Digital Forensic Tools Validation: The Software Engineering Principles Approach by

Read Complete Research Material



Digital Forensic Tools Validation: The Software Engineering Principles Approach

By

CHAPTER 3: METHODOLOGY APPROACH1

Aim1

Objectives1

Forensic Requirements Categories1

Forensic Requirements Specification2

Test Assertions3

Test Cases4

Test Method4

Risks to Digital Memory5

CHAPTER 4: DISCUSSION ANALYSIS7

Overview7

A call for standards-errors in forensic science8

Standards8

Adoption of Digital Forensics in an Archival Context10

Network Forensic Analysis Tools13

CHAPTER 5: RESULTS22

The digital forensics models22

Digital forensics and accreditation23

Challenges for digital forensic laboratory accreditation24

Education24

Validation and verification of tools25

Digital Conservation, Digital Archaeology28

Admissibility of digital evidence30

Digital Wiretaps32

CHAPTER 6: CONCLUSION37

Emerging Problems37

Computer Forensic Science39

Recovering and Discovering Information41

Examining Computer Evidence47

Authentication of Evidence49

Information-Assurance Services50

Information Assurance Applied to Digital Evidence51

Digital Video Evidence System52

REFERENCES54

CHAPTER 3: METHODOLOGY APPROACH

Aim

To develop a set of appropriate software engineering principles for digital forensics tools' development.

Objectives

To review literature to determine current state of validation of digital forensics tools.

To identify the current lapses and limitations in these validation procedures.

To investigate the strengths and weaknesses of various software engineering principles with particular focus on their influence on digital forensic tools.

To determine the software engineering principles most suitable for the development of digital forensics tools.

To examine and identify the software engineering principles that are currently employed in the development of digital forensic tools

To ascertain the efficiency of the developed set of principles, by comparing them with current digital forensic tools validation frameworks.

Forensic Requirements Categories

Digital forensics is associated in many people's minds primarily with the investigation of crime. However, it has also emerged in recent years as a promising source of tools and approaches for facilitating digital preservation and curation, specifically for protecting and investigating evidence from the past. This report provides a broad overview of digital forensics with pointers to resources and tools that may benefit the preservation of digital cultural heritage. More specifically, the report focuses on the application of digital forensics to the curation of personal digital archives. Personal digital archives are very complex: the diversity of objects and intricacy of their structural relationships present significant challenges to curation.

The nature of personal digital archives reflects both the evolution of technology and its associated social and political impact. Almost anything may appear in a personal digital archive, from emails and poet's drafts, through an astronomer's datasets, to digital workings of the mathematician, and notes of the political reformer. Forensic procedures tested and developed in this context may well be transferable to other areas of digital preservation and scholarship. With their diverse content, organization and ancestry, personal digital archives are the epitome of unstructured information and may serve as a test bed for refining forensic techniques in a curatorial context, as well as being an invaluable primary source of information for analysis..

Forensic Requirements Specification

The current emphasis on automation in digital forensic research is of particular significance to the curation of cultural heritage, where this capability is increasingly essential in a digital universe that continues to expand exponentially. Current research is directed at handling large volumes efficiently and effectively using a variety of analytical techniques. Parallel processing, for example, through purpose-designed Graphics Processing Units (GPUs), and high performance computing can assist processor-intensive activities such as full search and indexing, filtering and hashing, secure deletion, mining, fusion and ...