Reference no: EM133660687
Digital Forensics
Learning outcome 1: Reflect on and synthesise complex issues, problems, concepts and theories relating to securing diverse devices on non-wired networks;
Learning outcome 2: apply specialist knowledge and skills in enabling secure use of wireless, mobile and IoT networks to mitigate potential security breaches;
Learning outcome 4: critically examine cyber security breaches using forensic tools, processes, and procedures
Task details
You need to read the scenario and provide your answer for the list of questions. Question 1 - 25 marks, 750 word maximum (CLO 2 and 4)
A real-word investigation scenario at ALDI retailer
ALDI retailer has recently realized anomalies in its orders that are made by customer doing online shopping. It has undertaken an initial check of system log files, and there are a number of suspicious entries and IP addresses with a large amount of product data being sent outside the ALDI software system firewall. ALDI has also recently received a number of customer complaints saying that there is often a strange message displayed during online shopping and order processing, and they are often re-directed to a payment page that does not look legitimate. Your job is to conduct a digital forensic analysis process and data acquisition which relying on adopting a set of sophisticated tools.
Read the file named "Digital forensic tools-Recent advances and enhancing the status quo - supplementary material" which is under Module 6. A list of data acquisition tools is discussed in this file. Note that some of these tools may have been already discussed or referred to in Module 6.
Select 4 tools based on your interest. Then
Write a brief introduce/describe (maximum 5 lines) of these
tools and highlight at least 3 key features for each.
Write an analyse and discuss how these 4 tools can help you to conduct the whole investigation process including the
identification of digital evidence and data acquisition.
Hint: your answers and examples should be exactly related to the scenario.
General answers or examples that are irrelevant to the scenario are not acceptable.
Question 2 600 word maximum (CLO 2 and 3)
Consider the real-world scenario described in Question 1. Read the file named "Data acquisition process model" which is under Module 4. In particular, read carefully Figure 2 (UML activity diagram of the acquisition process).
Write a report, placing yourself in the shoes of a digital forensic detective for the local police office. Detail in the report, the steps that you are taken to gather evidence from IT support of ALDI, ALDI systems, and customers. In addition, explain 3 different obstacles that might you expect to encounter during the investigation case.
Question 3 300 word maximum (CLO 4)
The file named "Explainable artificial intelligence for digital forensics.pdf", available under Assessment -> Written Report folder, explores the potential of Explainable Artificial Intelligence (XAI) to enhance triage and analysis of digital forensic evidence, using examples of the current state of the art as a starting point. The .pdf provides both practical and novel ideas as well as controversial points for leveraging XAI to improve the efficacy of digital forensic analysis. Read this file completely and read carefully in particular the case study Section 4.
Based on your understanding and lecture PowerPoints and relevant sources in the Study Desk during the course so far, provide 5 example challenges and 5 example advantages in using XAI to conduct digital forensic analysis.
Hint: You need to consider Figure 2 in the file named "Explainable artificial intelligence for digital forensics.pdf" and sections 3.4.1 and 3.3.4 in this file to organise your answers.