October 21, 2020October 25, 2020[Solution] Poster
Computer Science Special Offer Order! by Professor Shamz
Coursework Assignment for the BSc Module of Digital Forensic
Investigation (5CC508)
Assignment Poster addressing a research question
Due Date Friday 01/11/2019
Due Time 23:59
Poster Submission:
Your electronic version of the poster should be submitted via Turnitin on Blackboard. You
should aim to submit your poster a suitable amount of time before the submission deadline.
Poster Printing:
You should print your poster (size A2) before coming to present it. You can use the University
printing service or any other outside printing service.
Anonymous Marking:
Turnitin Submission system will hide your name from your tutors, until after moderation.
This module has an exemption due to the face-to-face nature of the formative reviews during
workshops and the face-to-face marking of your work. As a result, you MUST ensure that you
include your student number in the submission title of your work for formative review and for
the final submission of your completed report(s) or other components of a portfolio.
If you do not do this, it will be impossible for your tutor to provide any formative or summative
feedback during the face to face formative reviews and final marking, because they will not be
able to find your work and they may not be able to create the final mark for your portfolio of
work.
In addition, you should not use your name on the title page, as requested in the Springer LNCS
template, instead, you should place your student ID in the name field and you should only use
the student number version of your unimail. This ensures
that the internal moderators cannot identify you, thus ensuring that the moderation process is
truly anonymous.
1 Detailed Requirements
Deliverable: Poster
You are required to do research (and/or experimentation, if you want) about a core concept
and to produce a poster that will help you explain the concept, and relevant details from the
perspective of Digital Forensic investigation. You should aim to answer a research question,
such as the examples questions listed below. You are not limited to those research
Sensitivity: Internal
Sensitivity: Confidential
questions; you can propose your own but, in this case, it needs to be approved by the
tutor.
All posters must comply with the following guidelines:
? It must include the title at the top of the poster.
? It should contain a small introduction and a conclusion.
? It must be in colour, size A2, large fonts.
? Any figures, text, pictures and tables should be clear, visible and readable from the
distance.
? It must be produced using appropriate software.
? It must include the student?s name and ID number.
? Don?t forget to include a box with references used and cited. Use the IEEE reference
style for the poster.
Deliverable: Poster Presentation
You will be required to stand by your poster in Week 6 in front of the class to present the
work to your colleagues and tutors and answer their questions. You will have 5 minutes to
present the work done and 5 minutes to answer questions.
The presentation will be recorded. Lack of presentation means unsuccessful achievement of
the learning outcome, i.e., fail for the assignment.
Example of Research Questions:
1. How are bits (0s & 1s) physically represented in different media, e.g., hard drive, USB,
CD/DVD, and SSD? How do these different mechanisms compare?
2. What is the process of ?wear leveling? in Solid State Drives? What is its impact for
Forensics?
3. What is ?Extensible Firmware Interface?? How does it compare with BIOS? What is
the evidential weight of carrying out a BIOS/EFI check? Which considerations should
be taken into account from a DF perspective?
4. What is ?GUID Partition Table?? How does a disk partitioned with GPT compare with
a disk partitioned with partition table in the MBR?
5. What is ?garbage collection? in Solid State Drives? What is its impact for Forensics?
6. What is the ?Microsoft Reserved Partition? used for? Can it be encrypted? What is its
relevance for Forensics?
7. What is ?Resilient File System?? What are its main characteristics compared to NTFS?
Sensitivity: Internal
Sensitivity: Confidential
8. How does acquiring a hard drive to an image file compare to cloning it? Elaborate on
advantages and disadvantages.
9. What types of evidence are lost when a computer is turned off? Why are they lost and
what challenges does it pose to Forensics?
10. What is ?disk signature?? How reliable is it? Where is it recorded, and what is its
relevance for Forensics?
Guidelines/best practices about posters:
https://homes.cs.washington.edu/~mernst/advice/poster.html
https://www.liverpool.ac.uk/media/livacuk/computingservices/printing/making-animpact-
with-your-poster.pdf
http://www.supi.manchester.ac.uk/media/services/supi/Academic-Poster-Guidance.pdf
https://www.sciencedirect.com/science/article/pii/S2049080116301303
Poster Presentation: Garbage collection in Solid State Drives and Its Relevance to Forensics
Place your order now for a similar assignment and get fast, cheap and best quality work written by our expert level assignment writers.
Tagged Get an extra fast discounted delivery
Post navigation
[Solution] Secularization[Solution] Classical Criminology





