Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

DIGITAL FORENSIC:A PANACEA FOR EVIDENCE PRESERVATION

Digital Forensic is the preservation, identification, recovery, documentation, analysis, and interpretation of digital evidence. Digital evidences are electronically stored records, facts, signs, information of probative value that shows clearly that an event occurred or that a crime has been committed. Preservation of Digital Evidence is the crux of Digital Forensics. As such, it must be handled in a way to ensure that it is promptly identified, preserved, collected, examined, analyzed and documented appropriately so that it is evidently weighty, authentic, reliable, believable, complete and that it passes the test of legal admissibility. Evidence Preservation is being constantly plagued with issues needed to be technically, administratively and legally resolved. Of which is, the rate of standardization of Digital Forensics Processes, particularly evidence preservation, by International standardizing bodies is slower than the challenges and continuously evolving digital technology. Consequently, Proactive, Sustained and Non-fragmented Research and Practitioner Communities must be established, where they do not exist and also supported by national and regional standardization organizations, to see to faster and up-to-date solutions. Such communities have greatly helped to sustain continuous growth and standardization in other fields such as software engineering, web frameworks, and mobile technology. A consolidated framework, the Enhanced Generic Digital Forensic Investigation Model (EGDFIM), is proposed in this work.

DIGITAL FORENSIC:A PANACEA FOR EVIDENCE PRESERVATION A Project Presented to the School of Science & Technology, Nigerian National Open University, Lagos, Nigeria. In Partial Fulfilment of the Requirements for the Degree of Master of Science In Information Technology OJEDIRAN, Alaba Bolaji (NOU120101902) November, 2014. OJEDIRAN ALABA BOLAJI Approval Page This is to approve and attest to the originality of this research report carried out by OJEDIRAN ALABA BOLAJI. In my own opinion, it is adequate both in scope and quality as a project for the award of the degree of Masters of Science in Information Technology, by the School of Science and Technology, National Open University. Dr Oyelade Jelili Supervisor .….…………………….…………………………….. Date and Signature Head of Department ……………………….. .….…………………….… Date and Signature External Examiner ……………………….. .….…………………….… Date and Signature Dean of the Faculty ……………………….. .….…………………….… Date and Signature OJEDIRAN ALABA BOLAJI Dedication I dedicate this research work to God Almighty, for the wisdom and insight given to me, and also to my best friend and wife, Bolanle and my lively son, Samuel and beautiful daughter, Oluwakayowa. You are all precious to me. OJEDIRAN ALABA BOLAJI Acknowledgements My unreserved appreciation and acknowledgement goes to my supervisor, mentor and teacher, Dr. Jelili Oyelade, for his untiring support, tutoring and inspiration for this work. Also, my profound gratitude goes to my entire family, my colleagues at the Data Processing Unit of Lagos State University, Ojo. To my mentor and teacher – Dr. Moses Adebowale Akanbi, Sir your motivation and drill is responsible for me going this far. I also appreciate the input and intelligent interaction with my colleagues at the Forensic Focus Community, CyberinfoCTS Ethical Hackers and Security Community-Deborah, keep up the good work. OJEDIRAN ALABA BOLAJI Abstract Digital Forensic is the preservation, identification, recovery, documentation, analysis, and interpretation of digital evidence. Digital evidences are electronically stored records, facts, signs, information of probative value that shows clearly that an event occurred or that a crime has been committed. Preservation of Digital Evidence is the crux of Digital Forensics. As such, it must be handled in a way to ensure that it is promptly identified, preserved, collected, examined, analyzed and documented appropriately so that it is evidently weighty, authentic, reliable, believable, complete and that it passes the test of legal admissibility. Evidence Preservation is being constantly plagued with issues needed to be technically, administratively and legally resolved. Of which is, the rate of standardization of Digital Forensics Processes, particularly evidence preservation, by International standardizing bodies is slower than the challenges and continuously evolving digital technology. Consequently, Proactive, Sustained and Non-fragmented Research and Practitioner Communities must be established, where they do not exist and also supported by national and regional standardization organizations, to see to faster and up-to-date solutions. Such communities have greatly helped to sustain continuous growth and standardization in other fields such as software engineering, web frameworks, and mobile technology. A consolidated framework, the Enhanced Generic Digital Forensic Investigation Model (EGDFIM), is proposed in this work. OJEDIRAN ALABA BOLAJI TABLE OF CONTENTS Signature Page .................................................................................................... ii Dedication ........................................................................................................... iii Acknowledgements ........................................................................................... iv Abstract ............................................................................................................... v Keywords ........................................................................................................... ix List of Tables ..................................................................................................... x List of Figures .................................................................................................... xi CHAPTER ONE: INTRODUCTION............................................................. 1 1.1 Background of the Study ................................................................... 1 1.2 Research Problem and Objectives ..................................................... 6 1.3 Objective of the Study ....................................................................... 7 1.4 Significance of the Study .................................................................. 7 1.5 Organization of Work ........................................................................ 8 CHAPTER TWO: LITERATURE REVIEW ............................................... 9 2.1 Background……………………………………………………….…. 9 2.2 Reviews of the Development of Digital Forensics Investigation Model.....12 2.2.1 Computer Forensic Investigative Process ........................... 13 2.2.2 DFRWS Investigative Model ............................................. 13 2.2.3 The Integrated Digital Investigation Model (IDIP) ........... 15 2.2.3.1 Readiness Phase ………………………………….15 2.2.3.2 Deployment Phase …………....………………….16 2.2.3.3 Physical Crime Scene Investigation Phase …...….16 OJEDIRAN ALABA BOLAJI 2.2.3.4 Digital Crime Scene Investigation Phase …..…….17 2.2.4 Enhanced Digital Investigation Process Model (EDIP) ..... 19 2.2.4.1 Readiness Phases... ................................................ 20 2.2.4.2 Deployment Phases... ............................................ 20 2.2.4.3 Traceback Phases... ............................................... 21 2.2.4.4 Dynamite Phases... ................................................ 22 2.2.4.5 Review Phases... .................................................... 22 2.2.5 Abstract Digital Forensics Model (ADFM) ....................... 23 2.2.6 Digital Forensic Model based on Malaysian Investigation Process…..26 2.2.7 Scientific Crime Scene Investigation Model ...................... 27 2.2.8 End to End Digital Investigation ........................................ 28 2.2.9 Extended Model of Cybercrime Investigation .................... 28 2.2.10 A HOB Framework for the Digital Investigations Process…....29 2.2.11 Framework for a Digital Forensic Investigation ............... 29 2.2.12 Computer Forensics Field Triage Process Model ............ 30 2.2.13 Common Process Model for Incident and Computer Forensics ……31 2.2.14 Dual Data Analysis Process ............................................. 31 2.2.15 Network Forensic Generic Process Model ....................... 32 2.3 Identifying the Common Phases of the Models ................................ 33 2.4 Generic Computer Forensic Investigation Model (GCFIM) ............. 37 2.5 Literature Summary ........................................................................... 41 CHAPTER THREE: RESEARCH METHODOLOGY ............................... 42 OJEDIRAN ALABA BOLAJI 3.1 Grounded Theory............................................................................... 43 3.2 Research Methods ............................................................................. 45 3.2.1 Grounded Theory Methods .........................................….....45 CHAPTER FOUR: RESEARCH MODEL.................................................... 48 4.1 The Proposed Model.......................................................................... 48 4.2 Most Important Factors in a Digital Forensic Model ........................ 53 4.2.1 Cost... ................................................................................... 54 4.2.2 The Administration ............................................................. 54 4.2.3 Technical issues .................................................................. 55 4.2.4 Legal issues …………………………..…………………... 55 4.3 Enhanced Generic Digital Forensic Investigation Model (EGDFIM)....... 56 4.4 Applying the EGDFIM Model .......................................................... 59 CHAPTER FIVE: DISCUSSIONS AND CONCLUSIONS ......................... 63 REFERENCES ................................................................................................. 65 OJEDIRAN ALABA BOLAJI Keywords Digital Forensic, Evidence Preservation, Digital Forensic Model, Digital Investigation Process, Forensic Framework, Digital Evidence OJEDIRAN ALABA BOLAJI List of Tables Table 2.1: List of the examined Models ............................................................. 33 Table 2.2: Common Phases of the examined Models ....................................... 34 Table 2.3: Generic Phases .................................................................................. 37 Table 2.4: Phase expansion of GCFIM .............................................................. 49 OJEDIRAN ALABA BOLAJI List of Figures Figure 2.1: Computer Forensic Investigative Process ........................................ 13 Figure 2.2: DFRWS Investigative Model ........................................................... 13 Figure 2.3: Phases of the IDIP Model ............................................................... 14 Figure 2.4: Enhanced Digital Investigation Process Model .............................. 18 Figure 2.5: Abstract Digital Forensics Model ................................................... 22 Figure 2.6: DFMMIP Model .............................................................................. 24 Figure 2.7: SCSI ................................................................................................ 25 Figure 2.8: EEDI Model .................................................................................... 26 Figure 2.9: EMCI Model .................................................................................... 26 Figure 2.10: HOBF Model ................................................................................. 27 Figure 2.11: FDFI Model ................................................................................... 27 Figure 2.12: Computer Forensics Field Triage Process Model ......................... 28 Figure 2.13: CPMICF Model ............................................................................ 29 Figure 2.14: DDAP Model ................................................................................ 29 Figure 2.15: NFGP Model ................................................................................. 30 Figure 2.16: Generic Computer Forensic Investigation Model (GCFIM) ........ 38 Figure 4.1: Process Flow between the Roles in Digital Forensics Investigation….....53 Figure 4.2: Most Important Factors in a Digital Forensic Model ..................... 54 Figure 4.3: Enhanced Generic Digital Forensic Investigation Model (EGDFIM) .............. 57 OJEDIRAN ALABA BOLAJI OJEDIRAN ALABA BOLAJI CHAPTER ONE INTRODUCTION The term ‘forensic’ is derived from the Latin word ‘forensis’ and it refers to of or before the forum. “In Roman times, a criminal charge meant presenting the case before a group of public individuals in the forum. Both the person accused of the crime and the accuser would give speeches based on their sides of the story. The individual with the best argument and delivery would determine the outcome of the case”(Wikipedia, 2014) This alludes to the fact that, evidences and how well it’s been presented in a case, determine the outcome of the case. Obviously, that has mostly been the situation for centuries of court case and corporate investigation. 1.1. Background of the Study Since IBM introduced the PC to the world in 1981, down to these recent times, more records are being processed and stored digitally than on analog mediums. Computers have become an important part of our lives and as such are involved in almost everything we do from paying bills to space exploration. Government agencies now host online Open Data Portal as a data collection cum retrieval point, e.g. Edo State, Nigeria; Academic records from Educational Institutions are now stored electronically and are also accessible online too, e.g. Nigerian National Open University; and e-Governance is gaining ground daily as well. 1 OJEDIRAN ALABA BOLAJI As digital data are consistently growing in size and complexity and the amount of stored digital records is doubling at an estimated rate of every 18 to 24 months(NIJ, 2010), the majority of crimes committed today has digital component, e.g. Cybercrime, data theft, hacking, etc. However, when an individual is brought before the courts or summoned for corporate investigation, innocence or guilt is basically decided by testimonies and evidence. Of the two areas, the evidence is probably the most key area(Walker, 2007). The ISO 15489-1:2001 defines records as "information created, received and maintained as evidence and information stored by an organization for legal obligations or in the transaction of business"(Gingrande, 2013). By the above definition, we could infer that all records are evidence. Computer Forensic is frequently used interchangeably with Digital Forensic, but their exit some representative differences between them. The term Computer Forensic would conveniently represent forensic of all types of computer systems and their peripheral devices. Meanwhile, Digital Forensic covers not only computers and their peripherals, but also mobile devices, cell phones, PDAs, Game Consoles, Kindles, Network devices, and Cloud computing. For almost two decades, the field of digital forensics has greatly been helpful in identifying, preserving, recovery, validating, acquisition, examination, analysis, and interpretation of digitally stored records. 2 documentation, OJEDIRAN ALABA BOLAJI “While dictionary definitions of ‘forensics’ typically specify legal processes, it is also used (to some extents metaphorically) to allude to the notion of exhaustive investigation and argument”(John, 2012). Though the Digital Forensic Research Workshop (DFRWS) of 2001, defined digital forensic as the use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations (Palmer, 2001). Digital forensics is not concerned mainly about computers and computer networks, but is rather mainly concerned with forensic procedures, rule of evidence and other legal processes as they pertain to computers and computer networks(Vacca, 2005). Digital evidences are electronically stored records, facts, signs, information of probative value that shows clearly that an event occurred or that a crime has been committed. The use of digital evidence has increased in the past few decades as courts have allowed the use of e-mails, digital photographs, ATM transaction logs, word processing documents, instant message histories, files saved from accounting programs, spreadsheets, internet browser histories, databases, the contents of computer memory, computer backups, computer printouts, Global Positioning 3 OJEDIRAN ALABA BOLAJI System tracks, logs from a hotel’s electronic door locks, and digital video or audio files(Casey, 2009). In recognition of digital involvement in our daily life, with to regards law enforcement and judiciary pursuit, the Evidence Act 2011 (also referred to as the Act) which introduces the "Admissibility of Statements in Documents Produced by Computers", has become enforced on June 3rd, 2011 when it received the assent of President Goodluck Jonathan of the Federal Republic of Nigeria. Thus, evidences obtained from computers, mobile phones and other electronic gadgets/devices are now admissible in the Nigeria’s law courts. Apart from the use of digital evidence for legal cases, corporate organisations are also faced with the need to preserve evidence of actions/records for Disaster Recovery or Business Contingency Plan, so as to make their organisation proofed against unanticipated and anticipated catastrophic incidence, and even more serious, incidence whose occurrence threatens the continued existence of the organisation. However, the cost of preserving digital evidence is high and organisations are faced with the tough decision of formulating enabling policies and committing their scarce resources to ensure the appropriate preservation of digital evidence or to channel these scarce resources only to their core business. Nevertheless, if they decided to commit some of their resources to preserving digital evidence, they expect the return on such investment to be optimal, in terms of adopting a consolidated solution that will preserve evidences for Investigative Process, Regulatory Obligation, Disaster Recovery or Business Contingency Plan and Daily Transactions. 4 OJEDIRAN ALABA BOLAJI Thus, Peter Sommer in (Sommer, 2012), advocated that we embed into our regular investigative processes, the specific skills and resources needed to handle evidence in digital form. Though, the types of evidence that an organization may need to collect and the methods that it uses to carry out the acquisition emerges from the risk analysis carried out, but unfortunately, “regular risk analysis often fails to identify the types of evidence that could and should be captured”(Sommer, 2012). Likewise, to store all digital records as digital evidences generated in the course of our planned and unplanned operations, will amount to an unrealistic storage burden, with a high probability of unusable content. Despite this conundrum, a systematic framework must be developed and adopted to effectively identify the type of digital evidences that should be captured amongst the torrent of digital records that are generated daily in the course of our planned and unplanned operations. Other challenges that ensue apart from the ones stated above are: identifying the sources of the evidences, preserving identified evidences, Legal approval and constraints in evidence acquirral, determining who to collect & how to collect digital evidences and the pattern of analysing the potential digital evidences identified. ‘Digital preservation is concerned with the sustainability of digital information, notably the resilience and perceptibility of digital objects in the long term’(John, 2012). 5 OJEDIRAN ALABA BOLAJI One of the tenets of digital forensics is to assure that the original media is not altered, and the methods used to create forensic quality copies of meta data, assures that the integrity of the original is maintained(Crim, 2006). From the above paragraph, it is obvious that the quality of digital evidence hinges on the processes of Digital Forensic used to obtain, preserve and analyze it. However, “Digital Forensics as a Discipline is the Bridge from Computer Science to Judicial Science. This creates risks for both the administration of justice and confidence in the discipline of digital forensics and computer science. Thus, there are perils that must be identified and addressed”(Losavio, 2010). 1.2 Research Problem and Objectives The research problem of the study is stated as follows: How can Digital Forensic processes ensure that Digital Evidences involved, are preserved? In order to venture in solving the main research problem, the research problem is further divided into three sub-questions, the sub-questions are: 1. What is the relationship between Digital Forensic Process and Digital Evidence Preservation? 2. How should a Digital Forensic process be structured and executed to ensure that digital evidences are preserved? 3. Is it possible to have a Consolidated Digital Evidence Preservation Framework that can fit into any Digital Forensic Model? 6 OJEDIRAN ALABA BOLAJI 1.3 Objective of the Study The main objective of the research is to: Identify the key factors that a Digital Forensic Process Model must have to ensure that digital evidence involved, is effectively preserved. This objective can be reached by first dealing with the research problem subquestions. The objectives related to the sub-questions are 1. To extract the basic relationship between digital forensic process and digital evidence preservation. 2. To identify the factors within a digital forensic process that ensures that digital evidences are preserved throughout the process. 3. To construct a framework from the factors identified in (2) above, and use the framework to analyze different Digital Forensic Models for improvement or further development. Based on the knowledge gained from answering the sub-questions, the main research question can be answered and the main objective reached. 1.4 Significance of the Study The study is significant, as the resultant consolidated framework, will be very useful for the application to Digital Forensic Investigation as well as an application outside of criminal or legal investigation and computer security. 7 OJEDIRAN ALABA BOLAJI 1.5 Organization of Work This research work will start by introducing the historical background of the study in the first Chapter called Introduction. Also, in this Chapter the problems to be solved is also stated. This will be followed by the second Chapter to review literatures on our research. The Research Methodology will then be presented in the third chapter, to lay out the plan of the researcher’s investigation, aimed at identifying factors and relationship between these factors in a Digital Forensic Process aimed at obtaining evidence therein. The Grounded Theory will be used as the choice methodology during the course of the research project” The fourth chapter will be on the Implementation and Evaluation of the researcher’s investigation and an Enhanced Generic Digital Forensic Investigation Model (EGDFIM) will be proposed in this chapter. This is an improvement on the Generic Computer Forensic Investigation Model (GCFIM) proposed by Yunus Yusoff, Roslan Ismail and Zainuddin Hassan(Yusoff, Ismail, & Hassan, 2011), which is itself a distillation of several digital forensic investigation models. The last chapter, the fifth chapter, will present the researcher’s conclusions, recommendations and suggestion(s) for future research 8 OJEDIRAN ALABA BOLAJI CHAPTER TWO LITERATURE REVIEW 2.1 Background Though, several definitions have been given in the previous chapter above, it will be useful to evaluate Digital Forensic in the context of this work. (Nikkel, 2006) defined digital forensic as the use of scientifically derived and proven methods toward the identification, preservation, collection, validation, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations. While the definition above is comprehensive, it is useful to consider another. In 2001, at the first meeting of the Digital Forensics Research Workshop (DFRWS), the following was adopted as a definition for digital forensics: The use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations(Palmer, 2001). These two definitions above clearly articulates the steps that sums up the Digital Forensic process and also with it, stipulates that these processes are scientifically derived and proven for the purpose of preserving digital evidences involved in a 9 OJEDIRAN ALABA BOLAJI Digital Forensic Investigation in order to reconstruct the events involved that is found to be criminal or disruptive to planned actions. We must note that Digital Forensic processes are not just for criminal investigations, but also for examining the disruption of planned action which may not be caused directly or indirectly by a person or machine, criminally oriented or not. The above paragraphs highlight one of the problems examined in this work, which is to examine the relationship between Digital Forensic and Digital Evidence Preservation. (Kaur & Kaur, 2012) stated that the way Digital Forensic Process is implemented has a direct impact on:  The prevention of further malicious events occurring against the intended “target".  The successful tracing back of the events that occurred which led to the crime, and determining the guilty parties involved.  Bringing the perpetrators of the crime to justice.  The improvement of current prevention mechanisms in place to prevent such an event from occurring again.  Improving standards used by corporate security professionals to secure their respective corporate networks.  How everyone “plugged" into this digital environment can increase their awareness about current vulnerabilities and prevention measures. Likewise, (Nikkel, 2006), statement that digital evidence as a data that support theory about digital events, agrees with Carrier and Spafford’s(Carrier & Spafford, 2003) 10 OJEDIRAN ALABA BOLAJI definition of digital evidence as a digital data that supports or refutes a hypothesis about digital events or the state of digital data. This definition includes evidence that may not be capable of being entered into a court of law, but may have investigative value(Ademu, Imafidon, & Preston, 2011). Evidence can be gathered from theft of or destruction of intellectual property, fraud, or anything else criminally related to the use of a digital device. Evidence which is also referred to as digital evidence is any digital data that can provide a significant link between the cause of the crime and the victim(Perumal, 2009). By examining the characteristics of Digital Evidence, that is, data of investigative value that is stored or transmitted by a digital device; it found to be fragile by nature, can be easily altered, damaged or destroyed by improper handling or improper examination, it is hidden in its natural state and cannot be know by the content in the physical object that holds such evidence(Ademu et al., 2011), It is clear that a Digital Forensic Investigative reports may be required to explain the examination process or model used and identify any limitation it posses by its application to the investigation been carried out(Mark M Pollitt, 2007). This has corroborated the fact that Digital Forensic process must be structured and executed in such a way to ensure that digital evidences involved are preserved accordingly. Thus leading us to review some of the numerous literatures that have contributed to the evolution and development of Digital Forensic Process Models. However, note that in this work, Digital Forensic Process Model is used interchangeably to Digital Forensic, Digital Forensic Model and Digital Forensic Investigation Model. 11 OJEDIRAN ALABA BOLAJI 2.2 Reviews of the Development of Digital Forensics Investigation Models Computer forensics can be traced back to as early as 1984 when the USA Federal Bureau of Investigation (FBI) laboratory and other law enforcement agencies begun developing programs to examine computer evidence The relationship between Digital Forensic and Digital Evidence Preservation is so intrinsic, as Digital Forensic heavily hinges on how digital evidences are treated, i.e. preserved, extracted, identified, stored, analyzed and presented and vice versa. However, in order to address the second research question, which is to find out how Digital Forensic processes are structured and executed to ensure that digital evidences are preserved, we would review some Digital Forensic Models with its embedded processors. There are a large number of literatures on Digital Forensic Models and it will be overwhelming to review all of them within the space allowed in this work. However, out of all these numerous literatures, we have selected some of them for review, based on divers’ representation of technology in the model and abstraction in presentation. These criteria were chosen to ensure that the models reviewed are not limited in application and that it could also fit in for use in present times as technology evolves daily irrespective of the geographical location or jurisdiction. They eventually selected models do not suggest that they are better than the other models that were not. 12 OJEDIRAN ALABA BOLAJI 2.2.1 Computer Forensic Investigative Process (1995) (M. M. Pollitt, 1995) has proposed a methodology for dealing with the digital evidence investigation so that the results to be scientifically reliable and legally acceptable. It comprises of 4 distinct phases. Figure 2.1 : Computer Forensic Investigative Process In Acquisition phase, evidence was acquired in an acceptable manner with proper approval from authority. It is followed by Identification phase whereby the tasks to identify the digital components of the acquired evidence and converting it to the format understood by human. The Evaluation phase comprises of the task to determine whether the components identified in the previous phase, is indeed relevant to the case being investigated and can be considered as a legitimate evidence. In the final phase, Admission, the acquired & extracted evidence is presented in the court of law. 2.2.2. DFRWS Investigative Model (2001) In 2001, the First Digital Forensics Research Workshop (DFRWS) (Palmer, 2001), proposed a general 13 OJEDIRAN ALABA BOLAJI Purpose digital forensic investigation process. It comprises of 6 phases. Figure 2.2: DFRWS Investigative Model(Palmer, 2001) DFRWS Investigative model started with an Identification phase, in which profile detection, System monitoring, audit analysis, etc., was performed. It is immediately followed by Preserving phase, involving tasks such as setting up a proper case management and ensuring an acceptable chain of custody. This phase is crucial so as to ensure that the data is collected free from contamination. The next phase is known as Collection, in which relevant data are being collected based on the approved methods utilizing various recovery techniques. Following this phase are two crucial phases, namely, Examination phase and Analysis phase. In these two phases, tasks such as evidence tracing, evidence validation, recovery of hidden/encrypted data, data mining, timeline, etc., were performed. The last phase is Presentation. Tasks related to this phase are documentation, expert testimony, etc. 14 OJEDIRAN ALABA BOLAJI 2.2.3 The Integrated Digital Investigation Model (IDIP) This investigation process was proposed by Carrier & Spafford (Carrier & Spafford, 2003) in 2003, with the intention to combine the various available investigative processes into one integrated model. The author introduces the concept of the digital crime scene which refers to the virtual environment created by software and hardware where digital evidence of a crime or incident exists. Phases of the IDIP Model The model organizes the process into five (5) phases, consisting all in all 17 components. Figure 2.3: Phases of the IDIP Model(Carrier & Spafford, 2003) 2.2.3.1 Readiness phases The goal of this phase is to ensure that the operations and infrastructure are able to fully support an investigation. It includes two phases: 1. Operations Readiness Phase; which ensures that human capacity is fully trained and equipped to deal with an incident when it occurs. 2. Infrastructure Readiness Phase; that ensures that the underlying infrastructure is sufficient enough to deal with incidents that come. For example equipment like video cameras and card readers being there and in good working condition. 15 OJEDIRAN ALABA BOLAJI 2.2.3.2 Deployment phases The purpose is to provide a mechanism for an incident to be detected and confirmed. It includes two phases: 1. Detection and Notification phase; where the incident is detected and then appropriate people notified. 2. Confirmation and Authorization phase; which confirms the incident and obtains authorization for legal approval to carry out a search warrant. 2.2.3.3 Physical Crime Scene Investigation phases The goal of these phases is to collect and analyse the physical evidence and reconstruct the actions that took place during the incident. It includes six phases:1. Preservation phase; which seeks to preserve the crime scene so that evidence can be later identified and collected by personnel trained in digital evidence identification. 2. Survey phase; that requires an investigator to walk through the physical crime scene and identify pieces of physical evidence. 3. Documentation phase; which involves taking photographs, sketches, and videos of the crime scene and the physical evidence. The goal is to capture as much information as possible so that the layout and important details of the crime scene are preserved and recorded. 4. Search and collection phase; that entails an in-depth search and collection of the scene is performed so that additional physical evidence is identified and hence paving the way for a digital crime investigation to begin. 5. Reconstruction phase; which involves organizing the results from the analysis done and using them to develop a theory for the incident. 16 OJEDIRAN ALABA BOLAJI 6. Presentation phase; that presents the physical and digital evidence to a court or corporate management. 2.2.3.4 Digital Crime Scene Investigation phases The goal is to collect and analyse the digital evidence that was obtained from the physical investigation phase and through any other future means. It includes similar phrases as the physical investigation phases, although the primary focus is on the digital evidence. The six phases are:1. Preservation phase; which preserves the digital crime scene so that evidence can later be synchronized and analysed for further evidence. 2. Survey phase; whereby the investigator transfers the relevant data from a venue out of physical or administrative control of the investigator to a controlled location. 3. Documentation phase; which involves properly documenting the digital evidence when it is found. This information is helpful in the presentation phase. 4. Search and collection phase; whereby an in-depth analysis of the digital evidence is performed. Software tools are used to reveal hidden, deleted, swapped and corrupted files that were used including the dates, duration, log file etc. Low-level time lining is performed to trace a user’s activity and identity. 5. Reconstruction phase; which includes putting the pieces of a digital puzzle together, and developing investigative hypotheses. 6. Presentation phase; that involves presenting the digital evidence that was found in the physical investigative team. 2.2.3.5 Review phase This entails a review of the whole investigation and identifies areas of improvement. 17 OJEDIRAN ALABA BOLAJI The IDIP model does well at illustrating the forensic process, and also conforms to the cyber terrorism capabilities(Rogers, Goldman, Mislan, Wedge, & Debrota, 2006), which require a digital investigation to address issues of data protection, data acquisition, imaging, extraction, interrogation, ingestion/normalisation, analysis and reporting. It also highlights the reconstruction of the events that led to the incident and emphasizes reviewing the whole task, hence ultimately building a mechanism for quicker forensic examinations. However, the IDIP model is open to some criticisms. First, despite encompassing all the earlier models, there is reason to question the IDIP model’s practicality. It for instance depicts the deployment phase which consists of confirmation of the incident as being independent of the physical and digital investigation phase. In practice however, it seems impossible to confirm a digital or computer crime unless and until some preliminary physical and digital investigation is carried out. Secondly, it does not offer sufficient specificity and does not, for instance, draw a clear distinction between investigations at the victim’s (secondary crime) scene and those at the suspect’s (primary crime) scene. Neither does it reflect the process of arriving at the latter. Since a computer can be used both as a tool and as a victim(Perumal, 2009), it is common for investigations to be carried out at both ends so that accurate reflections are made. Henry Lee(Ciardhuain, 2011) defines the primary crime scene as the place where the first criminal act occurred. The process of tracing back to it can be challenging when dealing with larger networks and in particular, the Internet(Perumal, 2009). 18 OJEDIRAN ALABA BOLAJI 2.2.4. Enhanced Digital Investigation Process Model (EDIP) (2004) As the name implies, this investigative model is based on the previous model, Integrated Digital Investigation Process (IDIP), as proposed by Carrier & Spafford. The Enhanced Digital Investigation Process Model, also known as EDIP (Baryamureeba & Tushabe, 2004), introduces one significant phase known as Traceback phase. This is to enable the investigator to trace back all the way to the actual devices/computer used by the criminal to perform the crime. Figure 2.4: Enhanced Digital Investigation Process Model(Baryamureeba & Tushabe, 2004) The investigation process started with Readiness phase and the tasks performed are the same as in IDIP. The second phase, Deployment phase, provides a mechanism for an incident to be detected and confirmed. It consists of 5 sub-phases namely Detection & Notification, Physical Crime Scene Investigation, Digital Crime Scene Investigation, Confirmation and lastly, Submission. Unlike DIP, this phase includes both physical and digital crime scene investigations and presentation of findings to legal entities (via Submission phase). In Traceback phase, tracking down the source crime scene, including the devices and location is the main objective. It is supported by two sub-phases, namely, Digital Crime Scene Investigation and Authorization 19 OJEDIRAN ALABA BOLAJI (obtaining approval to perform investigation and accessing information). Following Traceback phase is Dynamite phase. In this phase, investigation are conducted at the primary crime scene, with the purpose of identifying the potential culprit(s). Consist of 4 sub-phases, namely, Physical Crime Scene Investigation, Digital Crime Scene Investigation, Reconstruction and Communication. In Reconstruction sub-phase, pieces of information collected are put together so as to construct to possible events that could have happened. The Communication sub-phase is similar to the previous Submission phase. The investigation process ended with Readiness phase and the tasks performed are the same as in IDIP. Phases of the EIDIP Model 2.2.4.1 Readiness phases The goal of this phase is to ensure that the operations and infrastructure are able to fully support an investigation. It includes two phases: 1. Operations Readiness Phase; which ensures that human capacity is fully trained and equipped to deal with an incident when it occurs. 2. Infrastructure Readiness Phase; that ensures that the underlying infrastructure is sufficient enough to deal with incidents that come. For example equipment like video cameras and card readers being there and in good working condition. 2.2.4.2 Deployment phases The deployment phases provide a mechanism for an incident to be detected and confirmed. They take place at the place where the crime was detected and consist of five phases:20 OJEDIRAN ALABA BOLAJI 1. Detection and Notification phase; when an incident is detected and the appropriate people notified. 2. Physical Crime Scene Investigation; when a physical examination of the scene is performed and potential digital evidence identified. 3. Digital crime scene investigation phase; when an electronic examination of the scene is performed and digital evidence obtained with possibly an estimation of the extent of the impact or damage. 4. Confirmation phase; when the incident is confirmed and authorization given to obtain legal approval to carry out a search warrant and further investigations at suspect premises. 5. Submission phase; which involves presenting the physical and digital evidence to legal entities or corporate management. 2.2.4.3 Traceback phases Within these phases, the perpetrator’s physical crime scene of operation is tracked down, leading to identification of the devices that were used to perform the act. They consist of:1. Digital crime scene investigation; whereby primary crime scene is traced from the clues obtained from the previous phases. For example acquiring public and private IP addresses and mapping them to the country and institution will eventually lead to the host computer. IP addresses can be easily obtained by using the following commands: ping, nslookup, dig, tracert from a DNS server(N. L. Beebe & Clark, 2005). Locating the country and institution is simplified by various tools and websites like ip-to- 21 OJEDIRAN ALABA BOLAJI location.com and whatismyipaddress.net(Freiling & Schwittay, 2007; Köhn, Olivier, & Eloff, 2006). 2. Authorization phase; when authorization from local legal entities is obtained to permit further investigations and access to more information. 2.2.4.4 Dynamite phases These phases investigate the primary crime scene. They aim at collecting and analysing the items that were found at the primary crime scene to obtain further evidence that the crime originated from there and they help identify the potential culprits. They would consist of:1. Physical Crime Scene Investigation phase; when a physical examination of the scene is carried out to identify potential digital evidence. 2. Digital crime scene investigation phase; when an electronic examination of the scene is performed to obtain digital evidence of the incident and possibly an estimation of the time and dates when the incident was launched. 3. Reconstruction phase; that includes putting the pieces of a digital puzzle together and identifying the most likely investigative hypotheses. 4. Communication phase; which involves presenting the final interpretations and conclusions about the physical and digital evidence that has been investigated to a court or corporate management. 2.2.4.5 Review phase The whole investigation is reviewed and areas of improvement identified. 22 OJEDIRAN ALABA BOLAJI 2.2.5. Abstract Digital Forensics Model (ADFM) (2002) Drawing from the previous forensic protocols, there exist common steps that can be abstractly defined to produce a model that is not dependent on a particular technology or electronic crime. The basis of this model is to determine the key aspects of the aforementioned protocols as well as ideas from traditional forensics, in particular the protocol for an FBI physical crime scene search(Reith, Carr, & Gunsch, 2002a). This proposed model can be thought of as an enhancement of the DFRW model since it is inspired from it. Figure 2.5: Abstract Digital Forensics Model(Reith, Carr, & Gunsch, 2002b) The key components of this model include the following: 1. Identification – recognizing an incident from indicators and determining its type. This is not explicitly within the field of forensics, but significant because it impacts other steps. 23 OJEDIRAN ALABA BOLAJI 2. Preparation – preparing tools, techniques, search warrants, and monitoring authorizations and management support. 3. Approach strategy – dynamically formulating an approach based on potential impact on bystanders and the specific technology in question. The goal of the strategy should be to maximize the collection of untainted evidence while minimizing impact to the victim. 4. Preservation – isolate, secure and preserve the state of physical and digital evidence. This includes preventing people from using the digital device or allowing other electromagnetic devices to be used within an affected radius. 5. Collection – record the physical scene and duplicate digital evidence using standardized and accepted procedures. 6. Examination – in-depth systematic search of evidence relating to the suspected crime. This focuses on identifying and locating potential evidence, possibly within unconventional locations. Construct detailed documentation for analysis. 7. Analysis – determine significance, reconstruct fragments of data and draw conclusions based on evidence found. It may take several iterations of examination and analysis to support a crime theory. The distinction of analysis is that it may not require high technical skills to perform and thus more people can work on this case. 24 OJEDIRAN ALABA BOLAJI 8. Presentation – summarize and provide explanation of the conclusions. This should be written in a layperson’s terms using abstracted terminology. All abstracted terminology should reference the specific details. 