Research on an incident where an iot devices has compromised

Assignment Help Other Subject
Reference no: EM132298711

Assignment

The aim of this assignment is to focus on the implementation of Digital Forensics to the Internet of Things (IoT). This assignment consists of a theoretical component, which requires the application of reasoning to provide a solution to real-world problems, as well as a practical component.

The IoT is starting to form a great part in modern society, as IoT devices are starting to be used in more environments, fulfilling various tasks and requirements. IoT devices are devices that give physical entities, virtual entities by connecting the physical entities to the internet and various digital systems.

IoT devices can be seen as small computing devices, with rather specific uses. IoT devices are therefore usually resource constrained, which means the IoT devices do not have high performance hardware compared to normal computers.

IoT devices can however pose a threat to digital systems, as they can be vulnerable to cyber-attacks. This assignment will focus on the digital forensic aspects of IoT devices and how IoT devices change the Digital Forensic environment.

Your assignment is to conduct research on an incident where an IoT device(s) has/have been compromised in a cyber-attack, as well as the practical application of Digital Forensics with regards to IoT devices.

You will be required to find open-source tools that can be used in digital forensic investigations for this purpose. You will, however, be required to use various tools by making use of a Google Sheet document by "claiming" various tools that have been identified. This will ensure that not all the students make use of the same tools.

This will work on a first-come-first-served basis. For example, if you "claim" to use "Tool A", then we will cap the maximum number of students to, for example, 5 students. That means, if the maximum number of students for "Tool A" has been reached, you should claim another one, e.g. "Tool B". The "claim" procedure will be given later. Failing to use unique tools will cost you marks, i.e. is the maximum number of students for "Tool A" has been reached, yet you continue to use "Tool A", you will lose significant marks.Various theoretical tasks of the assignment:

1. Identify an incident where an IoT device(s) has/have been compromised in a cyber-attack. Provide details about the incident as to how the device(s) has/have been compromised and how it impacted the environment/systems that it formed a part of. Provide details as to how

it affected the availability and/or integrity and/or the confidentiality of the system it formed a part of.

2. Make use of a model framework for conducting digital forensic investigations and apply the framework to the identified scenario. For each of the steps in the identified framework, specify how you would conduct a forensic investigation on the IoT device(s) that formed part of the incident identified in question 1. Remember to reference the framework you identified.

3. Identify 2 possible solutions that could have prevented the cyber-attack in question 1. Discuss how these solutions could have prevented the cyber-attack. Hint: pay special attention to solutions that can be applied to IoT devices.

4. Identify 3 possible sources of evidence that can be gathered before an incident occurs, which can assist forensic investigators in their investigations in IoT-related cyber-attacks. The sources of evidence should thus be gathered before a possible incident occurs, which will speed up the forensic investigation, should an incident take place. Motivate your chosen sources of forensic evidence.

Practical tasks of the assignment:

5. Find an open source digital forensic investigation tool that can gather one of the identified sources of evidence that you mentioned in question 4 of the theoretical part of the assignment. Provide an overview of the tool that you identified and how the tool enables forensic investigators to use the evidence gathered using the tool. Note that the tool doesn't have to be specific to IoT devices as some sources of evidence can be universal. In other words, it can be applicable to various storage mediums and system information on various types of devices.

Please send an email to the provided email address to indicate which tool you would like to use for this question. Students will be limited to only 5 students for a specific tool, so choose quickly before your desired tool are no longer available. Failure in adhering to the limitation of only 5 students per tool will result in a penalty of 3 marks.

6. Illustrate the working of the open-source tool by showing how the tool can be useful in forensic investigations. The purpose of this question is to determine whether or not the tool is effective in providing forensic investigators with trustworthy evidence. Explain your steps and provide screenshots of how the tool gathers evidence. You will aslo be required to demonstrate the at a certain time after the project hand-in deadline.

Second theoretical part

Massive data centres such as Google, Microsoft and Firefox use tools to conduct live forensic analysis of their server farms. These tools are usually custom developed, due to the sheer size of these data centres. IoT devices are being utilised in modern society in enormous numbers. The problem with IoT devices is that there are limited to no tools that can be used specifically for IoT devices.

7. Find 1 open-source tool used in massive data centres for live forensic investigations. Provide an overview of what the tool does and how it works.

Please send an email to the provided email address to indicate which tool you would like to use for this question. Students will be limited to only 15 students for a specific tool, so

choose quickly before your desired tool are no longer available.

8. Would this tool be adaptable to work on IoT devices? Motivate your answer. If you are of the opinion that the tool can be used for IoT devices, list the reasons why this is the case. If you are of the opinion that the tool cannot be used on IoT devices, state the reasons why this is the case.

Second theoretical part
This part of the assignment requires the practical implementation of a tool, developed by yourself, to conduct forensic investigations of IoT devices. The tool must be used to preserve digital evidence from some IoT device.

An example of such a tool is a tool that can compare two images of a system. The tool will then be able to analyse the two versions of the file system and identify the files that changed between the two versions of the file system. The tool must conduct the comparison in a forensically-sound manner.

Attachment:- Final Assignment.rar

Verified Expert

The solution provides a digital forensic solution framework for IoT device through different scenarios of insecurity.It discusses the use of autopsy by showing how tools can be utilized for forensic investigations. Other include volatility.The framework was also used and applied to the scenario.I confirm it as the right solution.

Reference no: EM132298711

Questions Cloud

State the objectives of the strategic plan : To prepare for this assignment, read this week's required article by Firshein (1996). For your Final Project, you will compile the work you have completed.
How each category of stakeholder impacts the overall success : Choose one (1) public corporation in an industry with which you are familiar. Research the company on its own Website, the public filings on the Securities.
Write definition of authentication and authorization : Develop definitions in your own words for the terms below, which would be useful to employees with little or no technology background. Do not copy definitions.
Determine an athletes final score for the event : Determine an athletes final score for the event, the highest and lowest judges' scores are discarded and then the average of the rest of the scores
Research on an incident where an iot devices has compromised : Application of reasoning to provide a solution to real-world problems, as well as a practical component - IoT devices can be seen as small computing devices
Calculate inventory turnover : Financial Management for Decision Making Assignment - Case Study - Lou Lublin Books operates a chain of bookstores across the UK
Challenging problem and attempt to solve it using a robot : Identify a challenging problem and attempt to solve it using a robot. You will design a possible solution, attempt to implement that solution and then present
Applications of business analytics and data mining : create a written report that will review the applications of business intelligence analytics and Data Mining in different industry domains in decision making
Determine the maximum throw length for both bench face : Determine the maximum throw length for both bench face and cratering fly rock and provide a sketch detailing maximum throw length and the clearance distances

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd