30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

seen in Apple computers. The number <strong>of</strong> Apple computers in the market has been<br />

increasing exponentially over the past few years. In October 2010, Apple revealed that<br />

3.89 million Macs were sold in the previous quarter (Oliver, 2010, p.1). The number<br />

<strong>of</strong> investigations that involve Apple computers has been expected to increase. Adding<br />

such file systems and partition types is a logical choice <strong>for</strong> the evaluation to expand<br />

the testing range and types. Research reviewed in Section 3.1.2 suggests that usability<br />

<strong>of</strong> the disk imaging tools is the area that CFTT program has not addressed. Poor<br />

usability <strong>of</strong> the tools may lead the user to the mistaken action that could possibly<br />

affect the acquisition process. For instance, a poorly structured user interface may lead<br />

the user to choose wrong acquisition options and may affect the quality <strong>of</strong> the<br />

acquisition. This motivates this research to include usability-related observations in<br />

the research discussion.<br />

5.1.6 Research Challenges<br />

A number <strong>of</strong> technical problems were encountered during the process <strong>of</strong> tool testing.<br />

One <strong>of</strong> the challenges arose from the tool used to configure the test drive <strong>for</strong> testing.<br />

Hidden areas caused problems because they were automatically removed when<br />

booting into the Linux environment. The only write blocker available in the <strong>for</strong>ensics<br />

laboratory was from Tableau but the product <strong>of</strong> this brand would automatically<br />

override the test drive if the hidden areas were present. Some <strong>of</strong> the challenges were<br />

posed by the use <strong>of</strong> Linux <strong>Forensic</strong>s Live CDs during the testing as well.<br />

5.1.6.1 Configuration <strong>Tools</strong><br />

One <strong>of</strong> the challenges <strong>of</strong> the research is to locate the right tools <strong>for</strong> the designed test<br />

cases. The evaluation requires the researcher to per<strong>for</strong>m low-level manipulation over<br />

the test drives. The tools that are available to the researcher and able to meet the<br />

researching requirements are limited. As mentioned in section 4.2.1, the tools that are<br />

available <strong>for</strong> the research are not specifically designed <strong>for</strong> <strong>for</strong>ensic s<strong>of</strong>tware testing.<br />

The tool sets developed by NIST are the only specialised <strong>for</strong>ensic s<strong>of</strong>tware validation<br />

tools that are publicly available. In section 2.2.4, <strong>for</strong>ensics s<strong>of</strong>tware testing and/or<br />

validation are discussed as one <strong>of</strong> the challenges <strong>for</strong> the industry and the adoption <strong>of</strong><br />

such tools to support the validation is technically demanding. As reviewed in section<br />

107

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!