Computer Forensics Tool Catalog: Connecting Users With the Tools They Need AAFS –February 21, 2013 Ben Livelsberger NIST Information Technology Laboratory.

Slides:



Advertisements
Similar presentations
The Messy World of Grey Literature in Cyber Security 8 th Grey Literature Conference 4-5 December 2006 New Orleans, Louisiana Patricia Erwin – I3P Senior.
Advertisements

A Strategy for Testing Hardware Write Block Devices James R Lyle National Institute of Standards and Technology.
Specific hardware and software products identified in this report were used in order to perform the evaluations described. In no case does such identification.
Presentation. Contemporary Communication Fast – connects us quickly without delays Reliable – works always Global – connects us with the whole world Low.
Jim Lyle National Institute of Standards and Technology.
Deleted File Recovery Tool Testing Results Jim Lyle NIST 2/21/13AAFS -- Washington 1.
Using Scan and Read Pro. CTWorks Assistive Technology This presentation is intended to provide information about and how to use the assistive technology.
Creating Deleted File Recovery Tool Testing Images Jim Lyle National Institute of Standards and Technology.
Assistive Technologies That Help Job Seekers with Disabilities.
Homeland Security 11 1) IT Security Courseware and Hands-on Labs, via Virtual Training Environment (VTE) 2) Federal Cybersecurity Training Exercise Program.
Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation.
DTIC Overview Mr. Al Astley Defense Technical Information Center Director, Information Science & Technology June 3, 2010 Approved for Public Release U.S.
14 May 2010Montana Supreme Court Spring Training Conference 1 Verification of Digital Forensic Tools Jim Lyle Project Leader: Computer Forensic Tool Testing.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Forensic Tool Testing Results Jim Lyle National Institute of Standards and Technology.
Federated Testing: Well-Tested Tools, Shared Test Materials & Shared Test Reports; The Computer Forensics Tool Catalog Website: Connecting Forensic Examiners.
James Tam Introduction To CPSC 203 James Tam Administrative (James Tam) Contact Information -Office: ICT 707 -
Alcatel Customized Training Site David Otero University of San Diego MSIT 526 Dr. Carl Rebman.
Graphic File Carving Tool Testing Jenise Reyes-Rodriguez National Institute of Standards and Technology AAFS - February 19 th, 2015.
Mobile Device Forensics Rick Ayers. Disclaimer  Certain commercial entities, equipment, or materials may be identified in this presentation in order.
Mobile Device Forensics - Tool Testing Richard Ayers.
Using Talking Typing Teacher. CTWorks Assistive Technology This presentation is intended to provide information about and how to use the assistive technology.
Microsoft Access Database software. What is a database? … a database is an organized collection of data. A collection of data of similar information compiled.
Express Deployment Tool. Introducing the Express Deployment Tool! The Solution: The Express Deployment Tool (EDT) leverages a wizard-based graphical user.
Brett Hlavinka and Chris Aikens. Imagine…  You’re a CSCE Junior about to start upper-level courses  You’re frustrated with howdy and its uselessness.
Quirks Uncovered While Testing Forensic Tool Jim Lyle Information Technology Laboratory Agora March 28, 2008.
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
NIST CFTT: Testing Disk Imaging Tools James R. Lyle National Institute of Standards and Technology Gaithersburg Md.
BACS 371 Computer Forensics
This material is based upon work supported by the U.S. Department of Homeland Security, Science and Technology Directorate, Office of University Programs,
An Educational Computer Based Training Program CBTCBT.
Cdigix & Clabs Overview Chuck Powell Director, Academic Media & Technology, ITS Yale University May 11, 2005.
RACTrac Updated Vendor Info April OVERVIEW of AHA RACTrac 2.
Assessing Assistive Technology Needs Understanding the AT Evaluation Process 1 ADA Trainer Network Module 7c Trainer’s Name Trainer’s Title Phone /Website.
Delight QuickBooks Online Banking Internal Support Training QuickBooks Windows 2009/2010 Online Banking.
By Mahmmoud Rashed Moussa Habanbo George Bu Nader © Copyright AUST Department of Computer Science.
Ben Livelsberger NIST Information Technology Laboratory, CFTT Program
A Web Based Workorder Management System for California Schools.
Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation or.
GEAPS 5XX – Course Name 1. Lecture X: Lecture Title Lecturer: Name Job Title Organization.
Bringing the Library to You: Integrating Library Resources into Online Classrooms ACRL/CNI/EDUCAUSE Joint Virtual Conference - Innovate and Motivate: Next.
TL101A – Introduction To OA LodgeMaster. Learning Objectives Become familiar with the capabilities of the OA LodgeMaster system. Learn how to use the.
NETWORK OPERATING SYSTEM INTEROPERABILITY Jason Looney EKU, Department of Technology, CEN.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Security Checklists for IT Products. Agenda Overview of Checklist Program Discussion of Operational Procedures Current Status Next Steps.
Introduction to Computer Operating Systems
1 TYPE PAGE DATE SB eGrants Home Page home about USDA agencies & offices contact us faq’s help logout Search:> United States Department of Agriculture.
Improving your Audit Process Through Technology Christopher McDonald Director of Field Loss Prevention, Babies R’ Us Inc.
Understand Permissions LESSON Security Fundamentals.
When Is Full Blown Forensics Necessary? John Rosenthal, Esq. Partner, Winston Strawn DC Office Chris H. Paskach Partner KPMG LLP Patrick Oot, Esq Vice.
Harnessing P2P Power in the Classroom Julita Vassileva Department of Computer Science University of Saskatchewan, Canada.
Mobile Device Data Population for Tool Testing Rick Ayers.
Software as a Service (SaaS) Fredrick Dande, MBA, PMP.
Defining, Measuring and Mitigating Errors for Digital Forensic Tools Jim Lyle, Project Leader NIST Computer Forensics Tool Testing Feb 25, 2016AAFS - Las.
JTAG Tool Testing Jenise Reyes-Rodriguez National Institue of Standards and Technology AAFS – February 25 th, 2016.
Security Checklists for IT Products
A2J Author at Illinois Legal Aid Online
Microsoft Virtual Academy
Microsoft Office Support Phone Number
Oracle Database Management
Portfolio Tools in CoreSSG and SSGPlus
Barracuda Solutions VMware® vCloud® Air™ Version 1.0 | February 2015.
Shipyard Machinery and Power Tool Safety
HEAnet’s Collaboration with Academic Libraries: an ongoing happy story
September Workshop and Advisory Board Meeting Presenter Affiliation
Sometimes users find difficulty uninstalling Avast antivirus from their Windows 10 system? If you are too among them then we have made the process easier.
September Workshop and Advisory Board Meeting Presenter Affiliation
TL101A – Introduction To OA LodgeMaster
Cdigix & Clabs Overview
Assurance of Cyber-Physical Systems via Reasoning and Data Visualization Connecting automated reasoning techniques with data visualization to efficiently.
Presentation transcript:

