StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Selecting Forensic Tools - Essay Example

Cite this document
Summary
The growing indispensability of computer and internet technologies to the storage, retrieval, communication and analysis of information data has made the adoption of data security technologies an imperative. Most, possibly all, organisation which handle sensitive data have security technologies which are designed to pre-empt and prevent unauthorized intrusion but there is no fool-proof preventative strategy…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
Selecting Forensic Tools
Read Text Preview

Extract of sample "Selecting Forensic Tools"

Download file to see previous pages

ion/attack. It is, hence, computer detective work. The importance of computer forensic technologies to the securitization of information and for the detection of the source of cyber crimes, manifest in the unauthorized retrieval of data, cannot be overemphasized. As both Stephenson (1999) and Carrier (2004) emphasize, organizations which do not have a digital forensics system in place are inexcusably careless and irresponsible. The implication here is that organizations which handle sensitive data, especially data which the law holds as confidential and private such as patient information, will have a digital forensics system in place.

This was confirmed by our organization's IT Director who explained that a digital forensics analysis system was implemented over two years ago. While the IT Director claimed that the organization did not abide by criteria for the determination of whether to use open source or commercial tool sets, his explanation of the system and the process of its selection underscore its efficiency.Tool SelectionThe selection of the tool set was determined by the needs of the organization, the nature of its data and, importantly, a review of past attacks and unauthorized intrusion attempts.

As a healthcare organization, the securitization of data is of primary importance since the leakage of patient information to unauthorized personnel renders the organization vulnerable to litigation. Furthermore, because of the nature of its activities, the data information combines between text, as in medical reports and demographic data, graphics, as in patient X-rays, and numbers, as in financial information. The organization, therefore, has to protect three data types. In their analysis of the various computer forensic tools, Yasinsac and Manzano (2001) maintain that the criteria for selection should be data type and organizational needs and activities.

Further explaining this, they note that the tools which are used vis--vis graphical data are not effective when used for numerical or textual information. Watermarking tools are most effective where graphical data is concerned but not so in relation to textual data (Yasinsac and Manzano, 2001). Furthermore, whether commercial or open source tool sets are used should depend on an organization's size, the complexity of its functions and the volumes of data it handles (Yasinsac and Manzano, 2001).

Even though he concurred with Yasinsac and Manzano's (2001) recommendations, the IT director admitted that adherence to their tool set selection criteria was not feasible. While open-source rather than commercial tools were used as a result of the complexity of the organization's processes and the volumes of data it handles, it did not distinguish between graphic and text-based data. Doing so would involve the implementation of two different digital forensics tool sets, thereby multiplying the human and non-human resources assigned

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Selecting Forensic Tools Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Selecting Forensic Tools Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/miscellaneous/1514573-selecting-forensic-tools
(Selecting Forensic Tools Essay Example | Topics and Well Written Essays - 1000 Words)
Selecting Forensic Tools Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/miscellaneous/1514573-selecting-forensic-tools.
“Selecting Forensic Tools Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/miscellaneous/1514573-selecting-forensic-tools.
  • Cited: 0 times

CHECK THESE SAMPLES OF Selecting Forensic Tools

Digital Forensic Tools

The purpose of the present essay "Digital forensic tools" is to discuss the value of information technology contribution in forensics practice.... To ensure that the data is secure in storage and transmission, organizations deploy tools and hire security professionals.... The study will talk about some general network forensic for capturing and examining data that is traveled within the network.... However, the Network forensic Analysis Tool (NFAT) provides playback actions for investigations an electronic crime or hacking activity....
4 Pages (1000 words) Essay

Forensic Computing Development

hellip; It is known to be one of the most powerful and fastest tools in searching or locating files.... An advantage of this software is that it can be installed and run from a USB flash drive thus helps you in keeping your investigation tools and reports with you when you are mobile (Cansolvo & Scholtz, 2004, p.... forensic Computing   Name   Course Professor University State Date forensic Computing OS forensic is software used to easily uncover and extract relevant forensic data hidden in a computer within a short time period....
4 Pages (1000 words) Essay

Forensic Accounting class discussion

Computer forensics has the sole aim of performing a structured investigation while at the same time ensuring that… The evidence has to be maintained in order to find out what exactly took place, as well the person who can be held liable for a fraud carried out on a computer (Kranacher, Riley & Wells, 2011). There are several functions that can be utilized in forensic Accounting forensic Accounting Computer forensics Computer forensics refers to the application of computer analysis, as well as investigation techniques, to gather suitable evidence that can be presented in court....
1 Pages (250 words) Assignment

Computer Forensic Software

The need to eliminates or alleviate this risk has brought investigative tools that are mostly used in curbing cybercrimes as well as obtain digital evidence that is used in prosecuting criminals who exploit the technology for malicious intent.... The paper "Computer forensic Software" discusses that good visualizations and visual interfaces can be essential in reducing the time required to analyze data.... Other important subjects to be covered include how a forensic image is created as well as previewing and organizing available evidence by the creation of a case in AccessData's FTK, which is compulsory....
15 Pages (3750 words) Coursework

Validation of Forensic Tools and Software

The paper "Validation of forensic tools and Software"  explains how the tools are validated and the information required in a tool validation report....                … forensic tools are used in investigating security issues in various ways.... This report explains the importance of validating forensic tools.... For instance, judges highly trust forensic tools the way scientists trust scientific processes to make their study results consistent and verifiable....
7 Pages (1750 words) Coursework

Digital Forensic Incident Response for American Marketing Systems

He will also use tools that have the ability to crack encrypted files and passwords.... The paper "Digital forensic Incident Response for American Marketing Systems" gives reveal the existence of skimming culprits and the skimming procedure.... Digital forensic investigation is important for the productive prosecution of criminals who engage in digital crimes.... The investigators should therefore make sure that they obtain quality forensic evidence which the courts of law require in administering justice....
13 Pages (3250 words) Case Study

Acquiring Network Forensic Evidence

The paper "Acquiring Network forensic Evidence" concerns computer forensics in the context of law enforcement agencies or in corporate security, the utilization of computers to catalog physical evidence that is analyzed in forensics techniques including biometric identification, analyzing DNA, etc.... As security incidents are rising, there will be a huge demand for forensic computing professionals in the future (Computer forensics).... These traceability factors can lead to aid in forensic investigations and can track down criminals by investigating their computers....
6 Pages (1500 words) Essay

Challenges in Mobile Forensic Technologies

From the paper "Challenges in Mobile Forensic Technologies" it is clear that mobile forensic investigators face elevated expenses in training processes and as they seek to acquire different tools for use in the examination process.... hellip; It is understood that the tools used in forensic examinations are complex and diverse.... It is not easy for an investigator to find hardware to software tools that he is completely familiar with because there are many in the market, many of which many examiners have not used before....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us