30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.1.1 Computer <strong>Forensic</strong>s And Digital <strong>Forensic</strong>s<br />

The movement from computer <strong>for</strong>ensics to digital <strong>for</strong>ensics is presented in this section.<br />

Wang, Cannady, & Rosenbluth (2005, p.119) defines computer <strong>for</strong>ensic as a<br />

developing discipline rooted in <strong>for</strong>ensic science and computer technology, focusing on<br />

acquiring, analysing and presenting evidentiary evidence from computer systems to<br />

prosecute computer involved crimes and <strong>of</strong>fences. Another notable definition was<br />

provided by Britz (2008). Dixon (2005, p.7) stated that the central parts <strong>of</strong> computer<br />

<strong>for</strong>ensics are the preservation, identification, extraction, documentation and<br />

interpretation <strong>of</strong> computer data.<br />

Caloyannides, Memon, & Venema (2009) state that computer <strong>for</strong>ensics is<br />

per<strong>for</strong>ming static analysis on a single compromised computer system and missing<br />

dynamic in<strong>for</strong>mation, such as network connections, malwares in the memory and<br />

decryption keys. Many other electronic devices such as laptops, Personal Digital<br />

Assistants (PDAs), mobile phones, printers, fax machines and tablet PCs have been<br />

developed and widely used. The range <strong>of</strong> devices that are <strong>of</strong> interest to computer<br />

<strong>for</strong>ensics investigation is broadened to include the new popular electronic devices. A<br />

new terminology “Digital <strong>Forensic</strong>s” has been created and the term represents better<br />

the current state <strong>of</strong> computer <strong>for</strong>ensic environment. The term “Computer <strong>Forensic</strong>s” is<br />

still commonly used to refer to any investigation involving computers. The first<br />

Digital <strong>Forensic</strong> Research Workshop (DFRWS, 2001) defines digital <strong>for</strong>ensic science<br />

as follows:<br />

The use <strong>of</strong> scientifically derived and proven methods toward the<br />

preservation, collection, validation, identification, analysis, interpretation,<br />

documentation and presentation <strong>of</strong> digital evidence derived from digital<br />

sources <strong>for</strong> the purpose <strong>of</strong> facilitating or furthering the reconstruction <strong>of</strong><br />

events found to be criminal, or helping to anticipate unauthorized actions<br />

shown to be disruptive to planned operations (p. 16).<br />

Some practitioners now prefer to use Digital <strong>for</strong>ensics to describe a greater scope <strong>of</strong><br />

potential evidence than what is included in computer <strong>for</strong>ensics literature and <strong>of</strong>ten use<br />

more specialised terms such as mobile <strong>for</strong>ensics and network <strong>for</strong>ensics.<br />

9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!