Topic - Cloud Forensics-Challenges and approaches

Assignment Help Computer Networking
Reference no: EM132528419

MN624 Digital Forensics Assignment - Digital Forensics: Challenges and approaches, Melbourne Institute of Technology, Australia

Unit Learning Outcomes covered in this assessment - Students should be able to demonstrate their achievements in the following unit learning outcomes:

a. Apply socio-technical contexts in analysing the digital forensic evidences.

b. Investigate the nature and extent of a network intrusion.

c. Demonstrate competence in applying industry-standard forensic analysis techniques.

Assignment Description -

Tasks: There are two parts to this assignment, i.e. part A and part B.

A. Write a review article on one of the following topics listed at Part A. Your tutor will allocate you a group number (maximum four students in a group) and your topic. 90 marks

B. Presentation.

Part A description:

Topic 1 - Internet of Things Forensics: Challenges and approaches

Today is the era of Internet of Things (IoT), millions of machines such as cars, smoke detectors, watches, glasses, webcams, and other things that have the ability to connect, collect and exchange data over a wired and wireless network are being connected to the internet. The number of machines that possess the ability of remote access to monitor and collect data is continuously increasing. This development makes, on one hand, the human life more comfortable, convenient, but it also raises another hand issues on security and privacy. However, this development also raises challenges for the digital investigator when IoT devices is involved in criminal scenes. Your report should cover the following points.

Histrory and background of the Internet of Things Forensics

Compare between traditional digital forensics vs. IoT forensics

Describe forensic approaches for IoT devices

Address the issues of IoT forensics

Discuss the type of evidences that could be found with challenges in IoT forensics

Analyse and discuss the significance of digital forensics for the IoT ecosystem

Analyse and review the existing techniques for IoT forensics and identify among them the best technique

Analyse the challenges and Propose/ Review a number of solutions that can be taken to overcome these challenges

Invetsigate the relevant forensic tools that can be used to address the challenges of the above case

Topic 2 - Cloud Forensics: Challenges and approaches

Cloud computing may well become one of the most transformative technologies in the history of computing. As a result of the technology and methods used in cloud computing, the forensic investigation techniques face different types of issues while inspecting the case.

Write a research survey of the forensic challenges in cloud computing and analyze their most recent solutions and developments. Your article should cover the following points.

Describe forensic approaches for cloud forensics.

Discuss the type of evidences that could be found with challenges in Cloud computing.

Analyse and discuss the significance of digital forensics for the Cloud computing.

Review the Cloud Forensics Issues & Challenges.

Describe the issues in cloud computing that would affect the forensic investigation.

List of challenges facing the cloud forensic investigation .

List the digital forensics tools that could be useful for doing cloud forensics invetsigation.

Discussion of technologies and techniques in the existing solutions and future works

Propose/ Review a number of solutions that can be taken to overcome these challenges

Topic 3- Applying Digital Forensics to Social network: Challenges and approaches

Social network services (SNSs) contain intersteing information such as conversations between users, user location information, personal network, and user psychology. This information can be useful for digital investigation.

Write a research survey of the forensic challenges in social network and analyze their most recent solutions and developments. Your article should cover the following points.

History and background of the topic.

Conduct a litretrature review of the topic and discuss the articles' finding.

Challenges and Approaches in Online Social Networks.

Issues during Forensic Investigations Involving the Cloud

Digital Forensics as a Big Data Challenge.

Current social network Forensic Investigations.

Identify important data sources and analytical methods for automated forensic analysis on social network

Propose/ Review a number of solutions that can be taken to overcome these challenges.

List the digital forensics tools that could be useful for doing social networking forensics with brief description about the tools' operation.

Examined the performance of four forensic tools.

Complete the assignment (minimum 5 and maximum 8 pages) including all the sections below.

Title (maximum 15 words)

Abstract (200 - 250 words)

Introduction (500 - 1000 words)

Literature Review (1000 - 3000 words)

Main body (1000 - 3000 words)

Conclusion (200 - 300 words)

Future Works (150 - 300 words)

References (minimum 10 references)

Contents must include:

History and background of the topic.

Challenges and drawbacks.

Possible options (solutions) and future research areas proposed.

Include a minimum of two (2) figures to show the overall concept and summarized overview of the topic from the review of minimum 10 - 15 (but not limited to) papers.

If applicable, include a table to summarize the result of findings.

Part B description:

Prepare slides (between 5 - 10 slides) for presentation during the lab class. Read the instruction attached carefully.

Attachment:- Digital Forensics Challenges and approaches.rar

Reference no: EM132528419

Questions Cloud

What is the estimated variable manufacturing overhead cost : M Company derived, What is the estimated variable manufacturing overhead cost for a month in which scheduled production is 5,000 units?
Bringing to market new type of social network : You have just been hired as the new CIO at an exciting new startup in Silicone Valley. Your company is bringing to market a new type of social network
Demonstrate what is the direct materials quantity variance : Demonstrate What is the direct materials quantity variance? Yama Industiers has collected the data for its Thunderbolt line of products
Are there specific clusters with higher crime rates : Are there specific clusters with higher crime rates? Is Crime distribution even across all geographical areas or different?
Topic - Cloud Forensics-Challenges and approaches : Topic 2 - Cloud Forensics: Challenges and approaches. Discuss the type of evidences that could be found with challenges in Cloud computing
Which is not true regarding balanced scorecard measures : Which is not true regarding balanced scorecard measures?Nonfinancial measures help managers evaluate goal achievement regarding manufacturing cycle time
Analyzing white collar crimes in wall street : Writing a research paper on any topic is a challenging task and it becomes more so when you have to create your own topic from the subject matter provided.
Find what is the budgeted production for august : Find What is budgeted production for august? To guard against stockouts,the company requires that 20% of the next month's sales be on hand at end of each month.
Calculate ucc at the end of 4-years : a. Calculate UCC at the end of 4-years. b. What are the tax implications when the asset is sold?Explain and state any assumptions you make.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd