23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

After analyz<strong>in</strong>g the report on the 12 th of October 2010, the adm<strong>in</strong>istrator f<strong>in</strong>ds out the<br />

product database has been changed, accord<strong>in</strong>g to the changes <strong>in</strong> MD5 hashes of the<br />

databases and all the values of SI are changed to $600.00. Thus, the changes on the<br />

values of SI are unusual as different products <strong>in</strong> the shop are tagged with different<br />

prices (see Section 3.3.1 and Appendix 8).<br />

So, the adm<strong>in</strong>istrator escalates the event‟s priority and reports it to the<br />

<strong>in</strong>cident response team. Then, the report is reviewed and the forensic <strong>in</strong>vestigation is<br />

<strong>in</strong>itiated by the first responder or forensic <strong>in</strong>vestigator.<br />

3.3.4 Data Collection<br />

Generally, the ma<strong>in</strong> digital evidence can be collected from the target system of<br />

<strong>in</strong>terest as the digital evidence can be found <strong>in</strong> several different areas of target system<br />

(Zhang & L<strong>in</strong>, 2010). The very first step needs to be performed by the first responder<br />

or forensic <strong>in</strong>vestigator is to identify and acquire the evidence. There are various<br />

procedures that need to be followed. The procedures are followed <strong>in</strong> such a way that<br />

the evidence is acceptable to court of law. For <strong>in</strong>stance, the potential evidence must<br />

be identified and located. Similarly, the crime scene must be secured. So, the<br />

potential evidence of the compromised <strong>RFID</strong> BS will not be altered. Likewise, Britz<br />

(2009) stated that the preservation is also a part of seiz<strong>in</strong>g the evidence such as<br />

obta<strong>in</strong><strong>in</strong>g the warrant, plann<strong>in</strong>g the seizure, secur<strong>in</strong>g the crime scene, identify<strong>in</strong>g,<br />

locat<strong>in</strong>g, documentation and transportation of the evidence, <strong>in</strong> the real world.<br />

As stated <strong>in</strong> Section 3.2.1, the live forensic acquisition method will be used to<br />

collect all the potential evidence from the compromised <strong>RFID</strong> BS of the retail shop.<br />

Hence, the potential evidence data will be identified and acquired from several<br />

different locations such as the services, entities and sub-systems of the Bus<strong>in</strong>ess<br />

System architecture (see Table 2.5 <strong>in</strong> Section 2.3) of a compromised <strong>RFID</strong> stock<br />

management system.<br />

Therefore, after the identification of the evidence at the crime scene dur<strong>in</strong>g the<br />

<strong>in</strong>vestigation; the <strong>in</strong>vestigator will acquire the log files <strong>in</strong>clud<strong>in</strong>g reader‟s memory<br />

logs, server transaction logs, volatile and non-volatile artifacts of the SQL Server<br />

data, random access memory (RAM) of POS and the like on the live target operation<br />

73

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!