23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

safely, cha<strong>in</strong> of custody, CCTV analysis might also be conducted dur<strong>in</strong>g the<br />

forensic exam<strong>in</strong>ation. Otherwise, the forensic exam<strong>in</strong>ation of a compromised<br />

<strong>RFID</strong> based stock management system would not be complete and comprehensive.<br />

Thus, the perpetrator or theft or malicious attacker would not be able to be<br />

prosecuted.<br />

5.3 DISCUSSION OF RECOMMENDATIONS: BEST PRACTICES<br />

The previously discussed sections and the f<strong>in</strong>d<strong>in</strong>gs of the research experiment<br />

(Chapter 4) have guided the forensic <strong>in</strong>vestigators <strong>in</strong> such a way <strong>in</strong> which the<br />

knowledge of the digital forensic practices or procedures <strong>in</strong> <strong>RFID</strong> based Bus<strong>in</strong>ess<br />

System (<strong>RFID</strong> BS) need to be broadened. Especially, the digital forensic<br />

procedure <strong>in</strong> the processes of <strong>in</strong>vestigation preparedness, artefact acquisition or<br />

extraction, analysis and presentation of the theft of SI <strong>in</strong> a compromised <strong>RFID</strong> BS<br />

was <strong>in</strong>vestigated. Hence, the knowledge acquired dur<strong>in</strong>g the research experiment<br />

will now be discussed as the recommendations for forensic <strong>in</strong>vestigation related to<br />

<strong>RFID</strong> BS. In addition, the potential evidence can be acquired from <strong>RFID</strong> BS will<br />

be outl<strong>in</strong>ed and the recommendations for digital forensic best practices concerned<br />

with <strong>in</strong>vestigation preparedness, <strong>in</strong>cident response, acquisition, preservation,<br />

analysis of a compromised <strong>RFID</strong> stock management system.<br />

5.3.1 Manag<strong>in</strong>g <strong>Investigation</strong> Output and <strong>Investigation</strong> Preparedness: Best<br />

Practices<br />

Manag<strong>in</strong>g the outputs of <strong>in</strong>vestigation is significant to any forensic <strong>in</strong>vestigator <strong>in</strong><br />

order to preserve the <strong>in</strong>tegrity of collected evidence data, as sav<strong>in</strong>g collected<br />

evidence on the victim system will compromise the <strong>in</strong>tegrity of the evidence. Thus,<br />

the collected evidence should be saved <strong>in</strong> a trusted location. The trusted location<br />

could be either on forensic workstation/laptop or on the locally connected external<br />

storage media, depend<strong>in</strong>g on whether the <strong>in</strong>vestigation is conducted <strong>in</strong>teractively<br />

on the victim system or via remote connection. However, attach<strong>in</strong>g the storage<br />

media for <strong>in</strong>vestigation outputs directly to the target victim system will change the<br />

system state. Thus, the <strong>in</strong>vestigator must document the drive letter representative,<br />

connection and drive letter creation time, disconnection time of the output storage<br />

media. After document<strong>in</strong>g the <strong>in</strong>formation <strong>in</strong> detail, the <strong>in</strong>vestigator could exclude<br />

these changes <strong>in</strong> the <strong>in</strong>vestigation. Similarly, the forensic tools required and<br />

147

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!