23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

SQL statement from the SQL <strong>in</strong>jection attack code <strong>in</strong> order to verify which specific<br />

Server data was compromised. To conclude, the forensic <strong>in</strong>vestigator could be able to<br />

verify that any SQL Server data was undisclosed by utiliz<strong>in</strong>g SQL Server forensics.<br />

In the second case scenario, Fowler (2009) gives an example of a malicious<br />

employee who made unauthorized changes <strong>in</strong> a company‟s database (500 gigabytes<br />

capacity). The changes are considered to be done with<strong>in</strong> the onl<strong>in</strong>e sales database,<br />

especially on “the bill<strong>in</strong>g amounts of the customer’s order” and hence “the<br />

traditional forensic <strong>in</strong>vestigation is performed” (Fowler, 2009, p. 52). After<br />

<strong>in</strong>vestigation, the forensic exam<strong>in</strong>er concludes that the unhappy employee logs on to<br />

the database server after office hours for a few nights and the transactions done<br />

dur<strong>in</strong>g that time seems to be abnormal. But, the <strong>in</strong>vestigator cannot verify whether<br />

the modification of data by a suspicious employee is authorized and what the extent<br />

of the <strong>in</strong>cident is. Thus, Fowler (2009) mentions that the forensic <strong>in</strong>vestigator who<br />

<strong>in</strong>itiates SQL Server forensics can verify that a breach of security <strong>in</strong>cident has<br />

happend, prove the malicious activity caus<strong>in</strong>g database changes without authorized<br />

permission, and confirm the user who carried out those changes. However, the<br />

<strong>in</strong>vestigator has to apply “the data reduction pr<strong>in</strong>ciples to reduce the amount of data<br />

to be acquired and analysed” due to the large capacity of the database (Fowler, 2009,<br />

p. 52).<br />

Figure 3.3: Scenario 2 illustration (Fowler, 2009, p. 53)<br />

43

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!