Option 1: Tool Testing Report To respond to various computer security breaches and perform a proper forensics investigation, it is important to ensure that tried and true tools and software are utilized. Tool testing provides a confirmation that the tool or software that you are using to perform a forensic investigation is performing the actions that you intend and nothing more. The U.S. National Institute of Standards and Technology (NIST) ha

Module 5
Readings
· Chapters 3 & 4 (pages 154-175) in Guide to Computer Forensics and Investigations
· Sultan, S., & Salman, A. (2017). Towards digital forensics pedagogical framework. Proceedings of the of the 2017 International Conference on Education and E-Learning, 13-21.
· van den Bos, J. (2017) Sustainable automated data recovery: A research roadmap. Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics, 6-9.
Opening Exercise (0 points) Discussion (25 points) Critical Thinking (90 points)
Choose one of the following two assignments to complete this week. Do not do both assignments.
Identify your assignment choice in the title of your submission.

Option 1: Tool Testing Report

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

To respond to various computer security breaches and perform a proper forensics investigation, it is important to ensure that tried and true tools and software are utilized. Tool testing provides a confirmation that the tool or software that you are using to perform a forensic investigation is performing the actions that you intend and nothing more.

The U.S. National Institute of Standards and Technology (NIST) has a rigorous testing program for computer forensic tools and equipment.

Assignment Instructions
Write a paper that addresses these three sections:

1. Provide an overview of the NIST Computer Forensic Tool Testing (CFTT) program and its usefulness to computer forensic investigators.
2. Describe in detail the work that NIST has done in testing “disk imaging” and “deleted file recovery” tools.
3. Describe the significance and importance of the various computer forensic offerings from NIST.
4. Visit https://www.nist.gov/itl/ssd/digital-forensics for additional information.

Your paper must meet the following requirements:

• 4-5 pages in length, not including the cover page and reference page.
• Formatted according to the CSU-Global Guide to Writing and APA. Include an introduction, a body with fully developed paragraphs, and a conclusion.
• Be clearly and well written, using excellent grammar and style techniques. Be concise. Be logical. You are being graded in part on the quality of your writing. If you need assistance with your writing style, visit the Writing Center, which is also accessible from the Library’s homepage.
• Support your paper with at least two peer-reviewed, scholarly references. The CSU-Global Library is a great place to find these resources.

Refer to the Critical Thinking Rubric in Module 5 for more information on expectations for this assignment.
Option 2: Tool Testing Report Scenario
A marketing company has implemented a BYOD (Bring Your Own Device) program and would like to
introduce its IT department to mobile device forensics standards, practices, and tools endorsed by NLST called Computer Forensics Tool Testing (CFTT). You have been brought in to conduct a training session for the IT Department.

Assignment Instructions
Create a PowerPoint presentation describing CFTT concepts and its components pertaining to mobile devices. Visit https://www.nist.gov/itl/ssd/digital-forensics for additional information.

Your presentation must meet the following requirements:

• Include an introduction slide with the title of the presentation, your name, the submission date, and a reference slide.
• 10 or more slides of easy-to-understand content (text and visuals). Remember, your audience is teachers and employees of the school district who know nothing about data protection and security.
• Speaker’s notes containing 50-100 words per slide to elaborate on the slide. In your notes, support slide content with at least two peer-reviewed, scholarly references. The CSU-Global Library is a great place to find these resources.
• Avoid distracting transition elements and animations.
• Formatted according to the CSU-Global Guide to Writing and APA.

Refer to the Critical Thinking Rubric in Module 5 for more information on expectations for this assignment.
Mastery Exercise (10 points)

Module 6
Readings
· Chapters 9 & 10 (pages 389-407) in Guide to Computer Forensics and Investigations
· Choo, K. R. (2017). Research challenges and opportunities in big forensic data. Proceedings of the 2017 International Workshop on Managing Insider Security Threats, 79-80.
· Mayer, O., & Stamm, M. C. (2017). Countering anti-forensics of lateral chromatic aberration.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 15-20.
Opening Exercise (0 points) Discussion (25 points) Critical Thinking (100 points)
Choose one of the following two assignments to complete this week. Do not do both assignments.
Identify your assignment choice in the title of your submission.

The post Option 1: Tool Testing Report To respond to various computer security breaches and perform a proper forensics investigation, it is important to ensure that tried and true tools and software are utilized. Tool testing provides a confirmation that the tool or software that you are using to perform a forensic investigation is performing the actions that you intend and nothing more. The U.S. National Institute of Standards and Technology (NIST) ha appeared first on Essaylink.