Computer Forensics Tool Catalog: Connecting Users With the Tools They Need AAFS –February 21, 2013 Ben Livelsberger NIST Information Technology Laboratory CFTT Project

Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation or endorsement by the National Institute of Standards and Technology, nor does it imply that the products are necessarily the best available for the purpose. Neither NIST nor myself has financial interest in any of the real products mentioned as part of this talk.

Overview Introduction How the Catalog Works Features / Benefits Website Demo ConclusionSponsorsQuestions

Introduction: The Perfect Tool Idea: one tool that does everything Reality: need a bunch of tools Solution: an effective way for connecting practitioners to the tools they need

How Does the Tool Catalog Work? It’s taxonomy-driven Taxonomy: Forensic functionalities + associated technical parameters and technical parameter values Example: Deleted File Recovery Technical Parameters: Technical Parameters: “ Tool host OS / runtime environment ”: Windows, Linux, Mac “ Tool host OS / runtime environment ”: Windows, Linux, Mac “ Supported file systems ”: FAT16, FAT32, NTFS, exFAT, EXT3 “ Supported file systems ”: FAT16, FAT32, NTFS, exFAT, EXT3 “ Overwritten file identification ”: supported, not supported “ Overwritten file identification ”: supported, not supported

Taxonomy-driven: benefits It’s searchable It’s searchable Uniform information across tools Uniform information across tools It’s vendor populated It’s vendor populated tool info more accurate, easier to collect tool info more accurate, easier to collect tool submissions reviewed at NIST before posting tool submissions reviewed at NIST before posting field to list available test reports field to list available test reports

Demo

Conclusion Purpose: connect practitioners w/ the tools they need Taxonomy driven, searchable, vendor populated Spread the word. Ask vendors you work with to list their tools. Give us feedback; tell us what you like/don’t like.

Project Sponsors Department of Homeland Security, Science and Technology Directorate (Major funding) NIST/OLES (Program management)

Contacts Computer Forensics Tool Catalog: Ben Livelsbergerwww.cftt.nist.gov Sue Ballou, Office of Law Enforcement Standards

Questions?