BIT371-Expression-of-Interest-Template-2019-Final.doc - In this subject we are going to imagine that we are all working for an IT group who we will call

BIT371-Expression-of-Interest-Template-2019-Final.doc - In...

This preview shows page 1 - 5 out of 12 pages.

In this subject we are going to imagine that we are all working for an IT group, who we will call the IT Capstone Projects Group (ITCPG) Pty Ltd. The business has a number of IT professionals who often work as contractors and are called upon to work on projects. The skills of these professionals vary; some are software developers, networking and security specialists while others are specialists in business analytics. You are assumed to be on the books of this business and as such seek work through them. ITCPG receives or sources IT related projects which are undertaken by a group of specialist IT professionals. The project team will be determined by the requirements of the project. ITCPG will put out an expression of interest for each project. Groups members are identified and the first part of the process is for you show that you understand the requirements and have the skills to complete the particular project. Normally this would be very formal and quite detailed. We are going to simulate this process and ask each group to show us they have the knowledge and skills to complete the project. Once approved, you will then develop a project proposal providing greater detail of the project. It is important to note that a lot of what you write in the expression of interest will be included in the proposal.
Image of page 1
Melbourne Polytechnic BIT371 Capstone Experience IT C APSTONE P ROJECTS G ROUP P TY L TD E XPRESSION OF I NTEREST Forensics Analysis for Different Networks T EAM M EMBER N AMES : A.M.Punsisini Umedya Gunasinghe-1459611 Sukhchain Singh Dhaliwal-1451850 Muhammad Safwan Naseem-1449263 Subash Kandel-1455965 -24/03/2019-
Image of page 2
Table of Contents Invitation ................................................................................................. 2 Background ............................................................................................ 2 Key Business Objectives ...................................................................... 2 Key Stakeholders ................................................................................... 3 Client .......................................................................................................................... 3 Other .......................................................................................................................... 3 Business Requirements (or Project Scope) ........................................ 3 Overview ..................................................................................................................... 3 Deliverables ................................................................................................................ 3 Time Frame or Schedule ....................................................................... 3 Resources ............................................................................................... 3 Acceptance (Key Success Factors) ..................................................... 3 Assumptions, Constraints and Risks ....................................................... 4 Expression of Interest Forensics Analysis for different Networks Page 1
Image of page 3
Invitation The development of an information technology infrastructure including faster networks, wider distribution of free software, and advanced virtualization technology has popularized cloud computing. According to OOO (tribal zero), we provide Cloud computing services can be divided Cloud storage services including computing forensics. With the growing popularity of cloud computing, crimes using digital forensic methods for investigate cloud storage services related Issue. Using a cloud storage service leaves traces in local devices. This paper investigates such traces left in PCs and return to access cloud storage. Cloud storage must be examined when conducting digital forensics on that storage. In addition, this paper presents methods for collecting and analysing evidence about a variety of the cloud storage services currently available. Moreover, this paper will be discussing methods for forensic investigation of cloud storage services, and important factors that should be considered in a forensic investigation.
Image of page 4
Image of page 5

You've reached the end of your free preview.

Want to read all 12 pages?

  • Spring '17
  • Sui

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes