| Assessment Details and Submission Guidelines | |
| Trimester | T1, 2020 |
| Unit Code | MN624 |
| Unit Title | Digital Forensics |
| Assessment Author | Dr Ammar Alazab |
| Assessment Type | Group (Assignment 2) |
| Assessment Title | Assignment 2 – Digital Forensics: Challenges and approaches |
| Unit Learning Outcomes covered in this assessment | Students should be able to demonstrate their achievements in the following unit learning outcomes: a. Apply socio-technical contexts in analysing the digital forensic evidences c. Investigate the nature and extent of a network intrusion d. Demonstrate competence in applying industry-standard forensic analysis techniques |
| Weight | 25% of Total Assessment |
| Total Marks | 100 |
| Word limit | See instructions section |
| Submission Guidelines | All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using APA or IEEE referencing style for School of Business and School of Information Technology and Engineering respectively. |
| Extension | If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School’s Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about–mit/institute–publications/policies–procedures–and–guidelines/specialconsiderationdeferment |
| Academic Misconduct | Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at:http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/AcademicintegrityPolicyAndProcedure.For further information, please refer to the Academic Integrity Section in your Unit Description. |
Assignment Description
Tasks:
There are two parts to this assignment, i.e. part A and part B.
- Write a review article on one of the following topics listed at Part A. Your tutor will allocate you a group number (maximum four students in a group) and your topic. 90 marks
- Presentation 10 marks
Part A description:
Topic 1 – Internet of Things Forensics: Challenges and approaches
Today is the era of Internet of Things (IoT), millions of machines such as cars, smoke detectors, watches, glasses, webcams, and other things that have the ability to connect, collect and exchange data over a wired and wireless network are being connected to the internet. The number of machines that possess the ability of remote access to monitor and collect data is continuously increasing. This development makes, on one hand, the human life more comfortable, convenient, but it also raises another hand issues on security and privacy. However, this development also raises challenges for the digital investigator when IoT devices is involved in criminal scenes. Your report should cover the following points.
- Histrory and background of the Internet of Things Forensics
- Compare between traditional digital forensics vs. IoT forensics
- Describe forensic approaches for IoT devices
- Address the issues of IoT forensics
- Discuss the type of evidences that could be found with challenges in IoT forensics
- Analyse and discuss the significance of digital forensics for the IoT ecosystem
- Analyse and review the existing techniques for IoT forensics and identify among them the best technique
- Analyse the challenges and Propose/ Review a number of solutions that can be taken to overcome these challenges
- Invetsigate the relevant forensic tools that can be used to address the challenges of the above case
Topic 2 – Cloud Forensics: Challenges and approaches
Cloud computing may well become one of the most transformative technologies in the history of computing. As a result of the technology and methods used in cloud computing, the forensic investigation techniques face different types of issues while inspecting the case.
Write a research survey of the forensic challenges in cloud computing and analyze their most recent solutions and developments. Your article should cover the following points.
- Describe forensic approaches for cloud forensics.
- Discuss the type of evidences that could be found with challenges in Cloud computing.
- Analyse and discuss the significance of digital forensics for the Cloud computing.
- Review the Cloud Forensics Issues & Challenges.
- Describe the issues in cloud computing that would affect the forensic investigation.
- List of challenges facing the cloud forensic investigation .
- List the digital forensics tools that could be useful for doing cloud forensics invetsigation.
- Discussion of technologies and techniques in the existing solutions and future works
Propose/ Review a number of solutions that can be taken to overcome these challenges
Topic 3- Applying Digital Forensics to Social network: Challenges and approaches
Social network services (SNSs) contain intersteing information such as conversations between users, user location information, personal network, and user psychology. This information can be useful for digital investigation.
Write a research survey of the forensic challenges in social network and analyze their most recent solutions and developments. Your article should cover the following points.
- History and background of the topic.
- Conduct a litretrature review of the topic and discuss the articles’ finding.
- Challenges and Approaches in Online Social Networks.
Issues during Forensic Investigations Involving the Cloud - Digital Forensics as a Big Data Challenge.
- Current social network Forensic Investigations.
- Identify important data sources and analytical methods for automated forensic analysis on social network
- Propose/ Review a number of solutions that can be taken to overcome these challenges.
- List the digital forensics tools that could be useful for doing social networking forensics with brief description about the tools’ operation.
- Examined the performance of four forensic tools.
