23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

e re-written for other items with<strong>in</strong> 7 days. Thus, by scann<strong>in</strong>g the tags <strong>in</strong> the<br />

repository; the <strong>in</strong>vestigator could f<strong>in</strong>d the physical evidence of the fake tag (<strong>in</strong>jected<br />

with SQL poison<strong>in</strong>g code) used by the thief/perpetrator.<br />

4.3.6 Analysis of CCTV Images and Interviews with the Employees<br />

Accord<strong>in</strong>g to the timestamps acquired from analyz<strong>in</strong>g the collected data above, the<br />

<strong>in</strong>vestigator could further perform the forensic <strong>in</strong>vestigation of the <strong>in</strong>cident by<br />

analyz<strong>in</strong>g the recorded images of the CCTV (Closed Circuit Television) monitor<strong>in</strong>g<br />

system <strong>in</strong> the retail shop. Likewise, the forensic <strong>in</strong>vestigator could <strong>in</strong>terview the<br />

employees who were on duty on the day of the <strong>in</strong>cident occurred <strong>in</strong> the shop to get<br />

more <strong>in</strong>formation lead<strong>in</strong>g to the <strong>in</strong>vestigation and reconstruction of the activity <strong>in</strong> real<br />

time.<br />

However, the analysis of CCTV images and <strong>in</strong>terview<strong>in</strong>g the employees were not<br />

<strong>in</strong> the research scope as previously stated <strong>in</strong> the limitation section of Chapter 3<br />

(Section 3.4).<br />

4.4 CONCLUSION<br />

This Chapter 4 has reported the f<strong>in</strong>d<strong>in</strong>gs from the laboratory test<strong>in</strong>g of a bus<strong>in</strong>ess<br />

system that was designed to simulate the use of <strong>RFID</strong> tags <strong>in</strong> a retail shop. The results<br />

show that the extraction of all evidence left after a security breach is complex, time<br />

consum<strong>in</strong>g and requires the use of an extended set of <strong>Digital</strong> Forensic tools.<br />

Nevertheless, the research reports the precise expectations an <strong>in</strong>vestigator may<br />

have for undertak<strong>in</strong>g such an <strong>in</strong>vestigation. The next Chapter (5) will now discuss<br />

these f<strong>in</strong>d<strong>in</strong>gs <strong>in</strong> relation to the research question, sub questions and hypotheses.<br />

127

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!