Apply specialist knowledge and skills in enabling secure

Assignment Help Other Subject
Reference no: EM133659300 , Length: 3000 Words

Digital Forensics - Master of Information Technology and Systems

Learning outcome 1: reflect on and synthesise complex issues, problems, concepts and theories relating to securing diverse devices on non-wired networks;

Learning outcome 2: apply specialist knowledge and skills in enabling secure use of wireless, mobile and IoT networks to mitigate potential security breaches;

Learning outcome 3: critically examine cyber security breaches using forensic tools, processes, and procedures

Task description:

This report has three questions to be completed. Compile your answers into a single MS Word or .pdf document and then upload it to the University portal. Your Report MUST include your Name, Student Number and course code in the header of each page and include references and a bibliography where appropriate. When submitting your document/s, the file will be submitted to Turnitin for originality checking. Therefore, it is important to include necessary references and bibliographies in your submission.

Task details:
You need to read the scenario and provide your answer to the list of questions.

Question 1 750-words maximum (CLO 2 and 4)

A real-world investigation scenario at ALDI retailer ALDI retailer has recently realized anomalies in its orders that are made by customers doing online shopping. It has undertaken an initial check of system log files, and there are a number of suspicious entries and IP addresses with a large amount of product data being sent outside the ALDI software system firewall. ALDI has also recently received a number of customer complaints saying that there is often a strange message displayed during online shopping and order processing, and they are often re-directed to a payment page that does not look legitimate. Your job is to conduct a digital forensic analysis process and data acquisition which relying on adopting a set of sophisticated tools.

Read the file named "Digital Forensic tools-Recent advances and enhancing the status quo - supplementary material" which is under Module 6. (File is attached in this email) A list of data acquisition tools is discussed in this file. Note that some of these tools may have been already discussed or referred to in Module 6.

Select 4 tools based on your interest. Then...
Write a brief introduction/describe (maximum 5 lines) of these tools and highlight at least 3 key features for each.
Write an analyse and discuss how these 4 tools can help you to conduct the whole investigation process including the identification of digital evidence and data acquisition.

Question 2 600 word maximum (CLO 2 and 3)
Consider the real-world scenario described in Question 1. Read the file named "Data acquisition process model" which is under Module 4 (File is attached in this email). In particular, read carefully Figure 2 (UML activity diagram of the acquisition process). Write a report, placing yourself in the shoes of a digital forensic detective for the local police office. Detail in the report, the steps that you are taken to gather evidence from IT support of ALDI, ALDI systems, and customers.

In addition, explain 3 different obstacles that might you expect to encounter during the investigation case.

Question 3 300 word maximum (CLO 4)

The file named "Explainable artificial intelligence for digital forensics.pdf"(File is attached to this email), available under Assessment -> Written Report folder, explores the potential of Explainable Artificial Intelligence (XAI) to enhance triage and analysis of digital forensic evidence, using examples of the current state of the art as a starting point. The .pdf provides both practical and novel ideas as well as controversial points for leveraging XAI to improve the efficacy of digital forensic analysis. Read this file completely and read carefully in particular the case study Section 4.

Based on your understanding and lecture PowerPoints and relevant sources in the Study Desk during the course so far, provide 5 example challenges and 5 example advantages in using XAI to conduct digital forensic analysis.

Reference no: EM133659300

Questions Cloud

Can a member of an llc be held liable for harm caused : Can a member of an LLC be held liable for harm caused by lead-based paint pursuant to a housing code provision that imposes liability on any individual?
Policyholder claim for loss of outbuilding will be covered : Explain, with justification, whether the policyholder's claim for the loss of the outbuilding will be covered.
What disruption and challenge facing supply chain management : What are disruptions and challenges facing supply chain management? Current and future challenges and opportunities. Processes affected by these challenges.
Most debated polices of the criminal justice system : Capital punishment is one of the most debated polices of the criminal justice system. Using constitutional, humanitarian, or administrative arguments,
Apply specialist knowledge and skills in enabling secure : Apply specialist knowledge and skills in enabling secure use of wireless, mobile and IoT networks to mitigate potential security breaches
Would lyle claim of racial discrimination be for intention : Would Lyle's claim of racial discrimination be for intentional (disparate-treatment) or unintentional (disparate-impact) discrimination? Explain.
Explore how real people access health care : HSM 410- The goal of this homework is for each student to explore how real people access health care and how this might have changed over time.
Contract for holiday rental cottage booking : Explain, with justification, whether Sarah can cancel the contract for the holiday rental cottage booking and obtain a refund.
What specific national benchmark and best policing practices : What specific national benchmarks and best policing practices should be established for federal, state, local, and tribal law enforcement agencies?

Reviews

len3659300

3/14/2024 10:36:06 PM

Also, please kindly request the tutor to refer to the marking rubric when writing the assignment. Please provide a competitive quote for your services. I'm looking forward to your prompt response. Thank you!

len3659300

3/14/2024 10:35:46 PM

Everything else you need to know is explained clearly in the assignment file. Please read through all the details and let me know your update as soon as possible. This research/ report will be an ongoing project throughout the semester. Therefore, who can work with me throughout this semester for this course. This approach will help address any issues that arise during the assignment and ensure quality work. I'm also expecting his/her expert in strong English skills for this task.

len3659300

3/14/2024 10:34:33 PM

I hope you're having a good day! How's everything going? I hope you're keeping busy with your work. As the new semester begins, I have several tasks lined up for you, which is pretty standard. As you are aware I'm currently pursuing my "Master of Information Systems" degree, I have another assignment for you this semester that I'd like you to review. Here's what I'd like you to work on this semester: Name of the course: The course is called "Digital Forensics" Nature of the Assignment: Report

Write a Review

Other Subject Questions & Answers

  What community services might be developed

What community services might be developed? What might your strategies be to achieve these changes and services?

  Problems of mean blood pressure in the population

Give a 95% confidence interval for the mean blood pressure in the population from which the subjects were recruited.

  How do you feel about public speaking

How do you feel about public speaking? If you have communication anxiety which of the following approaches do you think will assist you to deal with your anxiety? Emotional reframing, self-monitoring, or controlling physical responses

  Legislated safeguards-inclusive communication

What are some aspects of legislated safeguards against discrimination and harassment that managers and coworkers would require to be aware of in their own development of diversity skills and diversity consciousness?

  Define the expectations and dictates of society

Determine whether you believe the actions of females and males are based more on genetics or the expectations and dictates of society

  Describe the drivers and factors of globalization

Describe the drivers and factors of globalization. Discuss the pros and cons of globalization.

  The preamble says that the state in india will assure

The preamble says that the state in India will assure the dignity of the individual. The constitution seeks to achieve this object by guaranteeing.

  What tools would be most beneficial

Have you experienced this before personally or witnessed this with your co-workers? What did you observe? What would you have done as a healthcare leader

  How the contemporary schisms prevent social workers

Describe the schism that developed between Jane Addams and Mary Richmond with respect to an understanding of the social work profession through policy advocacy

  Type of research design

Describe a specific and unique example of each type of research design (Experimental, Quasi-Experimental, Qualitative, and Correlational)

  Explain in detail the success and failure of the act

Explain in detail the success and failure of the Act and provide, in your opinion, suggestions to enhance its effectiveness.

  What is the primary and secondary diagnosis

Worse with activity. Rest helps. What are the 3 to 4 differential diagnoses? and what is the primary and secondary diagnosis

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd