23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

can also be found not only <strong>in</strong> the database‟s cache and procedure cache, but also can<br />

be traced <strong>in</strong> the memory. Referr<strong>in</strong>g to the Microsoft SQL Server Book onl<strong>in</strong>e,<br />

“SQL Server logs certa<strong>in</strong> system events and user-def<strong>in</strong>ed events to the<br />

SQL Server error log and the Microsoft W<strong>in</strong>dows application log.<br />

Both logs automatically timestamp all recorded events. Use the<br />

<strong>in</strong>formation <strong>in</strong> the SQL Server error log to troubleshoot problems<br />

related to SQL Server.<br />

The W<strong>in</strong>dows application log provides an overall picture of events<br />

that occur on the W<strong>in</strong>dows operat<strong>in</strong>g system, as well as events <strong>in</strong> the<br />

SQL Server and SQL Server Agent....” (http://msdn.microsoft.com/en-<br />

us/library/ms191202.aspx; 2010, p. 1)<br />

The researchers mention that the valuable <strong>in</strong>formation to the forensic <strong>in</strong>vestigator can<br />

be found <strong>in</strong> the SQL Server error logs and the W<strong>in</strong>dows application logs, although<br />

the duplication of log data exist <strong>in</strong> those two locations. However, the log <strong>in</strong> the SQL<br />

Server can easily be erased by the users who have got the adm<strong>in</strong>istrative rights or<br />

privileges. Even though there are events such as failed log<strong>in</strong> attempts, some database<br />

console commands (DBCC) captured by the SQL Server error and W<strong>in</strong>dows<br />

application logs, more evidence is required for the forensic <strong>in</strong>vestigation that has to<br />

be found somewhere <strong>in</strong> order to identify the structure of the database, the changes<br />

that are made to the data and the like. In addition to error and application logs, the<br />

SQL default trace and transaction logs are critical components of f<strong>in</strong>d<strong>in</strong>g evidence <strong>in</strong><br />

a potential data breach, as data modifications made by every transaction are recorded<br />

with timestamps. But Cerrudo (2009) also states that the extended stored procedure<br />

executions, SELECT and DBCC statements cannot be found <strong>in</strong> the transaction log.<br />

But <strong>in</strong> some cases, the critical evidence can also be found <strong>in</strong> the contents of the SQL<br />

server memory (data and procedure caches).<br />

F<strong>in</strong>ally, Cerrudo (2009) discusses “SQL server anti-forensic techniques”, the<br />

protection of an audit trail and evidence when the system is compromised.<br />

52

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!