Cyber Forensics Tools

What are cyber forensics tools?

Cyber forensics tools will help us to conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if we just want to learn a new skill, these suites and utilities will help us conduct memory forensic analysis, hard drive forensic analysis, forensic image exploration, forensic imaging and mobile forensics. As such, they all provide the ability to bring back in-depth information about what’s “under the hood” of a system.

Why are cyber forensics tools required?

Cyber forensics tools are required to establish a methodology for testing computer forensic software tools by development of general tool specifications, test procedures, test criteria, test sets, and test hardware. The results provide the information necessary for toolmakers to improve tools, for users to make informed choices about acquiring and using computer forensics tools, and for interested parties to understand the tools capabilities. A capability is required to ensure that forensic software tools consistently produce accurate and objective test results. Our approach for testing computer forensic tools is based on well-recognized international methodologies for conformance testing and quality testing.

What are the basic principles of cyber forensics?

  • When dealing with digital evidence, all of the general forensic and procedural principles must be applied. 
  • Upon seizing digital evidence actions taken should not change that Upon seizing digital evidence, actions taken should not change that evidence. 
  • When it is necessary for a person to access original digital evidence, that person should be trained for the purpose that person should be trained for the purpose. 
  • All activity relating to the seizure, access, storage or transfer of digital evidence must be fully documented, preserved and available for review. 
  • An Individual is responsible for all actions taken with respect to digital evidence whilst the digital evidence is in their possession. 
  • Any agency, which is responsible for seizing, accessing, storing or transferring digital evidence is responsible for compliance with these principles.
 What are the fundamentals of cyber forensics?



Reference List

Top 20 Free Digital Forensic Investigation Tools for SysAdmins from http://www.gfi.com/blog/top-20-free-digital-forensic-investigation-tools-for-sysadmins/

NIST Computer Forensic Tool Testing Program from http://www.cftt.nist.gov/

Digital Forensics - Computer Science from https://www.cs.purdue.edu/homes/ninghui/courses/426_Fall10/handouts/CS426_forensics.pdf

No comments:

Post a Comment