30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

project with detailed research result presented as supporting evidence. In addition, the<br />

paper has provided two significant methods used <strong>for</strong> evaluation and data analysis with<br />

detailed application in a case study. The research result has shown that AHP, WSM or<br />

a combination <strong>of</strong> both can benefit the data analysis in the present study.<br />

3.1.5 Function Oriented Methodology to Validate Digital <strong>Forensic</strong> <strong>Tools</strong><br />

The study <strong>of</strong> Guo & Slay (2010) proposed a function oriented methodology to verify<br />

and validate digital <strong>for</strong>ensic tools. Guo & Slay (2010) first describe the background <strong>of</strong><br />

the validation and verification framework within the field <strong>of</strong> digital <strong>for</strong>ensics. The<br />

methodology proposed by Guo & Slay (2010) can be summarised into five major<br />

stages as illustrated in Figure 3.6. Stage 1 involves the systematic and scientific<br />

understanding <strong>of</strong> the field <strong>of</strong> the Electronic Evidence (EE). This stage identifies the<br />

position <strong>of</strong> the functions in the investigative process. For example, the function<br />

focused only at research was that <strong>for</strong>ensic copy function. The <strong>for</strong>ensic copy function<br />

belongs to the collection phase <strong>of</strong> the investigative processes reviewed in Section<br />

2.1.2. The <strong>for</strong>ensic copy function was broken down into many sub-functions. After the<br />

function is mapped to different detailed sub-functions, the requirements <strong>for</strong> <strong>for</strong>ensic<br />

copy function are specified. A variety <strong>of</strong> diversifications were taken into account when<br />

specifying the requirements. After the requirements were specified, different test cases<br />

were developed according to each identified requirement. However, the authors have<br />

not applied the methodology on any disk imaging tool yet. They state that the tool<br />

would be tested against the test cases and measurement metrics would be applied to<br />

determine the accuracy and precision <strong>of</strong> the results (Guo & Slay, 2010).<br />

53

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!