O'Reilly logo

Computer Evidence: Collection and Preservation, Second Edition by Christopher L. T. Brown

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Verification, Testing, and Hashing

As stated throughout the book, peer review and testing, as well as an investigator’s local testing to ensure tools are performing as desired, are always advisable. To assist investigators in performing their own tests, NIST has posted the forensic software testing support tools and setup documents [Nist03] that it uses in tool testing on its public Web site at http://www.cftt.nist.gov/disk_imaging.htm.

In addition to testing tools for performance and accuracy, a key component of the disk-imaging process has been to test the resulting image (disk-to-disk or disk-to-file) for integrity through cryptographic hashing or checksums. Most forensic applications and handheld imagers implement some type of hashing or ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required