Digital Crime Investigation Technical Report: Module CC6003

Verified

Added on  2019/09/16

|2
|364
|293
Report
AI Summary
This technical report delves into the multifaceted realm of digital crime investigation, providing an in-depth analysis of its various aspects. The report explores the evolution of digital crime, detection methodologies, and prevention strategies. It also examines real-time analytical techniques for security event detection, computer forensics, and anti-forensic measures. The report further investigates Metasploit and its applications in penetration testing and anti-forensics, data hiding techniques, and the elimination of digital evidence. Additionally, it covers the medium and techniques in information hiding, steganography, steganalytical techniques, digital watermarking, and media signatures, along with direct attacks against computer forensic tools and covert channel analysis in TCP/IP. The report adheres to a strict structure, incorporating an introduction, a conclusion, and a comprehensive bibliography formatted according to Harvard/IEEE standards, drawing upon a range of sources including lecture slides, textbooks, and research papers.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
MODULE: CC6003 DIGITAL CRIME INVESTIGATION
technical report in about 1500 words
MS Doc file only
This technical report should be the culmination of good literature review work
carried out through using a wide mix of sources: lecture slides, textbooks,
industrial standards and guidelines, research papers, and web resources.
It should present the appropriate background on the topic area of interest. It
should also present technical content in relative depth looking at all the issues
concerned. The report needs an introduction at the beginning and a
conclusion at the end. A list of resources referenced and a separate
bibliography should be produced in the Harvard/IEEE reference format.
The key texts indicated in the module specification, specialist journals, and
various Web sites, such as Computer Forensics, Cybercrime and Steganography
Resources (http://www. forensics.nl/), Computer Crime Research Centre
(http://www.crime-research.org/), Uniting Forensic Computing Practitioners!
(http://www.f3.org.uk/), and The Metasploit Project Web site (http://
http://www.metasploit.com/), etc. provide a good guidance in terms of the
report content.
The technical report is to be based on one of the topics listed below, Choose
one topic to write about:
1. digital/cyber crime evolution, detection, and prevention
2. real-time analytical techniques to detect security events
3. computer forensics and anti-forensics
4. Metasploit and its applications in pentest and anti-forensics
5. data hiding and detection techniques
6. techniques and tools for elimination of digital evidence
7. the medium and techniques in information hiding
8. steganography and steganalytical techniques
9. digital watermarking and media signature
10. direct attacks against computer forensic tools
11. covert channel analysis and data hiding in TCP/IP
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
MUST BE 1500 WORDS
Marking Scheme
The coursework marks are composed of the following (Total 100 marks)
1. academic challenge/originality 10 marks
2. analysis/research 35 marks
3. critical reflection and conclusion 15 marks
4. clarity of expression and readability 15 marks
5. construction and presentation of the document 15 marks
6. reference and bibliography 10 marks
chevron_up_icon
1 out of 2
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]