30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.0 INTRODUCTION<br />

Chapter 2<br />

Literature Review<br />

The rapid development <strong>of</strong> communication and computing technology has led to the<br />

creation <strong>of</strong> large computer networks. However, this development has not come<br />

without a corresponding growth <strong>of</strong> electronic crimes (Brungs & Jamieson, 2005, p.57).<br />

Electronic crimes continue to pose a significant problem and cause huge financial<br />

losses, according to the CSI/FBI survey 2007 (Richardson, 2007). Computers and<br />

other electronic devices store many types <strong>of</strong> electronic data. Electronic data has played<br />

a crucial role as evidence in various court cases involving corporate litigation, theft <strong>of</strong><br />

intellectual property, credit card fraud and pornography (Williams, 2006; Johnson,<br />

2005). Detailed methods and procedures <strong>for</strong> evidence collection have developed<br />

within the digital <strong>for</strong>ensics in order to combat the growing number <strong>of</strong> electronic<br />

crimes. Evidence collection is the procedure that ensures the evidence is reliable,<br />

intact, accurate and verified (Kenneally & Brown, 2005).<br />

Electronic evidence is fragile in nature and can easily be modified, duplicated<br />

or damaged (Kleiman et al., 2007). Electronic evidence collected in an untested<br />

method may not withstand scrutiny in the court <strong>of</strong> law (Williams, 2006). A<br />

comprehensive procedure and fully tested tools must be utilised to acquire electronic<br />

evidence. A common industry practice is to acquire a bit-stream image <strong>of</strong> the storage<br />

media (Meyers & Rogers, 2004). Bit-stream image is the exact replica <strong>of</strong> the original<br />

device. As distinct from the normal hard drive backup, the bit-stream image will<br />

duplicate deleted files, file slacks, swap files, hidden areas and unallocated spaces.<br />

Also, the accuracy <strong>of</strong> the bit-stream image must be validated as well. A mathematical<br />

algorithm, such as MD5 or SHA1, is used to calculate a hash value <strong>for</strong> the original<br />

disk and compute another hash value <strong>for</strong> the bit-stream image to see whether both<br />

values are matched. Un<strong>for</strong>tunately, <strong>for</strong>ensic s<strong>of</strong>tware also has vulnerabilities like any<br />

other kind <strong>of</strong> s<strong>of</strong>tware. US-CERT (2007) published a note that a bug has found in<br />

EnCase. Newsham et al. (2007) published an article to demonstrate how to break<br />

7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!