23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>in</strong>creased when social eng<strong>in</strong>eer<strong>in</strong>g or human factor is added <strong>in</strong>to the mix (Q<strong>in</strong><br />

& Burgoon, 2007).<br />

The social eng<strong>in</strong>eer is able to extract <strong>in</strong>formation that may provide<br />

precision <strong>in</strong> an attack and also leave less digital evidence. The perpetrator also<br />

requires less technical knowledge and can execute a social control strategy<br />

(Samani, 2010). The common approaches of impersonat<strong>in</strong>g roles, such as<br />

friend, colleague, technician, authority figure, and so on, are less effective than<br />

an employee compromis<strong>in</strong>g the Bus<strong>in</strong>ess System. In this way the exact and<br />

sensitive <strong>in</strong>formation regard<strong>in</strong>g the SI <strong>Tag</strong>s, the POS processes and the BIS<br />

architecture may be disclosed. The technical security measures such as release<br />

mechanisms and encryption are generally reliable, robust and effective<br />

controls. However, the people who specify, build, use, and manage the<br />

Bus<strong>in</strong>ess System can be persuaded <strong>in</strong>to overrid<strong>in</strong>g the control system. Social<br />

eng<strong>in</strong>eer<strong>in</strong>g is a powerful technique for ga<strong>in</strong><strong>in</strong>g unauthorized access to<br />

confidential proprietary or personal <strong>in</strong>formation. The risk to the Bus<strong>in</strong>ess<br />

System is escalated by drip feed ga<strong>in</strong>s where an attacker starts with publicly<br />

available <strong>in</strong>formation and then leverages the knowledge for social<br />

relationships and escalat<strong>in</strong>g ga<strong>in</strong>s of sensitive <strong>in</strong>formation. The approach<br />

<strong>in</strong>cludes coercion (eg. blackmail) and different sequenced w<strong>in</strong>-loss situations<br />

for a targeted <strong>in</strong>ternal customer (current or former). The soft edge of profil<strong>in</strong>g<br />

trivial <strong>in</strong>cludes casual gossip and rumors, and the frame <strong>in</strong>ternal procedures,<br />

roles and responsibilities.<br />

The system impact of successful social eng<strong>in</strong>eer<strong>in</strong>g has consequences<br />

over a range of bus<strong>in</strong>ess performance <strong>in</strong>dicators. In our study we are<br />

pr<strong>in</strong>cipally concerned with theft and hence the additional risk social<br />

eng<strong>in</strong>eer<strong>in</strong>g has for Bus<strong>in</strong>ess System violation. Loss of <strong>in</strong>tegrity, trust, system<br />

utility and other collateral damages caused by successful social eng<strong>in</strong>eer<strong>in</strong>g<br />

fall outside of the <strong>in</strong>terest of this thesis. The <strong>in</strong>terest focuses on crim<strong>in</strong>al<br />

activity and the potential to collect robust digital evidence.<br />

63

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!