23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

the trusted forensic toolkits. In addition, all the forensic tools used and steps<br />

performed dur<strong>in</strong>g the <strong>in</strong>vestigation should be documented <strong>in</strong> order to track the<br />

activities performed by the forensic <strong>in</strong>vestigator. Moreover, the comparison of<br />

hash values (example: Appendix 22) of collected data before and after should also<br />

be done <strong>in</strong> order to verify the <strong>in</strong>tegrity of the evidence and preserve the evidence.<br />

Secur<strong>in</strong>g the crime scene (Section 3.3.4), transport<strong>in</strong>g the collected evidence<br />

(Section 3.3.4), cha<strong>in</strong> of custody (Section 3.1.5) and analys<strong>in</strong>g the forensic image<br />

copy on a specific forensic workstation are also the most important<br />

factors/forensic processes to ma<strong>in</strong>ta<strong>in</strong> the <strong>in</strong>tegrity of the collected evidence.<br />

5.3.5 Analysis of the Acquired Data: Best Practices<br />

In analysis of the acquired data from a compromised <strong>RFID</strong> BS, the ID and time<br />

stamps from the related sources are significant to speed the extraction of relevant<br />

evidence to the theft of SI from the acquired artefacts. Similarly, the analysis<br />

phase may also lead to a second round of human <strong>in</strong>terviews. In addition, POS<br />

evidence such as CCTV and <strong>in</strong>terview evidence from human participants (Chapter<br />

3; Section 3.4) must also be acquired, analysed and documented <strong>in</strong> the real world.<br />

Moreover, proper forensic tools used (such as EnCase, FTK, Tableau forensic<br />

hardware write blocker) and the steps taken dur<strong>in</strong>g the forensic exam<strong>in</strong>ation must<br />

be documented.<br />

5.4 CONCLUSION<br />

In this chapter, the discussion of f<strong>in</strong>d<strong>in</strong>gs from the research experiment presented<br />

<strong>in</strong> Chapter 4 was made. The answers to the proposed research questions from the<br />

methodology chapter (Section 3.2.6) were discussed <strong>in</strong> relation to the asserted<br />

hypotheses (Section 3.2.7) and a conclusion was reached with regard to the<br />

validity of the anticipated hypotheses. Likewise, the f<strong>in</strong>d<strong>in</strong>gs after the<br />

<strong>in</strong>vestigation of a compromised <strong>RFID</strong> system were also discussed and evaluated.<br />

Furthermore, the issues related to the <strong>in</strong>vestigation were stated.<br />

The ma<strong>in</strong> research question was a focal po<strong>in</strong>t to prove the theft of SI <strong>in</strong> a<br />

<strong>RFID</strong> BS and the phases of research model (Section 3.2.5) were established. The<br />

tested system design (Section 3.3.1) was also set up based on the ma<strong>in</strong> research<br />

question. The f<strong>in</strong>d<strong>in</strong>gs (Chapter 4) after a complete forensic exam<strong>in</strong>ation were<br />

able to prove the theft of SI <strong>in</strong> a simulated <strong>RFID</strong> based stock management system.<br />

150

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!