Microsoft Word - SIT703_A3_T2_2020.docx Assessment Information Assessment 3: Digital Forensic Report This document supplies detailed information on assessment tasks for this unit. Key information •...

1 answer below »
assignment


Microsoft Word - SIT703_A3_T2_2020.docx Assessment Information Assessment 3: Digital Forensic Report This document supplies detailed information on assessment tasks for this unit. Key information • Due: Friday 2 October 2020 by 20:00 (AEST) • Weighting: 60% • Word count: 4000 words Learning Outcomes This assessment assesses the following Unit Learning Outcomes (ULO) and related Graduate Learning Outcomes (GLO): Unit Learning Outcome (ULO) Graduate Learning Outcome (GLO) ULO 1: Apply knowledge of security on Windows network domain and follow standard procedure to investigate different types of cyber-crime GLO 1: Discipline knowledge and capabilities GLO 3: Digital literacy GLO 4: Critical thinking ULO 2: Investigate the usefulness of various forensic techniques and apply relevant methods to gain access and recover computer crime data GLO 1: Discipline knowledge and capabilities GLO 3: Digital literacy GLO 4: Critical thinking GLO 5: Problem solving ULO 3: Analyze and review findings to further probe and investigate computer crimes GLO 1: Discipline knowledge and capabilities GLO 3: Digital literacy GLO 4: Critical thinking GLO 5: Problem solving ULO 4: Reflect on findings and prepare reports for the target audience with justified findings GLO 2: Communication GLO 4: Critical thinking GLO 5: Problem solving Purpose Students should demonstrate their ability to review and critique the digital forensic hackathons hosted in recent years and their write-ups. Understanding these digital forensic tasks and their technical solutions will significantly help students deepen the understanding of the industry’s standard practice and general expectations of forensic abilities in the job market. Hackathon experiences and achievements have been valuable in the cybersecurity industry. Students will identify, investigate, and evaluate six forensic hackathon tasks and the associated write-ups. Students will be assessed on their ability to identify the appropriate tasks and write-ups, reproduce the technical solutions, justify the technical findings, reflect on the learning experiences, and present a professionally written essay. Instructions Students are required to independently write an essay of approximately 4,000 words and exhibits to support the findings and a bibliography. This essay should consist of the following parts: • a professionally made title page with student name and student ID • an abstract of 200 words capturing the highlights of the findings • a non-technical section summarizing the six identified hackathon tasks and brief descriptions of their write-ups along with justifications of their digital forensic relevance • a non-technical section critiquing the issues of the existing write-ups of each hackathon task in multiple perspectives • a technical section reproducing the solutions of the six hackathon tasks by using proper digital forensic tools with supporting evidence (screenshots) • a non-technical section reflecting personal learning experiences towards solving these tasks and aligning these to our curriculum • conclusion (around 150 words) • reference (Harvard style) Assessment Information All submitted essays will be assessed in the following five facets. Each facet has 12 maximal marks, and the total mark for the essay is 60. The marking rubrics on the next page reflect a summary of these facets with various competence levels. The five facets are explained as follows: 1. Quality of presentation. The essays should be written independently with original ideas, which will be measured by the TurnItIn similarity scores. Deakin values independent and original work. The essay should contain approximately 4,000 words in well-organized paragraphs and sections without grammar mistakes. The paragraphs and sections should follow logical orders and be well connected. A proper referencing style (Harvard) should be followed. 2. Quality of identified hackathon tasks. The six identified hackathon tasks should be independent of each other so that they cover a broad spectrum of digital forensic investigations. The hackathon tasks should be obtained from credible venues, and they should be less than three years old and maximally five years old. The existing write-ups need to be summarized in concise language. All six identified tasks should be justified to be related to the digital forensic investigation in the essay. All necessary links and references should be provided in the essay. 3. Quality of analyzing existing write-ups. The write-ups should be analyzed thoroughly to identify the room for improvement. Most write-ups are suboptimal, missing certain steps, and even contain errors because they are quickly written by hackathon participants soon after the event. If a hackathon task has multiple write-ups, different versions of write-ups should be compared to hypothesize the best method to solve the hackathon task; if there is only one write-up available, an alternative solution should be proposed to improve the current solution. 4. Quality of solving the identified hackathon tasks. Individual solutions should be developed based on the proposal in the previous section. Individual solutions towards the hackathon tasks should be provided with evidence like screenshots with step-by-step instructions. The solutions should be correct and fully explained. Significant contributions beyond the existing write-ups should be highlighted and summarized. 5. Quality of reflections. Personal reflections on the learning experiences of solving these hackathon tasks with alignment to our curriculum should be presented. In particular, forensic tools and investigation methods should be aligned with the topics covered in the unit. Highlights of learning experiences should be synthesized. Hints: • Cyber security hackathons are also known as “wargames”, “Capture-The-Flag”, or “CTF”. Using alternative words will improve your search results. • The website https://ctftime.org/ lists almost all hackathons occurred in the past where the references to the writeups can be also traced. SIT703 Advanced Digital Forensics Assessment Task 3: Digital Forensic Report Rubric Criteria (equally weighted, each has 12 marks max) Bronze (0 – 4 marks) Most of the following conditions are satisfied: Silver (4 – 8 marks) All the following conditions are satisfied: Gold (8 – 12 marks) All the following conditions are satisfied: Criteria 1: Quality of presentation Turnitin similarity score < 30%,="" essay="" length="" above="" 3,000="" words,="" occasional="" grammar="" mistakes,="" correct="" use="" of="" harvard="" referencing="" style,="" use="" mainly="" lay="" language="" and="" prescribed="" genre="" turnitin="" similarity="" score="">< 15%,="" essay="" length="" approximately="" 4,000="" words,="" organized="" sentences,="" paragraphs,="" and="" sections,="" rare="" grammar="" mistakes,="" correct="" use="" of="" harvard="" referencing="" style,="" use="" some="" discipline-specific="" language="" and="" prescribed="" genre="" turnitin="" similarity="" score="">< 7%, essay length approximately 4,000 words, well organized sentences, paragraphs, and sections, no grammar mistakes, correct and consistent use of harvard referencing style, use mostly discipline-specific language and appropriate genre criteria 2: quality of the identified hackathon tasks six independent hackathon tasks, summary of the existing write-ups, fair justifications to digital forensics, some links and references six independent hackathon tasks, credible venues, within the recent 5 years, concise summary of the existing write-ups, good justifications to digital forensics, most links and references six independent hackathon tasks, highly credible venues, within the recent 3 years, concise summary of the existing write-ups, excellent justifications to digital forensics, all necessary links and references criteria 3: quality of analysis identified issues of the existing write-ups, fair analysis, proposal for improvement clearly identified issues of the existing write- ups, good analysis, feasible proposal for improvement clearly identified issues of the existing write- ups, excellent analysis, novel and feasible proposal for improvement criteria 4: quality of reproducing solutions individual solution consistent with the proposal, most evidence provided in details, clear instructions, correct and partially explained solutions individual solution consistent with the proposal, all evidence provided in details, clear instructions, correct and fully explained solutions, contributions beyond the existing write-ups individual and novel solution consistent with the proposal, all evidence provided in details, clear and repeatable instructions, correct and fully explained solutions, significant contributions beyond the existing write-ups criteria 5: quality of reflections fair reflections on the learning experiences, fair alignment to the curriculum, acceptable level of synthesized knowledge and experiences good reflections on the learning experiences, good alignment to the curriculum, good level of synthesized knowledge and experiences excellent reflections on the learning experiences, excellent alignment to the curriculum, outstanding level of synthesized knowledge and experiences 7%,="" essay="" length="" approximately="" 4,000="" words,="" well="" organized="" sentences,="" paragraphs,="" and="" sections,="" no="" grammar="" mistakes,="" correct="" and="" consistent="" use="" of="" harvard="" referencing="" style,="" use="" mostly="" discipline-specific="" language="" and="" appropriate="" genre="" criteria="" 2:="" quality="" of="" the="" identified="" hackathon="" tasks="" six="" independent="" hackathon="" tasks,="" summary="" of="" the="" existing="" write-ups,="" fair="" justifications="" to="" digital="" forensics,="" some="" links="" and="" references="" six="" independent="" hackathon="" tasks,="" credible="" venues,="" within="" the="" recent="" 5="" years,="" concise="" summary="" of="" the="" existing="" write-ups,="" good="" justifications="" to="" digital="" forensics,="" most="" links="" and="" references="" six="" independent="" hackathon="" tasks,="" highly="" credible="" venues,="" within="" the="" recent="" 3="" years,="" concise="" summary="" of="" the="" existing="" write-ups,="" excellent="" justifications="" to="" digital="" forensics,="" all="" necessary="" links="" and="" references="" criteria="" 3:="" quality="" of="" analysis="" identified="" issues="" of="" the="" existing="" write-ups,="" fair="" analysis,="" proposal="" for="" improvement="" clearly="" identified="" issues="" of="" the="" existing="" write-="" ups,="" good="" analysis,="" feasible="" proposal="" for="" improvement="" clearly="" identified="" issues="" of="" the="" existing="" write-="" ups,="" excellent="" analysis,="" novel="" and="" feasible="" proposal="" for="" improvement="" criteria="" 4:="" quality="" of="" reproducing="" solutions="" individual="" solution="" consistent="" with="" the="" proposal,="" most="" evidence="" provided="" in="" details,="" clear="" instructions,="" correct="" and="" partially="" explained="" solutions="" individual="" solution="" consistent="" with="" the="" proposal,="" all="" evidence="" provided="" in="" details,="" clear="" instructions,="" correct="" and="" fully="" explained="" solutions,="" contributions="" beyond="" the="" existing="" write-ups="" individual="" and="" novel="" solution="" consistent="" with="" the="" proposal,="" all="" evidence="" provided="" in="" details,="" clear="" and="" repeatable="" instructions,="" correct="" and="" fully="" explained="" solutions,="" significant="" contributions="" beyond="" the="" existing="" write-ups="" criteria="" 5:="" quality="" of="" reflections="" fair="" reflections="" on="" the="" learning="" experiences,="" fair="" alignment="" to="" the="" curriculum,="" acceptable="" level="" of="" synthesized="" knowledge="" and="" experiences="" good="" reflections="" on="" the="" learning="" experiences,="" good="" alignment="" to="" the="" curriculum,="" good="" level="" of="" synthesized="" knowledge="" and="" experiences="" excellent="" reflections="" on="" the="" learning="" experiences,="" excellent="" alignment="" to="" the="" curriculum,="" outstanding="" level="" of="" synthesized="" knowledge="" and="">
Answered Same DaySep 28, 2021SIT703Deakin University

Answer To: Microsoft Word - SIT703_A3_T2_2020.docx Assessment Information Assessment 3: Digital Forensic Report...

Hartirath answered on Oct 01 2021
149 Votes
DIGITAL FORENSIC REPORT
Name of the student:
Name of the university:
Name of the professor:
Student ID:
Abstract
The key purpose of this paper is to describe the hackathon tasks in multiple disciplines. Basically, the hackathon task is related to draw the design of sprint like an event, which is known for the computer programmers where involvement of software development is important. The goal of hackathon activities is known to solve the challenges for different types of disciplines. Hackathon tasks are crucial for tech-savvy people; therefore, collaboration in-between tech-savvy people with advanced technologies helps to produce a positive outcome in different fields. In this case, cybersecurity is an important area for hackathon ides to meet the common goals.
However, through this paper, the researcherhas identified six different ty
pes of hackathon activities, which are as follows:
EdTech Hackathon Ideas, Health Tech Hackathon Ideas, Consumer Tech Hackathon Ideas, Auto Tech Hackathon Ideas, Financial Tech (FinTech) Hackathon Ideas, Retail Tech Hackathon Ideas.
All these ideas are relevant for a modern time where tech-savvy people need to focus on the interest of cybersecurity concepts. However, in order to accomplish this paper, the researcher has identified different issues for hackathon ideas related to chosen fields and describes its justification critically. In addition, the entire findings are reflected based on personal experiences to relate to the outcomes of the courses.
Table of Contents
Introduction:    4
Non-technical section for identification of Six hackathon tasks:    4
Hackathon’s issues    6
Personal learning experience    8
Conclusion:    9
References:    10
Introduction:
Forensic science (often called forensics) is a wide variety of scientific tools used to answer the questions of interest to the legal system. This might be related to civil or criminal litigation. Additionally to being associated to legal system, the broader forensic science can also covers recognized scientific methods and norms. With the help of these methods and norms, facts associated to events, artifacts, or certain other tangible objects can be examined. In this respect, the concept is associted to the concept of identity verification, in which case it is for benefits other than legal purposes to determine whether the object is what it wants or is declared to be an object. Due to advances in science as well as even forensic medicines, it’s much easier to solve crime nowaday’s than it was 50 years ago. In fact, innovative and new crime-resolving technologies are being introduced daily to help law enforcement departments to resolve the initial confusing cases. If we look at the role of forensic evidence in the field of criminal justice and law, we will see its importance in solving crimes because:
This really helps to determine the nature of the crime: some crimes are accidental, some are intentional. With help of a forensic microscope, we analyzed the proof, and we saw police as well as other personnel in law enforcement area to determine whether the offense was suicide, murder, and other types of accidental death. If it’s a murder, forensic froof will tell them whether the offence was cold-blooded or accidental. Forensic science is also use to investigate, find and solve drug crimes, theft, arson or car accidents.It can helps to eliminate personal prejudice: Forensic science allows officers of law enforcement to look only at proof, without paying attention to the instinct or feelings of the case. This is why it provides a quantitative method of solving crimes that can be used to provide cold, strong proof, which is more acceptable in court as well as jury convictions or acquittals (FBI, 2004 Year, page 1). 32).
Non-technical section for identification of Six hackathon tasks:
in order to represent the digital forensic concept in this paper, the researcher has identified the following six types of hackathon ideas related to the cybersecurity process such as EdTech Hackathon Ideas, HealthTech Hackathon Ideas, ConsumerTech Hackathon Ideas, Auto Tech Hackathon Ideas, FinancialTech (FinTech) Hackathon Ideas, RetailTech Hackathon Ideas (Maymina,Divinaand Liulia, 2018).
Today, artificial intelligence is important facets of digital technology; therefore, hackathons have expanded its scope on the basis of a wide array of verticals technology in different related fields such as cybersecurity, cyberbullying, health tech, auto tech, as well as EdTech, and so on. In the hackathon idea, argument reality, as well as AI and IoT systems, are involved. It is seen from different ideas that hackathon ideas are used as core technological processes to take the initiative for modern innovations and identification of their application.
· Ed-tech hackathon ideas: In the present situation, the education system has faced a continuous challenge to deliver a quality-based education system. In the modern system, it is assumed that a tech-based solution is identified as a bridge to reduce the gap for streamlining the education system (Kolog, Sutinen, and Nygren, 2016). However, there are different types of ideas related to hackathon experiences such as sharing learning experiences, application of smart tutor, development of a mobile app for the course and university finder, and so on. all this technology-based education system is essential for the modern age because the advancement of technologyhelps to avail remote education process in a better way so that one can understand all the topics related to education systems.
· Health Tech Hackathon Ideas: These types of ideas are essential for society because it helps to develop the quality of services along with enhances the safety of patients and reduces medical stress. However, potential technology is important for the health care system to automate daily activities for the identification of health care activities. On the other hand, IoT and health care activities are important for the determination of effective ideas to organize health care hackathons (Kienzler and Fontanesi, 2017).
· Consumer Tech Hackathon Ideas: In this concept, consumer tech activities are essential to make an excellent activity for handling the consumers. In this context, Grande et al. (2018) have identified that hackathon ideas are related to the development of different types of technologies for focusing the consumer solution to get a technology-related benefit. In this context, different ideas like autonomous drones, automated homes, and so on are essential. However, these ideas are necessary for consumer activities because it helps to digitize the ideas of the general people who have been treated as consumers.
· Auto Tech Hackathon Ideas: This technology-based hackathon idea is normally related to the automotive industry where cars or vehicles are interconnected with it. However, this is essential for modern days to provide extra benefits to the users who have a passion for driving; in modern days, the automotive industry is considered as important oner; therefore, in order to avoid the gap of the latest technology, this is used for providing better consumer services.
· Financial Tech (FinTech) Hackathon Ideas: There are different types of hackathon ideas that are essential for managing the process of financial activities in each business sector. Therefore, the key aim of this section is to improve the financial services by using emerging tech-based solutions.
· Retail Tech Hackathon Ideas: This is one of the booming ideas for consumers who have used a regular basis shopping process. However, digital performances help to lead the sales and marketing of an organization. Therefore, solutions are essential (Byrne, Sullivan, and O’Sullivan, 2018).
Hackathon’s issues
Each of the Hackathon tasks consists of some issues, and those issues are the main factors that are going to analyses here. There are six particular tasks that are identified based on the ideas, and those ideas are – “EdTechhackathon ideas,” “HealthTechhackathon ideas,” “ConsumerTechhackathon ideas,” “AutoTechhackathon ideas,” “FinancialTechhackathon ideas,” and “RetailTechhackathon ideas” (Trainer et al. 2016). Each of the ideas includes some ideas, and based on the ideas, the tasks, and the issues of the tasks are identified.
EdTechhackathon ideas
In the education sector, several types of challenges developed in the delivery and quality, and top solve those problems; this “EdTechhackathon system” helps a lot and covers the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here