Cyber Security Question

Please carefully read all requirements below and help me produce a high-quality, original academic report (not copied), written in a clear and critical style suitable for a top-grade submission.


ASSIGNMENT DETAILS

Module: Computer Forensics (COMP 30034)
Level: Undergraduate (Level 3)
Word Count: Approximately 2000 words
Deadline: 31 May 2026Link:

The assignment is based on the following research article:
Forensics and security issues in the Internet of Things (IoT)
(Springer link provided)


OVERALL OBJECTIVE

The assignment evaluates:

  1. Understanding of digital forensics in IoT environments
  2. Ability to critically analyze IoT architectures
  3. Evaluation of IoT security challenges and modern solutions

The writing MUST be:

  • Critical (not just descriptive)
  • Well-structured
  • Supported by academic references (APA 7)
  • Written in original words (no plagiarism)

REQUIRED STRUCTURE

The final report must include:

  1. Title Page
  2. Table of Contents
  3. Introduction (brief overview of IoT, security, and forensics importance)
  4. TASK 1 (400 words)
    Scenario: Smart city IoT system (traffic + surveillance) attacked

Required:

  • Explain forensic challenges in:
    Identifying evidence
    Collecting evidence
    Preserving evidence

Focus on:

  • Distributed devices (cameras, sensors)
  • Volatile data (logs, memory)
  • Lack of standardization
  • Chain of custody issues
  • Data integrity problems
  • Cloud dependency

Also explain:
How these challenges affect the investigation process
(e.g., delays, missing evidence, legal issues, accuracy)


  1. TASK 2(a) (400 words)
    Critically analyze IoT architecture models:

You must compare and evaluate:

  1. Three-layer architecture:
    • Perception layer
    • Network layer
    • Application layer
  2. Five-layer architecture:
    • Perception
    • Transport
    • Processing
    • Application
    • Business layer
  3. CloudFog architecture:
    • Cloud computing
    • Fog/Edge computing

Required:

  • Explain each architecture clearly
  • Compare advantages and disadvantages
  • Discuss which is better for security and forensics
  • Provide critical evaluation (not just explanation)

  1. TASK 2(b) (800 words)
    Smart city IoT system under cyberattack

You MUST analyze:

(A) Security Challenges:

  • Device heterogeneity (different devices/protocols)
  • Weak authentication mechanisms
  • Privacy issues
  • Unauthorized access
  • Data breaches
  • Abnormal network behavior (botnets, coordinated attacks)

(B) Evaluate Solutions:

  1. Blockchain:
  • Advantages: integrity, decentralization, trust
  • Limitations: scalability, cost, latency
  1. Machine Learning:
  • Advantages: anomaly detection, automation
  • Limitations: data requirements, false positives, resource usage

(C) Critical Evaluation:

  • Are these solutions practical in real-world smart cities?
  • What are the limitations in deployment?

(D) PROPOSE SOLUTION (VERY IMPORTANT):
Suggest a hybrid security model combining:

  • IoT security controls
  • Blockchain (for integrity)
  • Machine learning (for detection)

Example idea:

  • Edge layer uses ML for anomaly detection
  • Blockchain for secure logging
  • Central system for monitoring

  1. CONCLUSION

  • Summarize key findings
  • Highlight importance of IoT security and forensics
  • Mention future improvements

  1. REFERENCES

  • Use APA 7 format
  • Minimum 610 academic sources
  • Include the main article

IMPORTANT REQUIREMENTS

  • No plagiarism (Turnitin safe)
  • Academic tone
  • Clear headings
  • Logical flow
  • Include examples where possible
  • Diagrams are a plus (especially IoT architecture)

EXTRA REQUEST

Please:

  • Keep language clear (not overly complex)
  • Add critical thinking (compare, evaluate, justify)
  • Ensure it is suitable for viva (I should understand it)

WRITE MY PAPER

Comments

Leave a Reply