Professional Documents
Culture Documents
Lab fAT
Digital forensic tools are used to unravel criminal acts and prove crime in the
court of law. However, the area, task and/or functions digital forensic tools are
being applied in may not be suitable hence leading to unreliable results by
these tools. In many cases, forensic experts may apply a particular tool not
because it is the most effective tool but because it is available, cheap and the
expert is familiar with it. This has often led to use of unreliable digital forensic
tools, which may yield unreliable results. Unreliable results may jeopardize the
whole forensic investigation process and in some cases lead to criminals walking
free thereby being bolded to commit the same crime again. This may also lead
to time wasting, trial and error, loss of money, etc. How to validate the forensic
tools used for the investigation to generate the valid evidence.
SOLUTION
The process of using automated software has served law enforcement and the courts very well,
and experienced detectives and investigators have been able to use their well-developed
policing skills, in conjunction with the automated software, so as to provide sound evidence.
However, the growth in the computer forensic field has created a demand for new software
and a means to verify that this software is truly “forensic” i.e. capable of meeting the
requirements of the ‘trier of fact’.
The validity and credibility of electronic evidence are of paramount importance given the
forensic context of the discipline In other words, the trustworthiness of digital evidence relies
on the scientific application of the process, the analysis and the correct utilization and
functioning of computer forensic tools.
There are a few of points that need to be noted.
• First, vendor validation has been widely undocumented, and not proven publicly,
except through rhetoric and hearsay on bulletin boards. Many published documents in
this field discuss repeatability of process with other tools as the main validation
technique, but no documented record can be found in the discipline that expands on
the notion of two tools being wrong
• Secondly, this validation work treats the EE software package as a single unseparated
entity. Because the cost of purchasing such software is so great it would be infeasible
to discount an entire package due to a single or small group of functions failing
validation.
• Following the second point is the cost and complexity issue of the tool orientated VV
approach. These tools either are designed solely for forensic purposes or are designed
to meet the needs of particular interest groups
• Validation and verification of the discipline is a difficult task requiring a structured
framework and only the outcomes are defined. This presents unique problems with
the discipline since this dynamic change is not found in other forensic disciplines such
as fingerprint examination, and DNA testing.
The development of forensic software tools and high assurance software requires axiomatic
proofs in the foundational development of the software. This concept is the foundation of
traditional software engineering. many tools are not developed specifically for the purposes of
digital forensics, they are developed for other purposes and applied to the discipline, so this
makes it difficult to police.
FTK MANAGER
3. CREATING DATABASE
4. SELECT TYPE OF DATA SOURCE
CONCLUSION
In many cases, forensic experts may apply a particular tool not
because it is the most effective tool but because it is available, cheap
and the expert is familiar with it. This has often led to the use of
unreliable digital forensic tools, which may yield unreliable results.
Unreliable results may jeopardize the whole forensic investigation
process and in some cases lead to criminals walking free thereby
being bolded to commit the same crime again. This may also lead to
time-wasting, trial, and error, loss of money, etc. I successfully
analyzed all the data and validated with the help of various software.
and all the results were the same hance we can tell all the tools were
validated