23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Table A1. 2: Non-volatile Artefacts and Method of Acquisition (Compiled from<br />

Fowler, 2009, p. 192 & p. 93-94)<br />

Non-Volatile SQL<br />

Server Artefacts<br />

Authentication<br />

Sett<strong>in</strong>gs*<br />

Authorization<br />

Catalogs*<br />

SQL Server<br />

Log<strong>in</strong>s*<br />

Automated<br />

Artefact<br />

Collection<br />

(WFT)<br />

Ad Hoc<br />

Artefact<br />

Collection<br />

2<br />

Hash<strong>in</strong>g<br />

Method Used<br />

for Artefact<br />

Preservation<br />

md5deep (or)<br />

dcfldd<br />

Purpose<br />

(<strong>in</strong> order to:)<br />

● dcfldd Determ<strong>in</strong>e<br />

authentication<br />

and authorization<br />

● dcfldd Determ<strong>in</strong>e<br />

authentication<br />

and authorization<br />

● md5deep Determ<strong>in</strong>e<br />

authentication<br />

and authorization<br />

Databases* ● md5deep Not directly<br />

analysed<br />

Database Users* ● md5deep Determ<strong>in</strong>e<br />

authentication<br />

and authorization<br />

Database Objects* ● md5deep Reconstruct<br />

Activity<br />

Triggers* ● md5deep Reconstruct<br />

Activity<br />

Jobs* ● md5deep Reconstruct<br />

Activity<br />

Schemas* ● md5deep Reconstruct

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!