23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Software‟s EnCase <strong>Forensics</strong> Tra<strong>in</strong><strong>in</strong>g (Version 6.16.1) software on the forensic test-<br />

station. By do<strong>in</strong>g so, the <strong>in</strong>tegrity of the orig<strong>in</strong>al evidence will not be compromised<br />

due to the residual data from the flash drive. Hence the preservation of the artefacts<br />

will be ma<strong>in</strong>ta<strong>in</strong>ed dur<strong>in</strong>g the data collection phase.<br />

Figure 3.12: An Example of Us<strong>in</strong>g the Trusted md5deep Hash<strong>in</strong>g Algorithm for<br />

3.3.5 Data Process<strong>in</strong>g<br />

Preservation<br />

After the collection of potential evidence data from the entities of compromised <strong>RFID</strong><br />

BS, the <strong>in</strong>vestigator has to transport and stored the acquired evidence <strong>in</strong> a secured<br />

location <strong>in</strong> order to ma<strong>in</strong>ta<strong>in</strong> the <strong>in</strong>tegrity, reliability, and creditability (Ieong, 2006;<br />

Zhang & L<strong>in</strong>, 2010).<br />

Similarly, as part of the data process<strong>in</strong>g; all the acquired data (Section 3.3.4)<br />

will be copied <strong>in</strong> a forensically sound manner by us<strong>in</strong>g the hardware write blocker<br />

(Tableau Forensic USB Bridge) that will be attached to the forensic workstation <strong>in</strong><br />

order to preserve the <strong>in</strong>tegrity of the collected evidence data dur<strong>in</strong>g the forensic<br />

<strong>in</strong>vestigation. In fact, the <strong>in</strong>vestigator will only use a forensic copy of the acquired<br />

digital evidence dur<strong>in</strong>g analysis phase of the <strong>in</strong>vestigation. Only the way <strong>in</strong> which<br />

perform<strong>in</strong>g analysis on a forensic copy of acquired digital evidence data can ma<strong>in</strong>ta<strong>in</strong><br />

the <strong>in</strong>tegrity and security of the evidence.<br />

Furthermore, the format conversion of the orig<strong>in</strong>al collected evidence files will be<br />

done if required. For <strong>in</strong>stance, as stated <strong>in</strong> Section 3.1.4; the transaction log files and<br />

75

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!