StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Overview of digital forensics at NIST - Article Example

Cite this document
Summary
National Institute of Standards and Technology (NIST) is a federal technology agency that mainly works hand in hand with industries to improve the innovations technology and security. Digital forensics is a scientific technique used to provide analyzed information to support…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.1% of users find it useful
Overview of digital forensics at NIST
Read Text Preview

Extract of sample "Overview of digital forensics at NIST"

Digital Forensics at NIST National Institute of Standards and Technology (NIST) is a federal technology agency that mainlyworks hand in hand with industries to improve the innovations technology and security. Digital forensics is a scientific technique used to provide analyzed information to support investigations in cases of security incidences, arising from crimes, system damages and even recoveries of lost or damaged data (Shirley, par. 1). The main aim of using these techniques is to provide defined information to help in the investigations, analysis and provide proper recommendations on computer based security incidences.

Due to the increased computer related crimes, it is a fundamental requirement for any organization to employ these digital forensic skills to establish and solve their security issues. Use of these forensic techniques provides an additional assistance to the organization since it helps in troubleshooting, identification and repair of operational issues within a system, reviewing of the operating systems (Barnett, par. 9). Also provides recovery of lost data from computer systems in case of malicious or accidental damage.

It provides protection of sensitive information which would otherwise be used for malicious purposes and even acquisition of data from the hosts that can be used by the company in the future. Furthermore, it also gives an opportunity to monitor log entries and prevention of policy violations.Apart from all the support these digital forensics, there are shortcomings that accompany their use and benefits outlined above. One disadvantage is the difficulty in obtaining information from mobile devices like phones, iPads, and personal digital assistants.

Law enforcement and forensics on these devices are still a challenge since most of the mobile devices require specialized interfaces, storage, and hardware. Also getting information from the cloud storage space is tedious because of the complicated cloud technology. Works cited.Bennett, David. “The Challenges Facing Computer Forensics in Obtaining Information from Mobile Devices for Use in Criminal Investigations”. Forensic Focus Journal. 20.8 (2011). Web March 28, 2015< http://articles.

forensicfocus.com/2011/08/22/the-challenges-facing-computer-forensics-investigators-in-obtaining-information-from-mobile-devices-for-use-in-criminal-investigations/> Shirley, Radack. Forensic techniques: helping organizations improve their responses to information security incidences. Web 28 March 2015. < http://www.itl.nist.gov/lab/bulletns/bltnsep06.htm>

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Overview of digital forensics at NIST Article Example | Topics and Well Written Essays - 250 words”, n.d.)
Overview of digital forensics at NIST Article Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1685511-overview-of-digital-forensics-at-nist
(Overview of Digital Forensics at NIST Article Example | Topics and Well Written Essays - 250 Words)
Overview of Digital Forensics at NIST Article Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1685511-overview-of-digital-forensics-at-nist.
“Overview of Digital Forensics at NIST Article Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1685511-overview-of-digital-forensics-at-nist.
  • Cited: 0 times

CHECK THESE SAMPLES OF Overview of digital forensics at NIST

Forensic Camera Classification

The article “Forensic Camera Classification: Verification of Sensor Pattern Noise Approach” by Nitin Khanna, Aravind Mikkilineni and Edward Delp is an account of the evaluation of the authenticity of digital images.... The problem of image source identification is critical to The article “Forensic Camera ification: Verification of Sensor Pattern Noise Approach” by Nitin Khanna, Aravind Mikkilineni and Edward Delp is an account of the evaluation of the authenticity of digital images....
1 Pages (250 words) Essay

Risk management cycle and strategy of Money laundring in the US

This paper will seek to discuss the risk management cycle and strategy of money laundering in the US by using the steps involved in 'the risk management cycle' such as risk identification; risk measurement; risk analysis;  decisions; implementation; monitoring; policies.... hellip; The paper tells that the government should instill strategic plans required by every concerned agency in identifying the required tasks with a view to reaching the set goals of reducing risks that emanate from money laundering....
10 Pages (2500 words) Essay

Cloud-Based Computing Security

It is defined by the national institute of standards and technology (nist) as: “A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can rapidly provision and released with minimal management effort or service provider interaction”....
7 Pages (1750 words) Essay

Validation of Forensic Tools and Software

Organizations that undertake the validation of forensic toolsOne of the organizations that undertake the validation of the tools is the National Institute of Standards and Technology (nist) (NSRL, 2001).... The process is vital when giving evidence in court that the tools used are effective before presenting the digital proof....
7 Pages (1750 words) Coursework

Computer forenscis

An overview of Computer Forensics.... Efficiency; it allows much scripting and automation making it ideal for Linux in forensics Linux has various distributions that are very popular mainly because of the stability, better security and open source nature.... Recovery of data is crucial in forensics, and this is where Linux has an upper hand over Windows.... ?A Practitioners Guide to Linux as a Computer forensics Platform 3.... Computer forensics....
1 Pages (250 words) Article

The ISMS for Mr. Manos Llewellyn

Manos Llewellyn is not dispersed on a large scale, however, the company wishes to provide web development and web services, enable and configure Secure Socket Layer, Domain hosting, Web Applications, develop E-Shops, develop Web Designs, incorporation of a software house, graphic designing, and digital viral marketing strategy....
10 Pages (2500 words) Case Study

Digital Crime Investigation and Features of Steganography and Steganalytical Techniques

This coursework "digital Crime Investigation and Features of Steganography and Steganalytical Techniques" describes the different techniques and approaches.... nbsp; In steganography, important information is firstly hidden in host data such as text, digital video, audio, or image, and then secretly transmitted to the intended receiver.... This paper critically reviews both Steganography and Steganalysis, and analyses the different techniques and approaches used to implement steganography using digital text, video, image, or audio; various techniques of Steganalysis are also discussed....
9 Pages (2250 words) Coursework

Information Plan to Protect Information for Mobile Communications

The system is digital in nature.... … The paper " Information Plan to Protect Information for Mobile Communications" is a good example of a term paper on information technology.... The report is about the protection of information from MedDev Company with the help of software such as the Global System for Mobile Communications (GSM)....
10 Pages (2500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us