The practical analysis towards developing a guideline for the Xbox 360 forensic

The advancement of the technology has built the Xbox 360 with the powerful hardware. It comes with a cheap price and affordable to everybody. Moreover, it's becoming a networked media platform to perform flexible connectivity through the internet. These features has made the Xbox 360 as an idea...

Full description

Saved in:
Bibliographic Details
Main Author: Mohd. Isa, Hairul Azni
Format: Thesis
Language:English
Published: 2009
Subjects:
Online Access:http://eprints.utm.my/id/eprint/11301/1/HairulAzniMohdIsaMFSKSM2009.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utm-ep.11301
record_format uketd_dc
institution Universiti Teknologi Malaysia
collection UTM Institutional Repository
language English
topic QA75 Electronic computers
Computer science
spellingShingle QA75 Electronic computers
Computer science
Mohd. Isa, Hairul Azni
The practical analysis towards developing a guideline for the Xbox 360 forensic
description The advancement of the technology has built the Xbox 360 with the powerful hardware. It comes with a cheap price and affordable to everybody. Moreover, it's becoming a networked media platform to perform flexible connectivity through the internet. These features has made the Xbox 360 as an ideal tool to perform a cyber crime by utilizing it capabilities to the maximum. Since there is no proper guideline on conducting the investigation procedure on the Xbox 360 forensic, it is difficult to determine whether the Xbox 360 has been used as a crime tool. The immediate objective of this study is to investigate the physical modification of the Xbox 360 as well as to examine the best imaging technique for the Xbox 360 data storage. Then a new guideline was developed based on the result of the study. Several experiments had been conducted which involved several techniques and procedures for dismantling and imaging the Xbox 360's hard-disk. As the result, the best techniques and procedures for dismantling the Xbox 360's hard-disk had been determined. On the other hand, FTK Imager was chose after been compared with several imaging tools. Therefore, it had been used as an imaging tool for this purpose because it produced an image that's complies with the NIST standard for a forensic disk imaging tool. The guideline that was produced will give a great value and benefit to the forensic examiner community since there is no such research has been done before. Hence, this study can be a basis for the retrieving potential evidence techniques as well as developing a complete SOP for the Xbox 360 forensic in the future.
format Thesis
qualification_level Master's degree
author Mohd. Isa, Hairul Azni
author_facet Mohd. Isa, Hairul Azni
author_sort Mohd. Isa, Hairul Azni
title The practical analysis towards developing a guideline for the Xbox 360 forensic
title_short The practical analysis towards developing a guideline for the Xbox 360 forensic
title_full The practical analysis towards developing a guideline for the Xbox 360 forensic
title_fullStr The practical analysis towards developing a guideline for the Xbox 360 forensic
title_full_unstemmed The practical analysis towards developing a guideline for the Xbox 360 forensic
title_sort practical analysis towards developing a guideline for the xbox 360 forensic
granting_institution Universiti Teknologi Malaysia, Faculty of Computer Science and Information Systems
granting_department Faculty of Computer Science and Information System
publishDate 2009
url http://eprints.utm.my/id/eprint/11301/1/HairulAzniMohdIsaMFSKSM2009.pdf
_version_ 1747814837714419712
spelling my-utm-ep.113012018-06-04T09:51:38Z The practical analysis towards developing a guideline for the Xbox 360 forensic 2009-10 Mohd. Isa, Hairul Azni QA75 Electronic computers. Computer science The advancement of the technology has built the Xbox 360 with the powerful hardware. It comes with a cheap price and affordable to everybody. Moreover, it's becoming a networked media platform to perform flexible connectivity through the internet. These features has made the Xbox 360 as an ideal tool to perform a cyber crime by utilizing it capabilities to the maximum. Since there is no proper guideline on conducting the investigation procedure on the Xbox 360 forensic, it is difficult to determine whether the Xbox 360 has been used as a crime tool. The immediate objective of this study is to investigate the physical modification of the Xbox 360 as well as to examine the best imaging technique for the Xbox 360 data storage. Then a new guideline was developed based on the result of the study. Several experiments had been conducted which involved several techniques and procedures for dismantling and imaging the Xbox 360's hard-disk. As the result, the best techniques and procedures for dismantling the Xbox 360's hard-disk had been determined. On the other hand, FTK Imager was chose after been compared with several imaging tools. Therefore, it had been used as an imaging tool for this purpose because it produced an image that's complies with the NIST standard for a forensic disk imaging tool. The guideline that was produced will give a great value and benefit to the forensic examiner community since there is no such research has been done before. Hence, this study can be a basis for the retrieving potential evidence techniques as well as developing a complete SOP for the Xbox 360 forensic in the future. 2009-10 Thesis http://eprints.utm.my/id/eprint/11301/ http://eprints.utm.my/id/eprint/11301/1/HairulAzniMohdIsaMFSKSM2009.pdf application/pdf en public masters Universiti Teknologi Malaysia, Faculty of Computer Science and Information Systems Faculty of Computer Science and Information System Burke, P. K., and Craiger, J. P. (2007). Xbox Forensic. Journal of Digital Forensic Practice, 1, 1 – 8. Taylor and Francis. Casey, E. (2000). Handbook of Computer Crime. Forensic Science, Computer and the Internet. USA:Academic Press,. DNS. (2006). An introduction to computer forensics. UK: DNS (www.dns.co.uk). GASSP. (1999). Generally Accepted System Security Principles For Public Comment. USA: International Information Security Foundation. Graft, K. (2009, January 5). MS: 360 Life-to-Date Sales Hit 28m. Edge. Retrieved January 31, 2009, from http://www.edge-online.com/news/ms-360-life-datesales- hit-28m. Hamzah, Z. (2005). E-security Law and Strategy. Malaysia: LexisNexis – Malaysian Law Journal . Kent, K., Chevalier , S., Grance , T. and Dang , H. (2006). Guide to Integrating Forensic Techniques into Incident Response. (Special Publication 800-86). Gaithersburg, M.D.: National Institute of Standards and Technology. Kleiman, D. (Ed.), Cardwell, K., Clinton, T., Cross, M., Gregg, M., Varsalone, J. and Wright, C. (2007). The Official CHFI Study Guide (Exam 312-49) for Computer Hacking Forensic Investigators. (1st ed.) Burlington, M.A.: Syngress Publishing, Inc. NIST. (2001). Disk Imaging Tool Specification. USA: National Institute of Standards and Technology. NIST. (1996). Generally Accepted Principles and Practices for Securing Information Technology System. USA: National Institute of Standards and Technology. NIST Special Publication 800-86. (2006). Guide to Integrating Forensic Techniques into Incidents Response. USA: National Institute of Standards and Technology. Reyes, A. (Ed.), O'Shea, K., Steele, J., Hansen, J. R., Jean, B. R. and Ralph, T. (2007). Cyber Crime Investigations: Bridging the Gaps Between, Security Professionals, Law Enforcement, and Prosecutors . (1st ed.) Rockland, M.A.: Syngress Publishing, Inc. Turnbull, B. (2008). Forensic Investigation of the Nintendo Wii: A First Glance. Small Scale Digital Device Forensics Journal, 2 (1), 1 – 7. Small Scale Digital Device Forensics Journal (SSDDFJ). U. S. Department of Justice , Federal Bureau of Investigation (1999). Digital Evidence: Standards and Principles . USA: Forensic Science Communications. Vaughan, C. (2004). Xbox Security Issues and Forensic Recovery Methodology (Utilising Linux). Digital Investigation (2004), 1, 165 – 172. Science Direct. Yeager, R. (2006). Criminal Computer Forensics Management. Proceedings of The 3rd Annual Conference On Information Security Curriculum Development. 168-174. Association of Computing Machinery.