Question

In: Computer Science

You need to establish a procedure for your organization on how to validate a new forensics...

You need to establish a procedure for your organization on how to validate a new forensics software package. Write two to three pages outlining the procedure you plan to use in your lab. Be sure to cite references, such as the ISO standard or NIST, to support your procedure.

Solutions

Expert Solution

Setting the Standard: Standards and Legal Baselines for Software/Tool Validation
According to the National Institute of Standards and Technology (NIST), test results must be repeatable and reproducible to be considered admissible as electronic evidence. Digital forensics test results are repeatable when the same results are obtained using the same methods in the same testing environment. Digital forensics test results are reproducible when the same test results are obtained using the same method in a different testing environment (different mobile phone, hard drive, and so on). NIST specifically defines these terms as follows:

Repeatability refers to obtaining the same results when using the same method on identical test items in the same laboratory by the same operator using the same equipment within short intervals of time.

Reproducibility refers to obtaining the same results being obtained when using the same method on identical test items in different laboratories with different operators utilizing different equipment.

1) Develop the Plan
Developing the scope of the plan may involve background and defining what the software or tool should do in a detailed fashion. Developing the scope of the plan also involves creating a protocol for testing by outlining the steps, tools, and requirements of such tools to be used during the test. This may include evaluation of multiple test scenarios for the same software or tool. To illustrate, if validating a particular forensic software imaging tool, that tool could be tested to determine whether or not it successfully creates, hashes, and verifies a particular baseline image that has been previously setup. There are several publically available resources and guides that can be useful in establishing what a tool should do such as those available from NIST’s Computer Forensic Tool Testing Project (CFTT) available from http://www.cftt.nist.gov. The CFTT also publishes detailed validation reports on various types of forensic hardware and software ranging from mobile phones to disk imaging tools. In addition to CFTT, Marshall University has published various software and tool validation reports that are publically available for download from http://forensics.marshall.edu/Digital/Digital-Publications.html. These detailed reports can be used to get a feel for how your own internal protocol should be drafted. The scope of the plan may also include items such as: tool version, testing manufacturer, and how often the tests will be done. These factors should be established based on your organization standards. Typically, technology within a lab setting is re-validated quarterly or biannually at the very least.

2) Develop a Controlled Data Set
This area may be the longest and most difficult part of the validation process as it is the most involved. This is because it involves setting-up specific devices and baseline images and then adding data to the specific areas of the media or device. Acquisitions would then need to be performed and documented after each addition to validate the primary baseline. This baseline may include a dummy mobile phone, USB thumb drive, or hard drive depending on the software or hardware tool you are testing.

3) Conduct the Tests in a Controlled Environment
Outside all the recommendations and standards set forth by NIST and the legal community, it only makes sense that a digital forensics examiner would perform an internal validation of the software and tools being used in the laboratory. In some cases these validations are arbitrary and can occur either in a controlled or uncontrolled environment. Since examiners are continuously bearing enormous caseloads and work responsibilities, consistent and proper validations sometimes fall through the cracks and are validated in a somewhat uncontrolled “on-the-fly” manner. It’s also a common practice in digital forensics for examiners to “borrow” validations from other laboratories and fail to validate their own software and tools. Be very careful with letting this happen. Keep in mind that in order for digital forensics to be practicing true scientific principles, the processes used must be proven to be repeatable and reproducible. In order for this to occur, the validation should occur within a controlled environment within your laboratory with the tools that you will be using. If the examiner uses a process, software, or even a tool that is haphazard or too varied from one examination to the next, the science then becomes more of an arbitrary art. Simply put, validations not only protect the integrity of the evidence, they may also protect your credibility. As stated previously, using a repeatable, consistent, scientific method in drafting these validations is always recommended.

4) Validate the Test Results against Known and Expected Results
At this point, testing is conducted against the requirements set forth for the software or tool in the previous steps. Keep in mind that results generated through the experimentation and validation stage must be repeatable. Validation should go beyond a simple surface scan when it comes to the use of those technologies in a scientific process. With that said, it is recommended that each requirement be tested at least three times. If there are any variables that may affect the outcome of the validation (e.g. failure to write-block, software bugs) they should be determined after three test runs. There may be cases, however, where more or fewer test runs may be required to generate valid results.