9. Returning evidence – ensuring physical and digital property is returned to proper owner as well as determining how and what criminal evidence must be removed. Again, not an explicit forensics step, however, any model that seizes evidence rarely addresses this aspect. Note that these steps are not unlike traditional methods used to collect physical evidence, but in fact the abstraction of current practices applied to crimes that involve digital evidence(Reith et al., 2002a). “A large body of proven investigative techniques and methods exists in more traditional forensic disciplines. Most are applicable in cyberspace, but are not yet considered strongly”(Reith et al., 2002a). Also observe that the type of digital technology involved in these steps can be abstractly defined up to this point. This is important because it allows a standardized process to be defined without specifying the exact technology involved. This allows a consistent methodology for dealing with past, present, or future digital devices in a wellunderstood and widely accepted manner. For example, this methodology can be applied to a range of digital devices from calculators to desktop computers, or even unrealized digital devices of the future. Using this model, future technologies and the technical details required to forensically analyse them, can be instantiated to provide a consistent and standardized methodology for providing electronic evidence. This would enhance the science of forensics because it provides a basis for analysing new 25 OJEDIRAN ALABA BOLAJI digital/electronic technology while at the same time providing a common framework for law enforcement and the judicial system to feasibly work within a court of law. 2.2.6. Digital Forensic Model based on Malaysian Investigation Process (DFMMIP) In 2009, Perumal, S. (Perumal, 2009) proposed yet another digital forensic investigation model which is based on the Malaysian investigation processes. The DFMMIP model consist of 7phases Figure 2.6: DFMMIP model(Yusoff et al., 2011) Upon completion of the 1st phase, Planning, the next phase, Identification, followed. After that, Reconnaissance phase is conducted. This phase deals with conducting the investigation while the devices are still running (in operation) which is similar to performing live forensics. The author argued that the presence of live data acquisition that focuses on fragile evidence does increase the chances of positive prosecution. Before data can be 26 OJEDIRAN ALABA BOLAJI analyzed, they must be securely transported to the investigation site and be properly stored. This is indeed done in Transport & Storage phase. Once the data is ready, Analysis phase is invoked and the data will be analyzed and examined using the appropriate tools and techniques. Similar to the Presentation phase in the previous models, the investigators will be required to show the proof presented to support the case. This is done in Proof & Defense phase. Finally, Archive Storage phase is performed, whereby relevant evidence are properly stored for future references and perhaps can also be used for training purposes. 2.2.7 Scientific Crime Scene Investigation Model (SCSI) -2001 Figure 2.7: SCSI Model(Yusoff et al., 2011) 27 OJEDIRAN ALABA BOLAJI 2.2.8 End to End Digital Investigation Model (EEDI) – 2003 Figure 2.8: EEDI Model(Yusoff et al., 2011) 2.2.9 Extended Model of Cybercrime Investigation (EMCI) - 2004 Figure 2.9: EMCI Model(Yusoff et al., 2011) 28 OJEDIRAN ALABA BOLAJI 2.2.10 A Hierarchical, Objective-Based Framework for the Digital Investigations Process (HOBF) Figure 2.10: HOBF Model(Yusoff et al., 2011) 2.2.11 Framework for a Digital Forensic Investigation (FDFI) - 2006 Figure 2.11: FDFI Model(Yusoff et al., 2011) 29 OJEDIRAN ALABA BOLAJI 2.2.12. Computer Forensics Field Triage Process Model (CFFTPM) The CTTTPM (Rogers et al., 2006) proposes an onsite approach to providing the identification, analysis and interpretation of digital evidence in a relatively short time frame without the need to take back the devices or media back to the lab. Nor does it require taking the complete forensic images. The CFFTPM consist of 6 primary phases that are then further divided into another 6 sub-phases. Figure 2.12: Computer Forensics Field Triage Process Model(Yusoff et al., 2011) 30 OJEDIRAN ALABA BOLAJI 2.2.13 Common Process Model for Incident and Computer Forensics (CPMICF) Figure 2.13: CPMICF Model(Yusoff et al., 2011) 2.2.14 Dual Data Analysis Process (DDAP) Figure 2.14: DDAP Model(Yusoff et al., 2011) 31 OJEDIRAN ALABA BOLAJI 2.2.15 Network Forensic Generic Process Model (NFGP) Figure 2.15: NFGP Model(Yusoff et al., 2011) It is of uttermost importance to know that all the above highlighted models operated within the confines of the legal rule of the region or geographical location it is been applied. Thus a clear understanding of what the legal requirements are must be established right at the start of the investigation and this will informs each subsequent step or phase. By focusing on this end goal and deciding what legal norms are to be used, the most applicable framework and integral steps will become clear(Köhn et al., 2006). 32 OJEDIRAN ALABA BOLAJI However, since the Generic Computer Forensic Investigation Model (GCFIM) is a distillation of all the models reviewed in the literature review, we start by an exegesis of the Generic Computer Forensic Investigation Model (GCFIM). In furtherance to our review, we will also review the previous digital forensic model comparison tables, in order to identify the factors within the digital forensic process that ensures that evidences are preserved throughout the process. Considering the fifteen (15) models reviewed above in this chapter, we therefore begin by identifying the common phases in each model. 2.3 Identifying the Common Phases of the Models listed above In order to identify the common phases shared by all of the presented models, we started by assigning the investigation models with unique id and sorted them in chronological order. The result is displayed in the table below; Table 2.1: List of the examined Models(Yusoff et al., 2011) ID Year Name M01 1995 Computer Forensic Investigative Process M02 2001 DFRWS Investigative Model M03 2001 Scientific Crime Scene Investigation Model M04 2002 Abstract Digital Forensic Model M05 2003 Integrated Digital Investigation Process M06 2003 End to End Digital Investigation M07 2004 Enhance Digital Investigation Process 33 OJEDIRAN ALABA BOLAJI M08 2004 Extended Model of Cybercrime Investigation M09 2004 A Hierarchical, Objective-Based Framework for the Digital Investigation M10 2006 Computer Forensic Field Triage Process Model M11 2006 Framework for a Digital Forensic Investigation M12 2007 Dual Data Analysis Process M13 2007 Common Process Model for Incident and Computer Forensics M14 2009 Digital Forensic Model based on Malaysian Investigation Process (DFMMIP) M15 2010 Network Forensic Generic Process Model The next step is to Qualitized, that is, changing variables into Codes, we extract all of the phases within each of the digital forensic investigation process models. The extracted phases were also assigned with unique ID. Phases with similar tasks are grouped together. Table 2.2: Common Phases of the examined Models(Yusoff et al., 2011) ID Name of phases Available in P01 Access M12 P02 Acquisition M01,M12 P03 Admission M01 P04 Analysis M02,M04.M13, M14,M06,M09,M15 P05 Approach Strategy M04 34 OJEDIRAN ALABA BOLAJI P06 Archive Storage M14 P07 Authorization M08 P08 Awareness M08 P09 Case Specific Analysis M10 P10 Chronology Timeline Analysis M10 P11 Collection M02,M04.M06.M08,M09,M15 P12 Deployment M05,M07 P13 Detection M15 P14 Digital Crime Investigation M05 P15 Dissemination of Information M08 P16 Dynamite M07 P17 Evaluation M01 P18 Examination M02,M04,M06,M08,M15 P19 Hypothesis creation M08 P20 Identification M01,M02,M04, M14,M03,M06 P21 Incident Closure M09 P22 Incident Response M09,M15 P23 Individualization M03 P24 Internet Investigation M10 P25 Investigation M11, M15 P26 Notification M08 P27 Physical Crime Investigation M05 35 OJEDIRAN ALABA BOLAJI P28 Planning M10, M14,M08 P29 Post-Analysis M13 P30 Pre-Analysis M13 P31 Preparation M04,M09,M11,M15 P32 Presentation M02,M04,M06,M08,M09,M11,M15 P33 Preservation M02,M04,M06,M15 P34 Proof & Defense M14,M08 P35 Readiness M05,M07 P36 Recognition M03 P37 Reconnaissance M14 P38 Reconstruction M03 P39 Report M12 P40 Returning Evidence M04 P41 Review M05,M07 P42 Search & Identify M08 P43 Traceback M07 P44 Transport & Storage M14,M08 P45 Triage M10 P46 User Usage Profile Investigation M10 Based on the above list of phases (Table 2.2), Yunus, Roslan and Zainuddin(Yusoff et al., 2011) stated that it is apparent that a number of those phases do indeed duplicated or overlapped each other. Taking into account of the tasks performed in 36 OJEDIRAN ALABA BOLAJI each of the phases, and not just relying on the actual naming, we were able to observe that the phases can be grouped into 5 generic grouping namely, pre-process, acquisition & preservation, analysis, presentation and post-process. Table 2.3 below demonstrates how the phases were grouped into their respective generic grouping. Table 2.3: Generic Phases(Yusoff et al., 2011) Generic Phases Available phases Pre-Process P01, P05, P07, P08, P26, P28, P30, P31, P35, P36, Acquisition & P02, P11, P12, P13, P20, P30, P33, P42, P44 Preservation Analysis P04. P09, P10, P13, P14, P16, P17, P18, P19, P23, P24, P25, P27, P37, P38, P42, P43, P45, P46 Presentation P03, P29, P32, P34, P39, Post-Process P06, P15, P21, P22, P40, P41, 2.4 Generic Computer Forensic Investigation Model (GCFIM) Considering the generic phases identified above, a generic investigation process, known to be Generic Computer Forensic Investigation Model (GCFIM) was developed by Yunus,Roslan and Zainuddin. Figure 2.16 below, illustrate the proposed GCFIM. 37 OJEDIRAN ALABA BOLAJI Figure 2.16: Generic Computer Forensic Investigation Model (GCFIM)(Yusoff et al., 2011) Phase 1 of GCFIM is known as Pre-Process. The tasks performed in this phase relates to all of the works that need to be done prior to the actual investigation and official collection of data. Among the tasks to be performed are getting the necessary approval from relevant authority, preparing and setting-up of the tools to be used, etc. Phase 2 is known as Acquisition & Preservation. Tasks performed under this phase related to the identifying, acquiring, collecting, transporting, storing and preserving of data. In general, this phase is where all relevant data are captured, stored and be made available for the next phase. Phase 3 is known as Analysis. This is the main and the center of the computer forensic investigation processes. It has the most number of phases in its group thus reflecting the focus of most models reviewed are indeed on the analysis phase Various types of analysis are performed on the acquired data to identify the source of crime and 38 OJEDIRAN ALABA BOLAJI ultimately discovering the person responsible of the crime. Phase 4 is known as Presentation. The finding from analysis phase are documented and presented to the authority. Obviously, this phase is crucial as the case must not only be presented in a manner well understood by the party presented to, it must also be supported with adequate and acceptable evidence. The main output of this phase is either to prove or refute the alleged criminal acts Phase 5 is known as Post-Process. This phase relates to the proper closing of the investigation exercise. Digital and physical evidence need to be properly returned to the rightful owner and kept in a safe place, if necessary. Review of the investigative process should be done so that the lesson can be learnt and used for improvement of the future investigations. Instead of moving sequentially from one phase to another, the ability to go back to the previous phases must always be present. We are dealing with the situations that are forever changing in terms of the crimes scenes (physical and digital), the investigative tools used, the crime tools used and the level of expertise for the investigators. As such, it is much desired to be able to go back to the previous phases that we have done, not only to correct any weaknesses but also to acquire new things/information. We wish to note that phase numbered P22 (in Table 2.2) was put in Post-Process phase (in Table 2.3) which is due to the fact that action or response to any incident should be done after the incident was properly analyzed and presented to the authority. Nevertheless, should the investigator find a very risky and high impact incident, prerogative is up to the investigator to take any proper immediate actions. However, 39 OJEDIRAN ALABA BOLAJI this is a deviation to a normal process and should be treated on a case to case basis. The GCFIM has illustrated the process of digital forensic in a generic and simple way. Each of the steps can be well adapted for previous, recent and emerging digital terrains. It also allows for the dynamic interaction of the Physical Crime Scene with the Digital Crime Scene which is often a major source of confusion in applying most models to solve digital forensic issues. Also,” instead of moving sequentially from one phase to another, the ability to go back to the previous phases must always be present. We are dealing with the situations that are forever changing in terms of the crimes scenes (physical and digital), the investigative tools used, the crime tools used and the level of expertise for the investigators. As such, it is much desired to be able to go back to the previous phases that we have done, not only to correct any weaknesses but also to acquire new things/information”. However, the GCFIM model is open to some criticisms. As general as the model is, it only considered technologies that are currently existing and did not include emerging digital technologies, as new or emerging technologies will engender new processes of investigation, which may not fall into the current processes of the GCFIM generic model. Likewise, with the need for extending non-digital concepts (legal, accreditation, etc.) to the digital domain(N. Beebe, 2009), models borne out from non-technical sources like legal, but has a strong input in digital forensic investigation - in proving the 40 OJEDIRAN ALABA BOLAJI eventual evidence, must actively considered in formulating a model to be truly considered to be generic. 2.5 Literature Summary From the literature review, it was seen that there exists an abundance of process models for digital forensic investigations. The number of forensic models that have been proposed reveals the complexity of the computer forensic process. The following can be seen quite clearly: - Each of the proposed models builds on the experience of the previous; - Some of the models have similar approaches; - Some of the models focus on different areas of the investigation”(Köhn et al., 2006). However, this work seek to identify the factors within a digital forensic process that ensures that digital evidences are preserved throughout the process in order to achieve the leading goal of digital forensic, which is to produce concrete evidence suitable for presentation in a court of law. 41 OJEDIRAN ALABA BOLAJI CHAPTER THREE RESEARCH METHODOLOGY Leedy (Remenyi, 1998) formally defines research methodology as an operational framework within which the facts are placed so that their meaning may be seen more clearly. Research methodologies can also be viewed as ways of thinking about and studying social reality(Corbin & Strauss, 2008). That is, they can be viewed as stands towards the question of how can researchers find out what they believe can be known of social reality. Moreover, methodologies can be considered as overlapping viewpoints on the study of social reality(Mäkelä & Turcan 2007). Selection of research methodology depends on the research questions and objectives (Remenyi, 1998). The selection is affected by the following factors: - A topic to be researched and the specific research question - Methodologies which have been applied to similar type of research questions in previous research projects - Strengths and weaknesses of the methodologies - Researcher’s own preferences - Interests of stakeholders such as sponsors, companies/institutes under research, university and supervisor - Time and money restraints In the literature review, it was established that most of the digital forensic models proposed have its merits, yet requires that the main goal of forensic: evidence preservation and presentation, take priority over every other goal, irrespective of the 42 OJEDIRAN ALABA BOLAJI type and area of focus of the process used. This requirement calls for models that are not too complex to be realistically used to solve real-world digital forensic issues, as well as not too abstract to be void of bearing. Though we do not attempt to “re-invent the wheel”, we want to ensure the focal point of forensic is achieved in our proposed model in this work, by identifying clearly the factors that must be included in the process to achieve this. Therefore, a grounded theory, methodology is chosen to develop a suitable theoretical model for analysing these factors. 3.1. Grounded Theory Grounded theory, methodology was first developed by Barney G. Glaser and Anselm L. Strauss(Strauss & Corbin, 1990). They presented the first account of how to build grounded theory in their book “The discovery of grounded theory” in 1967(Mäkelä & Turcan 2007). Grounded theory is defined as theory derived inductively from the studied phenomenon. The theory is thereby discovered, developed and preliminary verified by systematically gathering and analysing information concerning the phenomenon. Therefore, data collection, analysis and theory are in a reciprocal relationship(Strauss & Corbin, 1990) Strauss and Corbin (1990) state that a well-developed, grounded theory fulfils four central criteria when the relationship of the theory and the phenomenon it describes 43 OJEDIRAN ALABA BOLAJI are assessed. These criteria are: (1) fit, (2) understanding, (3) generality and (4) control. If the theory is believable in relation to the day-to-day reality of the substantive area and is carefully derived from diverse raw data, then the theory should fit that substantive area. Because theory represents that reality, it should have a wide scope and feel sensible, thus supporting understanding of the persons studied and who practice in that area. If the raw data upon which the grounded theory is based is wide, and the interpretations conceptual and diverse, the theory should be abstract enough and include enough generality to be applicable to contexts similar to the phenomenon. Finally, the theory should offer the possibility of actions to control the phenomenon(Järvinen, 2004). Theoretical sensitivity, then again, refers to the awareness of the researcher to the subtleties of meaning of data. It means the ability to give meaning to data, the capacity to understand, and capability to separate the pertinent from that which is not. Theoretical sensitivity arises from knowledge in literature, professional experience, personal experience and the analytic process itself(Strauss & Corbin, 1990). Theoretical sensitivity can be increased by: (1) periodically stepping back and asking what is really going on, (2) maintaining an attitude of scepticism and (3) following the research procedures(Järvinen, 2004). 44 OJEDIRAN ALABA BOLAJI 3.2 Research Methods Research methods are a set of procedures and techniques for collecting and analysing data (Strauss & Corbin, 1998). These are for example, interviewing, collecting documents, observational techniques, personal experience methods, various visual methods and coding and iteration procedures (Mäkelä & Turcan 2007). 3.2.1 Grounded Theory Methods In grounded theory, Strauss & Corbin (1990) consider technical literature to include research reports and theoretical or philosophical discussions that have been made professionally and according to scientific rules. These serve as background material to which the researcher compares the results of his own empirical study. Other, nontechnical literature is considered to include biographies, diaries, documents, manuscripts, records, reports, catalogues and other material that can be used as source material or to complement interviews and field observations. The empirical data material is gathered using various data collection methods, usually interviews and observations (Järvinen, 2004). The literature and existing theory were searched using journal databases (EBSCOHost, ScienceDirect, etc.), books and finally Internet search for proper coverage. The searches were made using keywords such as virtual community, online community, and so on. Searches were expanded as significant quotations and references were found. 45 OJEDIRAN ALABA BOLAJI The analysis of grounded theory is constructed of three coding steps. These are: (1) open coding, (2) axial coding and (3) selective coding (Järvinen, 2004; Strauss & Corbin, 1990) Open coding means the analysis process of the data material. Concepts are conceptual assignments, which are attached to separate events and other representations of the phenomenon. Properties are characteristics, which relate to a category. A category, then again is a classification of concepts, which has been found by comparing concepts and by stating that some concepts relate to similar kind of phenomena. Concepts are grouped under a more abstract concept of a higher degree, which is called a category(Järvinen, 2004). The second phase of the analysis process is called axial coding. It means a group of procedures with which the categories are linked together by examining conditions, contexts, interrelationships and causality regarding the phenomenon. Axial coding includes constant change between inductive and deductive thinking. When the data material is studied, relationships or possible properties are deductively suggested, which are then related to the whole material and checked the expression by expression. Suggesting and checking is constantly made. That way it is assured that the emerging theory is based (grounded) on the material(Strauss & Corbin, 1990). Finally, selective coding means the search process for finding a core category, and in which other categories are related to the core category, relations are validated and categories are specified if necessary. Core category is a category that centrally relates to the phenomenon and integrates other categories around it. Throughout the analysis 46 OJEDIRAN ALABA BOLAJI and proposition formulation stages of the process, intensive rotation between data, the emerging theory and earlier literature has to be sought(Strauss & Corbin, 1990). 47 OJEDIRAN ALABA BOLAJI CHAPTER FOUR RESEARCH MODEL As earlier stated that we do not attempt to “re-invent the wheel”, we want to ensure the focal point of forensic is achieved in our proposed model in this work, by identifying clearly the factors that must be included in the digital forensic process to achieve this. Therefore, a grounded theory, methodology is chosen to develop a suitable theoretical model for analysing these factors. 4.1 The Proposed Model As it is noted, that if previous research had identified particular variables or constructs, but no theory had been generated that speculated on the relationship between those variables or constructs(Kelleher, 2010) a grounded theory can be employed to deduce a relationship between those variables or construct. Yunus Yusoff, Roslan Ismail and Zainuddin Hassan, have identified some common phases that constitute a Generic Computer Forensic Investigation Model (GCFIM), see Table 2.2 above. This was done by Open Coding, the first of the three coding steps for analysis of our research problem using the grounded theory methodology described in chapter 3. Moving on to the second step of the analysis, which is axial coding of the generic phases. Yunus Yusoff, Roslan Ismail and Zainuddin Hassan(Yusoff et al., 2011) also took into account of the tasks performed in each of the phases, and not just relying on 48 OJEDIRAN ALABA BOLAJI the actual naming, it is apparent that a number of those phases do indeed duplicated or overlapped each other. As shown in Table 3 above, they were able to observe that the phases can be grouped into 5 generic grouping namely, pre-process, acquisition & preservation, analysis, presentation and post-process. In order to identify the relationship between these phases, we will forge further in this work, using the third step of the analysis; that is, the Selective Coding. This is the search process for finding a core phase amongst all digital forensic investigation phases. The Core Phase is a phase that centrally relates to the phenomenon and integrates other phases around it. We will commence this process by considering table 2.3 with our methodology, from the literature review above, which has identified the basic processes of the Generic Computer Forensic Investigation Model. By expanding the table 2.3 in relation to table 2.2, from the literature review in chapter 2, we have the table 4.1, which expanded the phases of the Generic Computer Forensic Investigation Model (GCFIM). Table 4.1: Phase expansion of the Generic Computer Forensic Investigation Model (GCFIM) Generic Feasible Processes Per Phase Phases Pre-Process Access, Approach Strategy, Authorization, Awareness, Notification, Planning, Pre-Analysis, Preparation, Readiness, Recognition. 49 OJEDIRAN ALABA BOLAJI Acquisition & Acquisition, Collection, Deployment, Detection, Identification, Preservation Pre-Analysis, Preservation, Search & Identify, Transport & Storage. Analysis Analysis, Case Specific Analysis, Chronology Timeline Analysis, Detection, Digital Crime Investigation, Dynamite, Evaluation, Examination, Hypothesis creation, Individualization, Internet Investigation, Investigation, Physical Crime Investigation, Reconnaissance, Reconstruction, Search & Identify, Traceback, Triage, User Usage Profile Investigation. Presentation Admission, Post-Analysis, Presentation, Proof & Defense, Report. Post-Process Archive Storage, Dissemination of Information, Incident Closure, Incident Response, Returning Evidence, Review. By critical examination of the table 4.1 above, the generic phases would have meaning and connection if we consider the feasible process per each phase. Should/Can the Pre-Process phase commence with or without an investigation in sight? It is observed that the Pre-Process phase has processes that are carried out as the investigation commences. The process; Access, Approach Strategy, Authorization, Awareness, Notification, Planning, Pre-Analysis, Preparation and Recognition, all suggest that an investigation is in sight for them to commence. However, the process; 50 OJEDIRAN ALABA BOLAJI Readiness suggests that this process can be carried out with or without a digital forensic investigation in sight at the moment. Forensic Readiness, alternatively cited as proactive digital forensics (P. G. Bradford, M. Brown, Perdue, & Self, 2004), ensures that a system that has digital forensic readiness integrated into it, is better positioned to guarantee digital evidence preservation, as the system will be ready to support evidence acquisition and preservation than a system that is not ready. This Readiness Phase is indeed an ongoing phase throughout the Lifecycle of an organization. It also consists of 2 sub-phases, namely, Operation Readiness and Infrastructure Readiness(Carrier & Spafford, 2003).This approach is in tandem with fact that each phases of a digital forensic model should be structured such that it solves a problem(s) consistently and continuously. Mark Pollitt highlighted in (Mark M Pollitt, 2007) that digital forensics is not an elephant; it is a process and not just one process, but a group of tasks and processes in the investigation. Consequently, since its only Readiness that stands out, as a continuous and constant process with or without an investigation in view, of all the other processes of the Pre-Process phase, we have decided to separate it out of the Pre-Process phase, in order to further examine its possibility of it being a phase in a digital forensic investigation (DFI). Forensic Readiness is the ability of an organization to maximize its potential to use digital evidence while minimizing the cost of an investigation(Murphy, 2006). 51 OJEDIRAN ALABA BOLAJI Also, readiness ensures a proactive establishment of capability to securely gather scientifically and legally admissible evidence and as well put in place, sure legal review to facilitate action in response to an incident. This enhances the timely commencement of the other Pre-process processes. When this capability is built into a model, it ensures that not just a technical model has been established for a DFI but also a legally-sound model put in place, which keeps too many hands off the evidence and alleviates any chain of custody concerns while ensuring minimal disruption to the business in the event of an incident. After all, the actual purpose and core concept of digital forensics investigation is acquisition, preservation and presentation of legally admissible evidence. Likewise, with the need for extending non-digital concepts (legal, accreditation, etc.) to the digital domain, models borne out from non-technical sources like legal, but has a strong input in digital forensic investigation - in proving the eventual evidence, must actively consider in formulating a model to be truly considered to be generic. We considered the Zachman framework derivatives – FORensics ZAchman framework (FORZA) framework, a technology-independent digital forensics investigation framework which bind roles, responsibilities and procedures together. The entire process flow is described in the figure below. We considered this particular model, due to its coverage. 52 OJEDIRAN ALABA BOLAJI Figure 4.1: Process flow between the roles in digital forensics investigation(Ieong, 2006). Through this framework, different standards and procedures could be linked together in a more holistic way. Digital forensics investigation is no longer viewed from pure technical aspects. Business, system and legal aspects are incorporated. 4.2. Most Important Factors in a Digital Forensic Model From the further examination of the above, we were able to summarise that there are some major factors, if not handled properly, could mar the whole process of executing a successful Digital Forensic Investigation (DFI). These factors are; Legal Issues, Technical issues, Administrative Issues and Cost. 53 OJEDIRAN ALABA BOLAJI Of the four (4) most important factors of executing a successful DFI, as noted above, the survey we conducted amongst DF Practitioners reveals interestingly that Technical, Administrative and Cost issues have the same percentage of importance. Meanwhile, Legal issues are observed to be the most important. The above outcome has successfully answered our research objective which is to identify the key factors that a Digital Forensic Process Model must have to ensure that digital evidence involved, is preserved. Figure 4.2: Most Important Factors in a Digital Forensic Model 4.2.1 Cost Cost is very critical, especially in developing nations like Nigeria, where the other several national agenda seems to be more pressing and Digital Forensic as not fully been institutionalized. This cost could either be cost of hardware, software, training, certifications, time, hiring personnel and infrastructure, even though the eventual result may not justify the cost involved. Thus DFI models must be cost effective. 54 OJEDIRAN ALABA BOLAJI 4.2.2 The Administration The Administration, which means getting through administrative bottlenecks, obtaining approval and bureaucracy, as a DF Investigators probe into an organization or system under investigation. Also, getting the administrator of DF investigators to acquire updated or more tools for DF investigations could also be challenging, as the cost and annual subscription fees for tools that are needed are not getting any cheaper. Except that you decide to go the way of open source tools, which may not be adequate to be solely used to collect, preserve and analyse digital evidences. These administrative issues can halt or delay a digital forensic process if not carefully handled, or more importantly affect the quality of evidence to be presented at the end of the investigation. Thus DFI models must be DF ready to pre-address this issue even before the initiation of an investigation. 4.2.3 Technical issues Technical issues, assert the fact that the rate of technological innovation is faster than the pace of evolution of digital forensic models. Thus, models should be reviewed and implemented in line with technological advancement. 4.2.4 Legal issues The Legal issues are very germane to the successful execution of DF investigation. Simson L. Garfinkel reported that “legal challenges increasingly limit the scope of forensic investigations” as well as “a variety of legal challenges are combining to 55 OJEDIRAN ALABA BOLAJI make the very process of computer forensics more complicated, time consuming, and expensive” (Garfinkel, 2010). How should a Digital Forensic process be structured and executed to ensure that digital evidences are preserved? Digital Forensic processes are to be structured to allow connections and quick reviews in each process steps and well as adaptability and flexibility of the process to changing technological platforms. 4.3 Enhanced Generic Digital Forensic Investigation Model (EGDFIM) An Enhanced Generic Digital Forensic Investigation Model (EGDFIM) is hereby proposed. It is presented in Figure 4.3 below. 56 OJEDIRAN ALABA BOLAJI Figure 4.3: Enhanced Generic Digital Forensic Investigation Model (EGDFIM) 57 OJEDIRAN ALABA BOLAJI The First Phase of the Enhanced Generic Digital Forensic Investigation Model (EGDFIM) is Readiness. The phase is a proactive phase. The activities involve in this phase include setting up of both personnel and technological systems to Identify possible situations that Evidence is required; Recognize sources of evidence; Collect Information; Preserve the gathered Information; Planning the Response; Personnel Training and Roles delegation; Ensure effective Information Retrieval to Fast-track Investigation; Preventing Anonymous Activities; Protecting the Evidence. The Readiness Phase being introduced as the first is an enhancement to the previously described phases of the Generic Computer Forensic Investigation Model (GCFIM) proposed by Yunus Yusoff, Roslan Ismail and Zainuddin Hassan. When an incident is reported and DFI is to commence, it affords the benefit of having a means of acquiring and preserving evidence, in a way that is legally admissible, precollected even before an incident occurs or reported. Since in executing the Readiness Phase, the legal advisor would have given his/her legal advice and determine which range of evidence set would be required to initiate or defend a litigation. Of which if the readiness phase can meet at earlier stage of an investigation, time and expenses could be reduced. However, if not sufficient, the investigator can then concentrate more on seeking data from the devices that are relevant to the dispute. Forensic readiness planning ensures legal issues do not hamper future investigations. The Pre-Process, Acquisition & Preservation, Analysis, Presentation and PostProcess Phases have been earlier described in chapter two. 58 OJEDIRAN ALABA BOLAJI Is it possible to have a Consolidated Digital Evidence Preservation Framework that can fit into any Digital Forensic Model? YES, if the Model is not rigid. If the model is generic, allow for quick reviews and not cumbersome. Taking a clue from Software Engineering; back in the 1970s, 'Software Engineering' was thought to be about fairly large development models in projects with unchanging phases, and relative lack of concern about cost efficiency. However software development today is very much different. Rapid prototyping (short bursts of work, followed by reviews), but even that has been modified on, and seemingly occasionally also improved on. 4.4 Applying the EGDFIM Model We hereby tested the validity and applicability of the EGDFIM Model on a Data alteration fraud in Data Processing Center. A student record was altered; in which scores were credited in two courses he had previously failed. The department discovered this alteration and raised the alarm. Though, prior to this incidence, there have been speculations of attempts to alter students' records unlawfully, there has not been a formal report in this regards. However, the Readiness Phase has put in place; 1. Windows Active Directory Login on all computers in the Data Center. 2. Authorization level to alter records was restricted to few supervisors only. 3. For every alteration made on a student, the database keeps a log of the user that executed the alteration. 59 OJEDIRAN ALABA BOLAJI 4. Physical security was put in place to prevent unauthorized personnel from entering the Data Center. All the above readiness measures were carried out with or without a digital forensic investigation in sight at the moment. These actions were more of a broad systemic step rather than a narrow preparation for a particular incident. When an awareness and notification came up about the incident, the Pre-Process Phase was initiated. This phase ensured: 1. An Investigation panel was step up with Authorisation of the Head of the Data Center, the Department Head and the organisation’s Central Investigation Unit. 2. An approach strategy was drafted. 3. Plans were developed according to pre-analysis of the incident. 4. Then all possible evidence sources recognized. Note that the Pre-process phase is narrowed towards a particular incidence. The pre-analysis of the incident has the log on the server reveals that the login detail of a particular male staff of the Data Center was responsible for the alteration. Hence, the accused male staff was investigated for a start. This phase was followed quickly by the Acquisition & Preservation Phase, which included: 1. Search and Identification of digital from the computer of the male staff and the server and non-digital evidences from the personnel of the Data Center. On scanning the desktop of the male personnel, a PDF that showed the records 60 OJEDIRAN ALABA BOLAJI was altered, was discovered in the Recycle bin with the “Date Modified” been the said date that the server also reported that the alteration was done. 2. The discovered PDF should not be restored, as these will change the “Date Modified” of the PDF file and thus destroy the legal admissibility of the evidence, hence, deployment of mechanism to collect the evidences and as well preserving it was setup. 3. Transportation of digital evidences found on the computer that was logged into and used to alter the record, which was tracked by the windows active directory server. 4. Then storage of the evidence in such a way that its legal admissibility is not lost. The Analysis Phase then followed to: 1. User Usage Profile Investigation. 2. Legal and Technical Analyse of the evidences acquired thus far, to determine the actual culprits. 3. Chronology Timeline Analysis, Trace back and Reconstruction of the incidence. 4. Case Specific Analysis and Hypothesis creation 5. Evaluation and determining if further evidences are required. The evidences of the generated PDF found in the Recycle bin, together with other digital and non-digital sources were analysed accordingly. 61 OJEDIRAN ALABA BOLAJI The Presentation Phase followed the analysis phase, where the Reports of the analysis were presented to the Investigation sponsor. The presentation phase was then preceded by the Post-Process Phase, which Archive the evidence collected, Returning the computer on which digital evidences were found, the culprit was dismissed from the organization, dissemination of necessary information as regards the Closure of this Incident and a Review of the incident was done, with due check on the phases used to investigate the incident, to ensure that it is in tandem with best practices and organizationally and legally admissible. The outcome of these reviews was integrated into Readiness Phase for the Organization. Thus, we see that the EGDFIM Model is a continuum with phases that are subject to review, rather been a rigid straight-through process. It was however noted that the stages of the EGFIM is a technically independent framework, as the various personnel and concerned bodies that are involved in the stages of the model could easily understand and relate to the activities therein without forgetting the actual purpose and core concept of digital forensics investigation. 62 OJEDIRAN ALABA BOLAJI CHAPTER FIVE DISCUSSIONS AND CONCLUSIONS The Enhanced Generic Digital Forensic Investigation Model (EGDFIM) proposed in this work can robustly fit in and consistently resolve any Digital Forensic search for Digital Evidence. This Model is also abstracted to accommodate application to current and future digital technologies, as well as incorporating steps to assure complete interpretations and presentation of the evidence collected; a great need for Judiciary members and corporate management, for just and effective decisions. Howbeit, with further implementation and evaluation, the EGDFIM framework will is suitable for cyber and emerging cloud-computing crime investigation, and it is practically applicable in Nigeria. Also as a follow-up to this proposed model, we propose to start incorporating the framework questions together with the necessary workflow into an intelligence data acquisition scripts generator. Using this model, questions and answers in a digital forensics investigation could be systematically simulated. Then based on the analysis of the simulation, scripts would be tuned to assist digital forensic investigators, legal practitioner, law enforcement agents in a semiautomatic analysis of digital forensic investigations. By these automatic scripts, investigators can perform fast and zeroknowledge digital forensic acquisition and analysis. Thus, Enhanced Generic Digital Forensic Investigation Model (EGDFIM) will be formulated as a semiautomatic investigation toolbox. Summarily, for Digital Forensic to be a true panacea for evidence preservation; 1. An effective digital forensic process must be used, 63 OJEDIRAN ALABA BOLAJI 2. There must be strict compliance to the rule of evidence, and 3. A Systematic follow-through of relevant legal process should be incorporated into the digital forensic processes. 64 OJEDIRAN ALABA BOLAJI References Ademu, I. O., Imafidon, C. O., & Preston, D. S. (2011). A new approach of digital forensic model for digital forensic investigation. IJACSA) International Journal of Advanced Computer Science and Applications, 2(12). Baryamureeba, V., & Tushabe, F. (2004). The enhanced digital investigation process model. Paper presented at the Proceedings of the Fourth Digital Forensic Research Workshop. Beebe, N. (2009). Digital forensic research: The good, the bad and the unaddressed Advances in digital forensics V (pp. 17-36): Springer. Beebe, N. L., & Clark, J. G. (2005). A hierarchical, objectives-based framework for the digital investigations process. Digital Investigation, 2(2), 147-167. Carrier, B., & Spafford, E. H. (2003). Getting physical with the digital investigation process. International Journal of Digital Evidence, 2(2), 1-20. Casey, E. (2009). Handbook of digital forensics and investigation: Academic Press. Ciardhuain, S. (2011). An extended model of cybercrime investigation Accessed on 20th October 2011 Available(online): www. ijde. org/citeseerx. ist. psu. edu/viewdoc/download? doi= 10.1. 1.80. A ccessed on 11th August. Corbin, J., & Strauss, A. (2008). Basics of qualitative research: Techniques and procedures for developing grounded theory: Sage. Crim, J. (2006). Digital Forensics: Tools & Identification Retrieved July, 2013, from http://www.vascan.org/webdocs/06confdocs/Day1-TechnicalTrackDONE/CrimJesseDigital%20Forensics.pdf Freiling, F. C., & Schwittay, B. (2007). A Common Process Model for Incident Response and Computer Forensics. IMF, 7, 19-40. Garfinkel, S. L. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7, S64-S73. Gingrande, A. (2013). The Long-term Preservation of Digital Evidence. Retrieved July, 2014, from http://www.cnblogs.com/ysun/archive/2013/04/09/3010345.html Ieong, R. S. C. (2006). FORZA – Digital forensics investigation framework that incorporate legal issues. ELSEVIER(3 S ( 2 0 0 6 )), S 2 9 – S 3 6. Järvinen, P. J. (2004). Annikki (2004) Tutkimustyön metodeista. Opinpajan kirja, Tampere. John, J. L. (2012). Digital Forensics and Preservation. Digital Preservation Coalition. Kaur, R., & Kaur, A. (2012). Digital forensics. International Journal of Computer Applications, 50(5), 5-9. Kelleher, K. (2010). Grounded Theory Research Tutorial. Retrieved September, 2013, from http://researchcenter.waldenu.edu/Documents/Grounded_Full_Captions.pdf Köhn, M., Olivier, M. S., & Eloff, J. H. (2006). Framework for a Digital Forensic Investigation. Paper presented at the ISSA. Losavio, M. (2010). What Is Digital Evidence:The Forms, Loci And Metadata Of Electronic Evidence. THE SCIENCE OF DIGITAL FORENSICS, 5. Mäkelä, M. M., & Turcan , R. V. (2007). Building Grounded Theory in Entrepreneurship Research: Edward Elgar Publishing. Murphy, J. (2006). Forensic readiness. Dexisive, Accessed, 201003(06). NIJ. (2010). Digital Evidence Analysis Tools. Retrieved July, 2014, from http://www.nij.gov/nij/topics/forensics/evidence/digital/analysis/welcome.htm Nikkel, B. J. (2006). The role of digital forensics within a corporate organization. Paper presented at the May 2006, IBSA Conference, Vienna. Palmer, G. (2001). A road map for digital forensics research-report from the first Digital Forensics Research Workshop (DFRWS). Utica, New York. 65 OJEDIRAN ALABA BOLAJI Perumal, S. (2009). Digital forensic model based on Malaysian investigation process. International Journal of Computer Science and Network Security, 9(8), 38-44. Pollitt, M. M. (1995). Computer Forensics: An Approach to Evidence in Cyberspace. Paper presented at the National Information Systems Security Conference, Baltimore,USA. Pollitt, M. M. (2007). An ad hoc review of digital forensic models. Paper presented at the Systematic Approaches to Digital Forensic Engineering, 2007. SADFE 2007. Second International Workshop on. Reith, M., Carr, C., & Gunsch, G. (2002a). An examination of digital forensic models. International Journal of Digital Evidence, 1(3), 1-12. Reith, M., Carr, C., & Gunsch, G. (2002b). An Examination of Digital Forensic Models International Journal of Digital Evidence, Fall 2002: Volume. Remenyi, D. (1998). Doing research in business and management: an introduction to process and method: Sage. Rogers, M. K., Goldman, J., Mislan, R., Wedge, T., & Debrota, S. (2006). Computer forensics field triage process model. Journal of Digital Forensics, Security and Law, 1(2), 19-37. Sommer, P. (2012). Digital Evidence, Digital Investigations and E-Disclosure: A Guide to Forensic Readiness for Organisations, Security Adviders and Lawyers. Information Security Guide. Strauss, A., & Corbin, J. M. (1990). Basics of qualitative research: Grounded theory procedures and techniques: Sage Publications, Inc. Vacca, J. R. (2005). Computer Forensics: Computer Crime Scene Investigation (Networking Series)(Networking Series): Charles River Media, Inc. Walker, C. (2007). Computer forensics: bringing the evidence to court. Online: http://www. infosecwriters. com/text_resources/pdf/Com puter_Forensics_to_Court. pdf as on, 12. Wikipedia. (2014). Forensic Science. Retrieved 4 April, 2014, from http://en.wikipedia.org/wiki/Forensic_science Yusoff, Y., Ismail, R., & Hassan, Z. (2011). Common phases of computer forensics investigation models. International Journal of Computer Science & Information Technology (IJCSIT), 3(3), 17-31. 66