PROVIDING A THOROUGH ANALYSIS ON AVAILABLE COMPUTER FORENSIC TOOLS

Qualified Writers
Rated 4.9/5 based on 2480 reviews

100% Plagiarism Free & Custom Written - Tailored to Your Instructions

Objectives

 

This assessment item relates to the course learning outcome 1 to 7 as stated on page 1 of the course profile.

 

Enabling Objectives

  1. Providing a thorough analysis on available computer forensic tools.
  2. The justification of using a specific computer forensic tool.
  3. Discussion on the application of the computer forensic tool for dealing with the real case problem.
  4. Presenting the analysis and findings in the report.

Submission: Online Group submission Presentation documents via Moodle, Presentations in class (Distance students will be via online technology).

 

Instructions

 

This is a group based assignment for on campus students. The aim of this assignment is to improve your industry based practical research skills as well as team based working and learning. In this assignment, as future Forensic professionals, you are required to research recent cyber-attacks that gained attention worldwide and prepare a presentation as a group of up to 3 members during the class time. You need to form your group and decide proposed case for presentation in Week 3 and provide the group details to your local lecturer for confirmation.

 

For presentation case, research industry magazines (online and offline), CQU library databases and web sites that provide detailed description of different cyber-attacks. Your presentation should include well researched content. Also, ensure that you use peer reviewed journal articles and valid sources to collect information for your presentation.  Note that fictitious case studies are not accepted.

 

Distance students:

 

The time of the presentations and communication technology employed will be determined on an individual basis. Please contact the course coordinator well in advance.

 

Assessment Criteria

COIT20267 Assessment item 2 – Presentation

 

 

Marks available

Marks achieved

Comments

Case – Detailed about the organisation, who was involved and the reasons for the attack.

5

 

 

Type of attack – Supporting theory and evidence are presented to indicate the type of attack.

5

 

 

Consequence of an attack – Given clear description about how it affected the target and the benefits attacker achieved.

5

 

 

Tools – Identified forensic tools to collect evidence and provided justification for selecting specific tools.

5

 

 

Supporting theory – Made use of different techniques to collect evidence.

5

 

 

Clarity and consistency of presentation

1

 

 

Use of visual aids

1

 

 

Target audience

1

 

 

Quality response to questions during question and response time

1

 

 

Professional appearance

1

 

 

Documentation – Submitted copy of presentation summary with details of resources used (with in-text referencing and reference list).

5

 

 

Total

35

 

 

 

Marker:

 

 

Date:

 

Price: £109

100% Plagiarism Free & Custom Written - Tailored to Your Instructions