You are on page 1of 6

Assessment task information: CIS6708- Digital Forensics – Semester 1,

2024
Assessment 2: Report

This document provides you with information about the requirements for your assessment. Detailed
instructions and resources are included for completing the task. The Criterion Reference Assessment
(CRA) Rubric that markers use to grade the assessment task is included.

Task overview
Course learning This report addresses the following course learning objectives (CLO) 2,3, and 4:
outcomes addressed CLO2: reflect on and synthesise complex issues, problems, concepts and
theories relating to securing diverse devices on non-wired networks;
CLO3: apply specialist knowledge and skills in enabling secure use of wireless,
mobile and IoT networks to mitigate potential security breaches;
CLO4: critically examine cyber security breaches using forensic tools, processes,
and procedures

• This report is individual. Group submission will get a zero mark.


• Check word limit. Your report should be concise and self-explanatory with
respect to the word limit.
• Any assumptions which you consider in doing your assessment MUST be
stated clearly in your report.
Task description This report has three questions to be completed. Compile your answers into a
single MS Word or .pdf document and then upload to Study Desk. Your Report
MUST include your Name, Student Number and course code (CIS6708) in the
header of each page and include references and a bibliography where
appropriate. When submitting your document/s, the file will be submitted to
Turnitin for originality checking. Therefore, it is important to include necessary
references and bibliographies in your submission.
You need to read the scenario and provide your answer for the list of questions.
Task details
Question 1 – 25 marks, 750 word maximum (CLO 2 and 4)
A real-word investigation scenario at ALDI retailer
ALDI retailer has recently realized anomalies in its orders that are made by
customer doing online shopping. It has undertaken an initial check of system log
files, and there are a number of suspicious entries and IP addresses with a large
amount of product data being sent outside the ALDI software system firewall.
ALDI has also recently received a number of customer complaints saying that
there is often a strange message displayed during online shopping and order
processing, and they are often re-directed to a payment page that does not look
legitimate. Your job is to conduct a digital forensic analysis process and data
acquisition which relying on adopting a set of sophisticated tools.
- Read the file named “Digital forensic tools-Recent advances and
enhancing the status quo - supplementary material” which is under
Module 6. A list of data acquisition tools is discussed in this file. Note that
some of these tools may have been already discussed or referred to in
Module 6.
- Select 4 tools based on your interest. Then
o Write a brief introduce/describe (maximum 5 lines) of these
tools and highlight at least 3 key features for each.
o Write an analyse and discuss how these 4 tools can help you to
conduct the whole investigation process including the
identification of digital evidence and data acquisition.
Hint: your answers and examples should be exactly related to the scenario.
General answers or examples that are irrelevant to the scenario are not
acceptable.
Question 2 – 25 marks, 600 word maximum (CLO 2 and 3)
Consider the real-world scenario described in Question 1. Read the file named
“Data acquisition process model” which is under Module 4. In particular, read
carefully Figure 2 (UML activity diagram of the acquisition process).
Write a report, placing yourself in the shoes of a digital forensic detective for the
local police office. Detail in the report, the steps that you are taken to gather
evidence from IT support of ALDI, ALDI systems, and customers. In addition,
explain 3 different obstacles that might you expect to encounter during the
investigation case.
Question 3 – 50 marks, 300 word maximum (CLO 4)
The file named “Explainable artificial intelligence for digital forensics.pdf”,
available under Assessment -> Written Report folder, explores the potential of
Explainable Artificial Intelligence (XAI) to enhance triage and analysis of digital
forensic evidence, using examples of the current state of the art as a starting
point. The .pdf provides both practical and novel ideas as well as controversial
points for leveraging XAI to improve the efficacy of digital forensic analysis. Read
this file completely and read carefully in particular the case study Section 4.
Based on your understanding and lecture PowerPoints and relevant sources in the
Study Desk during the course so far, provide 5 example challenges and 5 example
advantages in using XAI to conduct digital forensic analysis.
Hint: You need to consider Figure 2 in the file named “Explainable artificial
intelligence for digital forensics.pdf” and sections 3.4.1 and 3.3.4 in this file to
organise your answers.
Due Date 22nd March 2024

Task snapshot
Maximum 3000 words+/-10% (word length includes in-text referencing and
Length
excludes your reference list and appendices)
Weighting 40%

Marks/ mark 40
allocation
Individual or Group Individual
This assignment must be all your own work. It is acceptable to discuss course
content with others to improve your understanding and clarify requirements, but
solutions to assignment questions must be done on your own.
You must not copy from anyone, including artificial intelligence tools (such as
ChatGPT), tutors and fellow students, nor allow others to copy your work.

How will I be Rubric


assessed
Submission information
Resources to Not applicable
complete task
Referencing/citations For this assessment you will use Harvard referencing.
Submission What you need to submit:
instructions
You will submit your answer in form of a single Word document (.doc) or .pdf file
using the submission link on the course StudyDesk that contains the following
items:
• No coversheet but footer must include: course code and name,
semester and year, assignment title, student name, student number
• Do not include the rubric
• Save your document with the following naming convention:
surname_initialORstudentnumber_coursecode_A1.doc/docx/pdf
e.g., Jones_J_A1_PSY1030.docx

Turnitin
Turnitin is a detection software and text matching tool used in this course.
Plagiarism checking is automatically done when you submit your assignment.
An originality/similarity report is automatically created which checks the
originality of your assignment. You can access and review the report.
NOTE:
• It may take up to 24 hours for a report to be issued from Turnitin
• When the assignment has been checked, you will see a notice in the
Files submission area.
• The percentage mark given indicates the amount of text matched
against the Turnitin Database. It is merely an indicator that should
always be reviewed to identify where Turnitin have picked up
potential plagiarism.
• You may have the option to edit submission or the option to submit
assignment, this is determined by your lecturer.
• Once you submit assignment you are no longer able to edit it.

