Topic - Internet of Things Forensics

Assignment Help Computer Networking
Reference no: EM132519039

MN624 Digital Forensics Assignment - Melbourne Institute of Technology, Australia

Assessment Title - Digital Forensics: Challenges and Approaches

Unit Learning Outcomes covered in this assessment - Students should be able to demonstrate their achievements in the following unit learning outcomes:

a. Apply socio-technical contexts in analysing the digital forensic evidences.

b. Investigate the nature and extent of a network intrusion.

c. Demonstrate competence in applying industry-standard forensic analysis techniques.

Assignment Description -

Tasks - There are two parts to this assignment, i.e. part A and part B.

A. Write a review article on one of the following topics listed at Part A. Your tutor will allocate you a group number (maximum four students in a group) and your topic.

B. Presentation.

Part A description:

Topic 1 - Internet of Things Forensics: Challenges and approaches

Today is the era of Internet of Things (IoT), millions of machines such as cars, smoke detectors, watches, glasses, webcams, and other things that have the ability to connect, collect and exchange data over a wired and wireless network are being connected to the internet. The number of machines that possess the ability of remote access to monitor and collect data is continuously increasing. This development makes, on one hand, the human life more comfortable, convenient, but it also raises another hand issues on security and privacy. However, this development also raises challenges for the digital investigator when IoT devices is involved in criminal scenes. Your report should cover the following points.

Histrory and background of the Internet of Things Forensics.

Compare between traditional digital forensics vs. IoT forensics.

Describe forensic approaches for IoT devices.

Address the issues of IoT forensics.

Discuss the type of evidences that could be found with challenges in IoT forensics.

Analyse and discuss the significance of digital forensics for the IoT ecosystem.

Analyse and review the existing techniques for IoT forensics and identify among them the best technique.

Analyse the challenges and Propose/ Review a number of solutions that can be taken to overcome these challenges.

Invetsigate the relevant forensic tools that can be used to address the challenges of the above case.

Topic 2 - Cloud Forensics: Challenges and approaches

Cloud computing may well become one of the most transformative technologies in the history of computing. As a result of the technology and methods used in cloud computing, the forensic investigation techniques face different types of issues while inspecting the case.

Write a research survey of the forensic challenges in cloud computing and analyze their most recent solutions and developments. Your article should cover the following points.

Describe forensic approaches for cloud forensics.

Discuss the type of evidences that could be found with challenges in Cloud computing.

Analyse and discuss the significance of digital forensics for the Cloud computing.

Review the Cloud Forensics Issues & Challenges.

Describe the issues in cloud computing that would affect the forensic investigation.

List of challenges facing the cloud forensic investigation .

List the digital forensics tools that could be useful for doing cloud forensics invetsigation.

Discussion of technologies and techniques in the existing solutions and future works.

Propose/ Review a number of solutions that can be taken to overcome these challenges

Topic 3- Applying Digital Forensics to Social network: Challenges and approaches

Social network services (SNSs) contain intersteing information such as conversations between users, user location information, personal network, and user psychology. This information can be useful for digital investigation.

Write a research survey of the forensic challenges in social network and analyze their most recent solutions and developments. Your article should cover the following points.

History and background of the topic.

Conduct a litretrature review of the topic and discuss the articles' finding.

Challenges and Approaches in Online Social Networks.

Issues during Forensic Investigations Involving the Cloud.

Digital Forensics as a Big Data Challenge.

Current social network Forensic Investigations.

Identify important data sources and analytical methods for automated forensic analysis on social network.

Propose/ Review a number of solutions that can be taken to overcome these challenges.

List the digital forensics tools that could be useful for doing social networking forensics with brief description about the tools' operation.

Examined the performance of four forensic tools.

Note - Complete the assignment (minimum 5 and maximum 8 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.

Title (maximum 15 words)

Abstract (200 - 250 words)

Introduction (500 - 1000 words)

Literature Review (1000 - 3000 words)

Main body (1000 - 3000 words)

Conclusion (200 - 300 words)

Future Works (150 - 300 words)

References (minimum 10 references)

Part B description:

Prepare slides (between 5 - 10 slides) for presentation during the lab class. Read the instruction attached carefully.

Attachment:- Assignment File - Digital Forensics Challenges and Approaches.rar

Reference no: EM132519039

Questions Cloud

Show a plausible indifference curve for luke : On a separate graph, show a plausible indifference curve for Luke such that the two plans are indifferent for Luke.
Prepare journal entries for received payment : Prepare Journal Entries For Received payment of $340,000 on accounts receivable. After receiving the payment, estimated that 4% of the remaining accounts
Project sponsor and customer informed : Your Project Sponsor and customer informed you that you have to deliver your project much sooner than anticipated. When you break the news to your team,
How does mark daily income depend on the wage rate : Show how the number of units of leisure Mark chooses depends on the wage rate using the leisure demand equation.
Topic - Internet of Things Forensics : Topic 1 - Internet of Things Forensics: Challenges and approaches. Compare between traditional digital forensics vs. IoT forensics
Evaluate psychological theories and their insights : Evaluate psychological theories and their insights into the widely varying opinions and attitudes that are expressed through social media.
Determination of price in two different market types : Compare the determination of price in two different market types: a perfectly competitive market and a monopoly. Evaluate your argument.
Explain internal control and internal audit : For internal controls use(SOAPSPAM) Segregation of duties, Explain internal control and internal audit and external audit with examples.
Budget constraint and the indifference curve : Explain, with the aid of graphical illustrations, whether the point of tangency between the budget constraint and the indifference curve

Reviews

Write a Review

Computer Networking Questions & Answers

  What are the networks technical requirements

MN621 Advanced Network Design Assignment. Write a report on a network plan by answering following: What are the network's technical requirements

  Create the technology survey of lans

Create the technology survey of LANs, which means for each LAN determine (or create): Hardware (# of computers, printers, etc.) CPU architecture (Intel, RISC, etc)

  Will the network be peer to peer or server based?

Will the network be peer to peer or server based?

  Protocol and network switching device use for the wireless

Explain which protocol and network switching device(s) you would use for the five computers on the LAN and for the wireless access?

  Explain the role of a voip gateway

Explain the role of a VoIP gateway-Define the PSTN hierarchy and key components of the network

  Reason for networking an organization''s computers together

What is the Health Insurance Portability and Accountability Act (HIPAA)? Support your answer with an example of a violation of this act by an organization (or of an individual within an organization).

  What are the inter-dependencies of workstation hardwares

what are the inter-dependencies of workstation hardwares with network components.

  Segment display and leds

The 8-Segment display and LEDs will show status of the safe: • U: indicates safe is unlocked • L: indicates safe is locked

  Make decisions about designing secure wireless networks

Critically analyse enterprise requirements for wireless systems and 802.11 protocol information. Make decisions about designing secure wireless networks.

  Explain difference between common network infrastructures

Complete the following modules in the Pluralsight course, "Network Architecture for CompTIA Network+ (N10-006)": Differentiating Between Common Network Infrastructures.

  What kind of naming structure would you give to servers

mr. smith is the director of it at a law firm located in downtown chicago. he needs to plan for a network upgrade. he

  Network management in organisations

MN501 - Discuss ethical and social issues pertaining to IT systems administration and Discuss ethical behaviour in accordance with professional codes

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd