Option 1: Tool Testing Report To respond to various computer security breaches and perform a proper forensics investigation, it is important to ensure that tried and true tools and software are utilized. Tool testing provides a confirmation that the tool or software that you are using to perform a forensic investigation is performing the actions that you intend and nothing more. The U.S. National Institute of Standards and Technology (NIST) ha


Module 5
Readings
· Chapters 3 & 4 (pages 154-175) in Guide to Computer Forensics and Investigations
· Sultan, S., & Salman, A. (2017). Towards digital forensics pedagogical framework. Proceedings of the of the 2017 International Conference on Education and E-Learning, 13-21.
· van den Bos, J. (2017) Sustainable automated data recovery: A research roadmap. Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics, 6-9.
Opening Exercise (0 points) Discussion (25 points) Critical Thinking (90 points)
Choose one of the following two assignments to complete this week. Do not do both assignments.
Identify your assignment choice in the title of your submission.

Option 1: Tool Testing Report

To respond to various computer security breaches and perform a proper forensics investigation, it is important to ensure that tried and true tools and software are utilized. Tool testing provides a confirmation that the tool or software that you are using to perform a forensic investigation is performing the actions that you intend and nothing more.

The U.S. National Institute of Standards and Technology (NIST) has a rigorous testing program for computer forensic tools and equipment.

Assignment Instructions
Write a paper that addresses these three sections:

1. Provide an overview of the NIST Computer Forensic Tool Testing (CFTT) program and its usefulness to computer forensic investigators.
2. Describe in detail the work that NIST has done in testing “disk imaging” and “deleted file recovery” tools.
3. Describe the significance and importance of the various computer forensic offerings from NIST.
4. Visit https://www.nist.gov/itl/ssd/digital-forensics for additional information.

Your paper must meet the following requirements:

• 4-5 pages in length, not including the cover page and reference page.
• Formatted according to the CSU-Global Guide to Writing and APA. Include an introduction, a body with fully developed paragraphs, and a conclusion.
• Be clearly and well written, using excellent grammar and style techniques. Be concise. Be logical. You are being graded in part on the quality of your writing. If you need assistance with your writing style, visit the Writing Center, which is also accessible from the Library’s homepage.
• Support your paper with at least two peer-reviewed, scholarly references. The CSU-Global Library is a great place to find these resources.

Refer to the Critical Thinking Rubric in Module 5 for more information on expectations for this assignment.
Option 2: Tool Testing Report Scenario
A marketing company has implemented a BYOD (Bring Your Own Device) program and would like to
introduce its IT department to mobile device forensics standards, practices, and tools endorsed by NLST called Computer Forensics Tool Testing (CFTT). You have been brought in to conduct a training session for the IT Department.

Assignment Instructions
Create a PowerPoint presentation describing CFTT concepts and its components pertaining to mobile devices. Visit https://www.nist.gov/itl/ssd/digital-forensics for additional information.

Your presentation must meet the following requirements:

• Include an introduction slide with the title of the presentation, your name, the submission date, and a reference slide.
• 10 or more slides of easy-to-understand content (text and visuals). Remember, your audience is teachers and employees of the school district who know nothing about data protection and security.
• Speaker’s notes containing 50-100 words per slide to elaborate on the slide. In your notes, support slide content with at least two peer-reviewed, scholarly references. The CSU-Global Library is a great place to find these resources.
• Avoid distracting transition elements and animations.
• Formatted according to the CSU-Global Guide to Writing and APA.

Refer to the Critical Thinking Rubric in Module 5 for more information on expectations for this assignment.
Mastery Exercise (10 points)

Module 6
Readings
· Chapters 9 & 10 (pages 389-407) in Guide to Computer Forensics and Investigations
· Choo, K. R. (2017). Research challenges and opportunities in big forensic data. Proceedings of the 2017 International Workshop on Managing Insider Security Threats, 79-80.
· Mayer, O., & Stamm, M. C. (2017). Countering anti-forensics of lateral chromatic aberration.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 15-20.
Opening Exercise (0 points) Discussion (25 points) Critical Thinking (100 points)
Choose one of the following two assignments to complete this week. Do not do both assignments.
Identify your assignment choice in the title of your submission.



This essay is written by:

Prof. Sykes Verified writer

Finished papers: 435

Proficient in:

English, History, Business and Entrepreneurship, Nursing, Psychology, Management

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer
© 2017 theacademicessays. All Rights Reserved. Design & Developed by theacademicessays.
How to Avoid Plagiarism
  • Use multiple resourses when assembling your essay
  • Use Plagiarism Checker to double check your essay
  • Get help from professional writers when not sure you can do it yourself
  • Do not copy and paste free to download essays
Get plagiarism free essay

Have A QUESTION?

Click Here to get instant solution!
X myStickymenu
Loading...