30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Preparation Collection Examination Analysis Reporting<br />

Figure 2.2. NIJ Investigation Process<br />

Many academics, research groups and corporations have attempted to develop<br />

frameworks <strong>for</strong> digital <strong>for</strong>ensics investigations including the examples presented in<br />

Table 2.1. Selamat, Yus<strong>of</strong>, & Sahib (2008) summarised that the existing digital<br />

<strong>for</strong>ensics frameworks (see Table 2.1) can map onto five common phases, namely<br />

Phase1 - Preparation, Phase 2- Collection and Preservation, Phase 3 - Examination and<br />

Analysis, Phase 4 - Presentation and Reporting and Phase 5 - Disseminating the case.<br />

Table 2.1 summarises different digital <strong>for</strong>ensic investigation frameworks so that<br />

standard digital <strong>for</strong>ensics investigation procedures can be established. Different<br />

activities and processes are also incorporated into appropriate phases. This study not<br />

only summarised some previous frameworks in great detail but also simplifies the<br />

existing frameworks. According to the result analysis from Selamat et al. (2008), most<br />

<strong>of</strong> the existing frameworks include the critical phases phase 2, 3 and 4. On the other<br />

hand, many frameworks (Pollitt, 1995; Stephenson, 2003) do not include phase 1 and<br />

5 as their standard processes. However, some frameworks (Baryamureeba & Tushabe,<br />

2004; Beebe & Clark, 2004; Carrier & Spaf<strong>for</strong>d, 2003; Ciardhuain, 2004; Freiling &<br />

Schwittay, 2007; Rogers, Goldman, Mislan, Wedge, & Debrota, 2006; Kohn, El<strong>of</strong>f, &<br />

Olivier, 2006; Reith, Carr & Gunsch, 2002) suggest that Phase 1 and 5 are significant<br />

to ensure the completeness <strong>of</strong> digital <strong>for</strong>ensic investigations to produce accurate and<br />

conclusive results.<br />

Some <strong>of</strong> the frameworks have similar approaches on how to per<strong>for</strong>m an<br />

investigation. For example, Carrier & Spaf<strong>for</strong>d (2004) and Kent, Chevalier, Grance, &<br />

Dang (2006) have similar approaches on acquiring digital evidence specifically in hard<br />

disk imaging. It consists <strong>of</strong> two parts, namely disk imaging and <strong>for</strong>ensic copy<br />

verification. A complete <strong>for</strong>ensic disk image backup is required and the original<br />

evidence is preserved as physical evidence. After the <strong>for</strong>ensic copy is made, its<br />

integrity is verified. <strong>Tools</strong> can be employed to compute the message digest <strong>of</strong> the<br />

original to the <strong>for</strong>ensic copy, then compare the two values and make sure they are<br />

12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!