2022 T2 BN309 Assignment 2 MEL SYD V1.0 Prepared by: ABM Russel XXXXXXXXXXModerated by: Dr Sanjeeb Shrestha August, 2022 Assessment Details and Submission Guidelines Unit Code BN309 Unit Title...

1 answer below »
Help


2022 T2 BN309 Assignment 2 MEL SYD V1.0 Prepared by: ABM Russel Moderated by: Dr Sanjeeb Shrestha August, 2022 Assessment Details and Submission Guidelines Unit Code BN309 Unit Title Computer Forensics Assessment Type Individual Assessment Title Computer forensics and anti-forensics techniques Purpose of the assessment (with ULO Mapping) This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them. • Document evidence and report on computer forensics findings; • Implement a number of methodologies for validating and testing computer forensics tools and evidence; • Exhibit and understand forensics ethical behaviour and professional conduct; • Implement a process to support the administration and management of computer forensics; • Conduct practical investigations into computer forensics, including industry and legal procedures with respect to data acquisitions. Weight 20% Total Marks 80 Word limit See the instructions. Due Date Wednesday 11:55pm 28 September 2022 Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension • If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and- guidelines/specialconsiderationdeferment Academic Misconduct • Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute- publications/policies-procedures-and-guidelines/Plagiarism-Academic- Misconduct-Policy-Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. Prepared by: ABM Russel Moderated by: Dr Sanjeeb Shrestha August, 2022 Assignment Description Objectives: The objective of this assignment is to gain theoretical and practical knowledge in different computer forensics and anti-forensics techniques. The students should apply appropriate computer forensics tools and techniques and write a report on their findings. Marks will be awarded based on the sophistication and the in-depth exploration of the techniques. Case Study: You are investigating a recent Intellectual Property theft case. Assignment Specification: Prepare a report and video demonstration on the following sections related to the case study. You need to research effective tools appropriate for this case. You can use your own files for analysis. Provide the list of references using IEEE referencing style at the end of the report. Task 1: Steganography Use steganography to hide data in two image files (jpeg and bmp). For the assignment purpose, use a secret text containing “MITXXXXXX”, where XXXXXX is your student number. Explain each step with the help of screenshots from the tool you used. (250 words). Task 2: Anti-forensics Research on two anti-forensics techniques and write a report on your findings on these techniques. Compare the pros and cons of these techniques in different contexts. Use one of the anti-forensic techniques on your file and explain how useful it is. Please explain your methods with the help of screenshots. (750 words) Demonstration Interview during lab session. You also need to prepare a video demonstration of your work. You should appear in the video (You Tube or similar) at the first and last 30 secs to introduce yourself and draw a conclusion on your experience with the different computer forensics and anti-forensics techniques. Prepared by: ABM Russel Moderated by: Dr Sanjeeb Shrestha August, 2022 Marking Criteria: Questions Description Marks Task 1 Data hiding using steganography Explanation of procedure and screenshots 10 10 Task 2 Anti-forensic techniques Pros and Cons Application of anti-forensic on files 10 10 10 Presentation Writing quality, Coherence, Report Structure 10 Reference style Follow IEEE reference style (should have both in-text citation and reference list) 10 Demonstration Interview and video demonstration 10 Total 80 Marking Rubric Grade Mark HD >=80% D 70%-79% CR 60%-69% P 50%-59% Fail<50% excellent very good good satisfactory unsatisfactory task 1 two tools listed and appropriate requirements specified and issues identified with explanation of procedure and screenshots two tools listed and some requirements specified and issues identified with explanation of procedure and screenshots two tools listed but incomplete requirements specified with a few explanations of procedure and screenshots missing explanation of procedure and/or screenshots unsatisfactory task 2 explained the act and the important key points provided an idea about the act with the key points did not provide a clear picture of the act with the key points included missing explanation and key points unsatisfactory presentation the presentation was a concise summary of the topic with all questions answered. comprehensive and complete coverage of information. the presentation was a good summary of the topic. most important information covered; little irrelevant info. the presentation was informative but several elements went unanswered. much of the information irrelevant; coverage of some of major points. the presentation was a brief look at the topic but many questions were left unanswered. majority of information irrelevant and significant points left out. unsatisfactory prepared by: abm russel moderated by: dr sanjeeb shrestha august, 2022 reference style clear styles with excellent source of references. clear referencing/ style generally good referencing/style unclear referencing/style unsatisfactory demonstration very professional, clear and easy to follow. professional, clear and easy to follow clear and easy to follow but lacks professionalism difficult to follow unsatisfactory excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" task="" 1="" two="" tools="" listed="" and="" appropriate="" requirements="" specified="" and="" issues="" identified="" with="" explanation="" of="" procedure="" and="" screenshots="" two="" tools="" listed="" and="" some="" requirements="" specified="" and="" issues="" identified="" with="" explanation="" of="" procedure="" and="" screenshots="" two="" tools="" listed="" but="" incomplete="" requirements="" specified="" with="" a="" few="" explanations="" of="" procedure="" and="" screenshots="" missing="" explanation="" of="" procedure="" and/or="" screenshots="" unsatisfactory="" task="" 2="" explained="" the="" act="" and="" the="" important="" key="" points="" provided="" an="" idea="" about="" the="" act="" with="" the="" key="" points="" did="" not="" provide="" a="" clear="" picture="" of="" the="" act="" with="" the="" key="" points="" included="" missing="" explanation="" and="" key="" points="" unsatisfactory="" presentation="" the="" presentation="" was="" a="" concise="" summary="" of="" the="" topic="" with="" all="" questions="" answered.="" comprehensive="" and="" complete="" coverage="" of="" information.="" the="" presentation="" was="" a="" good="" summary="" of="" the="" topic.="" most="" important="" information="" covered;="" little="" irrelevant="" info.="" the="" presentation="" was="" informative="" but="" several="" elements="" went="" unanswered.="" much="" of="" the="" information="" irrelevant;="" coverage="" of="" some="" of="" major="" points.="" the="" presentation="" was="" a="" brief="" look="" at="" the="" topic="" but="" many="" questions="" were="" left="" unanswered.="" majority="" of="" information="" irrelevant="" and="" significant="" points="" left="" out.="" unsatisfactory="" prepared="" by:="" abm="" russel="" moderated="" by:="" dr="" sanjeeb="" shrestha="" august,="" 2022="" reference="" style="" clear="" styles="" with="" excellent="" source="" of="" references.="" clear="" referencing/="" style="" generally="" good="" referencing/style="" unclear="" referencing/style="" unsatisfactory="" demonstration="" very="" professional,="" clear="" and="" easy="" to="" follow.="" professional,="" clear="" and="" easy="" to="" follow="" clear="" and="" easy="" to="" follow="" but="" lacks="" professionalism="" difficult="" to="" follow="">
Answered 3 days AfterSep 06, 2022

