30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Guo et al. (2009) have proposed a functionality driven approach <strong>for</strong> digital <strong>for</strong>ensic<br />

tools V & V. The methodology has focused on measuring the accuracy and precision<br />

<strong>of</strong> the testing results. They identified several functional categories and also the<br />

components <strong>of</strong> each sub-category through the method referred as function mapping<br />

(Guo et al., 2009). Function categories have been identified, including search function<br />

and <strong>for</strong>ensic copy function (Guo & Slay, 2010). After the function mapping, V & V<br />

requirements are specified. A typical group <strong>of</strong> reference sets that consist <strong>of</strong> different<br />

test scenarios is then developed. After the reference sets are confirmed, the task <strong>of</strong> V<br />

& V the defined function <strong>of</strong> digital <strong>for</strong>ensic tools is conducted. Both functional<br />

requirements and reference sets are built in an extensible way that will enable tool<br />

testers to extend them to fulfil their special test requirements (Guo et al., 2009).<br />

2.3 DEFINE DISK IMAGING TOOLS<br />

A comprehensive understanding <strong>of</strong> digital <strong>for</strong>ensic tools enables this research to better<br />

define disk imaging tools. Sadui (2001) from SANS Institute defines disk imaging as<br />

an image <strong>of</strong> the whole disk where the complete content <strong>of</strong> the disk is copied including<br />

the location <strong>of</strong> the data. Some types <strong>of</strong> validation mechanisms are provided to prove<br />

that the copy is exact and has not been altered. This is different from the normal<br />

computer backup. <strong>Disk</strong> imaging creates a bit-stream <strong>of</strong> the duplicate <strong>of</strong> original data<br />

(SWGDE, 2009). In other words, ambient or residual data such as deleted files,<br />

unallocated spaces, and file slack will be copied as well. The reason <strong>of</strong> creating<br />

<strong>for</strong>ensic image <strong>of</strong> the original evidence is that the original evidence must be preserved<br />

without being altered or tampered. Schweitzer (2003) also emphasises that <strong>for</strong>ensic<br />

examination needs to be conducted using only the image (copy) and not the original<br />

hard drive. Also, according to Federal Rules <strong>of</strong> Evidence 901(a), the <strong>for</strong>ensic image<br />

copy must be authenticated and proven as same as the original copy in order to be<br />

admissible as evidence.<br />

28

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!