Research Tools Used by Computer Forensic Teams Essay

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Computer Forensics is a branch of digital forensics which is used in “identifying, preserving, recovering, analyzing and presenting facts and opinions about the information” (Caloyannides, 2001, p. 22). This branch is mainly associated with the wide range of computer crimes. With the discovery of internet, computer crimes have been reached a significant level. There are many activities like viruses through which computer systems either in digital or electronic form are attacked all over the world. Computer Forensics teams are present to monitor and investigate such intrusions and protect computers and networks from such situations.

Several research tools are introduced by the software developing companies which facilitate examinations of cyber-attacks for computer forensics teams. Some of the most wide-spread tools are given below:

  • Appliance for Digital Investigation and Analysis (ADIA)
  • File Recovery Software
  • File Viewers
  • Password Recovery Software
  • X-Ways Forensics
  • Writing Tools
  • Network Tools
  1. Appliance for Digital Investigation and Analysis (ADIA): It is a VMware based appliance which is used for digital investigation and acquisition. Some of the best features of this tool are that it is built from public domain software and is free of charge. Besides, it is released on March 2012 and publically available.
  2. File Recovery Software: Another research tool used by computer forensics is file recovery software, which helps to find out the deleted files. Moreover, in many cases it also assists in recovering the files which are very difficult to analyze.
  3. File Viewers: There are various types of file viewers software which enable computer forensics to view the file without actual opening it.
  4. Password Recovery Software: This is another tool that helps computer forensics team regain the password. It can be considered one of the best tools since it is used to access password protected files. In addition, even if the password list is destroyed password recovery software can still recover it. By using the tool, computer forensics can investigate cybercrime more efficiently.
  5. X-Ways Forensics: Integrated Computer Forensics Software: It is an advanced research environmental tool for computer forensics. Being very efficient, it runs fast and finds deleted files. It is comprised of imaging, disk cloning, data interrupter, etc. (ISFCE: Certified Computer Examiner, 2005).
  6. Writing Tools: Writing tools replicate the data of hardware and software.
  7. Network Tools: Network tools are applied to analyze network traffic. For this purpose, packet sniffers are used which help computer forensics detect and analyze a live attack on the system. By using such tools, computer forensics team can perform its duties in a more effective manner. The team will be able to define the place where the attack has been carried out from. All the tools mentioned above are used by computer forensics to detect and control computer intrusions. All of them are also to decrease the rate of computer crimes.

Thus, there are several Forensics Toolkits available in the markets which are free of charge, for example, CERT Forensics Toolkit. CERT Forensics Toolkit contains tools that are freely available to federal, state, local law enforcement agencies, including the Department of Defense, within the USA (Caloyannides, 2001). Apart from this, there are also some tools which are open source and are free for everyone. Some of them are Data Acquisition, Volume Systems, File System, Memory and etc.

References

Caloyannides, M. (2001). Computer Forensics and Privacy. Boston, MA: Artech House.

ISFCE: Certified Computer Examiner. (2005). Web.

Print
More related papers
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, February 1). Research Tools Used by Computer Forensic Teams. https://ivypanda.com/essays/research-tools-used-by-computer-forensic-teams/

Work Cited

"Research Tools Used by Computer Forensic Teams." IvyPanda, 1 Feb. 2022, ivypanda.com/essays/research-tools-used-by-computer-forensic-teams/.

References

IvyPanda. (2022) 'Research Tools Used by Computer Forensic Teams'. 1 February.

References

IvyPanda. 2022. "Research Tools Used by Computer Forensic Teams." February 1, 2022. https://ivypanda.com/essays/research-tools-used-by-computer-forensic-teams/.

1. IvyPanda. "Research Tools Used by Computer Forensic Teams." February 1, 2022. https://ivypanda.com/essays/research-tools-used-by-computer-forensic-teams/.


Bibliography


IvyPanda. "Research Tools Used by Computer Forensic Teams." February 1, 2022. https://ivypanda.com/essays/research-tools-used-by-computer-forensic-teams/.

Powered by CiteTotal, the best citation website
If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Cite
Print
1 / 1