MN624 Digital Forensics Assignment Help

Assessment Details and Submission Guidelines

Tri

mester 

 

T2, 2024

Unit Code 

MN624

Unit Title 

Digital Forensics

Assessment Type 

Group Assignment (Maximum 4 Students in a group)

Assessment Title 

Digital forensics analysis and recommendations

Purpose of the  assessment (with ULO  Mapping)

This assignment is designed to assess student’s knowledge and skills related  to the following learning outcomes: 

a. Apply socio-technical contexts in analyzing digital forensic evidence c. Investigate the nature and extent of a network intrusion d. Demonstrate competence in applying industry-standard forensic analysis  techniques

Weight 

20% of the Total Assessment

Total Marks 

100

Word limit 

See instructions section

Due Date 

25 September 2024, 11:55 PM

Submission  

Guidelines

All work must be submitted on Moodle by the due date along with a  completed Assignment Cover Page.  

The demonstration video must include the presenters’ video. It must be  created using the Zoom app.  

The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri  (Body) font and 2 cm margins on all four sides of your page with  appropriate section headings.  

Reference sources must be cited in the text of the report, and listed  appropriately at the end in a reference list using IEEE referencing style for School of Business and School of Information Technology and  Engineering respectively.

Extension 

If an extension of time to submit work is required, a Special Consideration  Application must be submitted directly in AMS. You must submit this  application three working days prior to the due date of the assignment.  Further information is available at:  

Academic Misconduct 

Academic Misconduct is a serious offense. Depending on the seriousness  of the case, penalties can vary from a written warning or zero marks to  exclusion from the course or rescinding the degree. Students should make  themselves familiar with the full policy and procedure available at: For  further information, please refer to the Academic Integrity Section in your  Unit Description.


Use of  

Generative Artificial Intelligence  

(Gen AI) in  

Assessments

More information about the use of Gen AI in student assessment can be found in the full policy and procedure available at 

Further support can be found in the MIT Lib Guide: Using Gen AI at  MIT 

Gen AI is permitted to be used as a research tool only and should not be  included in the assignment.

Assignment Description 

Tasks: 

There are two parts to this assignment, i.e. part A and part B. 

A. Write a group report on one of the following topics listed in Part A. Your tutor will allocate  you a group number (maximum of four students in a group) and your topic. (65 Marks) B. Demonstration. Make a group video demonstration of three digital forensics tools.  (35 Marks)  

Part A description: 

Topic 1 – Internet of Things Forensics: Challenges and approaches 

Today is the era of the Internet of Things (IoT), millions of machines such as cars, smoke detectors,  watches, glasses, webcams, and other things that have the ability to connect, collect and exchange  data over a wired and wireless network are being connected to the internet. The number of machines  that possess the ability of remote access to monitor and collect data is continuously increasing. This  development makes, on one hand, human life more comfortable, and convenient, but it also raises  other hand issues on security and privacy. However, this development also raises challenges for the  digital investigator when IoT devices are involved in crime scenes. Your report should cover the  following points. 

History and background of Internet of Things Forensics: Provide an overview of the  emergence and evolution of IoT forensics, including its historical and technological  background. 

Comparison of traditional digital forensics vs. IoT forensics: Highlight the key differences  between traditional digital forensics and IoT forensics, including the unique challenges  posed by IoT devices in terms of data collection, storage, and analysis. 

Forensic approaches for IoT devices: Describe the different forensic approaches and  methodologies used in investigating IoT devices, including the collection and  preservation of digital evidence from IoT devices. 

Issues in IoT forensics: Address the security, privacy, and legal issues associated with IoT  forensics, including the potential risks and challenges involved in investigating crimes  involving IoT devices. 

Type of evidence and challenges in IoT forensics: Discuss the types of evidence that  could be found in IoT forensics investigations, as well as the challenges in collecting and analyzing such evidence, including issues related to data integrity, authenticity, and  encryption. 

Significance of digital forensics for the IoT ecosystem: Analyze and discuss the  significance of digital forensics in the context of the IoT ecosystem, including its role in  ensuring trust, security, and accountability in IoT deployments. 

Existing techniques for IoT forensics: Review and analyze the existing techniques and  methodologies used in IoT forensics, and identify the best technique based on their  strengths, limitations, and applicability to different IoT devices and scenarios. 

