30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.3.3.1 dcfldd ....................................................................................................... 31<br />

2.3.3.2 dc3dd ........................................................................................................ 32<br />

2.3.3.3 Helix 3 Pro ............................................................................................... 32<br />

2.3.3.4 Automated Image and Restore (AIR) ...................................................... 32<br />

2.3.3.5 Aimage ..................................................................................................... 32<br />

2.3.3.6 Windows-based Imaging <strong>Tools</strong> ............................................................... 33<br />

2.3.3.7 Apple Macintosh Imaging <strong>Tools</strong> ............................................................. 33<br />

2.3.4 Problem Areas in <strong>Disk</strong> Imaging <strong>Tools</strong> – <strong>Data</strong> Hiding ...................................... 33<br />

2.3.4.1 Host Protected Area (HPA) ..................................................................... 34<br />

2.3.4.1 Device Configuration Overlay (DCO) Area ............................................ 35<br />

2.3.5 Problem Areas in <strong>Disk</strong> Imaging <strong>Tools</strong> – Master Boot Record (MBR) &<br />

GUID Partition Table (GPT) ............................................................................ 35<br />

2.3.6 Problem Areas in <strong>Disk</strong> Imaging <strong>Tools</strong> – Hash Function ................................... 36<br />

2.4 The Functionalities <strong>of</strong> Selected <strong>Disk</strong> Imaging <strong>Tools</strong> .................................................. 37<br />

2.5 Summary <strong>of</strong> Key Issues and Problems ....................................................................... 39<br />

2.6 Conclusion .................................................................................................................. 41<br />

Chapter 3. Research Methodology<br />

3.0 Introduction ................................................................................................................. 43<br />

3.1 Review <strong>of</strong> Similar Studies .......................................................................................... 44<br />

3.1.1 NIST Standardised Approach <strong>of</strong> <strong>Disk</strong> Imaging <strong>Tools</strong> Testing ........................... 44<br />

3.1.2 Enhanced Approach <strong>for</strong> <strong>Disk</strong> Imaging <strong>Tools</strong> Evaluation ................................... 46<br />

3.1.3 Validating <strong>Forensic</strong> S<strong>of</strong>tware Utilising Black Box Testing Techniques ............ 48<br />

3.1.4 Applying Systematic Method <strong>for</strong> Commercial Off-the-shelf (COTS)<br />

<strong>Selection</strong> ............................................................................................................ 50<br />

3.1.5 Function Oriented Methodology to Validate Digital <strong>Forensic</strong> <strong>Tools</strong> ................. 53<br />

3.2 Research Questions and Hypotheses .......................................................................... 55<br />

3.3 The Research Model ................................................................................................... 56<br />

3.4 <strong>Data</strong> Requirements ...................................................................................................... 58<br />

3.4.1 <strong>Data</strong> Collection Methods .................................................................................... 59<br />

3.4.1.1 Market and Vendor Research and Internet Survey ................................ 59<br />

3.4.1.2 Function Mapping ................................................................................. 59<br />

vii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!