25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

implementations of operating system thumbnail caches and discusses available<br />

literature on their implementations.<br />

Chapter 3 highlights the requirement to breakdown the aim of this research into<br />

smaller focused areas in order to determine the validity of the hypothesis; the<br />

objectives of the components of this research are described. This is followed by<br />

an overview of the potential considerations for this research. One of the most<br />

significant considerations for this research is the requirement to evaluate<br />

methodologies and results by appropriate forensic standards. <strong>Final</strong>ly, the<br />

software tools used during this research are described.<br />

Chapter 4 identifies the criteria which determine the evidential value of an<br />

artefact and establishes how the criteria can be applied to evidence relating to a<br />

thumbnail cache. This chapter explores the term evidence and evaluates how<br />

evidential value is assessed in court; the criteria established for assessing<br />

evidential value in general are then applied specifically to the thumbnail cache<br />

to create a specification which can be used to evaluate the results of this<br />

research.<br />

Chapter 5 describes the structure and behaviour of the thumbnail cache<br />

implementations used in the Linux distributions Ubuntu and Kubuntu. The<br />

structural study highlights that whilst both thumbnail caches were implemented<br />

based on the same open desktop specification there are in fact small but<br />

important differences. The behavioural study identifies common user<br />

interactions with the system that would result in changes to data within the<br />

thumbnail cache; it also describes the changes that occur on the remainder of<br />

the system. The changes to the data can be used to identify possible user<br />

activity which has occurred on the system.<br />

Page 6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!