Instructions:
Prepare your article as below
- Go to the IEEE website and download the WORD template for the format. https://www.ieee.org/publications_standards/publications/authors/author_templates.html
- Another link for the template: https://www.ieee.org/publications_standards/publications/journmag/ieee_tj_template_17.pdf
- Read and familiarize yourself with the instructions carefully.
- Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas about how to start (see section 6). (https://www.ieee.org/publications_standards/publications/authors/author_guide_interactive.pdf)
- Complete the assignment (minimum 5 and maximum 8 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.
- Title (maximum 15 words)
- Abstract (200 – 250 words)
- Introduction (500 – 1000 words)
- Literature Review (1000 – 3000 words)
- Main body (1000 – 3000 words)
- Conclusion (200 – 300 words)
- Future Works (150 – 300 words)
- References (minimum 10 references)
- The article must be a ‘Review’1 article including at least 5 references and not more than 25.
- Strictly follow the IEEE reference format for in-body citations and the references section.
- See the attached files for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet.
- Contents must include:
- History and background of the topic
- Challenges and drawbacks
- Possible options (solutions) and future research areas proposed
- Include a minimum of two (2) figures to show the overall concept and summarized overview of the topic from the review of minimum 10 – 15 (but not limited to) papers
- If applicable, include a table to summarize the result of findings
- Remember to strictly follow the template and the instructions above to avoid penalties.
Part B description:
Prepare slides (between 5 – 10 slides) for presentation during the lab class. Read the instruction attached carefully.
Marking criteria:
Example of marking criteria are shown in the following table. Marks are allocated as follows:
| Section to be included in the report | Detailed Description of the Criteria | Marks |
| Conforming to the template and format | No marks will be given and severe penalties will apply for any breach of the format and template. Fonts, sizes, spacing, captions, headings, etc. will also be checked thoroughly. Be thorough and follow fully when using the template and format instruction to avoid penalties. | 10 |
| Figures and tables created | They should be created yourself and not copied from elsewhere. For full marks, you should create at least 2 figures and 2 tables. | 20 |
| Main sections | Main body structures and contents quality including word limit. | 45 |
| Literature review | Severe penalties apply for simple listing and describing. It should be a logically support analysis that reaches the review conclusion that should be included at the end of the section. Check word limit. | 10 |
| In body citation | Strictly follow the order and instruction by IEEE. Check when/where to put the citation. See attached files and search the internet for guidelines | 2 |
| References section | Check whether they follow the instruction. Otherwise, no marks will be provided | 3 |
| Presentation | Presentation skills and materials quality | 10 |
| Total | 100 |
Example Marking Rubric for Assignment #: Total Marks 100
Note: The marking criteria vary for each assignment
| Marking Rubric Criteria/ Grades | High Distinction (HD) [Excellent] >80% | Distinction (D) [Very Good] 70%-80% | Credits (C) [Good] 60%-70% | Pass (P) [Satisfactory] 50%-60% | Fail (N) [Unsatisfactory] <50% |
| Criteria 1 | Concise and specific to the project | Topics are relevant and soundly analysed. | Generally relevant and analysed. | Some relevance and briefly presented. | This is not relevant to the assignment topic. |
| Criteria 2 | Demonstrated excellent ability to think critically and sourced reference material appropriately | Demonstrated excellent ability to think critically but did not source reference material appropriately | Demonstrated ability to think critically and sourced reference material appropriately | Demonstrated ability to think critically and did not source reference material appropriately | Did not demonstrate ability to think critically and did not source reference material appropriately |
| Criteria 3 | Demonstrated excellent ability to think critically and sourced reference material appropriately | Demonstrated excellent ability to think critically but did not source reference material appropriately | Demonstrated ability to think critically and sourced reference material appropriately | Demonstrated ability to think critically and did not source reference material appropriately | Did not demonstrate ability to think critically and did not source reference material appropriately |
| Criteria 4 | All elements are present and very well integrated. | Components present with good cohesive | Components present and mostly well integrated | Most components present | Proposal lacks structure. |
| Criteria 5 | Logic is clear and easy to follow with strong arguments | Consistency logical and convincing | Mostly consistent logical and convincing | Adequate cohesion and conviction | Argument is confused and disjointed |
| Criteria 6 | Clear styles with excellent source of references. | Clear referencing style | Generally good referencing style | Sometimes clear referencing style | Lacks consistency with many errors |
1 See http://www.editage.com/insights/6-article-types-that-journals-publish-a-guide-for-early-career-researchers
The post MN624 Digital Forensics appeared first on My Assignment Online.