FIT3168 IT Forensics Assignment Problem

Assignment Help Other Subject
Reference no: EM132390015 , Length: word count:2000

FIT3168 IT Forensics Assignment - Monash University, Australia

A. CASE REPORTING -

1. CASE REPORT SUMMARY

Now that you have created a fictitious criminal case on your Assignment 1 of the unit, you are required to write a computer forensics report based on the "fictional" investigation and findings (see below).

The report will also be read by those people who are not necessarily having an in-depth technical background in IT and/or computer forensics. This should be considered when writing your report.

The report should include:

1. Case Information

2. Summary

3. Findings

4. Conclusion

5. Word list (glossary)

You can find the report examples/templates on Appendix C (page 215-218) of "Fundamentals of Digital Forensics: Theory, Methods, and Real-Life Applications?" by Joakim Kavrestad.

2. REPORT APPENDICES AND CODIFICATION

You should attach all relevant findings as your appendices. Note that you are not required to attach the real artifacts and evidences; creating and providing fictional screenshots, tables, hash lists can be used to represent the artifacts and evidences.

There are two options you can choose to complete this part. NOTE: you MUST state your option in the submission.

OPTION X: Generate a set of fictional forensic artifacts on your own based on the fictional story you wrote on your Assignment 1. The forensic artefacts should be reasonably closely related to the case, but it does not need to be overly complicated and should not be offensive (no illegal material is allowed). Note that the presented artefacts should be forensically sound. This means that you also need to attach proofs of integrity and originality of the artefacts.

OPTION Y: Create a fictional story based on the image file assigned to you on Assignment 1, as if the image file was a part of your fictional story. Utilize FTK's reporting features to assist you in presenting the related forensic artifacts you discover on the image file to support your report. Refer to Week 9 tutorial about finding related artefacts and generating reports. The FTK report may contain system information, bookmarks, and other related information to support your case.

B. DIGITAL FORENSIC ACADEMIC PAPER

1. CHOOSING A PAPER

You are required to take at least one published peer-reviewed academic paper/article. The paper needs to be published in a good conference venue or journal. The paper needs to be either published in recent years or fundamentally important for its field. You are not allowed to take any articles from Wikipedia or regular webpages. Patent documents are also allowed.

The field of the paper should be in any digital forensics branch that is not covered in our current FIT3168 syllabus. It means any disk-based forensics, Windows forensics, and network forensics paper is not permitted for selection. You can discuss your selection with your tutor.

The areas you can select including (but not limited to): cloud, Android, iOS, smart TV, gaming consoles (XBOX, PS3, PS4, etc), copier, scanner, CCTV, image, video, audio, digital cameras, etc.

You can select more than one papers if you think it is necessary (e.g. to create comparisons, etc).

The information of the paper needs to be clearly described :

  • Title, authors, affiliation, publishing year, publisher, conference/journal name.
  • Extra information such as number of citations, conference rank, etc.
  • The reason why you pick the paper (e.g. fresh/new ideas, fundamental ideas, etc).

2. PAPER DESCRIPTION

Using your own words, describe how the paper presents the ideas.

The subtopics/subheadings on your report should include:

  • Introduction
  • Background/preliminaries
  • Related works
  • The main technique/process
  • Experimental result/comparison
  • Conclusion
  • References (if you are referencing to other articles/sources)

3. PAPER CRITICAL ANALYSIS

You are required to write your analysis on the paper you have chosen and described. The topics should include:

  • What you understand from the paper (key ideas, etc).
  • Analysis whether the forensic technique from the paper is similar to disk-based or network-based forensics that you have learned.
  • How unique the proposed technique is.
  • How applicable the proposed technique is in a real world scenario.
  • The possible and potential weaknesses/drawbacks/overheads of the proposed technique.
  • Your ideas on how the approach can be improved.

Note - Only the answer to part B is needed. The MINIMUM word limit for Part B combined is 2,000 words.

Attachment:- IT Forensics Assignment File.rar

Reference no: EM132390015

Questions Cloud

How would you help a psychotic individual : Briefly review the biblical narrative in Mark 5: 1-20. How would you help a psychotic individual who presents to your treatment center and insists.
Psyc 6754 personnel psychology in the workplace question : PSYC 6754 - Personnel Psychology in the Workplace assignment help and assessment help, Walden University - Generate research question(s) and a set of hypotheses
How you would proceed with medical team in terms of advocacy : Explain how you would proceed with her medical team in terms of advocacy for her as a client believed to have this condition. Explain why you would need to take
PHL 212 Introduction to Ethics Assignment Problem : PHL 212 Introduction to Ethics assignment help and solutions, Southern New Hampshire University, assessment help - One of the main tasks of this course is the.
FIT3168 IT Forensics Assignment Problem : FIT3168 IT Forensics Assignment, Assessment Help and Solution - Monash University, Australia - DIGITAL FORENSIC ACADEMIC PAPER
How can validity and formality be applied to the model : How does the model fit into the need of a selected organization? How can validity and formality be applied to the model?
Counter cultures are in opposition to the sub-cultures : Counter cultures are in opposition to the sub-cultures. High-context communication is more precise than low-context communication.
Analyze the security implications of embedded systems : Discuss how organizations should analyze the security implications of embedded systems that they use.
Integrate with their technology architecture : What steps should an organization take to secure the embedded systems that integrate with their technology architecture?

Reviews

Write a Review

Other Subject Questions & Answers

  Describe the health issue and causes or risk factors

Choose a health issue. Describe the health issue and causes/risk factors. Describe the statistics and health disparities of the health issue in the United States

  Explain sources of conflict within an organization

Explain sources of conflict within an organization - Discuss types of conflict that can arise when groups vie for resources.

  Evaluate potential work setting for psychology professionals

Evaluate potential work settings where the use of technologies promotes ease and convenience for both psychology professionals and the populations they serve.

  Create double standards for asian americans

Does the model minority stereotype create double standards for Asian Americans who have to do more than members of the majority

  Explore the competitive advantage of your selected company

Analyze the competitive advantage of your selected company. Evaluate the strategies your selected company uses to create value and gain competitive advantage.

  Essay - climate change and environmental crisis

Essay Topic - Climate Change and Environmental Crisis. Write a 4-6 page, typed, double-spaced argumentative essay on the following question: Can we avoid ecological disaster (in particular, ecological disaster as a result of global warming) within..

  Explain the significance of the due process

Discuss the significance of the case and state whether race can "count" without it being determinative. Support your position with examples or evidence.

  What were the consequences of a failure to report

View the scenario called "Critical Decision Making for Providers" found in the Allied Health Community media. What were the consequences of a failure to report

  Describe the activities that occur during the intervention

Identify the problems that will be targeted by the intervention and indicate why the problem is important to address. Use several specific facts

  What are the relative merits of the entry strategies

what are the relative merits of the entry strategies discussed in this chapter? what is their role in an integrative

  Innovation important to individual or organisational success

What are examples of people, organisations, or products/services etc. you believe are innovative, and why do you believe they are

  Security issues-maintenance of paper medical records and EHR

Compare and contrast the security issues between maintenance of paper medical records and EHR. Use at least three outside references to support your views on this issue

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd