FIT3168 IT Forensics Assignment Problem

Assignment Help Other Subject
Reference no: EM132390015 , Length: word count:2000

FIT3168 IT Forensics Assignment - Monash University, Australia

A. CASE REPORTING -

1. CASE REPORT SUMMARY

Now that you have created a fictitious criminal case on your Assignment 1 of the unit, you are required to write a computer forensics report based on the "fictional" investigation and findings (see below).

The report will also be read by those people who are not necessarily having an in-depth technical background in IT and/or computer forensics. This should be considered when writing your report.

The report should include:

1. Case Information

2. Summary

3. Findings

4. Conclusion

5. Word list (glossary)

You can find the report examples/templates on Appendix C (page 215-218) of "Fundamentals of Digital Forensics: Theory, Methods, and Real-Life Applications?" by Joakim Kavrestad.

2. REPORT APPENDICES AND CODIFICATION

You should attach all relevant findings as your appendices. Note that you are not required to attach the real artifacts and evidences; creating and providing fictional screenshots, tables, hash lists can be used to represent the artifacts and evidences.

There are two options you can choose to complete this part. NOTE: you MUST state your option in the submission.

OPTION X: Generate a set of fictional forensic artifacts on your own based on the fictional story you wrote on your Assignment 1. The forensic artefacts should be reasonably closely related to the case, but it does not need to be overly complicated and should not be offensive (no illegal material is allowed). Note that the presented artefacts should be forensically sound. This means that you also need to attach proofs of integrity and originality of the artefacts.

OPTION Y: Create a fictional story based on the image file assigned to you on Assignment 1, as if the image file was a part of your fictional story. Utilize FTK's reporting features to assist you in presenting the related forensic artifacts you discover on the image file to support your report. Refer to Week 9 tutorial about finding related artefacts and generating reports. The FTK report may contain system information, bookmarks, and other related information to support your case.

B. DIGITAL FORENSIC ACADEMIC PAPER

1. CHOOSING A PAPER

You are required to take at least one published peer-reviewed academic paper/article. The paper needs to be published in a good conference venue or journal. The paper needs to be either published in recent years or fundamentally important for its field. You are not allowed to take any articles from Wikipedia or regular webpages. Patent documents are also allowed.

The field of the paper should be in any digital forensics branch that is not covered in our current FIT3168 syllabus. It means any disk-based forensics, Windows forensics, and network forensics paper is not permitted for selection. You can discuss your selection with your tutor.

The areas you can select including (but not limited to): cloud, Android, iOS, smart TV, gaming consoles (XBOX, PS3, PS4, etc), copier, scanner, CCTV, image, video, audio, digital cameras, etc.

You can select more than one papers if you think it is necessary (e.g. to create comparisons, etc).

The information of the paper needs to be clearly described :

  • Title, authors, affiliation, publishing year, publisher, conference/journal name.
  • Extra information such as number of citations, conference rank, etc.
  • The reason why you pick the paper (e.g. fresh/new ideas, fundamental ideas, etc).

2. PAPER DESCRIPTION

Using your own words, describe how the paper presents the ideas.

The subtopics/subheadings on your report should include:

  • Introduction
  • Background/preliminaries
  • Related works
  • The main technique/process
  • Experimental result/comparison
  • Conclusion
  • References (if you are referencing to other articles/sources)

3. PAPER CRITICAL ANALYSIS

You are required to write your analysis on the paper you have chosen and described. The topics should include:

  • What you understand from the paper (key ideas, etc).
  • Analysis whether the forensic technique from the paper is similar to disk-based or network-based forensics that you have learned.
  • How unique the proposed technique is.
  • How applicable the proposed technique is in a real world scenario.
  • The possible and potential weaknesses/drawbacks/overheads of the proposed technique.
  • Your ideas on how the approach can be improved.

Note - Only the answer to part B is needed. The MINIMUM word limit for Part B combined is 2,000 words.

Attachment:- IT Forensics Assignment File.rar

Reference no: EM132390015

Questions Cloud

How would you help a psychotic individual : Briefly review the biblical narrative in Mark 5: 1-20. How would you help a psychotic individual who presents to your treatment center and insists.
Psyc 6754 personnel psychology in the workplace question : PSYC 6754 - Personnel Psychology in the Workplace assignment help and assessment help, Walden University - Generate research question(s) and a set of hypotheses
How you would proceed with medical team in terms of advocacy : Explain how you would proceed with her medical team in terms of advocacy for her as a client believed to have this condition. Explain why you would need to take
PHL 212 Introduction to Ethics Assignment Problem : PHL 212 Introduction to Ethics assignment help and solutions, Southern New Hampshire University, assessment help - One of the main tasks of this course is the.
FIT3168 IT Forensics Assignment Problem : FIT3168 IT Forensics Assignment, Assessment Help and Solution - Monash University, Australia - DIGITAL FORENSIC ACADEMIC PAPER
How can validity and formality be applied to the model : How does the model fit into the need of a selected organization? How can validity and formality be applied to the model?
Counter cultures are in opposition to the sub-cultures : Counter cultures are in opposition to the sub-cultures. High-context communication is more precise than low-context communication.
Analyze the security implications of embedded systems : Discuss how organizations should analyze the security implications of embedded systems that they use.
Integrate with their technology architecture : What steps should an organization take to secure the embedded systems that integrate with their technology architecture?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd