Assignment Overview
You are required to forensically investigate how to identified (methods/techniques) sources of data on one of the categories listed in the following table. This involves you uploading, downloading and identify who can read data and determine how you can prove who uploads, downloads, watch/read content. You are to use spoofing techniques such as IP/MAC/email spoofing to see if you can still identify the source.
Check timestamp issues. You must investigate five (5) forensics techniques throughout your investigation. It is expected to use multiple tools and techniques to establish the claim.
Report (40%) Must have these headings and if appropriate have sub-headings
Cover Page: Name, Student ID, Subject Code.
Executive Summary – must be a page long. Must cover the entire report.
Introductions
Methods and Techniques (describe 5 with appropriate screenshots)
Conclusion – (include lessons learnt)
Appendix – any images, logs, graphs that are too big for the main body.
Presentation (10%) – 5 minutes + 2 minutes questions
Present your findings in a video (or in classes).
Must be available to answer questions.
Do Not submit Google’d keywords and give definitions
Do Not engaged in questionable activities (either academic misconduct or illegal activities)
Always submit your own work (e.g. your contribution)
Make sure there is significant proof such as screenshots, video, logs with timestamp, etc of your own work.
You can use any tool(s). Such as Wireshark, Netminer, windows event viewer, logs, etc. Or it is beneficial to learn new tools.
Due Date & Submission
By the due date, you must submit:
1. Name your file with your student number
2. Softcopy of your video link to MOODLE. By submitting on MOODLE you agree that the work is yours unless properly cited.
3. Fail to submit may result in a fail.
Late submission of assignments will be penalised as follows:
• For assignments 1 to 5 days late, a penalty of 10% (of total available marks) per day.
• For assignments more than 5 days late, a penalty of 100% will apply.
Your submission must be compatible with the software (PDF/Word) in Melbourne Polytechnic, Computer Laboratories/Classrooms.
Extensions:
Under normal circumstances extensions will not be granted. In case of extenuating circumstances—such as illness—a Special Consideration
form, accompanied by supporting documentation, must be received before 3 working days from the due date. If granted, an extension will be only granted only by the time period stated on the documentation; that is, if the illness medical certificate was for one day, an extension will be granted for one day only. Accordingly the student must submit within that time limit. Penalties may apply for late submission without an approved extension.
Penalties:
Academic misconduct such as cheating and plagiarism incur penalties ranging from a zero result to program exclusion.