MN624 Digital Forensic Assignment

Assignment Help Computer Network Security
Reference no: EM132419836

MN624 Digital Forensic - Melbourne Institute of Technology

Digital Forensics Assignment - Digital Forensics: Challenges and approaches

Unit Learning Outcomes covered in this assessment - Students should be able to demonstrate their achievements in the following unit learning outcomes:

a. Investigate the nature and extent of a network intrusion.

b. Demonstrate competence in applying industry-standard forensic analysis techniques.

Assignment Description -

Tasks: There are two parts to this assignment, i.e. part A and part B.

A. Write a review article on one of the following topics (Topic 1). Your tutor will allocate you a group number (maximum four students in a group) and your topic.

B. Presentation.

Part A description:

Topic 1 - Internet of Things Forensics: Challenges and approaches

Today is the era of Internet of Things (IoT), millions of machines such as cars, smoke detectors, watches, glasses, webcams, and other things that have the ability to connect, collect and exchange data over a wired and wireless network are being connected to the internet. The number of machines that possess the ability of remote access to monitor and collect data is continuously increasing. This development makes, on one hand, the human life more comfortable, convenient, but it also raises on other hand issues on security and privacy. However, this development also raises challenges for the digital investigator when IoT devices is involved in criminal scenes. Your article should cover the following points.

  • Histrory and background of the Internet of Things Forensics
  • Compare between traditional digital forensics vs. IoT forensics
  • Describe forensic approaches for IoT devices
  • Address the issues of IoT forensics
  • Discuss the type of evidences that could be found with challenges in IoT forensics
  • Analyse and discuss the significance of digital forensics for the IoT ecosystem
  • Analyse and review the existing techniques for IoT forensics and identify the best technique
  • Propose/ Review a number of solutions that can be taken to overcome these challenges
  • Challenges and analysis of their possible solutions.

Topic 2 - Cloud Forensics: Challenges and approaches

Cloud computing may well become one of the most transformative technologies in the history of computing. As a result of the technology and methods used in cloud computing, the forensic investigation techniques face different types of issues while inspecting the case. Write a research survey of the forensic challenges in cloud computing and analyze their most recent solutions and developments. Your article should cover the following points.

  • Describe forensic approaches for IoT devices
  • Discuss the type of evidences that could be found with challenges in Cloud computing
  • Analyse and discuss the significance of digital forensics for the Cloud computing.
  • A Review of Cloud Forensics Issues & Challenges
  • Describe the issues in cloud computing
  • List of challenges and analysis of their possible solutions.

Instructions: Prepare your article as below

1. Go to the IEEE website and download the WORD template for the format.

2. Read and familiarize yourself with the instructions carefully.

3. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas about how to start.

4. Complete the assignment (minimum 5 and maximum 8 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.

  • Title (maximum 15 words)
  • Abstract (200 - 250 words)
  • Introduction (500 - 1000 words)
  • Literature Review (700 - 2000 words)
  • Main body (1000 - 2000 words)
  • Conclusion (200 - 300 words)
  • Future Works (150 - 300 words)
  • References (minimum 10 references)

6. The article must be a 'Review' article including at least 5 references and not more than 25.

7. Strictly follow the IEEE reference format for in-body citations and the references section.

8. Contents must include:

  • History and background of the topic
  • Challenges and drawbacks
  • Possible options (solutions) and future research areas proposed
  • Include a minimum of two (2) figures to show the overall concept and summarized overview of the topic from the review of minimum 10 - 15 (but not limited to) papers
  • If applicable, include a table to summarize the result of findings.

Part B description:

Prepare slides (between 5 - 10 slides) for presentation during the lab class. Read the instruction attached carefully.

Attachment:- Digital Forensics Assignment File.rar

Reference no: EM132419836

Questions Cloud

Calculate the sum that ellen would have to pay now : Calculate the sum that Ellen would have to pay now in order to prepay five years of rent. The interest rate is 7%.
Calculate revenue for the month of september : Calculate revenue for the month of September using the accrual basis of accounting and calculate revenue for the month of September using the cash basis
Assignment - Code of Ethics : Assignment - Code of Ethics. Part C: Write-up/Revision of a Code of Ethics Policy. Develop a Code of Ethics Policy for your organization if one does not exist
Is the lease an operating lease or a financing lease : Krawczek Company will enter into a lease agreement with Heavy Equipment Co. where Krawczek will make lease payments over the next five years.
MN624 Digital Forensic Assignment : MN624 Digital Forensic Assignment Help and Solution, Melbourne Institute of Technology Assessment Writing Service - Digital Forensics: Challenges and approaches
Interest rate on a newly issued a2 public utility bond : What should be the interest rate on a newly issued A2 public utility bond?
Find the market value of the bonds-cox media corporation : Cox Media Corporation pays an 8 percent coupon rate on debentures that are due in 10 years. The current yield to maturity on bonds of similar risk is 6 percent
How much should craig charge for a maintenance contract : How much should Craig charge for a maintenance contract if the interest rate is 13%?
Charge for a maintenance contract : How much should Craig charge for a maintenance contract if the interest rate is 13%?

Reviews

len2419836

12/19/2019 3:49:24 AM

you have to choose one topic from topic 1 or 2. 624 need clear and simple report should be written personally no copy paste content needed.material with proper references you got the file we need to write reflective journal by selecting one topic and report must include all the points mentioned in the assignement like intro,abstract,body word limit will be 4000-5000.More important is need to follow the format in the assignemnet file link is provided in the instructions section.need to follow proper format for the ieee papers format

Write a Review

Computer Network Security Questions & Answers

  Important benefit of asymmetrical encryption

What is the most important benefit of asymmetrical encryption? Contrast with symmetrical encryption - Which part of CAIN is realized through the use of message digest functions and hashes?

  Geen computing is the study and practice of ecofriendly

1 green computing is the study and practice of ecofriendly computing resources. green computing is often seen

  Identify five major areas of security risk for the network

Identify at least 5 major areas of security risk for the network. For each security risk area, develop and document a plan to reduce the security risk.

  Network security controls assignment requirements

Network Security Controls Assignment Requirements Securing Windows networks requires recognizing potential vulnerabilities and selecting the best control

  Problem related to internet communication

Question 1: What is Net Neutrality and why is it important? Question 2: From the group project, identify at least one important step needed to work successfully with a team when working virtually (collaborating online rather than face to face). Th..

  Describe the mandatory policies and processes

Describe the mandatory policies, processes, and procedures you would implement in order to maintain the lab environment and preserve evidence

  Explain security strategy for a corporate wan

Prescribe a security strategy for a corporate WAN. Be sure to include methods to combat both technical and nontechnical attacks. C

  Identify the anomaly in the traffic organisation going

Identify the anomaly in the traffic this organisation is going through. What sort of evidence do you have to make this claim. What sort of utility or tool do you think the "attacker"is using to conduct this attack

  Search for software firewalls - type of protection

Using the Web, search for "software firewalls". Examine the various alternatives available and compare their functionality, cost, features, and type of protection.

  Information security in healthcare sector

Introduction about ransomware and their impacts on networked systems - Analysis of any two current or possible future security issues in Healthcare Networks

  Consider the following authentication protocol

Using RSA, perform an encryption then a decryption of the message M=5 using p=3, q=11, and e=7. (please add explanation, Show all your work, not just the final answer.)

  Benefits of an information system

Suppose monetary advantages of an information system of $50,000 the 1st year and increasing benefits of $5000a year of the next four years year 1=$50,000;

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd