Reference no: EM133123574
MN621 Advanced Network Design - Melbourne Institute of Technology
Assignment - Network requirement analysis and plan
Learning outcome 1: Analyse the need for advanced networks, standards and network solutions;
Students are required to use an industry case study of your PBL exercise to complete the assignment.
Assignment 1
1. Project Scope and report requirements
The project scope and requirement should have a detail explanation of the planning and designing of a network. It is recommended that bullet points are included whenever necessary. Use your Problem Based Learning (PBL) tutorial findings.
The following is the scope for Assignment.
• Write your own a real world business case study.
• Include points that you have gathered from case study.
• Discuss in a tabular form how the information obtained will be useful in designing the network.
2. Network design and justification
• Draw a network design. Network should include the following requirements:
o 3 routers
o 4 switches
o 10 PCs
o 4 VLANs.
• Suitable IP addressing scheme in tabular form (assume as many hosts as necessary for each department). Use your MIT student ID to come up with your own IP addressing scheme (to avoid Academic Misconduct). Justify the choice of IP address.
MN624 Digital Forensics - Melbourne Institute of Technology
Assessment - Digital Forensics Investigation
Learning Outcome 1: Record, administer and document digital forensics in social media.
Assignment Description: You need to research one recent digital forensics crime that requires digital forensics investigation, such as malware, embezzlement, extortion, cyberbullying, murder, kidnap, drug trafficking, intellectual property theft, espionage, employment misconduct, fraud, forgeries, inappropriate email and internet use in the workplace. For this part, you will write a 500 - 1000 words report that addresses the necessary steps to ensure that digital evidence is Collected, preserved, imaged, and can be examined. Prepare a report on the following:
1. Provide a detailed description of the case.
a. Summary of the offence being investigated.
b. Report who was involved in the crime, i.e. who was the criminal(s), the suspect(s) and the victim(s)?
c. Identify and report what type of evidence was used in the criminal investigation of the case;
d. Explain two acquisition methods that you should use in this case study.
e. Discuss some options that can be used for preserving the data.
2. Explain the importance of a chain of custody for digital forensic evidence. Be sure to explain the process of documenting, collecting and storing evidence from the crime scene you're investigating (e.g. a laptop computer). Describe the consequences of not following a proper chain of custody.
3. Discuss the procedures for the preservation of evidence; be sure to connect this work with the chain of custody. Describe consequences of not carefully preserving evidence.
4. List and analyze the tools you will need in your investigation and the reason you chose those tools. Support this analysis with relevant research. Critically evaluate the forensic tool(s) and discuss their capacity in various categories of functions, including acquisition, validation, and verification, extraction, reconstruction, and reporting.