23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

In addition, the eight different DFI roles are classified <strong>in</strong>to different layers that are<br />

“<strong>in</strong>terconnected to each other through sets of six categories of questions namely:<br />

What (the data attribute), Why (the motivation), How (the procedures), Who (the<br />

people), Where (the location), and When (the time)” (Ieong, 2006, p. S32).<br />

Figure 3.7: Process flow between the roles <strong>in</strong> digital forensics <strong>in</strong>vestigation (Ieong, 2006,<br />

p. S32)<br />

Even though there are eight different roles for DFI processes, the author (Ieong,<br />

2006) also mentions that some of the roles may be managed by the same person (for<br />

<strong>in</strong>stance; legal advisor and prosecutor roles, or forensics <strong>in</strong>vestigator and forensics<br />

analyst roles). Furthermore, the flow of procedures among different roles <strong>in</strong> DFI (as<br />

shown <strong>in</strong> Figure 3.7) is also discussed <strong>in</strong> detail (Ieong, 2006, p. S31-S33).<br />

Afterwards, the author illustrates the FORZA framework by apply<strong>in</strong>g it to an<br />

assumed case <strong>in</strong> which a corporate web system is hacked. In conclusion, Ieong (2006,<br />

p. S36) expla<strong>in</strong>s how “the FORZA framework will be formulated as a semi-automatic<br />

<strong>in</strong>vestigation toolbox” that would allow the forensics <strong>in</strong>vestigators to carry out “fast<br />

and zero-knowledge data acquisition”, as a future work.<br />

55

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!