2022 T2 BN309 Assignment 2 MEL SYD V1.0
Prepared by: ABM Russel XXXXXXXXXXModerated by: Dr Sanjeeb Shrestha August, 2022
Assessment Details and Submission Guidelines
Unit Code BN309
Unit Title Computer Forensics
Assessment Type Individual
Assessment Title Computer forensics and anti-forensics techniques
Purpose of the
assessment (with
ULO Mapping)
This assignment assesses the following Unit Learning Outcomes; students should be
able to demonstrate their achievements in them.
• Document evidence and report on computer forensics findings;
• Implement a number of methodologies for validating and testing computer
forensics tools and evidence;
• Exhibit and understand forensics ethical behaviour and professional conduct;
• Implement a process to support the administration and management of computer
forensics;
• Conduct practical investigations into computer forensics, including industry and
legal procedures with respect to data acquisitions.
Weight 20%
Total Marks 80
Word limit See the instructions.
Due Date Wednesday 11:55pm 28 September 2022
Submission
Guidelines
• All work must be submitted on Moodle by the due date along with a completed
Assignment Cover Page.
• The assignment must be in MS Word format, 1.5 spacing, 11-pt Cali
i (Body) font
and 2 cm margins on all four sides of your page with appropriate section headings.
• Reference sources must be cited in the text of the report, and listed appropriately
at the end in a reference list using IEEE referencing style.
Extension • If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly to the School's Administration Officer, in
Melbourne on Level 6 or in Sydney on Level 7. You must submit this application
three working days prior to the due date of the assignment. Further information is
available at:
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-
guidelines/specialconsiderationdeferment
Academic
Misconduct
• Academic Misconduct is a serious offence. Depending on the seriousness of the case,
penalties can vary from a written warning or zero marks to exclusion from the course
or rescinding the degree. Students should make themselves familiar with the full
policy and procedure available at: http:
www.mit.edu.au/about-mit/institute-
publications/policies-procedures-and-guidelines/Plagiarism-Academic-
Misconduct-Policy-Procedure. For further information, please refer to the Academic
Integrity Section in your Unit Description.
Prepared by: ABM Russel XXXXXXXXXXModerated by: Dr Sanjeeb Shrestha August, 2022
Assignment Description
Objectives:
The objective of this assignment is to gain theoretical and practical knowledge in different computer
forensics and anti-forensics techniques. The students should apply appropriate computer forensics
tools and techniques and write a report on their findings. Marks will be awarded based on the
sophistication and the in-depth exploration of the techniques.
Case Study:
You are investigating a recent Intellectual Property theft case.
Assignment Specification:
Prepare a report and video demonstration on the following sections related to the case study. You
need to research effective tools appropriate for this case. You can use your own files for analysis.
Provide the list of references using IEEE referencing style at the end of the report.
Task 1: Steganography
Use steganography to hide data in two image files (jpeg and bmp). For the assignment purpose, use a
secret text containing “MITXXXXXX”, where XXXXXX is your student number. Explain each step with
the help of screenshots from the tool you used. (250 words).
Task 2: Anti-forensics
Research on two anti-forensics techniques and write a report on your findings on these techniques.
Compare the pros and cons of these techniques in different contexts. Use one of the anti-forensic
techniques on your file and explain how useful it is. Please explain your methods with the help of
screenshots. (750 words)
Demonstration
Interview during lab session. You also need to prepare a video demonstration of your work. You
should appear in the video (You Tube or similar) at the first and last 30 secs to introduce yourself
and draw a conclusion on your experience with the different computer forensics and anti-forensics
techniques.
Prepared by: ABM Russel XXXXXXXXXXModerated by: Dr Sanjeeb Shrestha August, 2022
Marking Criteria:
Questions Description Marks
Task 1 Data hiding using steganography
Explanation of procedure and screenshots
10
10
Task 2 Anti-forensic techniques
Pros and Cons
Application of anti-forensic on files
10
10
10
Presentation Writing quality, Coherence, Report Structure 10
Reference style Follow IEEE reference style (should have both in-text citation
and reference list)
10
Demonstration Interview and video demonstration 10
Total 80
Marking Ru
ic
Grade Mark HD
=80%
D
70%-79%
CR
60%-69%
P
50%-59%
Fail
50%
Excellent Very Good Good Satisfactory Unsatisfactory
Task 1
Two tools listed
and appropriate
equirements
specified and issues
identified with
explanation of
procedure and
screenshots
Two tools listed
and some
equirements
specified and
issues identified
with explanation
of procedure and
screenshots
Two tools listed but
incomplete
equirements
specified with a few
explanations of
procedure and
screenshots
Missing
explanation of
procedure and/or
screenshots Unsatisfactory
Task 2
Explained the act
and the important
key points
Provided an idea
about the act
with the key
points
Did not provide a
clear picture of the
act with the key
points included
Missing
explanation and
key points Unsatisfactory
Presentation
The presentation
was a concise
summary of the
topic with all
questions
answered.
Comprehensive and
complete coverage
of information.
The presentation
was a good
summary of the
topic.
Most important
information
covered; little
i
elevant info.
The presentation
was informative but
several elements
went unanswered.
Much of the
information
i
elevant; coverage
of some of major
points.
The presentation
was a
ief look at
the topic but many
questions were left
unanswered.
Majority of
information
i
elevant and
significant points
left out.
Unsatisfactory
Prepared by: ABM Russel XXXXXXXXXXModerated by: Dr Sanjeeb Shrestha August, 2022
Reference
style
Clear styles with
excellent source of
eferences.
Clear
eferencing/
style
Generally good
eferencing/style
Unclear
eferencing/style Unsatisfactory
Demonstration Very professional,
clear and easy to
follow.
Professional,
clear and easy to
follow
Clear and easy to
follow but lacks
professionalism
Difficult to follow
Unsatisfactory