25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

each stage. One of the most critical steps of an investigation is imaging the<br />

digital media [Stephenson, 2003], as any analysis is performed from an image<br />

to ensure the original evidence is preserved. It is therefore necessary to protect<br />

the original evidence during imaging whilst ensuring an accurate image is<br />

acquired.<br />

Windows operating systems have been shown to leave a variety of traces that<br />

can greatly assist a forensic investigation [Greenfield, 2002]. Greenfield looks at<br />

common sources for finding forensic artefacts in Windows, suggesting that<br />

operating system guide books can provide useful insights into how and where<br />

information is likely to be found. It has been suggested that the new features<br />

found in operating systems such as Windows Vista [Hayes, 2009], may impact<br />

the way forensic examinations are conducted, particularly with the introduction<br />

of technology such as BitLocker [Hargreaves, 2008]. If encryption is used on a<br />

machine it would significantly impact the investigation by potentially making the<br />

evidence inaccessible. Having encryption tools resident within an operating<br />

system does not mean they will have a significant uptake with the general<br />

public; therefore traditional analysis of artefacts on unencrypted systems is still<br />

important.<br />

When considering creating an overall methodology for forensic computing<br />

investigations, or specific parts of the process, it is necessary to ensure that it is<br />

chosen based on the characteristics of the problem [Bogen, 2005]. Selecting<br />

and creating appropriate methodologies will maximise the retrieval of admissible<br />

evidence and the use of resources. Unsafe practices are occurring throughout<br />

investigations due to a lack of standardisation and definitions, which make it<br />

difficult to create appropriate new tools to assist with the analysis of machines<br />

[Carrier, 2006]. Therefore defining the problem allows for tools to be created<br />

which satisfy the necessary requirements, thereby improving the analysis<br />

process.<br />

Page 16

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!