30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.3.1 Attributes Of <strong>Disk</strong> Imaging <strong>Tools</strong><br />

NIST (2005) suggests that two critical measurable attributes <strong>of</strong> the disk imaging<br />

process are accuracy and completeness. NIST (2005) further defines accuracy as a<br />

qualitative measure to verify whether each bit <strong>of</strong> data <strong>of</strong> the <strong>for</strong>ensic copy is matched<br />

to the corresponding bit <strong>of</strong> the source. Completeness is a quantitative measure to<br />

verify whether every bit <strong>of</strong> source data is imaged (NIST, 2005).<br />

There are several factors that affect the two attributes outlined above. In order<br />

to access the evidence contained in a physical disk, the disk needs to be connected to<br />

the computer via a physical interface. The Physical interface <strong>of</strong> a hard disk may vary<br />

<strong>for</strong> different devices, such as, Integrated Drive Electronics (IDE), Small Computer<br />

System Interface (SCSI), Serial ATA (SATA), Universal Serial Bus (USB), IEEE<br />

1394 and eSATA. Each interface may have different variants or revisions with very<br />

different specifications to those <strong>of</strong> its predecessor. For instance, ATA-6 standard<br />

allows 48-bit Logical Block addressing (LBA) which has maximum disk size 128<br />

Petabyte (PB) whereas ATA-1 standard only allows 28-bit LBA. A disk imaging tool<br />

must be able to recognise different interfaces in order to access the physical disk.<br />

Another factor that might affect the completeness <strong>of</strong> the <strong>for</strong>ensic image copy is to<br />

identify the true size <strong>of</strong> the physical disk. A host protected area (HPA), sometimes<br />

known as hidden protected area, exists in some hard disks and is an area that is not<br />

normally visible to the operating system. Gupta et al. (2006) raise concerns in HPA <strong>for</strong><br />

digital <strong>for</strong>ensic investigators given the potential <strong>of</strong> hiding data.<br />

2.3.2 Mandatory Features Of <strong>Disk</strong> Imaging <strong>Tools</strong><br />

According to the disk imaging tool test specification from NIST (2004), some<br />

requirements are mandatory <strong>for</strong> disk imaging tool and are summarised in Table 2.4.<br />

NIST (2004) also include many other additional requirements that might be useful <strong>for</strong><br />

this research. Byers & Shahmehri (2009) also identify some extra requirements based<br />

on NIST (2004) with further interview and discussion with industry experts. Further<br />

requirements identifying how investigation proceeds are reviewed and presented in<br />

chapter 3.<br />

29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!