Reference no: EM133659300 , Length: 3000 Words
Digital Forensics - Master of Information Technology and Systems
Learning outcome 1: reflect on and synthesise complex issues, problems, concepts and theories relating to securing diverse devices on non-wired networks;
Learning outcome 2: apply specialist knowledge and skills in enabling secure use of wireless, mobile and IoT networks to mitigate potential security breaches;
Learning outcome 3: critically examine cyber security breaches using forensic tools, processes, and procedures
Task description:
This report has three questions to be completed. Compile your answers into a single MS Word or .pdf document and then upload it to the University portal. Your Report MUST include your Name, Student Number and course code in the header of each page and include references and a bibliography where appropriate. When submitting your document/s, the file will be submitted to Turnitin for originality checking. Therefore, it is important to include necessary references and bibliographies in your submission.
Task details:
You need to read the scenario and provide your answer to the list of questions.
Question 1 750-words maximum (CLO 2 and 4)
A real-world investigation scenario at ALDI retailer ALDI retailer has recently realized anomalies in its orders that are made by customers doing online shopping. It has undertaken an initial check of system log files, and there are a number of suspicious entries and IP addresses with a large amount of product data being sent outside the ALDI software system firewall. ALDI has also recently received a number of customer complaints saying that there is often a strange message displayed during online shopping and order processing, and they are often re-directed to a payment page that does not look legitimate. Your job is to conduct a digital forensic analysis process and data acquisition which relying on adopting a set of sophisticated tools.
Read the file named "Digital Forensic tools-Recent advances and enhancing the status quo - supplementary material" which is under Module 6. (File is attached in this email) A list of data acquisition tools is discussed in this file. Note that some of these tools may have been already discussed or referred to in Module 6.
Select 4 tools based on your interest. Then...
Write a brief introduction/describe (maximum 5 lines) of these tools and highlight at least 3 key features for each.
Write an analyse and discuss how these 4 tools can help you to conduct the whole investigation process including the identification of digital evidence and data acquisition.
Question 2 600 word maximum (CLO 2 and 3)
Consider the real-world scenario described in Question 1. Read the file named "Data acquisition process model" which is under Module 4 (File is attached in this email). In particular, read carefully Figure 2 (UML activity diagram of the acquisition process). Write a report, placing yourself in the shoes of a digital forensic detective for the local police office. Detail in the report, the steps that you are taken to gather evidence from IT support of ALDI, ALDI systems, and customers.
In addition, explain 3 different obstacles that might you expect to encounter during the investigation case.
Question 3 300 word maximum (CLO 4)
The file named "Explainable artificial intelligence for digital forensics.pdf"(File is attached to this email), available under Assessment -> Written Report folder, explores the potential of Explainable Artificial Intelligence (XAI) to enhance triage and analysis of digital forensic evidence, using examples of the current state of the art as a starting point. The .pdf provides both practical and novel ideas as well as controversial points for leveraging XAI to improve the efficacy of digital forensic analysis. Read this file completely and read carefully in particular the case study Section 4.
Based on your understanding and lecture PowerPoints and relevant sources in the Study Desk during the course so far, provide 5 example challenges and 5 example advantages in using XAI to conduct digital forensic analysis.
Can a member of an llc be held liable for harm caused
: Can a member of an LLC be held liable for harm caused by lead-based paint pursuant to a housing code provision that imposes liability on any individual?
|
Policyholder claim for loss of outbuilding will be covered
: Explain, with justification, whether the policyholder's claim for the loss of the outbuilding will be covered.
|
What disruption and challenge facing supply chain management
: What are disruptions and challenges facing supply chain management? Current and future challenges and opportunities. Processes affected by these challenges.
|
Most debated polices of the criminal justice system
: Capital punishment is one of the most debated polices of the criminal justice system. Using constitutional, humanitarian, or administrative arguments,
|
Apply specialist knowledge and skills in enabling secure
: Apply specialist knowledge and skills in enabling secure use of wireless, mobile and IoT networks to mitigate potential security breaches
|
Would lyle claim of racial discrimination be for intention
: Would Lyle's claim of racial discrimination be for intentional (disparate-treatment) or unintentional (disparate-impact) discrimination? Explain.
|
Explore how real people access health care
: HSM 410- The goal of this homework is for each student to explore how real people access health care and how this might have changed over time.
|
Contract for holiday rental cottage booking
: Explain, with justification, whether Sarah can cancel the contract for the holiday rental cottage booking and obtain a refund.
|
What specific national benchmark and best policing practices
: What specific national benchmarks and best policing practices should be established for federal, state, local, and tribal law enforcement agencies?
|