Challenges and solutions in IoT forensics: Analyze the challenges faced by digital  investigators in IoT forensics, and propose or review a number of solutions that can be  taken to overcome these 

Topic 2 – Mobile Forensics: Challenges and approaches 

The proliferation of mobile devices such as smartphones and tablets in the consumer market has  resulted in a growing demand for forensic examination of these devices. Mobile devices often carry  sensitive data and can be easy targets for cybercriminals, making mobile security essential. Mobile  security testing aims to detect vulnerabilities and malicious apps on mobile devices. This research  survey will focus on the challenges in mobile forensics in cloud computing and analyze the most  recent solutions and developments in this area. The article should cover the following points: 

History and Background of Mobile Forensics: Provide an overview of the evolution of  mobile forensics, including its history and background. Discuss the emergence of mobile  devices and their increasing prevalence in the consumer market, leading to the need for  mobile forensics. 

Type of Evidence and Challenges in Mobile Computing: Describe the different types of  evidence that could be found in mobile devices, such as contacts, call history, message  data (SMS, MMS, and emails), media files, and other databases. Discuss the challenges  that digital forensic practitioners may face in extracting and analyzing this evidence from  mobile devices in cloud computing environments. 

Significance of Digital Forensics for Mobile Computing: Analyze and discuss the  significance of digital forensics in the context of mobile computing. Highlight the  importance of mobile forensics in investigating and prosecuting cyber crimes involving  mobile devices, and its role in ensuring data integrity, authenticity, and admissibility in  legal proceedings. 

Digital Forensics Tools for Mobile Investigations: Discuss the digital forensic tools that  could be useful for conducting mobile forensic investigations. Review popular mobile  forensic tools available in the market and discuss their features, capabilities, and  limitations in extracting and analyzing evidence from mobile devices. 

Overview of Capabilities of Three Popular Mobile Forensic Tools: Provide an overview of  the capabilities of three popular mobile forensic tools, specifically focusing on their  performance in three mobile phones based on Apple’s iOS and Google’s Android  operating systems. Discuss the features and functionalities of these tools and their  effectiveness in extracting and analyzing different types of evidence. 

Limitations of Mobile Forensic Tools: Describe the limitations of the three mobile  forensic tools in accessing contacts, call history, message data (SMS, MMS, and emails),  media files, and other databases on Apple’s iOS and Google’s Android. Discuss the  challenges and issues that digital forensic practitioners may face in using these tools,  including limitations in data extraction, data integrity, and data admissibility in legal  proceedings.

Forensic Approaches for Mobile Forensics: Describe the forensic approaches that can be  used in mobile forensics, including logical, physical, and file system-level analysis.  Discuss the advantages, limitations, and best practices of these approaches in the  context of cloud computing environments. 

Mobile Forensics Issues and Challenges: Review the current issues and challenges in  mobile forensics, including the rapid evolution of mobile devices, frequent software  updates, encryption, cloud storage, anti-forensic techniques, and legal and ethical  considerations. Discuss the impact of these issues on the forensic investigation of mobile  devices and the difficulties faced by digital forensic practitioners. 

Issues in Mobile Computing Affecting Forensic Investigation: Describe the issues in  mobile computing that could affect the forensic investigation of mobile devices,  including device fragmentation, different operating systems, cloud storage, encryption,  and anti-forensic techniques. Discuss the challenges and limitations of mobile forensics  in addressing these issues and extracting accurate and reliable evidence. 

Performance Evaluation of Three Mobile Forensic Tools: Examine the performance of  three mobile forensic tools in terms of their accuracy, reliability, and efficiency in  extracting and analyzing evidence from mobile devices. Discuss the strengths and  

weaknesses of these tools and provide recommendations for improving their  performance. 

Topic 3 – Cloud Forensics: Challenges and approaches 

Cloud computing may well become one of the most transformative technologies in the history of  computing. As a result of the technology and methods used in cloud computing, forensic  investigation techniques face different types of issues while inspecting the case. Write a research survey of the forensic challenges in cloud computing and analyze their most  recent solutions and developments. Your article should cover the following points. Describe forensic approaches for cloud forensics. 

Discuss the type of evidence that could be found with challenges in Cloud computing. Analyze and discuss the significance of digital forensics for Cloud computing.  Review the Cloud Forensics Issues & Challenges. 

Describe the issues in cloud computing that would affect the forensic investigation. List of challenges facing the cloud forensic investigation.  

List the digital forensics tools that could be useful for doing cloud forensics investigation.  Discuss technologies and techniques in the existing solutions and future works Propose/ Review a number of solutions that can be taken to overcome these challenges 

Topic 4 – Email and Social Network Forensics: Challenges and approaches 

Email and social networking applications such as Facebook, Twitter, and LinkedIn may be involved  in instances of misuse such as copyright infringement, data protection violations, defamation,  identity theft, harassment, and dissemination of confidential information and  malware that can affect both organizations and individuals. As a result of the technology and  methods used in Email and Social Network Forensics, forensic investigation techniques face  different types of issues while inspecting the case. 

Write a research survey of the forensic challenges in Email and social networks and analyze their  most recent solutions and developments. Your article should cover the following points. Describe forensic approaches for Email and Social Network Forensics.

Discuss the type of evidence that could be found with challenges in Email and Social  Network Forensics. 

Analyze and discuss the significance of digital forensics for Email and Social Network  Forensics.  

Review the Email and Social Network Forensics Issues & Challenges. 

Describe the issues in Email and Social Network Forensics that would affect the forensic  investigation. 

List of challenges facing the Email and Social Network Forensics investigation. List the digital forensics tools that could be useful for doing Email and Social Network  Forensics investigations.  

Discussion of technologies and techniques in the existing solutions and future works Propose/ Review a number of solutions that can be taken to overcome these challenges 

Instructions: 

Prepare your article as below: 

1. Complete the assignment (minimum 6 and maximum 19 pages) including all the sections  below. The number of words will be counted thoroughly, and you must keep the minimum  number of words to avoid any penalties. 

Title (maximum 15 words) Abstract (200 – 250 words) Introduction (400 – 1000 words) Literature Review (1000 – 2000 words) Main body (500 – 1000 words) Results (200 – 500 words) Conclusion (200 – 500 words) Future Works (150 – 500 words) References (minimum 8 references) 

2. The article must be a ‘Review’1 article, including at least 6 references and not more than 25. 

Part B Description: 

Make a group video demonstration of three digital forensics tools. Prepare slides (between 8 – 12 slides) for your video demonstration. As a team of four, create a 5-8 minutes video demo using the  Zoom application (along with the presenters’ video) addressing the following tasks: 

1. Analyze and discuss the importance of your selected digital forensics tools  2. Perform three selected digital forensics tools  

3. Identify and discuss the strengths and weaknesses of each digital forensics tool  4. Which digital forensics would you recommend? Justify your recommendation.  

Submission Guidelines 

The assignment should be submitted on Moodle in two separate files: 

o The report should be submitted as a Word file 

o The demonstration should be submitted as a video file 

The demonstration video must include the presenters’ video.  

Do not use Wikipedia as a source or a reference. 

Make sure you properly reference any diagram/graphics used in the assignment.

Marking criteria: 

Marking criteria for Assignment #2

Section to be  

included in the  

report

Detailed Description of the Criteria 

Marks

Abstract 

A contextual sentence about the motivation behind your  research topic. 

Your thesis statements. 

A descriptive statement about the types of literature used in  the review. 

Summarize your findings. 

Conclusion(s) based upon your finding

5

Introduction and  background 

Introduction about your selected topic: 

State the general topic and give some background. 

Provide a review of the literature related to the topic. Convince the reader that the research area is  

significant/important/interesting. 

Define the terms and scope of the topic. 

Evaluate the current situation (advantages/ disadvantages)  and identify the gap.

10

Literature  

review

Literature review of your topic: 

Discuss in your review the approaches, limitations, and  conclusions of past reviews. 

Discuss the type of evidence. 

Severe penalties apply for simple listing and describing. It  should be a logically supported analysis that reaches the review  conclusion that should be included at the end of the section.  Check word limit.

10

Main sections 

Information about your selected topic. 

A general purpose and all relevant methods are stated using  the correct scientific terminology.

10

Results 

Examined the performance of three digital forensic tools based on your selected topic.

10


 

Figures and tables created should be created yourself and not  copied from elsewhere. For full marks, you should create at  least 2 figures and 2 tables. 

Findings and implications for digital forensic practitioners.

 

Conclusion 

A brief summary of the overall findings in relation to the  purpose of the study. 

Summary of thesis argument with concluding ideas that  impact the reader.

10

References  

section and body  citation 

Must consider at least five current references from  journal/conference papers and books. 

Strictly follow the order and instructions by IEEE. Check  when/where to put the citation. 

5

Report  

presentation

Writing is clear and relevant, with no grammatical and/or  spelling errors – polished and professional.

5

Part II: Video  

Demonstration 

Description of the section 

Marks

Digital forensics  tools  

demonstration

1. Analyze and discuss the importance of your selected digital  forensics tools [5 Marks] 2. Perform three selected digital forensics tools [10 Marks] 3. Identify and discuss the strengths and weaknesses of each digital  forensics tool [5 Marks] 4. Which digital forensics would you recommend? Justify your  recommendation. [5 Marks]

25

Presentation 

The information and technical knowledge are presented clearly and  effectively. Presentation marks will be awarded based on individual  performance and contributions to the video.

5

Teamwork and  Collaboration

Excellent teamwork and collaboration skills must be demonstrated 

5

Total 

Total Assignment Marks 

100

Example Marking Rubric for Assignment #2:

Marking 

Rubric  

Criteria/  

Grades

High  

Distinction  

(HD)  

[Excellent] 

>80%

Distinction  

(D) [Very  

Good] 

70%-80%

Credits 

(C) [Good] 

60%-70%

Pass (P)  

[Satisfactory] 50%-60%

Fail (N)  

[Unsatisfactory] 

<50%

Abstract /5 

clearly stated  

and  

appropriately  

focused;

clearly stated  

but the focus  

could have  

been sharper

Abstract 

phrasing tool  

simple, lacks  

complexity; or,  not clearly  

worded

Abstract lacks a  clear objective  

and/or does  

not “fit” the  

content of  

essay

Abstract not evident

Introduction  

and background

Exceptional  

introduction that  grabs interest of 

Proficient  

introduction 

Basic  

introduction 

Paper’s  

purpose is 

Weak or no introduction of  topic.


/10 

reader and states  topic. 

Thesis/topic is  

exceptionally  

clear, well 

developed, and  a definitive  

statement.

that is  

interesting and  stated topic.  

Thesis/topic is  

clear and  

arguable  

statement of  

position.

that states  

topic but lacks  

interest.  

Thesis/topic is  

somewhat  

clear and  

arguable.

unclear.  

Thesis/topic is  

weak or  

missing.

 

Literature  

review /10

Demonstrated  

excellent ability  to think  

critically and  

sourced  

reference  

material  

appropriately 

Demonstrated  

excellent  

ability to think  

critically but  

did not source  

reference  

material  

appropriately 

Demonstrated  

ability to think  

critically and  

sourced  

reference  

material  

appropriately 

Demonstrated  

ability to think  

critically and  

did not source  

reference  

material  

appropriately 

Did not demonstrate  

ability to think critically  and did not source  

reference material  

appropriately 

Main sections 

/10

All elements are  present and  

very well  

integrated. 

Components  

present with  

good cohesive 

Components  

present and  

mostly well  

integrated

Most  

components  

present 

Proposal lacks structure. 

Results /10 

Logic is clear  

and easy to  

follow with  

strong  

arguments 

Consistency  

logical and  

convincing 

Mostly  

consistent  

logical and  

convincing 

Adequate  

cohesion and  

conviction 

Argument is confused and  disjointed 

Conclusion /10

Excellent  

summary of  

thesis argument  with concluding  ideas that impact the reader. 

Introduces no  

new  

information.

Good summary  of topic with  

clear concluding  ideas. 

Introduces no  

new  

information.

Basic summary  of topic with  

some final  

concluding  

ideas. 

Introduces no  

new  

information.

Lack of  

summary of  

topic.

Lacks consistency with  

many errors 

References  

section and  

body citation /5

Clear styles  

with excellent  

source of  

references.

Clear  

referencing  

style

Generally good  referencing  

style

Unclear  

referencing  

style

Lacks consistency with  

many errors.

Report  

presentation /5

Writing is clear  

and relevant,  

with no  

grammatical  

and/or spelling  errors – 

polished and  

professional.  

Reference,  

citations and  

images are  

properly  

formatted.

Most ideas are  stated clearly  

and are related  to the topic,  

with only  

minor  

grammatical  

and/or spelling  errors.  

References,  

citations and  

images are  

adequate.

Many ideas  

require  

clarification,  

are off-topic or  have little  

relevance to  

the  

assignment. 

Paper does not  meet the  

criteria for the  

assignment  

(too short or  

incomplete, too  long, and/or  

completely off 

topic). 

Writing is clear and  

relevant, Many  

grammatical and/or  

spelling errors; very  

challenging to read, poor  writing flow. Improper  

references and/or  

citations section.


Digital forensics  tools  

demonstration  

/25

An in-depth and  very clear  

discussion  

about Digital  

forensics tools

Very clear  

discussion  

about Digital  

forensics tools

Generally good  discussion  

about Digital  

forensics tools

A brief 

discussion  

about Digital  

forensics tools

Irrelevant discussion  

about Digital forensics  

tools

Presentation /5 

The  

presentation  

was a concise  

summary of the  topic with all  

questions  

answered.  

Comprehensive  and complete  

coverage of  

information.

The  

presentation  

was a good  

summary of the  topic.  

Most  

important  

information  

covered; little  

irrelevant info.

The  

presentation  

was informative  but several  

elements went  unanswered.  

Much of the  information  

irrelevant;  

coverage of  some of the major  points.

The presentation  was a brief look  at the topic but  many questions  were left  

unanswered.  

Majority of  information  

irrelevant and  significant points  left out.

Inappropriate/disinterested  body language

Teamwork and  

Collaboration 

/5

Excellent 

Very good 

good 

satisfactory 

Unsatisfactory