Forensic methodologies used in the investigation

Assignment Help Other Subject
Reference no: EM133870633

Cyber Forensic

Assessment - Case Study Cybersecurity Investigation and Mitigation Report

Advanced Cybersecurity Investigation and Practical Implementation

Assessment Overview

This assessment requires students to analyse a real-world cybersecurity incident, conduct in-depth forensic investigations, and implement technical solutions using practical tools discussed in lectures.

Case Studies

0 Medibank Data Breach (2022) Medibank Cyberattack
Overview
1 Latitude Financial Cyberattack (2023) Latitude Financial Data
Breach
2 Canva Data Breach (2019) Canva Data Breach
Information
3 Optus Data Breach (2022) Optus Data Breach
Summary
4 Australian National University (ANU) Hack (2018-2019) ANU Cyber Attack
Report
5 MyGov Phishing Attack (2021) MyGov Phishing_
Incident
6 Australian Government Department of Home Affairs Home Affairs Data
Cyber Incident (2023) Breach
7 Transport for NSW Ransomware Attack (2020) Transport for NSW
Cyber Attack
8 NAB Customer Data Leak (2020) NAB Data Breach
Details
9 Woolworths MyDeal Data Breach (2022) MyDeal Data Breach
Students should use the provided source as a starting point for their investigation, ensuring they adhere to APA 7th referencing style for all citations and references in their report. Each student must investigate their assigned case study, analyse the attack methodology, and demonstrate forensic investigation techniques.
Assessment 3 (a): Individual Investigation Report (20%)
Your forensic investigation report must include:

1. Executive Summary
Explain the key findings of the assigned cybersecurity incident.
Summarise the forensic methodologies used in the investigation,
Provide recommendations for cybersecurity improvements.

2. Introduction
Discuss the significance and implications of the assigned case study.
Explain the scope, objectives, and methodology of the forensic investigation.

3. Evidence Collection & Forensic Analysis
Describe the incident response steps, including data acquisition and integrity verification.
Explain forensic imaging techniques and memory dump analysis for extracting system artefacts.
Analyse network traffic patterns to investigate data exfiltration methods.
Use and justify forensic tools such as:
Autopsy (File System Analysis)
Volatility (Memory Forensics)
Wireshark (Network Packet Analysis)
Splunk (SIEM Log Correlation) VARA Rules (Malware Hunting)

4. Attack Analysis & Practical implementation

Explain how the attackers gained access and discuss their methods for extracting sensitive data.
Analyse maiware and backdoor techniques used during the breach.
Investigate cloud-based forensic evidence and endpoint forensic artefacts to identify Indicators of Compromise (lo Cs) using Splunk & Windows Event Logs.
Examine how the attackers employed detection evasion techniques to remain undetected.

5. Legal & Compliance Aspects
Discuss the legal implications of the cybersecurity incident, focusing on Australian data protection regulations and compliance failures.
Explain how cybersecurity policies such as GDPR and the Australian Privacy Act 1988 apply to this case.

6. Strategic Cybersecurity Recommendations
Recommend measures for improving data security and preventing future breaches.
Explain how organisations can implement Zero Trust security models and other risk mitigation strategies.

7. References & Citation
Use APA 7th referencing style for all sources.
Include in-text citations where applicable.
Provide a reference list at the end of the report.
Ensure all references are from academic and reputable sources (e.g., journals, books, government reports, and white papers).

8. Appendices
Include screenshots of forensic tools in use.
Provide technical evidence, extracted artefacts, and log files.

Assessment: Presentation & Practical Demonstration

Each student must present their forensic investigation with a hands-on component. The presentation must include:

1, Summary of the Assigned Cybersecurity Incident

2. Explanation of the Attack Methodology

3. Demonstration of Forensic Analysis Using At least Two Tools

Practical Task 1: Memory Forensic Analysis using Volatility to analyse memory dumps.
Practical Task 2: Network Traffic Analysis using Wireshark to identify malicious outbound traffic.

4. Discussion on Legal & Ethical Considerations in Digital Forensics

5. Recommendations for Preventing Similar Cyber Attacks

Presentation Guidelines:

Provide 6-10 slides
Provide suitable Visual Aids, Including diagrams, forensic logs, and screenshots.
Mode of Delivery: PPT slides submissions, In-class Demonstration/Presentation and Viva

Reference no: EM133870633

Questions Cloud

Describe three network service security features : ICTNWK540 Design, build and test network servers, ICT60220 Advanced Diploma of Information Technology - Identify and describe three network service security
Describe the historical evolution of family : Describe the historical evolution of family and groups within society.
What is outcome theory : What is outcome theory and how do I find information about it? I have to compare and contrast it to other methodologies.
Which clients medications the nurse knows : The nurse knows that sildenafil is contraindicated due to an interaction with which client's medications?
Forensic methodologies used in the investigation : CY13601 Cyber Forensic, Polytechnic Institute Australia - Case Study Cybersecurity Investigation and Mitigation Report
Role of practice of student nurse in vaccine administration : What is the role of the practice of the Student nurse in vaccine administration?
Function of skeletal system including the main type of bone : Analysing the structure and function of the skeletal system including the main type of bone, connective tissues, protective structures and joints.
What measurement tools are available for anxiety disorder : Include the tool with your discussion and describe what anxiety disorder(s) the tool is useful for identifying/measuring.
Explain the use of psychiatric rating scale : Explain when it is appropriate to use BPRS tool rating scale with clients during the psychiatric interview process.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd