| | | |
TASK DESCRIPTION: |
Students will work in groups to evaluate 3 current state-of-the-art digital forensics tools. The outcome of this assignment will be a 4-page survey that (1) explains the feature set of each tool; (2) provides a tool comparison matrix; (3) identify specialised use cases for each tool; and (4) a demonstration of one of the tools under evaluation. This assignment will enable students to develop the knowledge of current industry-applied digital forensics tools; moreover, the understanding of unique situations and scenarios for which specialised tools and protocols are required.
Week of distribution and due date: The assignment will be available in week 7 on MyLO. The survey report will be due in week 10.
|
TASK LENGTH: | |
DUE DATE: | Week 10 |
WEIGHT: | 20 % |
|
CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME |
| | | 1 | Provide evaluation of 3 industry-proven digital forensics toolkits | LO3 | 2 | Develop a comparison matrix with a complete feature set of tools covering all 5-steps of digital investigation | LO3 | 3 | Identify specialised and unique use cases for each tool under evaluation | LO3, LO4 | 4 | Demonstrate one of the tools under evaluation to educate peers | LO3, LO4 |
|
|
|
Assessment Task 4: Cybersecurity assignment |
TASK DESCRIPTION: | Students will work in groups to enhance a software application that demonstrates vulnerabilities at the code level. To develop the application, students will implement the source code in a high-level language and provide test cases. The application will address the secure programming challenges described in the latest CWE listings. In addition to the source code, students will submit a video demonstration and a post-implementation analysis that addresses the technical aspects of the assignment. These aspects include implementation challenges, limitations, data privacy, and outcomes of test cases. Through this assignment, students will learn to work as a team to produce a software solution without known vulnerabilities, following industry-based development practices.
Week of distribution and due date: Assignment specification will be made available in week 6. Assignment submission will be due in week 13.
|
TASK LENGTH: | In a software application with approximately 3 high-level requirements, each requirement may address 2-3 vulnerabilities. |
DUE DATE: | Week 13 |
WEIGHT: | 20 % |
|
CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME |
| | | 1 | Analyse a modern-day cybersecurity threat. | LO1 | 2 | Complete a project plan with requirements specification, formal design, and test scenarios. | LO2 | 3 | Incorporate the latest software vulnerability listings such as CWE-25 and OWASP top 10 where applicable. | LO2 | 4 | Develop source code as per the project specification. | LO2 | 5 | Report the analysis of the test results, project limitations and challenges. | LO1, LO2 |
|
|
|
Assessment Task 5: Forensic Toolkit (FTK) assignment |
TASK DESCRIPTION: |
This is an individual assessment in which students will apply their skills using Access Data's forensic tools, including Imager, Registry Viewer, and FTK. The assignment will enable students to apply digital forensics principles and techniques to eForensic artifacts such as files, registry keys, logs, images, messages, and timestamps. Students will submit the assignment as a Word document that reflects the outcomes of the steps taken during the investigation process.
Week of distribution and due date: The assignment will become available in week 9. The investigation process will take place during the eForensic tutorials in weeks #9, #11, and #13. The outcome of each tutorial will be submitted as a component of the assessment. The final component of the assessment must be submitted on MyLO by the end of week 13.
|
TASK LENGTH: | ~6 hrs. (2 hrs. each for Imager, Registry viewer, and Forensic toolkit modules) |
DUE DATE: | Week 13 |
WEIGHT: | 30 % |
|
CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME |
| | | 1 | Acquire eForensic artefacts with forensic integrity intact | LO3, LO4 | 2 | Investigation and evaluation of the key eForensic artefacts | LO4 | 3 | Report key eForensics artefacts post-investigation | LO3, LO4 |
|
|
|