Evidence Collection and Analysis Tools
Christopher L. T. Brown, Technology Pathways
Types of Investigations and Tool Selection
Tool Testing, Admissibility, and Standards
Admissibility of Digital Evidence
Integrated Collection (Imaging) and Analysis Tools
Specialized Tools for E-mail and Internet History Analysis
Collection and Analysis Workstation
INTRODUCTION
In today's digital age, evidence of improprieties often lies deep within the corporate information technology infrastructure in such places as personal data assistants, the lowest levels of computer hard disks, and a litany of other storage devices. The old cliché, “the right tool for the job,” has never been so fitting than when selecting tools for the conduct of computer forensics.
This article intends to do more than simply list various tools and their use. It provides readers with a discussion of the unique natures of different types of computer forensics tools and selection criteria for each. Information on tool testing and certifications is also provided to assist readers in their own tool selection and testing. Self-validation of tools is considered a “best practice” in the computer forensics field. ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.