30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.4.1 <strong>Data</strong> Collection Methods<br />

Different data collection methods adopted in the proposed research are explained in<br />

the following sub-sections.<br />

3.4.1.1 Market And Vendor Research And Internet Survey<br />

Market and Internet survey and vendor research are among the common approaches to<br />

screen and select candidate s<strong>of</strong>tware <strong>for</strong> a s<strong>of</strong>tware evaluation project (Maiden &<br />

Ncube, 1998; Kunda & Brooks, 1999; Kontio, 1996). More than 50 open-sourced and<br />

proprietary vendors have been researched against the preliminary requirements and the<br />

research budget. In<strong>for</strong>mation reviewed includes the s<strong>of</strong>tware user manuals, publically<br />

released notes, updated histories, consumer reports, user comments and related <strong>for</strong>um<br />

entries. A list <strong>of</strong> three candidate s<strong>of</strong>tware is presented in Phase 1.<br />

3.4.1.2 Function Mapping<br />

Be<strong>for</strong>e the complete set <strong>of</strong> requirements is developed, a function map is created to<br />

map each identified function to the requirements <strong>of</strong> disk imaging tools. After each<br />

function and its sub-functions are identified, the requirements corresponding to each<br />

function category will be specified. Guo & Slay (2010) mentioned that function<br />

mapping can provide a level <strong>of</strong> abstraction <strong>of</strong> functions that should be included or<br />

tested <strong>for</strong> the tool testers or s<strong>of</strong>tware developers. Byers & Shahmehri (2009) also<br />

employed similar method to identify more potential requirements <strong>for</strong> tool testing. The<br />

function map is tool independent and it can be applied to any disk imaging tools. Tool<br />

developers, testers and analysts can adapt the function map to identify their own<br />

requirements and start testing the tool in a focused and organised approach. Figure 3.9<br />

depicts the function map built in a way that it can be reused to create suitable<br />

requirements <strong>for</strong> any disk imaging tools.<br />

The function map (Figure 3.9) consists <strong>of</strong> six major schemes, namely Access<br />

Method (AM), Digital Source (DS), <strong>Data</strong> Destination (DD), Execution Environment<br />

(EE), Hidden Areas (HA) and Physical Interface (PI). The definitions <strong>of</strong> six major<br />

schemes can be found in Appendix 1. Each major scheme may have few sub-sections.<br />

Due to space limitation, function map only presents the important parts that are<br />

relevant to this research. To access the DS from the device, the device needs to be<br />

59

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!