30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

s<strong>of</strong>tware, also known as closed-source s<strong>of</strong>tware, includes Micros<strong>of</strong>t® Office, Adobe®<br />

Photoshop, Access<strong>Data</strong> FTK® and Guidance s<strong>of</strong>tware Encase®. Digital <strong>for</strong>ensics<br />

s<strong>of</strong>tware is available in both Open source and Proprietary s<strong>of</strong>tware. Currently, there is<br />

a gap in the digital <strong>for</strong>ensic industry. There is no program or project that focuses on<br />

testing the OSS to determine whether they function as supposed. Testing Open source<br />

disk imaging tools is what this dissertation will pursue.<br />

There are many arguments and misconceptions <strong>of</strong> both OSS and proprietary<br />

s<strong>of</strong>tware regarding the reliability. Source code made available to public can attract<br />

attackers to search and exploit vulnerabilities to achieve their goals (Boulanger, 2005).<br />

According to the OSS development process, source code publicly available can be<br />

evaluated by other developers. If problems or vulnerabilities <strong>of</strong> the s<strong>of</strong>tware are<br />

identified, other developers would report them and the s<strong>of</strong>tware programmers will<br />

analyse the problems and provide solutions to these problems. Collaboration <strong>of</strong><br />

different ef<strong>for</strong>ts from large number <strong>of</strong> developers will make s<strong>of</strong>tware much more<br />

reliable and secure than Proprietary s<strong>of</strong>tware. Waring & Maddocks (2005) stated that<br />

this can also be enhanced with the availability <strong>of</strong> the source code to other<br />

programmers who can identify problems and propose solutions. Also, there five<br />

present research cases <strong>of</strong> UK public sectors adopted OSS and this indicate that<br />

reliability is a benefit to their organisations (Waring & Maddocks, 2005). Furthermore,<br />

OSS considers peer review procedure to have a central role in their development<br />

process. The peer review procedure also complies with the Daubert guidelines factor 2<br />

as the evidence has subjected to peer reviewed and publication. Some people argue<br />

that peer review process <strong>of</strong> OSS is not effective as it is claimed to be. Viega (2000)<br />

raised an argument that source code open to the public does not automatically<br />

guarantee the code will be reviewed and analysed by competent developers. For<br />

example, a bug in Berkeley S<strong>of</strong>tware Distribution (BSD) UNIX caused a simultaneous<br />

file access conflict issue, that existed in the system <strong>for</strong> over 25 years (Perrin, 2008).<br />

On the other hand, Payne (2002) suggested that the argument must always be<br />

taken with “a grain <strong>of</strong> salt” because a system such as Sun Microsystems Solaris is<br />

considered as reliable while operating as a closed source. Evidence can be found that<br />

closed source Proprietary s<strong>of</strong>tware has less security vulnerabilities than OSS if we take<br />

23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!