CC6011NI Digital Investigation and E-Discovery – Islington College

https%3A%2F%2Fdrive.google

ieQpP65AsagYO4q7Iz6zym6k2fGWsxn 5aUL3e1tvcC7HlThA9DtMgHewrcM4vvwoEaiC1LLkcq9fjGJnme0M6q8NKX 2skh3syEXgfMNRoV2gM02mBMx5sRVMlBZuMv9gJNvrsS2kJ 7McsYj53y7o

MAIN SIT COURSEWORK QUESTION PAPER: Year Long 2023/2024 

Module Code: CC6011NI Module Title: Digital Investigation and E-Discovery Module Leader: Mr. Monil Adhikari
Coursework Type: Individual Coursework Weight:This coursework accounts for 50%of your total module grades. Submission Date: Week 12 (Thursday, 11 January 2024) When Coursework is  Week 3 given out: Submission  Submit the following to Islington College’s MST portal before  Instructions: the due date (before 01:00 PM on the due date): ● The documentation in MS Word compatible or PDF  format Warning:London Metropolitan University and Islington College takes  Plagiarism seriously. Offenders will be dealt with sternly.

© London Metropolitan University

Plagiarism Notice 

You are reminded that there exist regulations concerning plagiarism. 

Extracts from University Regulations on Cheating, Plagiarism and Collusion 

Section 2.3: “The following broad types of offence can be identified and are provided as  indicative examples ….. 

i.Cheating: including copying coursework. 

ii.Falsifying data in experimental results. 

iii.Personation, where a substitute takes an examination or test on behalf of the candidate.  Both candidate and substitute may be guilty of an offence under these Regulations. iv.Bribery or attempted bribery of a person thought to have some influence on the  candidate’s assessment. 

v.Collusion to present joint work as the work solely of one individual. 

vi.Plagiarism, where the work or ideas of another are presented as the candidate’s own. vii.Other conduct calculated to secure an advantage on assessment. 

viii.Assisting in any of the above. 

Some notes on what this means for students: 

i.Copying another student’s work is an offence, whether from a copy on paper or from a  computer file, and in whatever form the intellectual property being copied takes, including  text, mathematical notation and computer programs. 

ii.Taking extracts from published sources without attribution is an offence. To quote ideas,  sometimes using extracts, is generally to be encouraged. Quoting ideas is achieved by  stating an author’s argument and attributing it, perhaps by quoting, immediately in the  text, his or her name and year of publication, e.g. ” e = mc2 (Einstein 1905)”. A reference  section at the end of your work should then list all such references in alphabetical order  of authors’ surnames. (There are variations on this referencing system which your tutors  may prefer you to use.) If you wish to quote a paragraph or so from published work then  indent the quotation on both left and right margins, using an italic font where practicable,  and introduce the quotation with an attribution. 

Further information in relation to the existing London Metropolitan University regulations  concerning plagiarism can be obtained from http://www.londonmet.ac.uk/academic regulations

SCHOOL OF COMPUTING AND DIGITAL MEDIA 

MODULE: CC6011 DIGITAL INVESTIGATION & E-DISCOVERY 

SPECIFICATION OF THE COURSE WORK (SEM 1 2023-24) (MAIN SIT)● Individual technical report in about 1500 words 

● Weighting: 50% 

This technical report should be the culmination of good literature review work carried out  through using a wide mix of sources: lecture slides, textbooks, industrial standards and  guidelines, research papers, and web resources.  

It should present the appropriate backgroundon the topic area of interest. It should also  present technical content in relative depthlooking at all the issues concerned. The  report needs an introduction at the beginning and a conclusion at the end. Your lecturer  also prefers the report should be criticalin terms of literature review and creativein  terms of the report content (incl. method, results, and evaluation). A list of resources 

referenced, and a separate bibliography should be produced in the Harvard/IEEE  reference format.  

The two links can be good references for report structure (though not restricted to the  two): 

1. http://www2.port.ac.uk/media/contacts-and-departments/student-support services/ask/downloads/Key-features-of-academic-reports.pdf 

2. https://www.wordy.com/writers-workshop/writing-an-academic-report/ 

The key texts indicated in the module specification, specialist journals, and various Web  sites, such as Computer Crime Research Centre(http://www.crime-research.org/),  Uniting Forensic Computing Practitioners!(http://www.f3.org.uk/), Computer Forensics:  Anti-Forensic Tools & Techniques  (https://resources.infosecinstitute.com/category/computerforensics/introduction/areas 

of-study/digital-forensics/anti-forensic-tools-techniques/#gref), and The Metasploit  Project Web site(http:// http://www.metasploit.com/), etc. provide a good guidance in  terms of the report content.

The technical report is to be based on one of the topics listed below, which link to one or  more sections of the module syllabus.  

1. real-time analytical techniques to detect security events 

2. open-source digital forensics tools, anti-forensics tools and scenarios 3. mobile forensics and anti-forensics development, tools and scenarios 4. computer forensics and anti-forensics development, tools and scenarios 5. Information war or cyber warfare analysis, techniques, tools and scenarios 6. Metasploit and its applications in pen test and anti-forensics 

7. data hiding and detection techniques 

8. techniques and tools for elimination of digital evidence 

9. steganography and steganalysis techniques  

10.digital watermarking and media signature 

11.direct attacks against computer forensic tools 

12.covert channel analysis and data hiding in TCP/IP  

13.Threat Intelligence and development 

14.digital/cybercrime evolution, detection, and prevention 

15.anti-forensics techniques, tools, scenarios, and application 

16.a comprehensive study of social engineering in computer security 17.data analytics in digital forensics and crime investigation 

Assessment Guidelines and Submission Details 

This report should have about 1500 wordsin length (excluding references and  bibliography).  

If you think there is a good reason for late submission, such as disability or illness,  and you have supporting documentary evidence then you should contact the PAT  in advance for the arrangement of late submission through emails.

Marking Scheme 

The coursework is assessed on the following criteria:

Items 1. academic challenge/originality  Weighting
10%
2. analysis/research  35%
3. critical reflection and conclusion  15%
4. clarity of expression and readability  15%
5. construction and presentation of the document  15%
6. reference and bibliography  10%

63 Comments

Leave a Reply

Your email address will not be published. Required fields are marked *