30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

answered. Details <strong>of</strong> data collection, processing, analysis and presentation are<br />

presented in section 3.4. The data mapping that links the question to the different data<br />

types and the hypothesis tests is shown in Figure 3.11. The limitation <strong>of</strong> the research<br />

will be discussed in section 3.5 and followed by a conclusion.<br />

3.1 REVIEW OF SIMILAR STUDIES<br />

Five relevant studies will be critically reviewed to analyse how other researchers are<br />

defining and implementing methodologies in areas related to the proposed research.<br />

The focus <strong>of</strong> Chapter 2 is on the definition <strong>of</strong> what is important in the area <strong>of</strong> digital<br />

<strong>for</strong>ensic disk imaging tools. The task <strong>of</strong> Chapter 3 is to identify how to conduct the<br />

research in the topic area.<br />

3.1.1 Standardised Approach Of Testing <strong>Disk</strong> Imaging <strong>Tools</strong> From NIST<br />

The CFTT program is a joint project between a few organisations in the United States<br />

<strong>of</strong> America including NIJ, DOJ and NIST. The aim <strong>of</strong> the CFTT program is to actively<br />

provide a measure <strong>of</strong> assurance that the tools used during the investigation <strong>of</strong> digital<br />

crimes produce aacurate and complete results. The program addresses one key<br />

problem <strong>of</strong> the industry and legal community. This problem is that there is no standard<br />

or credible test to validate the accuracy and completeness <strong>of</strong> the result extracted by<br />

disk imaging tools. The test results are able to assist the <strong>for</strong>ensic s<strong>of</strong>tware vendors to<br />

improve their tools and provide best practice reference to support the results produced<br />

by those tools <strong>for</strong> presentation in the court. The primary studies <strong>of</strong> NIST (2004) and<br />

NIST (2005) <strong>of</strong> CFTT program present the testing <strong>of</strong> disk imaging tools. The studies<br />

initiated by NIST have a direct link to the proposed research because the approach<br />

taken has been widely recognised and acknowledged by the scientific and legal<br />

community. NIST is also one <strong>of</strong> the few research organisations dedicated to digital<br />

<strong>for</strong>ensic tool testing.<br />

NIST implements a systematic approach to identify and test the tool<br />

requirements. Figure 3.1 illustrates the methodology used by NIST <strong>for</strong> their disk<br />

imaging tool testing. They suggest that at the beginning, the category <strong>of</strong> <strong>for</strong>ensic<br />

requirements will be determined by a group <strong>of</strong> expert users.<br />

44

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!