Please carefully read all requirements below and help me produce a high-quality, original academic report (not copied), written in a clear and critical style suitable for a top-grade submission.
ASSIGNMENT DETAILS
Module: Computer Forensics (COMP 30034)
Level: Undergraduate (Level 3)
Word Count: Approximately 2000 words
Deadline: 31 May 2026Link:
The assignment is based on the following research article:
Forensics and security issues in the Internet of Things (IoT)
(Springer link provided)
OVERALL OBJECTIVE
The assignment evaluates:
- Understanding of digital forensics in IoT environments
- Ability to critically analyze IoT architectures
- Evaluation of IoT security challenges and modern solutions
The writing MUST be:
- Critical (not just descriptive)
- Well-structured
- Supported by academic references (APA 7)
- Written in original words (no plagiarism)
REQUIRED STRUCTURE
The final report must include:
- Title Page
- Table of Contents
- Introduction (brief overview of IoT, security, and forensics importance)
- TASK 1 (400 words)
Scenario: Smart city IoT system (traffic + surveillance) attacked
Required:
- Explain forensic challenges in:
Identifying evidence
Collecting evidence
Preserving evidence
Focus on:
- Distributed devices (cameras, sensors)
- Volatile data (logs, memory)
- Lack of standardization
- Chain of custody issues
- Data integrity problems
- Cloud dependency
Also explain:
How these challenges affect the investigation process
(e.g., delays, missing evidence, legal issues, accuracy)
- TASK 2(a) (400 words)
Critically analyze IoT architecture models:
You must compare and evaluate:
- Three-layer architecture:
- Perception layer
- Network layer
- Application layer
- Five-layer architecture:
- Perception
- Transport
- Processing
- Application
- Business layer
- CloudFog architecture:
- Cloud computing
- Fog/Edge computing
Required:
- Explain each architecture clearly
- Compare advantages and disadvantages
- Discuss which is better for security and forensics
- Provide critical evaluation (not just explanation)
- TASK 2(b) (800 words)
Smart city IoT system under cyberattack
You MUST analyze:
(A) Security Challenges:
- Device heterogeneity (different devices/protocols)
- Weak authentication mechanisms
- Privacy issues
- Unauthorized access
- Data breaches
- Abnormal network behavior (botnets, coordinated attacks)
(B) Evaluate Solutions:
- Blockchain:
- Advantages: integrity, decentralization, trust
- Limitations: scalability, cost, latency
- Machine Learning:
- Advantages: anomaly detection, automation
- Limitations: data requirements, false positives, resource usage
(C) Critical Evaluation:
- Are these solutions practical in real-world smart cities?
- What are the limitations in deployment?
(D) PROPOSE SOLUTION (VERY IMPORTANT):
Suggest a hybrid security model combining:
- IoT security controls
- Blockchain (for integrity)
- Machine learning (for detection)
Example idea:
- Edge layer uses ML for anomaly detection
- Blockchain for secure logging
- Central system for monitoring
- CONCLUSION
- Summarize key findings
- Highlight importance of IoT security and forensics
- Mention future improvements
- REFERENCES
- Use APA 7 format
- Minimum 610 academic sources
- Include the main article
IMPORTANT REQUIREMENTS
- No plagiarism (Turnitin safe)
- Academic tone
- Clear headings
- Logical flow
- Include examples where possible
- Diagrams are a plus (especially IoT architecture)
EXTRA REQUEST
Please:
- Keep language clear (not overly complex)
- Add critical thinking (compare, evaluate, justify)
- Ensure it is suitable for viva (I should understand it)
Leave a Reply
You must be logged in to post a comment.