BN309 Computer Forensics

Prepared by: ABM Russel Moderated by: Tony Jan May, 2020

Assessment Details and Submission Guidelines
Unit Code BN309
Unit Title Computer Forensics
Assessment Type Individual Assignment
Assessment Title Validating and Testing Computer Forensics Tools and Evidence – Part 2
Purpose of the
assessment (with
ULO Mapping)
This assignment assesses the following Unit Learning Outcomes; students should be
able to demonstrate their achievements in them.
• Systematically collect evidence at private-sector incident scenes.
• Document evidence and report on computer forensics findings.
• Implement a number of methodologies for validating and testing computer
forensics tools and evidence
• Understand the cross-examination of a legal process
Weight 25%
Total Marks 100
Word limit See the instructions.
Due Date Tuesday 11:55pm i.e. 2nd June 2020
Submission
Guidelines
• All work must be submitted on Moodle by the due date along with a completed
Assignment Cover Page.
• The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font
and 2 cm margins on all four sides of your page with appropriate section headings.
• Reference sources must be cited in the text of the report, and listed appropriately
at the end in a reference list using IEEE referencing style.
Extension • If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly to the School’s Administration Officer, in
Melbourne on Level 6 or in Sydney on Level 7. You must submit this application
three working days prior to the due date of the assignment. Further information is
available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and
guidelines/specialconsiderationdeferment
Academic
Misconduct
• Academic Misconduct is a serious offence. Depending on the seriousness of the case,
penalties can vary from a written warning or zero marks to exclusion from the course
or rescinding the degree. Students should make themselves familiar with the full
policy and procedure available at: http://www.mit.edu.au/about-mit/institute
publications/policies-procedures-and-guidelines/Plagiarism-Academic
Misconduct-Policy-Procedure. For further information, please refer to the Academic
Integrity Section in your Unit Description.

Prepared by: ABM Russel Moderated by: Tony Jan May, 2020
Assignment Questions:
Objective:
The objectives of this assignment is to gain theoretical and practical knowledge in different
computer forensics and anti-forensics techniques such as image acquiring and data hiding. The
students should apply appropriate computer forensics tools and techniques and write a report on
their findings. Marks will be awarded based on the sophistication and the in-depth exploration of the
techniques.
Case Study:
You are investigating a murder case related to drug dealing. You have acquired the USB drive from
the crime scene.
Assignment Specification:
Prepare a report and video demonstration on the following sections related to the case study. You can
use your own files for data hiding and analysis. Provide the list of references using IEEE referencing
style at the end of the report.
Section 1: Steganography
Use steganography to hide data in an image file. Explain each step with the help of
screenshots from the tool you used. (250 words)
Section 2: Data Hiding in Slack
File slack is the space between the end of a file and the end of the disk cluster it is stored in.
Hide a secret message into a file that contains slack space. Explain each step with the help
of screenshots from the tool you used. (500 words)
Section 3: Anti-forensics
Research on anti-forensics techniques and write a report on your findings on these
techniques. Compare the pros and cons of these techniques in different contexts. Use one of
the anti-forensic technique on your files and explain how useful it is. Please explain your
methods with the help of screenshots. (750 words)
Demonstration:
Demonstrate your work. You should appear in the video (You Tube or similar) at the first and
last 30 secs to introduce yourself and draw a conclusion on your experience with the
different computer forensics and anti-forensics techniques.
Prepared by: ABM Russel Moderated by: Tony Jan May, 2020
Marking Criteria:

Questions Description Marks
Section 1 Data hiding using steganography
Explanation of procedure and screenshots
10
10
Section 2 Data hiding in slack
Explanation of procedure and screenshots
10
10
Section 3 Anti-forensic techniques
Pros and Cons
Application of anti-forensic on files
10
10
10
Presentation Writing quality, Coherence, Report Structure 10
Reference style Follow IEEE reference style (should have both in-text citation
and reference list)
10
Demonstration Video demonstration 10
Total 100

Marking Rubric:

Sections Excellent (80%-100%) Good (70%-80%) Fair (60%-70%) Poor (50%-60%)
Section 1 Appropriate
requirements of the
plan specified
explained and
Issues identified and
listed
Requirements
for the plan
specified and
issues identified
and listed
Not a complete
plan with a few
Explanation of
procedure and
screenshots
Did not address
sub sections of
the section
Section 2 Addressed the three
tools explained
briefly as to how they
work and the data
hiding explained
Addressed the
three tools
however with
minimum
explanation with
data hiding
Three tools
selected but not
explained and
not provided a
enough
explanation for
the justification
of data hiding
Not a complete
list of security
tools and
missing
explanation of
data hiding
Section 3 Explained the act and
the important key
points
Provided an idea
about the act
with the key
points
Did not provide a
clear picture of
the act with the
key points
included
Missing
explanation and
key points

Prepared by: ABM Russel Moderated by: Tony Jan May, 2020

Presentation The presentation was
a concise summary of
the topic with all
questions answered.
Comprehensive and
complete coverage of
information.
The
presentation
was a good
summary of the
topic.
Most important
information
covered; little
irrelevant info.
The presentation
was informative
but several
elements went
unanswered.
Much of the
information
irrelevant;
coverage of
some of major
points.
The
presentation
was a brief look
at the topic but
many questions
were left
unanswered.
Majority of
information
irrelevant and
significant
points left out.
Demonstration Very professional,
clear and
easy to follow.
Professional,
clear
and easy to
follow
Clear and easy to
follow but lacks
professionalism
Difficult to
follow

The post BN309 Computer Forensics appeared first on My Assignment Online.

WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?
Scroll to Top