Ask a question to Desklib · AI bot

Ask NowBETA

Module: CC6003 digital Crime investigation.

Added on -2019-09-16

| 2 pages
| 364 words
| 293 views

Trusted by 2+ million users,
1000+ happy students everyday

MODULE: CC6003 DIGITAL CRIME INVESTIGATIONtechnical report in about 1500 wordsMS Doc file only This technical report should be the culmination of good literature review work carried out through using a wide mix of sources: lecture slides, textbooks, industrial standards and guidelines, research papers, and web resources. It should present the appropriate background on the topic area of interest. It should also present technical content in relative depth looking at all the issues concerned. The report needs an introduction at the beginning and a conclusion at the end. A list of resources referenced and a separate bibliography should be produced in the Harvard/IEEE reference format. The key texts indicated in the module specification, specialist journals, and various Web sites, such as Computer Forensics, Cybercrime and SteganographyResources (http://www. forensics.nl/),Computer Crime Research Centre (http://www.crime-research.org/), Uniting Forensic Computing Practitioners! (http://www.f3.org.uk/), and The Metasploit Project Web site (http:// http://www.metasploit.com/), etc. provide a good guidance in terms of the report content.The technical report is to be based on one of the topics listed below, Choose one topic to write about:1.digital/cyber crime evolution, detection, and prevention2.real-time analytical techniques to detect security events3.computer forensics and anti-forensics4.Metasploit and its applications in pentest and anti-forensics5.data hiding and detection techniques6.techniques and tools for elimination of digital evidence7.the medium and techniques in information hiding8.steganography and steganalytical techniques 9.digital watermarking and media signature10.direct attacks against computer forensic tools11.covert channel analysis and data hiding in TCP/IP

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Students who viewed this