.

Thursday, May 2, 2019

Selecting Forensic Tools Essay Example | Topics and Well Written Essays - 1000 words

Selecting Forensic apparatuss - Essay Exampleion/attack. It is, hence, computer detective work.The greatness of computer forensic technologies to the securitization of training and for the detection of the source of cyber crimes, manifest in the unauthorized retrieval of data, cannot be overemphasized. As both Stephenson (1999) and immune carrier (2004) emphasize, organizations which do not have a digital forensics system in place be unjustifiably careless and irresponsible. The implication here is that organizations which handle sensitive data, especially data which the law holds as mystic and private such as patient cultivation, will have a digital forensics system in place. This was confirmed by our organizations IT Director who explained that a digital forensics analysis system was implemented over devil years ago. While the IT Director claimed that the organization did not abide by criteria for the determination of whether to use up to(p) source or commercial tool sec ures, his explanation of the system and the process of its selection underscore its efficiency.Tool SelectionThe selection of the tool set was determined by the needs of the organization, the nature of its data and, importantly, a review of past attacks and unauthorized intrusion attempts. As a healthcare organization, the securitization of data is of primary importance since the leakage of patient information to unauthorized personnel renders the organization vulnerable to litigation. Furthermore, because of the nature of its activities, the data information combines between text, as in medical reports and demographic data, graphics, as in patient X-rays, and numbers, as in financial information. The organization, therefore, has to protect three data types. In their analysis of the various computer forensic tools, Yasinsac and Manzano (2001) go along that the criteria for selection should be data type and organizational needs and activities. Further explaining this, they note that the tools which are apply vis--vis graphical data are not effective when used for numerical or textual information. Watermarking tools are most effective where graphical data is concerned but not so in coition to textual data (Yasinsac and Manzano, 2001). Furthermore, whether commercial or open source tool sets are used should take care on an organizations size, the complexity of its functions and the volumes of data it handles (Yasinsac and Manzano, 2001). Even though he concurred with Yasinsac and Manzanos (2001) recommendations, the IT director admitted that adherence to their tool set selection criteria was not feasible. While open-source rather than commercial tools were used as a precede of the complexity of the organizations processes and the volumes of data it handles, it did not distinguish between graphic and text-based data. Doing so would involve the implementation of cardinal different digital forensics tool sets, thereby multiplying the human and non-human resour ces assigned

No comments:

Post a Comment