30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

experts will be used to narrow down to a small number <strong>of</strong> test cases. Finally a set <strong>of</strong><br />

relevant test cases that contain a group <strong>of</strong> test assertions are identified. International<br />

guidelines and standards such as the International Organization <strong>for</strong> Standardization<br />

(ISO) / International Electrotechnical Commission (IEC) 17025 are adopted to<br />

standardise the test procedures and methods. NIST runs tests on selected tools and<br />

produces test reports according to the testing plan and procedures. Vendor and Steer<br />

Committee review the final test report and release the report to the public. The<br />

methodology used by the CFTT program is a systematic approach that is highly<br />

organised, robust and credible. Each step is reviewed and revised by experts from law<br />

en<strong>for</strong>cements and <strong>for</strong>ensics communities. Test scenarios, tool requirements and test<br />

assertions can be modified and adopted in the proposed research. Also, the support<br />

s<strong>of</strong>tware tools developed by NIST can improve efficiency <strong>of</strong> the testing process and<br />

also avoid unexpected problems arising from using untested s<strong>of</strong>tware. From the test<br />

report, the test result is repeatable and reproducible. The test report serves as a<br />

reference point <strong>for</strong> the research to compare and analyse the test results that can<br />

identify any underlying problems.<br />

3.1.2 Enhanced Approach For <strong>Disk</strong> Imaging <strong>Tools</strong> Evaluation<br />

Byers & Shahmehri (2009) aim to provide a systematic approach to test disk imaging<br />

tools since tool testing is challenging, time consuming and expensive. Also, only few<br />

publications have been published in areas <strong>of</strong> digital <strong>for</strong>ensic tool testing. The study<br />

focuses on evaluating Encase 6.8 and Linen 6.1 (Linux version <strong>of</strong> Encase), both<br />

developed by Guidance S<strong>of</strong>tware. The purpose <strong>of</strong> the evaluation in this research is the<br />

same as that <strong>of</strong> the CFTT program. Studies from the CFTT program and Byers &<br />

Shahmehri (2009) try to determine if the disk imaging tools used during the<br />

investigations per<strong>for</strong>m as expected and produce accurate and completed results.<br />

Studies from Byers & Shahmehri (2009) have similarities to the CFTT program but<br />

also many major differences are identified during their evaluation. The methodology<br />

adopted by Byers & Shahmehri (2009) is shown in Figure 3.2. As the first phase,<br />

generic testing requirements are identified from three sources, namely <strong>for</strong>mal<br />

46

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!