skip navigation

LIBRARY

Abstract Database

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

To download this abstract, check the box next to the NCJ number then click the "Back To Search Results" link. Then, click the "Download" button on the Search Results page. Also see the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 206231 Add to Shopping cart Find in a Library
Title: Test Results for Software Write Block Tools: RCMP HDL V0.4
Corporate Author: National Institute of Standards and Technology (NIST)
United States of America
Date Published: August 2004
Page Count: 83
Sponsoring Agency: National Institute of Justice (NIJ)
Washington, DC 20531
National Institute of Justice/NCJRS
Rockville, MD 20849
National Institute of Standards and Technology (NIST)
Gaithersburg, MD 20899-3460
Grant Number: 94-IJ-R-004
Sale Source: National Institute of Justice/NCJRS
Box 6000
Rockville, MD 20849
United States of America
Document: PDF
Type: Test/Measurement
Format: Document
Language: English
Country: United States of America
Annotation: This report presents findings from tests of the Royal Canadian Mounted Police Hard-Disk Write Lock V0.4 (RCMP HDL) against the Software Write Block Tool Specification and Test Plan Version 3.0.
Abstract: The Software Write Block Tool Specification and Test Plan Version 3.0 requires that a top-level software write block tool not allow a protected drive to be changed, not prevent obtaining any information from or about any drive, and not prevent any operations to a drive that is not protected. For all test cases run, the RCMP HDL blocked the commands that were listed in the documentation as commands that would be blocked; however, it did not block some commands that could change the contents or accessibility of a protected drive. The commands not blocked were the Extended Write (0x43), Initialize Drive Parameters (0x09), PS/2 ESDI Diagnostic (0x0E), PC/XT Controller Ram Diagnostic (0x12), and Controller Internal Diagnostic (0x14) commands. Also, the tool did not block any commands in the miscellaneous category. For all test cases run, the tool always allowed commands to obtain information from any protected drives; and the tool always allowed any command to access any unprotected drives for all test cases run. Extensive data tables
Main Term(s): Computer software
Index Term(s): Computer aided investigations; Computer evidence; Computer privacy and security; Computer related crime; NIJ grant-related documents
Note: NIJ Special Report; downloaded November 8, 2005.
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=206231

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.