MN624 Digital Forensics Assignment

Assignment Help Computer Engineering
Reference no: EM132929315

MN624 Digital Forensics - Melbourne Institute of Technology

Assessment - Digital forensics analysis and recommendations

Learning outcome 1: Apply socio-technical contexts in analysing the digital forensic evidences
Learning outcome 2: Investigate the nature and extent of a network intrusion
Learning outcome 3: Demonstrate competence in applying industry-standard forensic analysis techniques

Tasks:

There are two parts to this assignment, i.e. part A and part B.

A. Write a group report on one of the following topics listed at Part A. Your tutor will allocate you a group number (maximum five students in a group) and your topic.

B. Demonstration. Make a group video demonstration of three digital forensics tools.

Part A description:

Topic 1 - Network Forensics: Challenges and approaches

Network forensics is a growing research area and is becoming increasingly central to law enforcement as cybercrime becomes more complex. Network data is always changing; an investigator must understand how to examine data over time. The main idea of network forensics is to detect malicious users or activities by collecting evidence from the network packet. Recently, several machine learning techniques have been developed to automate and develop intelligent network forensics systems. However, this development also raises challenges for the digital investigator when network devices are involved in crime scenes. Write a group report including the following sections
• History and background of the network forensics.
• Discusses the different tools and techniques available to conduct network forensics.
• Describe forensic approaches for the network forensics.
• Address the issues of network forensics.
• Discuss the type of evidence that could be found with challenges in network forensics.
• Analyse and discuss the significance of digital forensics for the network forensics.
• Analyse and review the existing techniques for network forensics and identify among them the best technique.
• Examine the performance of three network forensic tools.
• Analyse the challenges and Propose/ Review some solutions that can be taken to overcome these challenges.
• Investigate the relevant forensic tools that can be used to address the challenges of the above case.
• Propose/ Review some solutions that can be taken to overcome these challenges

Topic 2 - Mobile Forensics: Challenges and approaches
The proliferation of Mobile devices such as smartphones and tablets on the consumer market has caused a growing demand for forensic examination of the devices. A mobile device may carry sensitive data and becomes an easy target for cyber criminals. Mobile security is thus essential-mobile security testing targets to detect vulnerabilities and malicious apps on a mobile device.
Write a research survey of the mobile forensic challenges in cloud computing and analyse their most recent solutions and developments. Your article should cover the following points.
• History and background of the mobile forensics.
• Discuss the type of evidence that could be found with challenges in mobile computing.
• Analyse and discuss the significance of digital forensics for mobile computing.
• Discuss the digital forensics tools that could be useful for doing a mobile forensic investigation.
• Provides an overview of the capabilities of three popular mobile forensic tools on three mobile phones based on Apple's iOS and Google's Android operating systems.
• Describes the limitations of each, three forensics tools, in accessing contacts, call history, message data (SMS, MMS and emails), media files and other databased on Apple's iOS and Google's Android
• Describe forensic approaches for mobile forensics.
• Review the mobile Forensics Issues and challenges.
• Describe the issues in mobile computing that would affect the forensic investigation.
• Examined the performance of three mobile forensic tools.
• Discussion of technologies and techniques in the existing solutions and future works.
• Findings and implications for digital forensic practitioners.
• Propose/ Review a number of solutions that can be taken to overcome these challenges.

Instructions:
Prepare your article as below

1. Go to the IEEE website and download the WORD template for the format.

2. Another link for the template

3. Read and familiarise yourself with the instructions carefully.

4. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas about how to start (see section 6).

5. Complete the assignment (minimum 6 and maximum 19 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.
• Title (maximum 15 words)
• Abstract (200 - 250 words)
• Introduction (800 - 2000 words)
• Literature Review (1000 - 3000 words)
• Main body (1000 - 3000 words)
• Conclusion (200 - 300 words)
• Future Works (150 - 300 words)
• References (minimum 10 references)

6. The article must be a ‘Review' article, including at least 5 references and not more than 25.

7. Strictly follow the IEEE reference format for in-body citations and the references section.

8. See the attached files for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet.

9. Contents must include:
• History and background of the topic
• Overview of mobile or network forensics capabilities.
• Discuss the type of evidences.
• Forensic approaches
• Challenges and drawbacks
• Examine the digital forensic tools based on your selected topic.
• Findings and implications for digital forensic practitioners.
• Possible options (solutions) and future research areas proposed
• Include a minimum of two (2) figures to show the overall concept and summarised overview of the topic from the review of minimum 10 - 15 (but not limited to) papers
• If applicable, include a table to summarise the result of findings

Attachment:- Digital Forensics.rar

Reference no: EM132929315

Questions Cloud

Three historical shifts in leadership : Discuss two or three historical shifts in leadership that eventually led to the creation of the human resources position.
Pros and cons of outsourcing and internal training : Discuss the pros and cons of Outsourcing and Internal Training.
Workplace or might have to do in future : Think about the type of writing you have done in the workplace or might have to do in the future.
Level on maslow hierarchy of needs : Each level of Maslow's Hierarchy of Needs can empower an employee to improve personally and professionally.
MN624 Digital Forensics Assignment : MN624 Digital Forensics Assignment Help and Solution, Melbourne Institute of Technology - Assessment Writing Service
Explain inclusive style of leadership : Modern society gives preference to the inclusive style of leadership and the traits that are associated with it. Are there situations where inclusive leadership
Analyze influence of criminal justice model : Analyze the influence of the criminal justice model on the structure and mission of a local police department
Performance appraisal exercise in the company : When dismissing an employee on grounds of poor work performance the input received from the performance appraisal exercise in the company will be vital.
Memo for upper management explaining grievance : What would you see about the 11% pay raise that was already promised to the employee? Explain.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd