30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Apache web server and Micros<strong>of</strong>t Internet In<strong>for</strong>mation Services (IIS) as examples.<br />

Reichenkron (2006) presented evidence that the Apache web Server has more<br />

vulnerabilities than Micros<strong>of</strong>t IIS. Payne (2002) presented another argument that OSS<br />

is easily subjected to malicious code planted in the s<strong>of</strong>tware. Most <strong>of</strong> OSS projects use<br />

Concurrent Versioning System (CVS) to keep track <strong>of</strong> project progress, publish new<br />

versions <strong>of</strong> the s<strong>of</strong>tware and collaborate with multiple developers. Projects like the<br />

Apache web server will only publish patches or fixes to the public from trusted<br />

developers or submissions after careful examination and extensive testing.<br />

Boulanger (2005) presented another argument claiming that hiding the source<br />

code does not provide additional security. A common way <strong>of</strong> looking <strong>for</strong><br />

vulnerabilities is to send or input unexpected commands or codes to test the validation<br />

mechanism <strong>of</strong> the s<strong>of</strong>tware. Knowledge <strong>of</strong> the source code is not required. If the<br />

s<strong>of</strong>tware does not respond with a correct exception, this might indicate the existence <strong>of</strong><br />

vulnerability in the system. For example, an online e-commerce website usually has<br />

customer login and password protection. If the web server did not implement proper<br />

input validation mechanism, the attacker may launch an attack like Structured Query<br />

Language (SQL) injection to exploit vulnerability to query sensitive and valuable<br />

in<strong>for</strong>mation from the back-end database. Grossman (2007) reported that SQL Injection<br />

attack has been classified as one <strong>of</strong> the top ten website vulnerabilities.<br />

Vulnerability can be discovered much faster in OSS than in Proprietary<br />

s<strong>of</strong>tware. Raymond (2002) postulates the bug discovering in OSS as “Given enough<br />

eyeballs, all bugs are shallow”. In matter <strong>of</strong> days or even minutes, s<strong>of</strong>tware bugs are to<br />

be reported once s<strong>of</strong>tware is released or updated. For proprietary s<strong>of</strong>tware, it can only<br />

wait <strong>for</strong> the vendor to release patch to fix the problem. In some cases, vendor may not<br />

even release a patch <strong>for</strong> a small problem because the problem may require huge ef<strong>for</strong>t<br />

to fix and it is not cost efficient. However, OSS may have a few options. If the vendor<br />

does not release patch <strong>for</strong> the problem, it is not unusual that some developers will<br />

program their own fix and release their products to the public. In some rare cases, no<br />

other developers <strong>of</strong>fer any fix to a particular problem. Users still have options to<br />

develop their own patch to fix the problem but <strong>for</strong> proprietary s<strong>of</strong>tware these options<br />

simply do not exist.<br />

24

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!