The practical analysis towards developing a guideline for the Xbox 360 forensic
The advancement of the technology has built the Xbox 360 with the powerful hardware. It comes with a cheap price and affordable to everybody. Moreover, it's becoming a networked media platform to perform flexible connectivity through the internet. These features has made the Xbox 360 as an idea...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2009
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/11301/1/HairulAzniMohdIsaMFSKSM2009.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-utm-ep.11301 |
---|---|
record_format |
uketd_dc |
institution |
Universiti Teknologi Malaysia |
collection |
UTM Institutional Repository |
language |
English |
topic |
QA75 Electronic computers Computer science |
spellingShingle |
QA75 Electronic computers Computer science Mohd. Isa, Hairul Azni The practical analysis towards developing a guideline for the Xbox 360 forensic |
description |
The advancement of the technology has built the Xbox 360 with the powerful hardware. It comes with a cheap price and affordable to everybody. Moreover, it's becoming a networked media platform to perform flexible connectivity through the internet. These features has made the Xbox 360 as an ideal tool to perform a cyber crime by utilizing it capabilities to the maximum. Since there is no proper guideline on conducting the investigation procedure on the Xbox 360 forensic, it is difficult to determine whether the Xbox 360 has been used as a crime tool. The immediate objective of this study is to investigate the physical modification of the Xbox 360 as well as to examine the best imaging technique for the Xbox 360 data storage. Then a new guideline was developed based on the result of the study. Several experiments had been conducted which involved several techniques and procedures for dismantling and imaging the Xbox 360's hard-disk. As the result, the best techniques and procedures for dismantling the Xbox 360's hard-disk had been determined. On the other hand, FTK Imager was chose after been compared with several imaging tools. Therefore, it had been used as an imaging tool for this purpose because it produced an image that's complies with the NIST standard for a forensic disk imaging tool. The guideline that was produced will give a great value and benefit to the forensic examiner community since there is no such research has been done before. Hence, this study can be a basis for the retrieving potential evidence techniques as well as developing a complete SOP for the Xbox 360 forensic in the future. |
format |
Thesis |
qualification_level |
Master's degree |
author |
Mohd. Isa, Hairul Azni |
author_facet |
Mohd. Isa, Hairul Azni |
author_sort |
Mohd. Isa, Hairul Azni |
title |
The practical analysis towards developing a guideline for the Xbox 360 forensic |
title_short |
The practical analysis towards developing a guideline for the Xbox 360 forensic |
title_full |
The practical analysis towards developing a guideline for the Xbox 360 forensic |
title_fullStr |
The practical analysis towards developing a guideline for the Xbox 360 forensic |
title_full_unstemmed |
The practical analysis towards developing a guideline for the Xbox 360 forensic |
title_sort |
practical analysis towards developing a guideline for the xbox 360 forensic |
granting_institution |
Universiti Teknologi Malaysia, Faculty of Computer Science and Information Systems |
granting_department |
Faculty of Computer Science and Information System |
publishDate |
2009 |
url |
http://eprints.utm.my/id/eprint/11301/1/HairulAzniMohdIsaMFSKSM2009.pdf |
_version_ |
1747814837714419712 |
spelling |
