25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The definition of Forensic Computing has been the subject of debate; Hall<br />

[2005] compared a variety of definitions that are in use; for example Garber<br />

[2001] describes the subject as:<br />

“the analysis of hard drives, CDs, floppy disks, zip and jazz disks, flash memory<br />

cards and other forms of storage media to uncover evidence of crimes”.<br />

One of the most common aspects identified throughout the definitions Hall<br />

examined is the requirement to ensure the preservation of both the physical and<br />

digital evidence [Hall, 2005]. Forensic Computing has been shown to have<br />

different professional and academic concerns to those found in computer<br />

science [Cooper, 2005]; the field has more similarities with the professional and<br />

academic concerns of Forensic Science. Whilst there are many definitions<br />

available for Forensic Computing, it can still be defined as a sub-discipline of<br />

forensic science [Hall, 2005]. The Oxford English Dictionary [OED, 2011]<br />

defines forensic as “relating to or denoting the application of scientific methods<br />

and techniques to the investigation of crime”; therefore Forensic Computing<br />

could be considered to be the application of the principles of forensic science to<br />

digital devices.<br />

The investigatory process aims to prove or disprove a hypothesis, using<br />

methods which can be presented in court; the hypothesis generally relates to<br />

the actions of an individual. An analyst needs to handle the digital media in a<br />

suitable way to ensure this objective is fulfilled. The focus of forensic computing<br />

is to investigate an event after it has occurred through acquiring, analysing and<br />

reporting any evidence recovered from digital media [Hannan, 2004].<br />

McKemmish [1999] identified four key components of forensic computing in<br />

terms of their involvement with digital evidence. These are: (i) identification, (ii)<br />

preservation, (iii) analysis and (iv) presentation; each component having its own<br />

procedures and requirements.<br />

Page 12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!