It’s also important to realize that you are probably not the first to use and validate a particular software or tool, so chances are that if you are experiencing inconsistent results, the community may be experiencing the same results as well. Utilizing peer review may be a valuable asset when performing these validations. Organizations such as the High Technology Crime Investigation Association (HTCIA) and the International Association of Computer Investigative Specialists (IACIS) maintain active member e-mail lists for members that can be leveraged for peer review. There are also various lists and message boards pertaining to mobile phone forensics that can be quite helpful when validating a new mobile technology. In addition, most forensic software vendors maintain message boards for software, which can be used to research bugs or inconsistencies arising during validation testing.

This answer more hlpeful for you so plz give me the positive rating Thq


Related Solutions

As a manager and leader of your own organization,   discuss how you would establish a conducive...
As a manager and leader of your own organization,   discuss how you would establish a conducive communication climate. What are some of the communication channels would you use to improve the chances to implement your recommendations towards an organizational change? 600 words or more
Now you may understand why you need a statistics course. As a forensics analyst, how would...
Now you may understand why you need a statistics course. As a forensics analyst, how would you use statistical flow analysis to identify a compromised host? How about to confirm or disprove data leakage? How would it be used to create a profile of an individual? Can statistical flow analysis be used to prevent either a host becoming compromised or data being leaked?
You need to validate the concentration of a 50 μL stock solution reported it be 25...
You need to validate the concentration of a 50 μL stock solution reported it be 25 mg/mL based single measurement. To conserve sample you decide to use the UV-vis plate reader to make an absorbance measurement using a 100 μL well-volume. Given: The protein has a molecular weight of 6,343 g/mol. and a molar extinction coefficient or 113,268 M-1cm-1 (Effective pathlength = 0.3 cm for a 100 μL well volume). The instrument you have available provides accurate absorbance readings for...
How much would you need to gift to the university today to establish a scholarship fund...
How much would you need to gift to the university today to establish a scholarship fund that pays out $10000 in scholarships in one year and grows the scholarship payout by 1% per year? Assume that the university endowment earns 8% per year on its investments.
The Forensics Lab of the New York City Police Department is interested in learning how to...
The Forensics Lab of the New York City Police Department is interested in learning how to determine the coefficient of friction between two surfaces - the tires and the road. They need this information to help them relate the length of the skid marks to the speed of a vehicle before it started skidding. Your lab group, as a part of an interview process for a lucrative contract with the NYPD, is asked to devise a procedure to determine the...
Your organization is experiencing tremendous growth and based on your projections you will need to hire...
Your organization is experiencing tremendous growth and based on your projections you will need to hire an additional 5 managers in the upcoming year. You would like to fill these positions internally. For this assignment you will be required to do the following: 1. Create an organization of your choice and explain the mission, vision and values of the organization. 2. Create a job description for the manager position. 3. Create an internal replacement chart that will identify a minimum...
As a client how do you establish trust? If you take your tax information to a...
As a client how do you establish trust? If you take your tax information to a tax preparer, what qualities do you look for when evaluating integrity?
You start a job on a Fabrication line for silicon based devices. To validate that your...
You start a job on a Fabrication line for silicon based devices. To validate that your fab process is working, you inspect for defective wafers. Suppose that in a tray containing 20 wafers pulled off the line, four are defective based on your line statistics. Suppose that you pull two wafers from this tray for analysis. Find the probability of the following: a) Neither wafer is defective. b) At least one of the wafers is defective. c) Neither is defective,...
How would you establish a correction plan to bring your actual expenses in line with the...
How would you establish a correction plan to bring your actual expenses in line with the budget? Please cite your sources. THERE IS NO CASE STUDY
identify a new initiative utilizing new technology in your organization or a health care organization with...
identify a new initiative utilizing new technology in your organization or a health care organization with which you are familiar. (Examples: online training for annual competency training, tele-visits, a move from traditional servers to cloud data management, operations systems in place in supply chain management, bar coding, inventory management, etc.) Once you have identified the initiative, conduct an online search to find information about IT implementation for similar initiatives in other industries. The Assignment: In 3–4 pages, describe the operational...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT