StudentShare solutions
Triangle menu

Selecting Forensic Tools - Essay Example

Nobody downloaded yet

Extract of sample
Selecting Forensic Tools

ion/attack. It is, hence, computer detective work.
The importance of computer forensic technologies to the securitization of information and for the detection of the source of cyber crimes, manifest in the unauthorized retrieval of data, cannot be overemphasized. As both Stephenson (1999) and Carrier (2004) emphasize, organizations which do not have a digital forensics system in place are inexcusably careless and irresponsible. The implication here is that organizations which handle sensitive data, especially data which the law holds as confidential and private such as patient information, will have a digital forensics system in place. This was confirmed by our organization's IT Director who explained that a digital forensics analysis system was implemented over two years ago. While the IT Director claimed that the organization did not abide by criteria for the determination of whether to use open source or commercial tool sets, his explanation of the system and the process of its selection underscore its efficiency.
Tool Selection
The selection of the tool set was determined by the needs of the organization, the nature of its data and, importantly, a review of past attacks and unauthorized intrusion attempts. As a healthcare organization, the securitization of data is of primary importance since the leakage of patient information to unauthorized personnel renders the organization vulnerable to litigation. Furthermore, because of the nature of its activities, the data information combines between text, as in medical reports and demographic data, graphics, as in patient X-rays, and numbers, as in financial information. The organization, therefore, has to protect three data types.
In their analysis of the various computer forensic tools, Yasinsac and Manzano (2001) maintain that the criteria for selection should be data type and organizational needs and activities. Further explaining this, they note that the tools which are used vis--vis graphical data are not effective when used for numerical or textual information. Watermarking tools are most effective where graphical data is concerned but not so in relation to textual data (Yasinsac and Manzano, 2001). Furthermore, whether commercial or open source tool sets are used should depend on an organization's size, the complexity of its functions and the volumes of data it handles (Yasinsac and Manzano, 2001).
Even though he concurred with Yasinsac and Manzano's (2001) recommendations, the IT director admitted that adherence to their tool set selection criteria was not feasible. While open-source rather than commercial tools were used as a result of the complexity of the organization's processes and the volumes of data it handles, it did not distinguish between graphic and text-based data. Doing so would involve the implementation of two different digital forensics tool sets, thereby multiplying the human and non-human resources assigned ...Show more

Summary

The growing indispensability of computer and internet technologies to the storage, retrieval, communication and analysis of information data has made the adoption of data security technologies an imperative. Most, possibly all, organisation which handle sensitive data have security technologies which are designed to pre-empt and prevent unauthorized intrusion but there is no fool-proof preventative strategy…
Author : dgleason
Selecting Forensic Tools essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Selecting Forensic Tools"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Digital Forensic Tools
Information is lifeblood for any organization. This is an information age where information is digitized and stored on information systems and travels to the inbound and outbound network. To ensure that the data is secure in storage and transmission, organizations deploy tools and hire security professionals.
4 pages (1000 words) Essay
Selecting and Managing Employees
First, the essay briefly describes the Mount St. Mary’s Hospital and Health Center in Lewiston New York north of Niagara Falls. Finally, this paper states the most appropriate means of managing the performance of the registered maternity nurse who would fill a vacancy at the Lewiston Mount St. Mary’s Hospital and Health Center.
8 pages (2000 words) Essay
Consider the challenges of the forensic recovery and examination of data from mobile devices
The cross over between computers forensics and mobile device forensics 12 5. Conclusion 13 Abstract By the end of the 1st decade of the new millennium mobile device usage increased tremendously; an indication that technology is advancing at very high rate.
14 pages (3500 words) Essay
Forensic Botany
Many scientists have been trying to design approaches that can aid in the effective identification of the multiple species. The fact that plants are subject to fast degradation serves to complicate the issue of identification because the process of differentiating the degraded parts of plants to the level of the specific identification is long.
6 pages (1500 words) Essay
Forensic Anthropology
This is the same way and approach that can be applied in the understanding of forensic anthropology. To understand forensic anthropology it imperative that one understands what forensic involves and after that move on to understand what anthropology is all about.
8 pages (2000 words) Essay
Forensic Archaeology
Geographical survey is the most relevant and commonly applied methods for evaluating clandestine graves. Based on the feature of the place of occurrence of crime, forensic archeologists adopt various geographical
12 pages (3000 words) Essay
Term paper
Companies have also employed forensic accountants for prevention of fraud and perform supervisory role in order to comply with regulations laid out by the SOX 2002. The current paper will examine the role of
12 pages (3000 words) Essay
Research Essay is an essay based on the cyber forensic
Presently, modern day cyber precaution ethics habitually require far-reaching aftermarket standardisation to be accurately successful within management systems fields (Saks & Koehler, 2005). In addition, the operating cost
16 pages (4000 words) Essay
Forensic
aken while collecting, storing and transporting the digital evidence so as to maintain its viability when used in court (Bennett, Maton, & Kervin, 2008). Therefore, to maintain the validity of this evidence, the responders have to follow the following steps. First, the evidence
1 pages (250 words) Essay
Forensic
The printers and copiers always transfer their characteristics to the documents. The paper discusses the various characteristics of printers and copiers that make them readily identifiable.
4 pages (1000 words) Essay
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Click to create a comment
Contact Us