25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2007], which assist in building event timelines as they elaborate on the<br />

relationships between MAC times. They can also elaborate on the user and<br />

system behaviour effects on the file’s state. Chow reviews the value of the<br />

thumbnail cache, in relation to these rules, for establishing information relating<br />

to the viewing of such files [Chow, 2007: Scenario 9]. This suggests that the<br />

thumbnail cache can be used to assist in building timelines of activity on a<br />

machine. MAC times are sensitive to manipulation [Waghorn, 2003] and require<br />

careful consideration by analysts to ensure they maintain their validity, not just<br />

because of accidental clicking on a file, but ensuring there are no traces of<br />

programs specifically designed to alter MAC times, and that the BIOS time is<br />

set as expected.<br />

2.3.3 Event Reconstruction<br />

Digital investigations use the same five key phases as those used in traditional<br />

physical investigations; preservation, surveying, documenting, searching,<br />

reconstruction [Carrier, 2005]. Reconstruction in digital investigations involves<br />

analysing the information recovered from a system and constructing events<br />

from it; the events can be ordered to show how the information recovered came<br />

to exist in its present state. An event can be defined as an incident that changes<br />

the state of one or more objects; in a digital investigation, an event can be<br />

thought of as an action that changes one or more of the bits in which the<br />

information is stored.<br />

In a case, event reconstruction can assist in proving or disproving guilt by<br />

establishing the order in which events occurred. Once events have been<br />

reconstructed, characteristics can be used to determine whether the actions<br />

were committed with intent [Carney, 2004]. For example, analysing times can<br />

give an indication of whether an action was the result of a piece of software or<br />

the user, since the user will have slower reaction times than the machine; there<br />

would need to be larger gaps between events than a machine would require.<br />

Page 27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!