23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ix<br />

3.2.2.2 The POS Entity Security Risk ................................................... 61<br />

3.2.2.3 The BIS Security Risk ............................................................... 61<br />

3.2.2.4 Human Actors ............................................................................ 62<br />

3.2.3 Case Study ................................................................................................. 64<br />

3.2.4 Descriptive Method .................................................................................... 64<br />

3.2.5 Research Overview .................................................................................... 65<br />

3.2.6 Research Question ..................................................................................... 66<br />

3.2.7 Hypotheses ................................................................................................. 66<br />

3.2.8 Data Map ................................................................................................... 68<br />

3.3 Data Requirements ..................................................................................................... 69<br />

3.3.1 System Design ........................................................................................... 69<br />

3.3.2 Data Generation or Attack Case Scenario ................................................. 71<br />

3.3.3 <strong>Investigation</strong> Scenario ................................................................................ 72<br />

3.3.4 Data Collection .......................................................................................... 73<br />

3.3.5 Data Process<strong>in</strong>g .......................................................................................... 75<br />

3.3.6 Data Analysis ............................................................................................. 76<br />

3.3.7 Data Presentation ....................................................................................... 77<br />

3.4 Limitations ................................................................................................................. 78<br />

3.5 Expected Outcomes ................................................................................................... 80<br />

3.6 Conclusion ................................................................................................................. 80<br />

Chapter 4 – Research F<strong>in</strong>d<strong>in</strong>gs<br />

4.0 Introduction ................................................................................................................ 82<br />

4.1 Variations Encountered <strong>in</strong> Experiment ...................................................................... 83<br />

4.1.1 System Design ........................................................................................... 83<br />

4.1.2 Data Generation or Attack Case Scenario ................................................. 85<br />

4.1.3 <strong>Investigation</strong> Case Scenario ....................................................................... 85<br />

4.1.4 Data Collection .......................................................................................... 85<br />

4.1.5 Data Process<strong>in</strong>g .......................................................................................... 87<br />

4.1.6 Data Analysis ............................................................................................. 88<br />

4.1.7 Data Presentation ....................................................................................... 88<br />

4.2 Report of the Collected Data ...................................................................................... 88

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!