To respond to various computer security breaches and perform a proper forensics investigation.

User Generated

Ynfirtnfmra1

Writing

Description

To respond to various computer security breaches and perform a proper forensics investigation, it is important to ensure that tried and true tools and software are utilized. Tool testing provides a confirmation that the tool or software that you are using to perform a forensic investigation is performing the actions that you intend and nothing more.

The U.S. National Institute of Standards and Technology (NIST) has a rigorous testing program for computer forensic tools and equipment.

You can review and learn more about the NIST Tool Testing Program by visiting: http://www.cftt.nist.gov

For this assignment, you are asked to prepare a written report that includes the following three sections:

  • Provide an overview of the NIST Computer Forensic Tool Testing program and its usefulness to computer forensic investigators.
  • Describe in detail the work that NIST has done in testing “disk imaging” and “deleted file recovery” tools.
  • Describe the significance and importance of the various computer forensics offerings from NIST as shown on this site: http://www.nist.gov/itl/ssd/computerforensics.cfm

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

1
Tool Testing for Forensic Investigation - Outline
I.
II.

Overview of NIST Computer Forensic Tool Testing (CFTT) Program
Disk Imaging and Deleted File Recovery Tools

III.

Significance and Importance of Various Forensic Offerings

IV.

Conclusion


Running head: TOOLS TESTING FOR FORENSIC INVESTIGATION

Tool Testing for Forensic Investigation
Name
Institution

1

TOOLS TESTING FOR FORENSIC INVESTIGATION

2

Tool Testing for Forensic Investigation
Overview of NIST Computer Forensic Tool Testing (CFTT) Program
In spite of the shocking perspective that computers can be involved in criminal activity as
an instrument, evidence, and victim among others, the assertion is correct during the
investigation. Forensic examiners are involved in the study of a computer crime after proper
authorization to seize evidence, create duplicates for analysis, analyze them and report the results
to the courts. The evidence provided by forensic examiners and analyst is critical to the
administration of justice and promotion of equity and fairness in the society. It is the underlying
need that informed the development of the Computer Forensic Tool Testing Program (CFTT),
which is a methodology that is designed for the standardization and verification of the
specifications, procedures, criteria, sets, hardware that is used for testing forensic software.
As ...


Anonymous
Goes above and beyond expectations!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags