Validation of Digital Forensic Tools

Validation of Digital Forensic Tools

Philip Craiger (University of Central Florida, USA), Jeff Swauger (University of Central Florida, USA), Chris Marberry (University of Central Florida, USA) and Connie Hendricks (University of Central Florida, USA)
Copyright: © 2006 |Pages: 15
DOI: 10.4018/978-1-59140-872-7.ch005
OnDemand PDF Download:


An important result of the U.S. Supreme Courts Daubert decision is that the digital forensic tools must be validated if the results of examinations using those tools are to be introduced in court. With this audience in mind, our chapter describes important concepts in forensic tool validation along with alternative just-in-time tool validation method that may prove useful for those who do not have the capability of conducting extensive, in-depth forensic tool validation efforts. The audience for this chapter is the law enforcement agent and industry practitioner who does not have a solid theoretical background—from training or experience—in software validation, and who is typically time-constrained in the scope of their validation efforts.

Complete Chapter List

Search this Book:
Table of Contents
Kyriakos Tsiflakos
Panagiotis Kanellis, Evangelos Kiountouzis, Nicholas Kolokotronis, Drakoulis Martakos
Panagiotis Kanellis, Evangelos Kiountouzis, Nicholas Kolokotronis, Drakoulis Martakos
Chapter 1
Thomas M. Chen, Chris Davis
This chapter gives an overview of the major types of electronic attacks encountered today and likely to continue into the foreseeable future. A... Sample PDF
An Overview of Electronic Attacks
Chapter 2
Steven Furnell, Jeremy Ward
In the two decades since its first significant appearance, malware has become the most prominent and costly threat to modern IT systems. This... Sample PDF
Malware: An Evolving Threat
Chapter 3
Sriranjani Sitaraman, Subbarayan Venkatesan
This chapter introduces computer and network forensics. The world of forensics is well understood in the non-digital world, whereas this is a... Sample PDF
Computer and Network Forensics
Chapter 4
III Richard, Vassil Roussev
Digital forensics investigators have access to a wide variety of tools, both commercial and open source, which assist in the preservation and... Sample PDF
Digital Forensic Tools: The Next Generation
Chapter 5
Philip Craiger, Jeff Swauger, Chris Marberry, Connie Hendricks
An important result of the U.S. Supreme Courts Daubert decision is that the digital forensic tools must be validated if the results of examinations... Sample PDF
Validation of Digital Forensic Tools
Chapter 6
Dario Valentino Forete
Log file correlation comprises two components: Intrusion Detection and Network Forensics. The skillful and mutualistic combination of these distinct... Sample PDF
Log Correlation: Tools and Techniques
Chapter 7
Pallavi Kahai, Kamesh Namuduri, Ravi Pense
Security incidents that threaten the normal functioning of the organization are on the rise. In order to resist network attacks most organizations... Sample PDF
Tracing Cyber Crimes with a Privacy-Enabled Forensic Profiling System
Chapter 8
Caroline Chibelushi, Bernadette Sharp, Hanifa Shah
The advancement of multimedia and communication systems has not only provided faster and better communication facilities but also facilitated easier... Sample PDF
ASKARI: A Crime Text Mining Approach
Chapter 9
Sos S. Agaian, Benjamin M. Rodriguez
This chapter focuses on the development of digital forensic steganalysis tools/methods through analysis and evaluation of the most popular “sample... Sample PDF
Baseic Steganalysis for the Digital Media Forensics Examiner
Chapter 10
Warren Wylupski, David R. Champion, Zachary Grant
One of the emerging issues in the field of digital crime and digital forensics is corporate preparedness in dealing with attacks on computer network... Sample PDF
Incident Preparedness and Response: Devlopming a Security Policy
Chapter 11
S.H. (Basie) von Solms, C.P. (Buks) Louwrens
The purpose of this chapter is twofold: Firstly, we want to determine the relationships, if any, between the discipline of digital forensics and the... Sample PDF
The Relationship Between Digital Forensics, Corporate Governance, IT Governance, and IS Governance
Chapter 12
Andreas Mitrakas, Damián Zaitch
The steep increase of cyber crime has rendered digital forensics an area of paramount importance to keep cyber threats in check and invoke legal... Sample PDF
Law, CyberCrime and Digital Forensics: Trailing Digital Suspects
Chapter 13
Bernd Carsten Stahl, Moira Carroll-Mayer, Peter Norris
In order to be able to address issues of digital crime and forensic science in cyberspace, there is a need for specifically skilled individuals.... Sample PDF
Forensic Computing: The Problem of Developing a Multidisciplinary University Course
Chapter 14
Christopher Malinowski
This chapter considers and presents training possibilities for computer forensic investigators. The author differentiates between civil service and... Sample PDF
Training the Cyber Investigator
Chapter 15
Michael A. Caloyannides
Digital data increasingly presented in courts as evidence is mistakenly viewed by judges and juries as inherently unalterable. In fact, digital data... Sample PDF
Digital "Evidence" is Often Evidence of Nothing
About the Authors