Module: CC6003 digital Crime investigation.

Added on - 16 Sep 2019

  • Dissertation

    type

  • 2

    pages

  • 364

    words

  • 52

    views

  • 0

    downloads

Showing pages 1 to 1 of 2 pages
MODULE: CC6003 DIGITAL CRIME INVESTIGATIONtechnical report in about1500 wordsMS Doc file onlyThis technical report should be the culmination of good literature review workcarried out through using a wide mix of sources: lecture slides, textbooks,industrial standards and guidelines, research papers, and web resources.It should present the appropriate background on the topic area of interest. Itshould also present technical content in relative depth looking at all the issuesconcerned.The report needs an introduction at the beginning and aconclusion at the end. A list of resources referenced and a separatebibliography should be produced in the Harvard/IEEE reference format.The key texts indicated in the module specification, specialist journals, andvarious Web sites, such asComputer Forensics, Cybercrime and SteganographyResources(http://www. forensics.nl/),Computer Crime Research Centre(http://www.crime-research.org/),Uniting Forensic Computing Practitioners!(http://www.f3.org.uk/), andThe Metasploit Project Web site(http://http://www.metasploit.com/), etc. provide a good guidance in terms of thereport content.The technical report is to be based on one of the topics listed below, Chooseone topic to write about:1.digital/cyber crime evolution, detection, and prevention2.real-time analytical techniques to detect security events3.computer forensics and anti-forensics4.Metasploit and its applications in pentest and anti-forensics5.data hiding and detection techniques6.techniques and tools for elimination of digital evidence7.the medium and techniques in information hiding8.steganography and steganalytical techniques9.digital watermarking and media signature10.direct attacks against computer forensic tools11.covert channel analysis and data hiding in TCP/IP
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Unlock This Document