Nobody downloaded yet

Forensic Tools - Research Paper Example

Comments (0) Cite this document
Summary
One can use them to collect information in a research. It can also used in the evaluation of software in order to find out their effectiveness in performing an attack or defense. The tools are mostly…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.2% of users find it useful
Forensic Tools
Read TextPreview

Extract of sample "Forensic Tools"

Download file to see previous pages The tools need to be validated to ensure reliability (Brunty, 2011). They are highly trusted by the community that deals with legal issues. For instance, judges highly trust forensic tools the way scientists trust scientific processes to make their study results consistent and verifiable. Forensic tools should not be used as scientific processes because they are not scientific in nature. They have to be validated before being used. Validation enables the legal community to match a forensic tool with the nature of investigation and types of data to be collected. The validation is also important because it increases one’s confidence when using the tools. The process is vital when giving evidence in court that the tools used are effective before presenting the digital proof. Validation increases the competitiveness of a forensic examiner. Without it, the reputation of even the most experience examiner can be destroyed. Validation of the tools is also necessary because it ensures repeatability. When using the same tool, one should be able to obtain the same results after conducting the same test. This proves that the information presented in the tools is of high quality (Evans, Bond & Bement, 2004). In addition, validation ensures reproducibility when using the tools. This means that when using the tools one can obtain the same results even if the same tests are carried out in different settings.
One of the organizations that undertake the validation of the tools is the National Institute of Standards and Technology (NIST) (NSRL, 2001). This organization conducts various projects in laboratories. The aim of the organization entails establishing methodologies for testing the effectiveness of the forensic tools. For instance, the organization develops the tools specifications and tests sets. It also identifies the general test procedure and standards. The ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Forensic Tools Research Paper Example | Topics and Well Written Essays - 1750 words”, n.d.)
Forensic Tools Research Paper Example | Topics and Well Written Essays - 1750 words. Retrieved from https://studentshare.org/information-technology/1659066-forensic-tools
(Forensic Tools Research Paper Example | Topics and Well Written Essays - 1750 Words)
Forensic Tools Research Paper Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/1659066-forensic-tools.
“Forensic Tools Research Paper Example | Topics and Well Written Essays - 1750 Words”, n.d. https://studentshare.org/information-technology/1659066-forensic-tools.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Forensic Tools

Forensic investigation

...that the examiner should follow when he receives case: check the investigator need, document everything about the case, fill chain of the custody, resized the evidence, and store it, make verification of tools and software. In addition, it analyzes images for the original hard drive by using different software and checks the MD5, store the original hard drive, do peer’s reviews for what he has done, and check a pre-defined checklist of all required steps.  Literature Review Each Digital Forensic Laboratory should have a manual that the examiner can use to be able to handle the digital evidence without causing damage or alteration to the original evidence so that Court cases are rejected based on...
13 Pages(3250 words)Essay

Forensic Archaeology

...and considered a specific emerging field, consists of tools, techniques and methods, developed for archaeological research purposes, to assist legal investigations. Forensic archaeologists are usually the members of faculty of archaeology deployed to work in close coordination with expert search teams, forensic entomologists, forensic botanists and forensic pathologists to find and investigate buried evidence at crime scenes. Forensic archaeology assists in investigating genocide, war crimes, crimes against humanity, mass disaster victim recovery, and repatriation of war dead (Hunter & Cox, 2005). Forensic archaeology...
9 Pages(2250 words)Assignment

Forensic Psychology

...? Forensic Psychology My PSY 131 General Psychology Fall Brandi Marten Forensic Psychology Introduction The term ‘forensic’ refers to matters that pertains “to courts or to law, both civil and criminal” (Bartol and Bartol, 2008, p. 3). Bartol and Bartol (20008, p. 3) pointed out that “forensic science involves the application of scientific knowledge to legal problems” (Bartol and Bartol, 2008, p. 3). According to Bartol and Bartol (2008), psychology is one such science and there are two definitions of forensic psychology: the narrow and the broad definitions. The narrow definition holds that “forensic psychology refers to the application...
5 Pages(1250 words)Research Paper

