Link Search Menu Expand Document

This is the mobile-friendly web version of the original article.

St. Cloud State University

theRepository at St. Cloud State


Culminating Projects in Information Assurance, Department of Information Systems


6-2021

Judith N’Gumah [Email]xc7934wv ‘at’ go.minnstate.edu

Video: St. Cloud State University (SCSU) - Campus Tour (St. Cloud MN USA)

Recommended Citation N’Gumah, Judith, “Evaluating Security in Cryptocurrency Wallets” (2021). Culminating Projects in Information Assurance. 115. https://repository.stcloudstate.edu/msia_etds/115

This Starred Paper is brought to you for free and open access by the Department of Information Systems at theRepository at St. Cloud State. It has been accepted for inclusion in Culminating Projects in Information Assurance by an authorized administrator of theRepository at St. Cloud State. For more information, please contact [email protected].

  1. Abstract
  2. Table of Contents
  3. List of Tables
  4. List of Figures

Abstract

The number of users who are interested in trading Cryptocurrency is tremendously increasing, however, some users of cryptocurrency wallets do not know how to protect themselves or how to use a wallet with high protection. The objective of this paper is to propose a framework to enable users to evaluate the security and privacy of cryptocurrencies wallets. This framework will provide users with a list of attributes that define the degree of user protection in cryptocurrency wallets. This work aims to improve security and privacy in cryptocurrency wallets and enable users of these platforms to interact safely.

Table of Contents

List of Tables

List of Figures

Chapter

  • I. Introduction
    • Introduction
    • Problem Statement
    • Nature and Significance of the Problem
    • Objective of the Study
    • Study Questions/Hypotheses
    • Limitations of the Study
    • Definition of Terms
    • Summary
  • II. Background and Review of Literature
    • Introduction
    • Background Related to the Problem
    • Literature Related to the Problem
    • Literature Related to the Methodology
    • Summary
  • III. Methodology
    • Introduction
    • Design of the Study
    • Data Collection
    • Summary
  • IV. Data Presentation and Analysis
    • Introduction
    • Data Presentation
    • Data Analysis
    • Summary
  • V. Results, Conclusion, and Recommendations
    • Introduction
    • Results
    • Conclusion
    • Future Work
  • References

List of Tables

  1. List of Countries Using and Owning Cryptocurrencies and the Percentages of Use

  2. Pros and Cons on StrongCoin Table

  3. Trezor T Wallet Advantages and Disadvantages

List of Figures

  1. Countries Using and Owning Cryptocurrencies Percentages

  2. OWASP loT Top Ten and Applicability of Existing Security

  3. Paper Wallets

  4. General Statistics of Bitcoin Talk Forum

  5. Comparisons of Various Online Forums

  6. Metamask Secret Phrase

  7. Downloading Jaxx

  8. Creating a Checksum for Every Download

  9. Latest Features on the Application

  10. Create a New Wallet or Restore an Older One

  11. Two Options: Express or Custom on Jaxx

  12. Selection of Cryptocurrencies on Jaxx

  13. Fiat Currency on Jaxx

  14. Backup Phrase of Jaxx

  15. Set Up 4-digit Security Pin

  16. Initiate the Firmware, Create a New Wallet and Backing Up the Seed

  17. Setting Up the PIN and Naming the Device

  18. Ledger Nano X

  19. Data Analysis of Different Cryptocurrency Wallets

  20. Percentages of Different Cryptocurrency Wallets


Table of contents