30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

13<br />

Investigative Process Model<br />

(Freiling & Schwittay, 2007)<br />

2.1.3 Development And Evolution <strong>of</strong> Digital <strong>Forensic</strong> <strong>Tools</strong><br />

14<br />

4 phases 1-5<br />

It was common to use the evidentiary computer to gather evidence when no<br />

specialised digital <strong>for</strong>ensics tools were available. The major risk <strong>of</strong> this traditional<br />

approach is that potential evidence can be overlooked such as deleted and hidden files.<br />

In addition, the integrity <strong>of</strong> the evidence is not verifiable. S<strong>of</strong>tware programs, such as<br />

DD (shown in Table 2.2), could be used to acquire the content <strong>of</strong> an entire hard disk<br />

and even capture the deleted data but these programs are not widely recognised as a<br />

<strong>for</strong>ensic tool. It was adopted in the law en<strong>for</strong>cement sector but most <strong>of</strong> the <strong>for</strong>ensic<br />

investigators were still per<strong>for</strong>ming investigations at file system level without showing<br />

much heed to deleted and hidden data. Several s<strong>of</strong>tware programs are discussed<br />

through this section to analyse the development and evolution <strong>of</strong> the digital <strong>for</strong>ensic<br />

tools. The analysis will help the research better understand the capability <strong>of</strong> the digital<br />

<strong>for</strong>ensic tools. Table 2.2 summarises the main functionalities <strong>of</strong> the discussed s<strong>of</strong>tware<br />

programs in this section.<br />

S<strong>of</strong>tware programs that are capable <strong>of</strong> recognising different file types and<br />

recovering deleted files have appeared in the market such as Norton <strong>Disk</strong>Edit and<br />

XtreeGold (shown in Table 2.2). Some specialised <strong>for</strong>ensic tools, such as SafeBack<br />

and DIBS (shown in Table 2.2), were developed with the capability <strong>of</strong> collecting<br />

electronic evidences without damaging the integrity <strong>of</strong> the original evidentiary data.<br />

The Law en<strong>for</strong>cement sector such as Royal Canadian Mounted Police (RCMP) also<br />

developed their specialised s<strong>of</strong>tware tools <strong>for</strong> computer investigations (Casey, 2004).<br />

The introduction <strong>of</strong> large data storage devices caused new problems <strong>for</strong> <strong>for</strong>ensic<br />

investigators (Akhter, 2008). Automated and integrated s<strong>of</strong>tware toolkits such as,<br />

EnCase, FTK and iLook (shown in Table 2.2), were developed to help <strong>for</strong>ensic<br />

investigators process digital evidence more efficiently and effectively and also<br />

overcome challenges such as large hard drives and evidence searching. The toolkits<br />

usually feature a user-friendly and clear graphical user interface (GUI) to assist the<br />

user locate potential evidence much promptly. Searching and indexing are optimised

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!