Explain the key principles of cyber forensics

Assignment Help Basic Computer Science
Reference no: EM13977812

You are required to complete and submit a RESEARCH-BASED essay describing and discussing the processes AND challenges involved in  identifying and recovering digital evidence from a crime scene. This covers the theoretical part of the unit and should be based on the lecture/workshop material, this guide, the lecture notes and, most importantly your own research endeavours. In my experience, employers are looking for graduates who possess analytical, research and communication (writing) skills above and beyond the components of the degree.

The essay MUST contain the following:

- Introduction

§ Defining your scope of coverage of the essay.

- Content
§ To enhance your grades, you MUST include some description and discussion of the following in your essay:

• Describe digital evidence

• Explain the key principles of cyber forensics.

• Discuss investigation processes used to identify and recover evidence obtained from a computer for evidentiary purposes.

- Conclusion

§ This is where you summarise the facts described in the body of your essay and add your own conclusions based on what you have read. No new material should be added here.

Some important aspects of the essay are:

§ Grammar and spelling - spell check your drafts - get a friend or relative to proof-read your drafts prior to submission.

§ References that are cited in the essay - use EndNote, if you wish. This is available from the Library, free of charge. Post your draft to Turnitin (see separate  instructions) to ensure that you have not inadvertently plagiarised the work of others.

§ Bibliography of other reference material that was used but not cited.

§ Use appropriate headings and sub-headings that relate to the chosen topic. The essay should include relevant quotations and examples to support discussion within the essay.

§ The quality and breadth of references used will be taken into account and credit will be given for evidence of wide reading on the topic and use of material from a variety of sources (i.e., Learning Guide, books, journals, websites, newspapers, etc).

§ You will also be assessed on the presentation of your essay, as well as the contents. Marks will not be awarded where correct referencing is not used and will also not be awarded where the above instructions are not followed. All assertions by other authors must be correctly referenced. Please restrict your own comments to observations about the work of authors you are quoting. Your own world view and statements of unsubstantiated facts (that are not referenced) do not earn marks.

§ Please see the Online Resources page on the unit MyLMS homepage. This will provide you with some links to help you with your essay preparation and writing.

§ The University uses software called Turnitin which checks for plagiarism. Please note that when assignments are submitted electronically to Turnitin by you or your Unit Coordinator, a copy of your work is retained on the database to check collusion and future plagiarism. The University has a legal agreement with Turnitin that it will not share or reproduce student work in any form.

§ For ICT248, Assignment 01, the Research Essay must be fully referenced where the assertions of other authors are being used and must first be submitted to Turnitin before it is submitted to LMS as a completed assignment. Advice on using Turnitin can be found at

https://our.murdoch.edu.au/Educational-technologies/Turnitin/

Reference no: EM13977812

Questions Cloud

Why is the environment considered a part of sociology : Why is the environment considered a part of sociology? What effects does the environment have on societies
What additional amount of cash could the firm : Beverly Corp. had total assets of $1,200,000 in 2010 ( 80 percent of its sales are credit) The company's gross profit margin is 25 percent, its ending inventory is $150,000, and its accounts receivable balance is $90000. What additional amount of cas..
Write a paper describing the nukak society : View the film of the Nukak Hunting at http://www.survivalinternational.org/films/thehunt, then read more about the Nukak at the main webpage www.survivalinternational.org. Write a paper describing the Nukak society
What will your annual loan payment be : Bath's Bank offers you a $50,000, seven-year loan at 3.6% annual interest. What will your annual loan payment be? A bank is willing to lend me $200,000 today if I repay $16,048.52 each year (starting a year from today) for the next 20 years. What int..
Explain the key principles of cyber forensics : Explain the key principles of cyber forensics. Discuss investigation processes used to identify and recover evidence obtained from a computer for evidentiary purposes.
Probability return standard deviation beta : Project 1 Probability Return Standard Deviation Beta 50% chance 22% 12% 1.1 50% chance - 4% Project 2 Probability Return Standard Deviation Beta 30% chance 36% 19.5% 0.8 40% chance 10.5% 30% chance - 20% Project 3 Project 2 Project 1 Either Project 2..
What angle does fr make with the positive x axis : What angle does Fr make with the positive x axis? Express your answer in degrees to two significant figures. What is the magnitude of the block's acceleration vector, a?
American with disabilities act - what ada entails : From the list below, pick a topic for the Assignment. Create a PowerPoint presentation that addresses the topic you have chosen. American with Disabilities Act - what ADA entails, how to implement it, examples of accommodations etc
Debt to purchase new equipment for a surgical unit : A competitive hospital maintains current equipment and purchases new in order to stay current with the latest technology. If you were evaluating the capital budget performance of a hospital what factors would you consider justifying taking on more de..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Significant factors contributing to mmcc-s success

Write down most significant factors contributing to MMCC's success with its new, secure, self-managed network? Describe the reasons for your choices.

  International standards organization

As the CIO of a company engaged in business today, one of the main areas of focus is data protection. Discuss the key data protection points that must be taken into consideration prior to a strategy plan and policy being established for a company

  Classify each of the following occurrences as an incident

Classify each of the following occurrences as an incident or disaster. If an occurrence is a disaster, determine whether or not business continuity plans would be called into play.

  Recognize the make and model of one 1 laser printer and one

identify the make and model of one 1 laser printer and one 1 inkjet printer that are similarly priced. evaluate the

  The majority of the court of appeal in daniels v anderson

What were the facts, the decision, and the reasoning of the majority of the Court of Appeal in Daniels v Anderson (the AWA case)

  Questions based on computer science

Which of these statements are true, for propositional logic? (In an exam you would have to justify your answers). A. If a formula is not satisfiable then it is not valid B. X is not satisfiable if and only if ¬X is valid C. If a formula is not valid ..

  Calculate the sample size

Calculate the sample size needed given these factors: Calculate the sample size needed given these factors:

  Who are getting advantages from piracy robberies

Why are (were) pirates difficult to eliminate? What to you believe about pirates as moder-day Robin Hoods? Who are getting advantages from piracy robberies?

  Why are they both important to game development explain

In an array of characters we saw that NULL is important in defining where the end of the string is. As we keep looking further and further into strings (both array and string) why is NULL important? With two different types of NULL, why are they both..

  Characteristics of professionals collapse

How might definitions of plagiarism vary across cultures and Characteristics of professionals Collapse

  Evaluate ethical issues faced by technology companies

Support your paper with a minimum of five (5) scholarly resources. In addition to these specified resources, other appropriate scholarly resources, including older articles, may be included.

  Write a program that takes an integer on the command line

Write a program that takes an integer on the command line, checks that it is not negative or bigger than 200 (in which case a suitable message should be printed and no computation performed) and then prints it out followed by every number

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd