Conclusion
- Future Work
- References
List of Tables
List of Countries Using and Owning Cryptocurrencies and the Percentages of Use
Pros and Cons on StrongCoin Table
Trezor T Wallet Advantages and Disadvantages
List of Figures
Countries Using and Owning Cryptocurrencies Percentages
OWASP loT Top Ten and Applicability of Existing Security
Paper Wallets
General Statistics of Bitcoin Talk Forum
Comparisons of Various Online Forums
Metamask Secret Phrase
Downloading Jaxx
Creating a Checksum for Every Download
Latest Features on the Application
Create a New Wallet or Restore an Older One
Two Options: Express or Custom on Jaxx
Selection of Cryptocurrencies on Jaxx
Fiat Currency on Jaxx
Backup Phrase of Jaxx
Set Up 4-digit Security Pin
Initiate the Firmware, Create a New Wallet and Backing Up the Seed
Setting Up the PIN and Naming the Device
Ledger Nano X
Data Analysis of Different Cryptocurrency Wallets
Percentages of Different Cryptocurrency Wallets
Table of contents
- Chapter I - Introduction
- Chapter II - Background and Review of Literature
- Chapter III - Methodology
- Chapter IV - Data Presentation and Analysis
- Chapter V - Results, Conclusion, and Recommendations
- References