MN624 Digital Forensic Assignment

Assignment Help Computer Network Security
Reference no: EM132419836

MN624 Digital Forensic - Melbourne Institute of Technology

Digital Forensics Assignment - Digital Forensics: Challenges and approaches

Unit Learning Outcomes covered in this assessment - Students should be able to demonstrate their achievements in the following unit learning outcomes:

a. Investigate the nature and extent of a network intrusion.

b. Demonstrate competence in applying industry-standard forensic analysis techniques.

Assignment Description -

Tasks: There are two parts to this assignment, i.e. part A and part B.

A. Write a review article on one of the following topics (Topic 1). Your tutor will allocate you a group number (maximum four students in a group) and your topic.

B. Presentation.

Part A description:

Topic 1 - Internet of Things Forensics: Challenges and approaches

Today is the era of Internet of Things (IoT), millions of machines such as cars, smoke detectors, watches, glasses, webcams, and other things that have the ability to connect, collect and exchange data over a wired and wireless network are being connected to the internet. The number of machines that possess the ability of remote access to monitor and collect data is continuously increasing. This development makes, on one hand, the human life more comfortable, convenient, but it also raises on other hand issues on security and privacy. However, this development also raises challenges for the digital investigator when IoT devices is involved in criminal scenes. Your article should cover the following points.

  • Histrory and background of the Internet of Things Forensics
  • Compare between traditional digital forensics vs. IoT forensics
  • Describe forensic approaches for IoT devices
  • Address the issues of IoT forensics
  • Discuss the type of evidences that could be found with challenges in IoT forensics
  • Analyse and discuss the significance of digital forensics for the IoT ecosystem
  • Analyse and review the existing techniques for IoT forensics and identify the best technique
  • Propose/ Review a number of solutions that can be taken to overcome these challenges
  • Challenges and analysis of their possible solutions.

Topic 2 - Cloud Forensics: Challenges and approaches

Cloud computing may well become one of the most transformative technologies in the history of computing. As a result of the technology and methods used in cloud computing, the forensic investigation techniques face different types of issues while inspecting the case. Write a research survey of the forensic challenges in cloud computing and analyze their most recent solutions and developments. Your article should cover the following points.

  • Describe forensic approaches for IoT devices
  • Discuss the type of evidences that could be found with challenges in Cloud computing
  • Analyse and discuss the significance of digital forensics for the Cloud computing.
  • A Review of Cloud Forensics Issues & Challenges
  • Describe the issues in cloud computing
  • List of challenges and analysis of their possible solutions.

Instructions: Prepare your article as below

1. Go to the IEEE website and download the WORD template for the format.

2. Read and familiarize yourself with the instructions carefully.

3. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas about how to start.

4. Complete the assignment (minimum 5 and maximum 8 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.

  • Title (maximum 15 words)
  • Abstract (200 - 250 words)
  • Introduction (500 - 1000 words)
  • Literature Review (700 - 2000 words)
  • Main body (1000 - 2000 words)
  • Conclusion (200 - 300 words)
  • Future Works (150 - 300 words)
  • References (minimum 10 references)

6. The article must be a 'Review' article including at least 5 references and not more than 25.

7. Strictly follow the IEEE reference format for in-body citations and the references section.

8. Contents must include:

  • History and background of the topic
  • Challenges and drawbacks
  • Possible options (solutions) and future research areas proposed
  • Include a minimum of two (2) figures to show the overall concept and summarized overview of the topic from the review of minimum 10 - 15 (but not limited to) papers
  • If applicable, include a table to summarize the result of findings.

Part B description:

Prepare slides (between 5 - 10 slides) for presentation during the lab class. Read the instruction attached carefully.

Attachment:- Digital Forensics Assignment File.rar

Reference no: EM132419836

Questions Cloud

Calculate the sum that ellen would have to pay now : Calculate the sum that Ellen would have to pay now in order to prepay five years of rent. The interest rate is 7%.
Calculate revenue for the month of september : Calculate revenue for the month of September using the accrual basis of accounting and calculate revenue for the month of September using the cash basis
Assignment - Code of Ethics : Assignment - Code of Ethics. Part C: Write-up/Revision of a Code of Ethics Policy. Develop a Code of Ethics Policy for your organization if one does not exist
Is the lease an operating lease or a financing lease : Krawczek Company will enter into a lease agreement with Heavy Equipment Co. where Krawczek will make lease payments over the next five years.
MN624 Digital Forensic Assignment : MN624 Digital Forensic Assignment Help and Solution, Melbourne Institute of Technology Assessment Writing Service - Digital Forensics: Challenges and approaches
Interest rate on a newly issued a2 public utility bond : What should be the interest rate on a newly issued A2 public utility bond?
Find the market value of the bonds-cox media corporation : Cox Media Corporation pays an 8 percent coupon rate on debentures that are due in 10 years. The current yield to maturity on bonds of similar risk is 6 percent
How much should craig charge for a maintenance contract : How much should Craig charge for a maintenance contract if the interest rate is 13%?
Charge for a maintenance contract : How much should Craig charge for a maintenance contract if the interest rate is 13%?

Reviews

len2419836

12/19/2019 3:49:24 AM

you have to choose one topic from topic 1 or 2. 624 need clear and simple report should be written personally no copy paste content needed.material with proper references you got the file we need to write reflective journal by selecting one topic and report must include all the points mentioned in the assignement like intro,abstract,body word limit will be 4000-5000.More important is need to follow the format in the assignemnet file link is provided in the instructions section.need to follow proper format for the ieee papers format

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd