MN624 Digital Forensics Assignment

Assignment Help Computer Engineering
Reference no: EM132929315

MN624 Digital Forensics - Melbourne Institute of Technology

Assessment - Digital forensics analysis and recommendations

Learning outcome 1: Apply socio-technical contexts in analysing the digital forensic evidences
Learning outcome 2: Investigate the nature and extent of a network intrusion
Learning outcome 3: Demonstrate competence in applying industry-standard forensic analysis techniques

Tasks:

There are two parts to this assignment, i.e. part A and part B.

A. Write a group report on one of the following topics listed at Part A. Your tutor will allocate you a group number (maximum five students in a group) and your topic.

B. Demonstration. Make a group video demonstration of three digital forensics tools.

Part A description:

Topic 1 - Network Forensics: Challenges and approaches

Network forensics is a growing research area and is becoming increasingly central to law enforcement as cybercrime becomes more complex. Network data is always changing; an investigator must understand how to examine data over time. The main idea of network forensics is to detect malicious users or activities by collecting evidence from the network packet. Recently, several machine learning techniques have been developed to automate and develop intelligent network forensics systems. However, this development also raises challenges for the digital investigator when network devices are involved in crime scenes. Write a group report including the following sections
• History and background of the network forensics.
• Discusses the different tools and techniques available to conduct network forensics.
• Describe forensic approaches for the network forensics.
• Address the issues of network forensics.
• Discuss the type of evidence that could be found with challenges in network forensics.
• Analyse and discuss the significance of digital forensics for the network forensics.
• Analyse and review the existing techniques for network forensics and identify among them the best technique.
• Examine the performance of three network forensic tools.
• Analyse the challenges and Propose/ Review some solutions that can be taken to overcome these challenges.
• Investigate the relevant forensic tools that can be used to address the challenges of the above case.
• Propose/ Review some solutions that can be taken to overcome these challenges

Topic 2 - Mobile Forensics: Challenges and approaches
The proliferation of Mobile devices such as smartphones and tablets on the consumer market has caused a growing demand for forensic examination of the devices. A mobile device may carry sensitive data and becomes an easy target for cyber criminals. Mobile security is thus essential-mobile security testing targets to detect vulnerabilities and malicious apps on a mobile device.
Write a research survey of the mobile forensic challenges in cloud computing and analyse their most recent solutions and developments. Your article should cover the following points.
• History and background of the mobile forensics.
• Discuss the type of evidence that could be found with challenges in mobile computing.
• Analyse and discuss the significance of digital forensics for mobile computing.
• Discuss the digital forensics tools that could be useful for doing a mobile forensic investigation.
• Provides an overview of the capabilities of three popular mobile forensic tools on three mobile phones based on Apple's iOS and Google's Android operating systems.
• Describes the limitations of each, three forensics tools, in accessing contacts, call history, message data (SMS, MMS and emails), media files and other databased on Apple's iOS and Google's Android
• Describe forensic approaches for mobile forensics.
• Review the mobile Forensics Issues and challenges.
• Describe the issues in mobile computing that would affect the forensic investigation.
• Examined the performance of three mobile forensic tools.
• Discussion of technologies and techniques in the existing solutions and future works.
• Findings and implications for digital forensic practitioners.
• Propose/ Review a number of solutions that can be taken to overcome these challenges.

Instructions:
Prepare your article as below

1. Go to the IEEE website and download the WORD template for the format.

2. Another link for the template

3. Read and familiarise yourself with the instructions carefully.

4. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas about how to start (see section 6).

5. Complete the assignment (minimum 6 and maximum 19 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.
• Title (maximum 15 words)
• Abstract (200 - 250 words)
• Introduction (800 - 2000 words)
• Literature Review (1000 - 3000 words)
• Main body (1000 - 3000 words)
• Conclusion (200 - 300 words)
• Future Works (150 - 300 words)
• References (minimum 10 references)

6. The article must be a ‘Review' article, including at least 5 references and not more than 25.

7. Strictly follow the IEEE reference format for in-body citations and the references section.

8. See the attached files for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet.

9. Contents must include:
• History and background of the topic
• Overview of mobile or network forensics capabilities.
• Discuss the type of evidences.
• Forensic approaches
• Challenges and drawbacks
• Examine the digital forensic tools based on your selected topic.
• Findings and implications for digital forensic practitioners.
• Possible options (solutions) and future research areas proposed
• Include a minimum of two (2) figures to show the overall concept and summarised overview of the topic from the review of minimum 10 - 15 (but not limited to) papers
• If applicable, include a table to summarise the result of findings

Attachment:- Digital Forensics.rar

Reference no: EM132929315

Questions Cloud

Three historical shifts in leadership : Discuss two or three historical shifts in leadership that eventually led to the creation of the human resources position.
Pros and cons of outsourcing and internal training : Discuss the pros and cons of Outsourcing and Internal Training.
Workplace or might have to do in future : Think about the type of writing you have done in the workplace or might have to do in the future.
Level on maslow hierarchy of needs : Each level of Maslow's Hierarchy of Needs can empower an employee to improve personally and professionally.
MN624 Digital Forensics Assignment : MN624 Digital Forensics Assignment Help and Solution, Melbourne Institute of Technology - Assessment Writing Service
Explain inclusive style of leadership : Modern society gives preference to the inclusive style of leadership and the traits that are associated with it. Are there situations where inclusive leadership
Analyze influence of criminal justice model : Analyze the influence of the criminal justice model on the structure and mission of a local police department
Performance appraisal exercise in the company : When dismissing an employee on grounds of poor work performance the input received from the performance appraisal exercise in the company will be vital.
Memo for upper management explaining grievance : What would you see about the 11% pay raise that was already promised to the employee? Explain.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Configuration management and control in industry standards

There is no specific word count or anything; I just need to know a little bit about it.

  Determine why the e-mail has become a critical component

In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global.

  Build appropriate functions for these classes

A CollegeCourse class includes fields representing department, course number, credit hours, and tuition. Its child, LabCourse, includes one more field that holds a lab fee charged in addition to the tuition.

  What are some examples of casual use of and and or decisions

What are some examples of casual (and incorrect) use of AND and OR decisions? As a programmer, how might you ensure that the problem is well defined before.

  List four kinds of cryptanalysis attacks

List three mono alphabetic ciphers. List three polyalphabetic ciphers. List two transposition ciphers. List four kinds of cryptanalysis attacks.

  Compare the two design alternatives using amdahls law

Assume that the two design alternatives are to decrease the CPI of FPSQR to 2 or to decrease the average CPI of all FP operations to 2.4.

  Describe the advantages and disadvantage of magnetic storage

Describe the advantages and disadvantages of magnetic storage, optical storage, and solid state storage using criteria such as versatility, durability, capacity, access time, and transfer rate.

  Design a simple control systemthat has three switches

Design a simple control systemthat has three switches, amotor, and lights. Draw the wiring diagram. Write the code and upload it to D2L.

  Construct the binary search tree

Construct the binary search tree for the following input stream, assuming no balancing or pivoting is done: Frodo, Bilbo, Smaug, Gandalf, Wormtongue, Denethor, Sauron, Galadriel, Aragorn.

  What everyday actions would you like to see connected

Using the concept of Internet of Things, what everyday actions would you like to see connected to the Internet?

  What do you think of the new trash policy

Seattle City began enforcing new law on Trash. Single-family properties whose garbage contains more than more than 10 percent recyclables or food waste.

  What is the association rule in data mining

What is the association rule in data mining? Why is the association rule especially important in big data analysis? How does the association rule allow.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd