Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

2022 T2 BN309 Assignment 2 MEL SYD V1.0 Prepared by: ABM Russel XXXXXXXXXXModerated by: Dr Sanjeeb Shrestha August, 2022 Assessment Details and Submission Guidelines Unit Code BN309 Unit Title...

1 answer below »

2022 T2 BN309 Assignment 2 MEL SYD V1.0

Prepared by: ABM Russel XXXXXXXXXXModerated by: Dr Sanjeeb Shrestha August, 2022

Assessment Details and Submission Guidelines
Unit Code BN309
Unit Title Computer Forensics
Assessment Type Individual
Assessment Title Computer forensics and anti-forensics techniques
Purpose of the
assessment (with
ULO Mapping)
This assignment assesses the following Unit Learning Outcomes; students should be
able to demonstrate their achievements in them.
• Document evidence and report on computer forensics findings;     
• Implement a number of methodologies for validating and testing computer
forensics tools and evidence;     
• Exhibit and understand forensics ethical behaviour and professional conduct;     
• Implement a process to support the administration and management of computer
forensics;     
• Conduct practical investigations into computer forensics, including industry and
legal procedures with respect to data acquisitions.    
Weight 20%
Total Marks 80
Word limit See the instructions.
Due Date Wednesday 11:55pm 28 September 2022
Submission
Guidelines
• All work must be submitted on Moodle by the due date along with a completed
Assignment Cover Page.
• The assignment must be in MS Word format, 1.5 spacing, 11-pt Cali
i (Body) font
and 2 cm margins on all four sides of your page with appropriate section headings.
• Reference sources must be cited in the text of the report, and listed appropriately
at the end in a reference list using IEEE referencing style.
Extension • If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly to the School's Administration Officer, in
Melbourne on Level 6 or in Sydney on Level 7. You must submit this application
three working days prior to the due date of the assignment. Further information is
available at:
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-
guidelines/specialconsiderationdeferment
Academic
Misconduct

• Academic Misconduct is a serious offence. Depending on the seriousness of the case,
penalties can vary from a written warning or zero marks to exclusion from the course
or rescinding the degree. Students should make themselves familiar with the full
policy and procedure available at: http:
www.mit.edu.au/about-mit/institute-
publications/policies-procedures-and-guidelines/Plagiarism-Academic-
Misconduct-Policy-Procedure. For further information, please refer to the Academic
Integrity Section in your Unit Description.





Prepared by: ABM Russel XXXXXXXXXXModerated by: Dr Sanjeeb Shrestha August, 2022


Assignment Description
Objectives:
The objective of this assignment is to gain theoretical and practical knowledge in different computer
forensics and anti-forensics techniques. The students should apply appropriate computer forensics
tools and techniques and write a report on their findings. Marks will be awarded based on the
sophistication and the in-depth exploration of the techniques.

Case Study:
You are investigating a recent Intellectual Property theft case.
Assignment Specification:
Prepare a report and video demonstration on the following sections related to the case study. You
need to research effective tools appropriate for this case. You can use your own files for analysis.
Provide the list of references using IEEE referencing style at the end of the report.
Task 1: Steganography
Use steganography to hide data in two image files (jpeg and bmp). For the assignment purpose, use a
secret text containing “MITXXXXXX”, where XXXXXX is your student number. Explain each step with
the help of screenshots from the tool you used. (250 words).
Task 2: Anti-forensics

Research on two anti-forensics techniques and write a report on your findings on these techniques.
Compare the pros and cons of these techniques in different contexts. Use one of the anti-forensic
techniques on your file and explain how useful it is. Please explain your methods with the help of
screenshots. (750 words)

Demonstration

Interview during lab session. You also need to prepare a video demonstration of your work. You
should appear in the video (You Tube or similar) at the first and last 30 secs to introduce yourself
and draw a conclusion on your experience with the different computer forensics and anti-forensics
techniques.
Prepared by: ABM Russel XXXXXXXXXXModerated by: Dr Sanjeeb Shrestha August, 2022

Marking Criteria:

Questions Description Marks

Task 1 Data hiding using steganography
Explanation of procedure and screenshots
10
10
Task 2 Anti-forensic techniques
Pros and Cons
Application of anti-forensic on files
10
10
10
Presentation Writing quality, Coherence, Report Structure 10
Reference style Follow IEEE reference style (should have both in-text citation
and reference list)
10
Demonstration Interview and video demonstration 10
Total 80
Marking Ru
ic
Grade Mark HD
=80%
D
70%-79%
CR
60%-69%
P
50%-59%
Fail
50%

Excellent Very Good Good Satisfactory Unsatisfactory
Task 1

Two tools listed
and appropriate
equirements
specified and issues
identified with
explanation of
procedure and
screenshots
Two tools listed
and some
equirements
specified and
issues identified
with explanation
of procedure and
screenshots
Two tools listed but
incomplete
equirements
specified with a few
explanations of
procedure and
screenshots
Missing
explanation of
procedure and/or
screenshots Unsatisfactory
Task 2
Explained the act
and the important
key points
Provided an idea
about the act
with the key
points
Did not provide a
clear picture of the
act with the key
points included
Missing
explanation and
key points Unsatisfactory
Presentation
The presentation
was a concise
summary of the
topic with all
questions
answered.
Comprehensive and
complete coverage
of information.
The presentation
was a good
summary of the
topic.
Most important
information
covered; little
i
elevant info.
The presentation
was informative but
several elements
went unanswered.
Much of the
information
i
elevant; coverage
of some of major
points.
The presentation
was a
ief look at
the topic but many
questions were left
unanswered.
Majority of
information
i
elevant and
significant points
left out.
Unsatisfactory
Prepared by: ABM Russel XXXXXXXXXXModerated by: Dr Sanjeeb Shrestha August, 2022

Reference
style
Clear styles with
excellent source of
eferences.
Clear
eferencing/
style
Generally good
eferencing/style
Unclear
eferencing/style Unsatisfactory
Demonstration Very professional,
clear and easy to
follow.
Professional,
clear and easy to
follow
Clear and easy to
follow but lacks
professionalism
Difficult to follow
Unsatisfactory
Answered 3 days After Sep 06, 2022

Solution

Shubham answered on Sep 09 2022
77 Votes
Task 1
Data hiding using steganography
Steganography is the art of hiding data like hiding sensitive data into the digital image. It can provide better security than cryptography and it can help in hiding contents of messages. It is a formal mechanism of data encryption and this method is used for converting the message into ciphertext with the use of encryption algorithm and the message can be sent to the recipient who is authorized for receiving and getting the original message [4]. The electronic communication can include steganography coding inside the transport layer like image file, program or document file. It is based on a data hiding technique that uses an LSB based algorithm for hiding secret messages by embedding it in cover media like images. Images are used for steganography because digital images are insensitive to the visual system of humans and it can be considered as a good cover ca
ier.
Explanation of procedure and screenshots
Image 1
The above image is the tool that will be used for steganography, this will include use of image and a text that will be hidden in the image.
In the above image, the image named “milky-way-2695569__340” has been selected and text message “MIT123456” will be hidden in the image.
On the above file, the data gets hidden in the image with the use of steganography technique.
Image 2
The above shows the layout of the tool that is used for steganography.
In this process, image named “ocean-3605547__340” has been used for hiding the text that is “MIT123456”.
The above image is the output of steganography and text is hidden in the above image.
Task 2
Anti-forensic techniques
File encryption is another anti-forensic technique that can be used for processing the readable data into the unreadable format with the use of various encryption algorithms. The encryption of files can be an effective way for protecting the data from anti-forensic tools that can also be used for encrypting files with the intent for making the data difficult to decode or access. It is the way for encoding the file that has sensitive data for sending the file securely. The...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here