Answer To: 2022 T2 BN309 Assignment 2 MEL SYD V1.0 Prepared by: ABM Russel XXXXXXXXXXModerated by: Dr Sanjeeb...

Shubham answered on Sep 09 2022
61 Votes
Task 1
Data hiding using steganography
Steganography is the art of hiding data like hiding sensitive data into the digital image. It can provide better security than cryptography and it can help in hiding conten
ts of messages. It is a formal mechanism of data encryption and this method is used for converting the message into ciphertext with the use of encryption algorithm and the message can be sent to the recipient who is authorized for receiving and getting the original message [4]. The electronic communication can include steganography coding inside the transport layer like image file, program or document file. It is based on a data hiding technique that uses an LSB based algorithm for hiding secret messages by embedding it in cover media like images. Images are used for steganography because digital images are insensitive to the visual system of humans and it can be considered as a good cover carrier.
Explanation of procedure and screenshots
Image 1
The above image is the tool that will be used for steganography, this will include use of image and a text that will be hidden in the image.
In the above image, the image named “milky-way-2695569__340” has been selected and text message “MIT123456” will be hidden in the image.
On the above file, the data gets hidden in the image with the use of steganography technique.
Image 2
The above shows the layout of the tool that is used for steganography.
In this process, image named “ocean-3605547__340” has been used for hiding the text that is “MIT123456”.
The above image is the output of steganography and text is hidden in the above image.
Task 2
Anti-forensic techniques
File encryption is another anti-forensic technique that can be used for processing the readable data into the unreadable format with the use of various encryption algorithms. The encryption of files can be an effective way for protecting the data from anti-forensic tools that can also be used for encrypting files with the intent for making the data difficult to decode or access. It is the way for encoding the file that has sensitive data for sending the file securely. The...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here