Comparing and Selecting Forensic Tools

User Generated

pzhxhz128

Writing

Description

Suppose you were recently hired for a new position as the computer forensics manager at a medium-sized communications company. One of your duties will be to analyze, test, and select forensic tool standards for the company.

Write a four to five (4-5) page paper in which you:

  1. Analyze the five (5) categories of tasks performed with computer forensics tools and provide an example of a software tool that performs each task.
  2. List the questions you would ask when evaluating and selecting forensics tools. Select the question you believe is the most important and provide a rationale.
  3. Explain how a comparison table can assist a decision maker when analyzing computer forensic tools.
  4. Select one (1) Windows-based and one (1) Linux-based forensic software tool and create a comparison table analyzing the functions and sub-functions of each.
  5. Describe the benefits of the NIST’s CFTT project and how it can assist decision-makers in analyzing and selecting forensic tools.
  6. Create an expense budget for the tools you would consider utilizing at the company and provide reasoning and planned function of the selected tools.
  7. Note: Submit the expense budget as an exhibit for the assignment. It is not included in the required page length.
  8. Use at least three (3) quality resources in this assignment.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Please confirm the paper and let me know if you may need something fixed. Waiting to hear from you

Running head: FORENSIC TOOLS

1

Comparing and Selecting Forensic Tools
Name
Instructor
Course
Date

FORENSIC TOOLS

2

Five (5) categories of tasks performed with computer forensics tools.

Computer forensic tools perform various categorical tasks that include acquisition. Under
the certain tasks, the tools help in making copies from an original drive, making both physical
and logical data copies, and foreign acquisition of data. The hexadecimal editor is significant for
viewing the contents of raw image files. The forensic tools also perform a critical function like
validation and discrimination. Here, the tools help to verify the integrity of the acquired data by
sorting the available investigation data (Maras, 2015). The CRC-32, MD5 help to secure various
hash Algorithms during the validation process. Additionally, the filtering process uses the
National Software Reference Library (NSRL) that avails the known file hashes commonly used.
The extraction tools are also significant in computer forensics since they help in
computing investigations (Widup, 2014). They enhance the data viewing process, keyword
searching technique and decompressing of data. Importantly, extraction tools like password
dictionary attacks help hack encrypted files. Alternatively, the brute force attack tools help crack
complicated passwords. A reconstruction is a vital tool in computer forensics since it helps to
rebuild any suspect drive. This process is critical for displays the events in a given crime. Thus,
reconstruction uses the SafeBack, the SnapBack and EnCase to help make image-to-disk copies.
Lastly, reporting is an important task in forensics in that it helps to enhance disk analyses and
examinations. As such, to enhance the report generator, one can use the ProDiscover or the
Acces...


Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags