دورية أكاديمية

Forensic Investigation of Remnant Data on USB Storage Devices Sold in New Zealand

التفاصيل البيبلوغرافية
العنوان: Forensic Investigation of Remnant Data on USB Storage Devices Sold in New Zealand
المؤلفون: Zawar Shah, Arkar Kyaw, Hong Phat Truong, Imdad Ullah, Andrew Levula
المصدر: Applied Sciences, Vol 12, Iss 12, p 5928 (2022)
بيانات النشر: MDPI AG, 2022.
سنة النشر: 2022
المجموعة: LCC:Technology
LCC:Engineering (General). Civil engineering (General)
LCC:Biology (General)
LCC:Physics
LCC:Chemistry
مصطلحات موضوعية: forensic investigation, computer crime, digital devices, data leakage, data security, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
الوصف: The digital forensic tools used by law enforcement agencies for forensic investigations are mostly proprietary and commercially expensive; although open-source tools are used, the investigations conducted with such tools are not verified by reputable organisations, and hence, users are reluctant to practice such tools. To address this issue, we experimentally evaluate three open-source forensic tools based on various requirements recommended by the National Institute of Standards and Technology (NIST) framework for forensic investigation. The experimental setup consists of a forensic workstation, write-blocker, and purchased USB hard drives investigated via digital forensic imaging tools, i.e., DC3DD, DCFLDD, and Guymager. We create various test cases, which distribute USB hard drives in different groups and investigate the functional and optional requirements of NIST along with recovering and analysing remnant data. We evaluate these forensic tools by analysing the log information, following, anonymously (to ensure that data were not disclosed or misused during or after the investigations) collecting, examining, and classifying the remnant data restored from the USB hard drives. We observe that the percentage of hardware resources usage and the processing time of each tool are remarkably different, e.g., Guymager was the fastest tool and met all the functional requirements in each test case, but it utilised more CPU and memory resources than DC3DD, DCFLDD. We note that 88.23% of the USB hard drives contained sensitive personal or business information (e.g., personal photos, bank transactions, and contracts). Subsequently, the remnant data analysis shows that consumers in New Zealand are unaware of personal data security and the associated vulnerabilities of data leakages.
نوع الوثيقة: article
وصف الملف: electronic resource
اللغة: English
تدمد: 2076-3417
العلاقة: https://www.mdpi.com/2076-3417/12/12/5928Test; https://doaj.org/toc/2076-3417Test
DOI: 10.3390/app12125928
الوصول الحر: https://doaj.org/article/96963ff272cf4e9ba575d76bddf02b77Test
رقم الانضمام: edsdoj.96963ff272cf4e9ba575d76bddf02b77
قاعدة البيانات: Directory of Open Access Journals
الوصف
تدمد:20763417
DOI:10.3390/app12125928