Reference no: EM132929315
MN624 Digital Forensics - Melbourne Institute of Technology
Assessment - Digital forensics analysis and recommendations
Learning outcome 1: Apply socio-technical contexts in analysing the digital forensic evidences
Learning outcome 2: Investigate the nature and extent of a network intrusion
Learning outcome 3: Demonstrate competence in applying industry-standard forensic analysis techniques
Tasks:
There are two parts to this assignment, i.e. part A and part B.
A. Write a group report on one of the following topics listed at Part A. Your tutor will allocate you a group number (maximum five students in a group) and your topic.
B. Demonstration. Make a group video demonstration of three digital forensics tools.
Part A description:
Topic 1 - Network Forensics: Challenges and approaches
Network forensics is a growing research area and is becoming increasingly central to law enforcement as cybercrime becomes more complex. Network data is always changing; an investigator must understand how to examine data over time. The main idea of network forensics is to detect malicious users or activities by collecting evidence from the network packet. Recently, several machine learning techniques have been developed to automate and develop intelligent network forensics systems. However, this development also raises challenges for the digital investigator when network devices are involved in crime scenes. Write a group report including the following sections
• History and background of the network forensics.
• Discusses the different tools and techniques available to conduct network forensics.
• Describe forensic approaches for the network forensics.
• Address the issues of network forensics.
• Discuss the type of evidence that could be found with challenges in network forensics.
• Analyse and discuss the significance of digital forensics for the network forensics.
• Analyse and review the existing techniques for network forensics and identify among them the best technique.
• Examine the performance of three network forensic tools.
• Analyse the challenges and Propose/ Review some solutions that can be taken to overcome these challenges.
• Investigate the relevant forensic tools that can be used to address the challenges of the above case.
• Propose/ Review some solutions that can be taken to overcome these challenges
Topic 2 - Mobile Forensics: Challenges and approaches
The proliferation of Mobile devices such as smartphones and tablets on the consumer market has caused a growing demand for forensic examination of the devices. A mobile device may carry sensitive data and becomes an easy target for cyber criminals. Mobile security is thus essential-mobile security testing targets to detect vulnerabilities and malicious apps on a mobile device.
Write a research survey of the mobile forensic challenges in cloud computing and analyse their most recent solutions and developments. Your article should cover the following points.
• History and background of the mobile forensics.
• Discuss the type of evidence that could be found with challenges in mobile computing.
• Analyse and discuss the significance of digital forensics for mobile computing.
• Discuss the digital forensics tools that could be useful for doing a mobile forensic investigation.
• Provides an overview of the capabilities of three popular mobile forensic tools on three mobile phones based on Apple's iOS and Google's Android operating systems.
• Describes the limitations of each, three forensics tools, in accessing contacts, call history, message data (SMS, MMS and emails), media files and other databased on Apple's iOS and Google's Android
• Describe forensic approaches for mobile forensics.
• Review the mobile Forensics Issues and challenges.
• Describe the issues in mobile computing that would affect the forensic investigation.
• Examined the performance of three mobile forensic tools.
• Discussion of technologies and techniques in the existing solutions and future works.
• Findings and implications for digital forensic practitioners.
• Propose/ Review a number of solutions that can be taken to overcome these challenges.
Instructions:
Prepare your article as below
1. Go to the IEEE website and download the WORD template for the format.
2. Another link for the template
3. Read and familiarise yourself with the instructions carefully.
4. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas about how to start (see section 6).
5. Complete the assignment (minimum 6 and maximum 19 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.
• Title (maximum 15 words)
• Abstract (200 - 250 words)
• Introduction (800 - 2000 words)
• Literature Review (1000 - 3000 words)
• Main body (1000 - 3000 words)
• Conclusion (200 - 300 words)
• Future Works (150 - 300 words)
• References (minimum 10 references)
6. The article must be a ‘Review' article, including at least 5 references and not more than 25.
7. Strictly follow the IEEE reference format for in-body citations and the references section.
8. See the attached files for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet.
9. Contents must include:
• History and background of the topic
• Overview of mobile or network forensics capabilities.
• Discuss the type of evidences.
• Forensic approaches
• Challenges and drawbacks
• Examine the digital forensic tools based on your selected topic.
• Findings and implications for digital forensic practitioners.
• Possible options (solutions) and future research areas proposed
• Include a minimum of two (2) figures to show the overall concept and summarised overview of the topic from the review of minimum 10 - 15 (but not limited to) papers
• If applicable, include a table to summarise the result of findings
Attachment:- Digital Forensics.rar