Moderation (optional) All staff who are assessing your work meet to discuss and compare their
judgements before marks or grades are finalised.

Assessment Policies Information and links regarding USQ’s assessment policy/ procedure;
& Procedures extensions and late submissions; academic integrity & misconduct and
marking are found on your course StudyDesk Assessment page.
Note on Late submission & extensions: Applications for an extension of time
will only be considered if received in accordance with the USQ Assessment
procedure and the Assessment of Compassionate and Compelling
Circumstances Procedure. Refer to the links on StudyDesk for copies of these
procedures.

Academic Integrity
Your time at University is an opportunity to develop the knowledge and the skills you will need to
succeed in your chosen profession. Academic integrity is essential in ensuring the quality of your
education and development. Academic Integrity means acting with the values of honesty, trust, fairness
and respect in learning, teaching and research. It celebrates the genuine achievements made by yourself
and your peers.
Breaches of academic integrity undermine your development and the ability of you to work at the level
needed after you graduate. Academic Misconduct includes but is not limited to Plagiarism, Collusion,
Cheating and Contract Cheating, Impersonation, Misrepresentation and Falsification, Self-Plagiarism and
Solicitation.
To help maintain the integrity of your work within your degree, USQ has sophisticated detection systems
that monitor all assessment for indicators of academic misconduct. When you submit an assessment
item, all the details are recorded and can be referred to if we suspect academic misconduct has
occurred. Penalties may be applied retrospectively in circumstances where a breach is identified after
completion of a course.
IMPORTANT
ARTIFICIAL INTELLIGENCE (AI) AND ACADEMIC INTEGRITY
Many websites and apps use artificial intelligence to generate or paraphrase material. Tools like
ChatGPT, GrammarlyGo and Quillbot may only be used in assessments when you have been given
explicit approval from your course coordinator to do so. Unless you receive explicit, written approval,
you may not submit any work that was not written or created by yourself, because this constitutes
academic misconduct.

We understand that when you take on a university study program, you might be in a time poor, high
pressure situation. From time to time the temptation might be there to take short cuts that lead to
instances of academic misconduct.
If you are ever feeling pressured or the temptation to submit work that is not your own arises, don’t do
it. Instead, get the free support you need from USQ.
Contact your Course Examiner, iconnect or your Library Learning Advisor for free support.
Assessment 2 (written report) Rubric
Assessment 2 Rubric
Student Name: Due Date:
Assessment Name: Written report Weighting: 40% Mark out of 40
Criteria High Distinction Distinction Credit Pass Fail
(100 – 85) (84 – 75) (74 – 65) (65 – 50) (49 – 0)
Question Clarity of tool description The description of The description of The description of The description of The selected tools are
1 (CLOs and justification selected tools is selected tools is selected tools is not explained
selected tools needs
2 and 4) (supportive scenario- complete, distinct complete, distinct incomplete or partial, completely. No
further development
specific examples) the features for each are features for each are distinct features for examples of distinct
(no example of key
strengths and discussed, and the discussed, and the each are well- features for each tool.
weaknesses of tool for way each tool is used way each tool is used explained, and the features). The No example or
investigation including during the during the way each tool is used application of tools irrelevant examples of
digital evidence and data investigation is well- investigation is well- during the during the tool application during
acquisition (25 marks) described. The described. The investigation is investigation the investigation
answers clearly answers clearly unclear. There is process in unclear process. The are
explain how the tools explain how the tools partial clarity about (no context-specific several presentation
are collectively help are collectively help how these tools help examples are issues including
with the investigation with the investigation with the investigation provided). There are spelling/formatting.
process along with process along with process according to some presentation
illustrative examples illustrative examples the scenario. There issues.
relevant to the relevant to the are some presentation
scenario. scenario. However, issues.
the application of each
tool and relevant
examples to conduct
the investigation
process are not well
developed and
justified (some
examples are too
general, wrong, or
irrelevant to the
scenario).
Question Clarity of steps to be The description of The description of The description of The description of The description of
2 taken to gather evidence steps is complete and steps is somewhat steps and identified steps and identified steps and identified
(CLOs 2 from different sources and supported with complete and obstacles need further obstacles are too obstacles are not well-
and 3) justifications for different examples according to supported with development. They general or incomplete explained and not
obstacles (25 marks) the scenario. The examples according to are too general and according to the related to the scenario.
identified obstacles the scenario. not specific to the scenario. There are It is not clear how steps
against the However, the scenario. some presentation are performed, and
investigation process investigation process issues. obstacles are relevant
are sound and is general and some to the scenario. The are
relevant to the identified obstacles several presentation
scenario need further issues including
along with illustrative development. spelling/formatting.
examples.
Question Context specific (no The description of The description of The description of The description of The description of
3 general) example challenges and challenges and challenges or challenges or challenges or
(CLOs 4) challenges and example advantages related to advantages related to advantages related to advantages related to advantages related to
advantages in using XAI XAI application to XAI application to XAI application to XAI application to XAI application to
to conduct digital forensic conduct digital conduct digital conduct digital conduct digital forensic conduct digital forensic
along with rationale to forensic analysis are forensic analysis is forensic analysis are analysis are analysis are not clear,
select the examples well described with somewhat complete, incomplete, too underdeveloped. They wrong, or relevant to
analysis (50 marks) clear illustrative clear, and specific to general, and not are irrelevant, too XAI. The are several
examples. XAI. Some challenges specifically related to general, and not presentation issues
and advantages need XAI. specifically related to including
further explanation or XAI. There are some spelling/formatting.
support with presentation issues.
examples.

Result:
Additional Feedback

You might also like