FORENSIC SECURITY TOOLS

FORENSIC SECURITY TOOLS

I am very behind. (all I need is what tools would you use)
As with any professional field, you can select from a wide variety of tools to aid you in your work as a computer forensics investigator. Some tools are better than others, and many are only useful in certain situations. Furthermore, prices can vary drastically. You might be able, in some instances, to get by with a free software tool, whereas other situations might require you to purchase a commercial package. Part of your job as an investigator is to identify tools you need and balance considerations of applicability, budget, and so on.

For this unit, your group chooses what it considers the best-in-class commercial tools for your chosen business environment. Discuss with your group members the contents of a dream toolbox for your sector/division. You can refer to tools presented in this unit’s readings or research the Internet for additional tools. Include three or four tools in the toolbox to allow its users to cross-validate any forensic findings.

Once the group has identified and discussed the appropriate tools, answer the following questions in a 2- to 3-page group report:
•What criteria or process did the group use to select the tools for your business sector?
•What tools are in the dream toolbox? Provide a detailed list of those tools, including tools for cross-validation. What are benefits and disadvantages of each?
•How do the choices meet the needs of your business sector?
•What background and training do the computer forensic team members need to use the tools?
•Does your organization require a certain status to purchase and use the tools? (For instance, do you need to be a law enforcement agency rather than a private organization?)

Answer Preview

Computer forensic is an important branch of computer science when it comes to crimes related to computer and the internet. This stems from the advanced development in the uses of the computer from the basic functions of yesteryears in relation to their modern use for data…

(627 Words)

Scroll to Top