Forensic Evidence

...). After investigating computers, it was discovered that the serial killer John Robinson was using internet to find people to schedule a meeting. Afterwards they were killed by sexually assaulting them. These facts were only possible by forensic computing techniques and were not possible by physical evidence and investigation (Computer forensics, n.d ). However, many techniques are associated with forensic computing, few techniques are categorized in to two groups i.e. Graphical User Interface (GUI) based forensic tools and Command line forensic tools (Conklin 2005). The command line tools are relatively...
5 Pages(1250 words)Research Paper

Digital Forensic Tools

...?Digital Forensic Tools Information is lifeblood for any organization. This is an information age where information is digitized and stored on information systems and travels to the inbound and outbound network. To ensure that the data is secure in storage and transmission, organizations deploy tools and hire security professionals. However, there are many challenges that organizations have to overcome for securing the information on the network as well as in the servers. Certified skilled professionals, incident response management teams and other relevant staff plays a significant role for protecting and responding to threats that may or have compromise the network to gain access to...
4 Pages(1000 words)Essay

Computer Forensic Tools

...?Computer Forensic Tools Number There is different software that can be used to recover deleted files in a computer system. The most prevalent are Recuva, Pandora recovery, SoftPerfect file recovery and Glary undelete. These programs were developed by different individual and therefore, have some unique features. Recuva is file recovery software that is available freely. The software is extremely easy to use and have several advanced components that are optional. The software facilitates the recovery of files that are stored in external drives, memory card and the hard drive. The program recovers files in various operating systems such as vista, windows 7, Xp and different server. Recuva enables the...
3 Pages(750 words)Term Paper

Selecting Forensic Tools

... system in place are inexcusably careless and irresponsible. The implication here is that organizations which handle sensitive data, especially data which the law holds as confidential and private such as patient information, will have a digital forensics system in place. This was confirmed by our organization's IT Director who explained that a digital forensics analysis system was implemented over two years ago. While the IT Director claimed that the organization did not abide by criteria for the determination of whether to use open source or commercial tool sets, his explanation of the system and the process of its selection underscore its efficiency. Tool Selection The selection of the tool set was determined by the needs... of the...
4 Pages(1000 words)Essay

Forensic Accounting

.............................................................5 2. Forensic accounting 2.1 Historical development of forensic accounting........................................................6 2.2Liability exposure that the forensic accountant........................................................8 2.3 Educational and professional training requirements of forensic accountants..........9 3. Environmental accounting and related auditing...................................................9 4. Corporate governances 4.1 Definition..............................................................................................................10 4.2 Importance of corporate...
12 Pages(3000 words)Essay

Forensic

...that it can be used to provide evidence. Encryption was used in the past to prevent people from viewing incriminating files (Taylor, Haggerty, Gresty, & Hegarty, 2010). A message is encoded using a particular key, hence making it impossible for anybody to decrypt it. Lastly, media database systems can be unified into one. Encryption and stenography can be used legitimately by forensic examiners to ensure that there is minimal tampering with the collected evidence. Stenography was used in the past to ensure confidential communication. Secondly, it can be used to protect data since it is embedded. References Bennett, S., Maton, K., & Kervin, L. (2008). The “digital...
1 Pages(250 words)Essay

Forensic

...Forensic Document Examination Questioned documents are a common case in many legal proceedings. Forensic analysts are thus faced with a task of analysis the contents of the documents, nature of the materials used and the source. One of the primary tasks of forensic experts is to examine the individual characteristics of a document and match them with characteristics of a printer or photocopier. The printers and copiers always transfer their characteristics to the documents. The paper discusses the various characteristics of printers and copiers that make them readily identifiable. Such characteristics include; toner elements, grabber marks, graphic marks from specific printers and...
4 Pages(1000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Forensic Tools for FREE!

Contact Us