Investigate the nature and extent of a network intrusion

Assignment Help Other Subject
Reference no: EM132531308

MN624 Digital Forensics - Melbourne Institute of Technology

Assignment - Digital Forensics: Challenges and approaches

Unit Learning Outcomes covered in this assessment - Students should be able to demonstrate their achievements in the following unit learning outcomes:

a. Apply socio-technical contexts in analysing the digital forensic evidences.

b. Investigate the nature and extent of a network intrusion.

c. Demonstrate competence in applying industry-standard forensic analysis techniques.

Assignment Description -

Tasks: There are two parts to this assignment, i.e. part A and part B.

A. Write a review article on one of the following topics listed at Part A. Your tutor will allocate you a group number (maximum four students in a group) and your topic. 90 marks

B. Presentation.

Part A description:

Topic 1 - Internet of Things Forensics: Challenges and approaches

Today is the era of Internet of Things (IoT), millions of machines such as cars, smoke detectors, watches, glasses, webcams, and other things that have the ability to connect, collect and exchange data over a wired and wireless network are being connected to the internet. The number of machines that possess the ability of remote access to monitor and collect data is continuously increasing. This development makes, on one hand, the human life more comfortable, convenient, but it also raises another hand issues on security and privacy. However, this development also raises challenges for the digital investigator when IoT devices is involved in criminal scenes. Your report should cover the following points.

Histrory and background of the Internet of Things Forensics

Compare between traditional digital forensics vs. IoT forensics

Describe forensic approaches for IoT devices

Address the issues of IoT forensics

Discuss the type of evidences that could be found with challenges in IoT forensics

Analyse and discuss the significance of digital forensics for the IoT ecosystem

Analyse and review the existing techniques for IoT forensics and identify among them the best technique

Analyse the challenges and Propose/ Review a number of solutions that can be taken to overcome these challenges

Invetsigate the relevant forensic tools that can be used to address the challenges of the above case

Topic 2 - Cloud Forensics: Challenges and approaches

Cloud computing may well become one of the most transformative technologies in the history of computing. As a result of the technology and methods used in cloud computing, the forensic investigation techniques face different types of issues while inspecting the case.

Write a research survey of the forensic challenges in cloud computing and analyze their most recent solutions and developments. Your article should cover the following points.

Describe forensic approaches for cloud forensics.

Discuss the type of evidences that could be found with challenges in Cloud computing.

Analyse and discuss the significance of digital forensics for the Cloud computing.

Review the Cloud Forensics Issues & Challenges.

Describe the issues in cloud computing that would affect the forensic investigation.

List of challenges facing the cloud forensic investigation .

List the digital forensics tools that could be useful for doing cloud forensics invetsigation.

Discussion of technologies and techniques in the existing solutions and future works

Propose/ Review a number of solutions that can be taken to overcome these challenges

Topic 3- Applying Digital Forensics to Social network: Challenges and approaches

Social network services (SNSs) contain intersteing information such as conversations between users, user location information, personal network, and user psychology. This information can be useful for digital investigation.

Write a research survey of the forensic challenges in social network and analyze their most recent solutions and developments. Your article should cover the following points.

History and background of the topic.

Conduct a litretrature review of the topic and discuss the articles' finding.

Challenges and Approaches in Online Social Networks.

Issues during Forensic Investigations Involving the Cloud

Digital Forensics as a Big Data Challenge.

Current social network Forensic Investigations.

Identify important data sources and analytical methods for automated forensic analysis on social network

Propose/ Review a number of solutions that can be taken to overcome these challenges.

List the digital forensics tools that could be useful for doing social networking forensics with brief description about the tools' operation.

Examined the performance of four forensic tools.

Complete the assignment (minimum 5 and maximum 8 pages) including all the sections below.

Title (maximum 15 words)

Abstract (200 - 250 words)

Introduction (500 - 1000 words)

Literature Review (1000 - 3000 words)

Main body (1000 - 3000 words)

Conclusion (200 - 300 words)

Future Works (150 - 300 words)

References (minimum 10 references)

Contents must include:

History and background of the topic.

Challenges and drawbacks.

Possible options (solutions) and future research areas proposed.

Include a minimum of two (2) figures to show the overall concept and summarized overview of the topic from the review of minimum 10 - 15 (but not limited to) papers.

If applicable, include a table to summarize the result of findings.

Part B description:

Prepare slides (between 5 - 10 slides) for presentation during the lab class. Read the instruction attached carefully.

Attachment:- Digital Forensics Challenges and approaches.rar

Reference no: EM132531308

Questions Cloud

What are the warranty expense balances : Under the cash basis method, what are the Warranty Expense balances for 2010 and 2011? what balance under current liabilities in the 2010 balance sheet?
Calculate the capital balances of each partner : Calculate the capital balances of each partner after the admission of Garachico, assuming that bonuses are recorded when appropriate for each
Describe the organization environment : Describe the organization's environment, and evaluate its preparedness for virtualization. Explain Microsoft licensing for virtualized environments
How much can spend each year after retires : How much can spend each year after retires, if can earn 9 % per year after retirement. Her first withdrawal will be made at the end of first retirement year.
Investigate the nature and extent of a network intrusion : Apply socio-technical contexts in analysing the digital forensic evidences and Demonstrate competence in applying industry-standard forensic analysis techniques
How much will have when start business seven years : You will deposit immediately (t = 0). If the account earns 8% compounded annually, how much will you have when you start your business 7 years from now?
Discuss the proper accounting treatment : Discuss the proper accounting treatment, including any required disclosures, for each situation. Give the rationale for your answers.
Building secure web applications : Do a bit of research on CWE, Common Weakness Enumeration. Write a brief overview of their scoring system.
Prepare the journal entry to record the impairment loss : Hall division is $1,900,000 instead of $2,100,000. Prepare the journal entry to record the impairment loss, if any, on December 31, 2011.

Reviews

Write a Review

Other Subject Questions & Answers

  Describe the practical applications of your research

Describe how this study is new or different from other studies. Describe practical applications of your research. Who study in the field find it interesting?

  Review problem on ethnographic narrative

A descriptive reflection on the Taino indigenous group you selected during the course. Please include any additional insights about the group's history/origins.

  Researcher is studying the effects of sex-male and female

A researcher is studying the effects of sex—male and female—and dietary sugar on energy level. Male and female participants agree to follow either a high sugar or low sugar diet for eight weeks. The researcher asks the participants to complete a numb..

  Where would you send a family who needed help

The goal of this activity is to become familiar with community resources in your own geographic area. How aware are you of the resources that exist in your.

  Why will he give up his freedom

John Locke argues that freedom and liberty are very different things. Do you agree or not? Why or why not?

  Draw diagram that shows architecture of video processing

Draw a diagram that shows the architecture of the video processing application after the transition to a micro-service approach

  Identify the population and the effect of the initiative

Caregivers and veterans omnibus health services act of 2010: Identify the population and the effect of the initiative

  Why should companies outsource projects

Why should companies outsource projects

  Compare two existing approaches to employee evaluations

What cultural challenges do you foresee in the use of performance management systems and subsequent communication with employees?

  How a christian worldview can make sense of trends

write a 250-word thread explaining the ways in which such contemporary issues resonate with American identity and how a Christian worldview can make sense of these trends

  What is - the stages of change model

"Can The Stages of Change Model help victims or clients involved in domestic violence or a client who is in a abusive relationship?" If so explain how "The Stages of Change Model" may helps client involved in domestic violence ?

  What experiences stand out for you

What experiences stand out for you? High points and were there times when your reading experience or the materials you were reading made you feel like an insider? Like an outsider?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd