23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

firstly affect the back-end <strong>RFID</strong> middleware system and then the virus will later be<br />

spread<strong>in</strong>g with<strong>in</strong> the corporate <strong>RFID</strong> system.<br />

Thus, the writers or designers of the <strong>RFID</strong> middleware must carefully design<br />

and build the middleware by perform<strong>in</strong>g appropriate checks (bounds check<strong>in</strong>g,<br />

special character filter<strong>in</strong>g and the like) <strong>in</strong> order to avoid “<strong>RFID</strong> middleware from<br />

suffer<strong>in</strong>g all of the well-known vulnerabilities experienced by the Internet” (Rieback<br />

et al., 2006b, p. 169).<br />

3.1.3 SQL Server <strong>Forensics</strong><br />

In this book chapter, Fowler (2009) discuses what SQL Server forensics is, and how<br />

to <strong>in</strong>vestigate the <strong>in</strong>cidents relat<strong>in</strong>g to SQL Server data. The author also mentions the<br />

differences between the traditional forensics and SQL Server forensics. Furthermore,<br />

the method used <strong>in</strong> SQL Server forensics is used to identify whether the security of a<br />

database is breached or supplementary <strong>in</strong>vestigation is needed to confirm a breach.<br />

Firstly, Fowler (2009) expla<strong>in</strong>s that the digital forensics field is very new and<br />

it started gett<strong>in</strong>g <strong>in</strong>dustry attention <strong>in</strong> 2001. S<strong>in</strong>ce 2001 until now, the digital<br />

forensics field has rapidly been grow<strong>in</strong>g due to groups such as the <strong>Digital</strong> Forensic<br />

Research Workshop (DFRWS), and a number of conferences such as the Black Hat<br />

USA conferences and the like. Then, he states that the problems of security breaches<br />

of data are not an uncommon theme <strong>in</strong> current news. As a result of companies try<strong>in</strong>g<br />

to cut costs by consolidat<strong>in</strong>g databases onto a smaller amount of database servers, it<br />

leads s<strong>in</strong>gle sources of confidential <strong>in</strong>formation to become the primary targets for<br />

malicious attackers. Hence, “75% of cyber attacks are application based and many<br />

<strong>in</strong>volve the theft of personal or f<strong>in</strong>ancial <strong>in</strong>formation stored with<strong>in</strong> a database,<br />

accord<strong>in</strong>g to the Gartner Group” (Fowler, 2009, p. 48). He gives the examples of<br />

recent data breaches such as the CardSystems which <strong>in</strong>volved the theft of 200,000<br />

credit card details and TJ Maxx which entails the leak of 45.7 million credit and debit<br />

account details. Moreover, <strong>in</strong> order to help the protection of sensitive data, Fowler<br />

(2009) po<strong>in</strong>ts to the legislation and regulations deal<strong>in</strong>g with data breach issues. For<br />

<strong>in</strong>stance, the Payment Card Industry (PCI) necessitates organizations to employ<br />

control actions towards sensitive data and Senate Bill 1386 (SB – 1386, commonly<br />

known as “The California Security Breach Information Act”) forces companies to<br />

40

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!