Premium Essay

Nt1310 Unit 4 Forensic Tools

Submitted By
Words 435
Pages 2
V. STUDY ENVIRONMENT
During the implementation phase, various types of com- puters and mobile devices were chosen to check the extent of support of the selected forensic tools. It is not necessary to use the same computing devices or smart phones while working with similar systems in the future. TABLE I. PARAMETER MAPPING

Data Sources and Information Integration 1) Data Integration from Different Mobile Devices/Sources by A Single Tool

2) Ability to Overcome Encryption And User Locks

3) Privacy of Data Extracted and Modes of Extraction

Knowledge processing 1) Speed of Extraction of Data and Accuracy of Data

2) Fault Tolerance of the Forensic Tool

Data integrity and validation 1) Data Tampering Detection

2) Data Integrity Management

Presentation 1) Collaboration Capabilities of the Forensic Tool

Additional Factors 1) Vendor Information (Updates, Data Storage Security, Reliability, Admissibility of Evidence)

A. Personal Computer Environment …show more content…
Forensic and Cellebrite’s UFED Physical Analyzer, required a computer for processing data, performing analysis and viewing of reports. SIFT could only be used in a Linux Environment, hence a Linux Workstation (Ubuntu 14.04) was used. TSK was installed on another Linux workstation (Ubuntu 12.04.5) to work via command line, and the GUI - based Autopsy tool was installed on a Windows Workstation (Windows 10). The commercial tools - MOBILedit! Forensic and Cellebrite’s UFED Physical Analyzer were installed on Windows Workstations (Windows 8.1 and Windows 10

Similar Documents

Premium Essay

Test

...IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction...

Words: 2305 - Pages: 10