23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

� Limit<strong>in</strong>g the use of memory residents such as temporary<br />

tables and variables dur<strong>in</strong>g <strong>in</strong>vestigation would restrict an<br />

effect on the SQL Server buffer pool.<br />

� By avoid<strong>in</strong>g the changes <strong>in</strong> permissions on database<br />

objects could help the <strong>in</strong>vestigator not to overwrite<br />

previous permission assignments on database objects and<br />

not to generate various log entries dur<strong>in</strong>g <strong>in</strong>vestigation.<br />

� To avoid the unpleasant affects on the victim system’s<br />

SQL syntax or logic errors, the executions of required SQL<br />

statements for <strong>in</strong>vestigation should be <strong>in</strong>itially tested on<br />

the test station as a small error <strong>in</strong> SQL syntax could have<br />

catastrophic consequences on the database server.<br />

5.3.4 Identification, Acquisition and Preservation: Best Practices<br />

As previously stated (Section 5.2.4; Sections 3.3.4 and 3.3.5 <strong>in</strong> Chapter 3), the<br />

evidential search of a compromised <strong>RFID</strong> BS should be preceded by preserv<strong>in</strong>g<br />

the evidence of the volatile entities and subsystems. Forensic imag<strong>in</strong>g would<br />

usually proceed from the most volatile to the least. However, <strong>in</strong> the real world<br />

<strong>RFID</strong> BS; the key evidence could be located <strong>in</strong> priority from the Web server,<br />

backend database server, the POS and the SI. If the SI evidence had been lost on<br />

account of volatility then the Server Image should conta<strong>in</strong> sufficient detail from<br />

which to fully <strong>in</strong>vestigate the system. Hence the SI and POS could be isolated<br />

(def<strong>in</strong>e system first) and the Servers imaged as a priority. Human actors or CCTV<br />

dimensions must also be considered as the sources of evidence. The evidence<br />

from these sources would normally be imaged and documented at the same time.<br />

The acquisition of potential evidence data from a compromised <strong>RFID</strong> BS<br />

should be treated carefully, as the volatile data could be vanished if the backend<br />

SQL Server was down. The forensic <strong>in</strong>vestigator must deploy a forensically sound<br />

methodology of collect<strong>in</strong>g potential evidence data <strong>in</strong> order to preserve the<br />

<strong>in</strong>tegrity of the collected data. For <strong>in</strong>stance, sav<strong>in</strong>g the collected data <strong>in</strong>to a trusted<br />

location, us<strong>in</strong>g hardware write blocker dur<strong>in</strong>g acquisition and analysis, and<br />

acquir<strong>in</strong>g and analys<strong>in</strong>g the potential evidence from a compromised system with<br />

149

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!