my-utm-ep.113012018-06-04T09:51:38Z The practical analysis towards developing a guideline for the Xbox 360 forensic 2009-10 Mohd. Isa, Hairul Azni QA75 Electronic computers. Computer science The advancement of the technology has built the Xbox 360 with the powerful hardware. It comes with a cheap price and affordable to everybody. Moreover, it's becoming a networked media platform to perform flexible connectivity through the internet. These features has made the Xbox 360 as an ideal tool to perform a cyber crime by utilizing it capabilities to the maximum. Since there is no proper guideline on conducting the investigation procedure on the Xbox 360 forensic, it is difficult to determine whether the Xbox 360 has been used as a crime tool. The immediate objective of this study is to investigate the physical modification of the Xbox 360 as well as to examine the best imaging technique for the Xbox 360 data storage. Then a new guideline was developed based on the result of the study. Several experiments had been conducted which involved several techniques and procedures for dismantling and imaging the Xbox 360's hard-disk. As the result, the best techniques and procedures for dismantling the Xbox 360's hard-disk had been determined. On the other hand, FTK Imager was chose after been compared with several imaging tools. Therefore, it had been used as an imaging tool for this purpose because it produced an image that's complies with the NIST standard for a forensic disk imaging tool. The guideline that was produced will give a great value and benefit to the forensic examiner community since there is no such research has been done before. Hence, this study can be a basis for the retrieving potential evidence techniques as well as developing a complete SOP for the Xbox 360 forensic in the future. 2009-10 Thesis http://eprints.utm.my/id/eprint/11301/ http://eprints.utm.my/id/eprint/11301/1/HairulAzniMohdIsaMFSKSM2009.pdf application/pdf en public masters Universiti Teknologi Malaysia, Faculty of Computer Science and Information Systems Faculty of Computer Science and Information System Burke, P. K., and Craiger, J. P. (2007). Xbox Forensic. Journal of Digital Forensic Practice, 1, 1 – 8. Taylor and Francis. Casey, E. (2000). Handbook of Computer Crime. Forensic Science, Computer and the Internet. USA:Academic Press,. DNS. (2006). An introduction to computer forensics. UK: DNS (www.dns.co.uk). GASSP. (1999). Generally Accepted System Security Principles For Public Comment. USA: International Information Security Foundation. Graft, K. (2009, January 5). MS: 360 Life-to-Date Sales Hit 28m. Edge. Retrieved January 31, 2009, from http://www.edge-online.com/news/ms-360-life-datesales- hit-28m. Hamzah, Z. (2005). E-security Law and Strategy. Malaysia: LexisNexis – Malaysian Law Journal . Kent, K., Chevalier , S., Grance , T. and Dang , H. (2006). Guide to Integrating Forensic Techniques into Incident Response. (Special Publication 800-86). Gaithersburg, M.D.: National Institute of Standards and Technology. Kleiman, D. (Ed.), Cardwell, K., Clinton, T., Cross, M., Gregg, M., Varsalone, J. and Wright, C. (2007). The Official CHFI Study Guide (Exam 312-49) for Computer Hacking Forensic Investigators. (1st ed.) Burlington, M.A.: Syngress Publishing, Inc. NIST. (2001). Disk Imaging Tool Specification. USA: National Institute of Standards and Technology. NIST. (1996). Generally Accepted Principles and Practices for Securing Information Technology System. USA: National Institute of Standards and Technology. NIST Special Publication 800-86. (2006). Guide to Integrating Forensic Techniques into Incidents Response. USA: National Institute of Standards and Technology. Reyes, A. (Ed.), O'Shea, K., Steele, J., Hansen, J. R., Jean, B. R. and Ralph, T. (2007). Cyber Crime Investigations: Bridging the Gaps Between, Security Professionals, Law Enforcement, and Prosecutors . (1st ed.) Rockland, M.A.: Syngress Publishing, Inc. Turnbull, B. (2008). Forensic Investigation of the Nintendo Wii: A First Glance. Small Scale Digital Device Forensics Journal, 2 (1), 1 – 7. Small Scale Digital Device Forensics Journal (SSDDFJ). U. S. Department of Justice , Federal Bureau of Investigation (1999). Digital Evidence: Standards and Principles . USA: Forensic Science Communications. Vaughan, C. (2004). Xbox Security Issues and Forensic Recovery Methodology (Utilising Linux). Digital Investigation (2004), 1, 165 – 172. Science Direct. Yeager, R. (2006). Criminal Computer Forensics Management. Proceedings of The 3rd Annual Conference On Information Security Curriculum Development. 168-174. Association of Computing Machinery. |