23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

xi<br />

4.3.4 Analysis of the Physical Drive Image ...................................................... 126<br />

4.3.5 Analysis of <strong>RFID</strong> <strong>Tag</strong>s <strong>in</strong> the Repository ................................................ 126<br />

4.3.6 Analysis of CCTV Images and Interview with the Employees ............... 127<br />

4.4 Conclusion ............................................................................................................... 127<br />

Chapter 5 – Research Discussion<br />

5.0 Introduction .............................................................................................................. 128<br />

5.1 Discussion of Research Question ............................................................................. 129<br />

5.1.1 Ma<strong>in</strong> Research Question and Associated Hypotheses ............................. 129<br />

5.1.2 Secondary Research Question and Associated Hypotheses …………….130<br />

5.2 Discussion of F<strong>in</strong>d<strong>in</strong>gs ............................................................................................. 143<br />

5.2.1 Discussion of Conducted Research Phases .............................................. 143<br />

5.2.2 Discussion of Implemented System Design ............................................ 143<br />

5.2.3 Discussion of Conducted Attack Case Scenario ...................................... 144<br />

5.2.4 Discussions of Identification, Acquisition and Extraction ....................... 144<br />

5.2.5 Discussions of Analysis and Presentation ................................................ 145<br />

5.3 Discussion of Recommendations: Best Practices .................................................... 147<br />

5.3.1 Manag<strong>in</strong>g <strong>Investigation</strong> Output and <strong>Investigation</strong><br />

Preparedness: Best Practices ................................................................... 147<br />

5.3.2 Incident Response: Best Practices ........................................................... 148<br />

5.3.3 Precautions for Respond<strong>in</strong>g to an SQL<br />

Server Incident: Best Practices ................................................................ 148<br />

5.3.4 Identification, Acquisition and Preservation: Best Practices ................... 149<br />

5.3.5 Analysis of the Acquired Data: Best Practices ........................................ 150<br />

5.4 Conclusion ............................................................................................................... 150<br />

Chapter 6 – Conclusion<br />

6.0 Introduction .............................................................................................................. 152<br />

6.1 Summary of F<strong>in</strong>d<strong>in</strong>gs ............................................................................................... 153<br />

6.2 Answer to the Research Questions .......................................................................... 155<br />

6.3 Conclusion and Further Research ............................................................................. 156

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!