Jump to content

Database forensics

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Taylordavison (talk | contribs) at 18:04, 12 December 2012. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Database Forensics is a branch of digital forensic science relating to the forensic study of databases and their related metadata.[1]

The discipline is similar to computer forensics, following the normal forensic process and applying investigative techniques to database contents and metadata. Cached information may also exist in a servers RAM requiring live analysis techniques.

A forensic examination of a database may relate to the timestamps that apply to the update time of a row in a relational table being inspected and tested for validity in order to verify the actions of a database user. Alternatively, a forensic examination may focus on identifying transactions within a database system or application that indicate evidence of wrongdoing, such as fraud.

Software tools such as ACL, Idea and Arbutus (which provide a read-only environment) can be used to manipulate and analyse data. These tools also provide audit logging capabilities which provide documented proof of what tasks or analysis a forensic examiner performed on the database.

Currently many database software tools are in general not reliable and precise enough to be used for forensic work as demonstrated in the first paper published on database forensics.[2] There is currently a single book published in this field,[3] though more are destined.[4] Additionally there is a subsequent SQL Server forensics book by Kevvie Fowler named SQL Server Forensics which is well regarded also.[5]

The forensic study of relational databases requires a knowledge of the standard used to encode data on the computer disk. A documentation of standards used to encode information in well-known brands of DB such as SQL Server and Oracle has been contributed to the public domain.[6][7]

It is important to note, for evidential purposes, that because the forensic analysis of a data base is not executed in isolation, the technological frame work within which a subject database exit, is crucial to understanding and resolving questions of data authenticity and integrity especially as it relates to database users.

Methods

Familial DNA testing is an investigation tool that employs the use to Database forensics to convict criminals and exonerate innocent people convicted of crimes. Familial DNA testing is used when DNA found at a crime scene strongly resembles DNA already in the database. The two pieces of DNA are likely to be related persons, and the perpetrator is tracked down based on the information of the relative in the database.[8] This technique is surrounded by controversy regarding whether it i an invasion of privacy, and whether it could lead to an increase of racial profiling amount the judicial system. Other scholars argue, however, that the potential of convicting criminals that are harmful to society far outweighs any potential of privacy invasion or racial profiling. [9]

Further reading

References

  1. ^ Olivier, Martin S. (2009). "On metadata context in Database Forensics". Science Direct. doi:10.1016/j.diin.2008.10.001. Retrieved 2 August 2010. {{cite web}}: Check |doi= value (help); Unknown parameter |month= ignored (help)
  2. ^ Oracle Database Forensics using LogMiner - GIAC Certified Student Practical
  3. ^ Oracle Forensics ISBN 0-9776715-2-6 (May 2008)
  4. ^ Oracle Forensics Using Quisix ISBN 0-470-19118-X (Dec 2008)
  5. ^ SQL Server Forensics ISBN 0-321-54436-6 (Dec 2008)
  6. ^ SANS Institute - Forensic Analysis of a SQL Server 2005 Database Server
  7. ^ Oracle Forensics and Incident Response - databasesecurity.com
  8. ^ [1] "Double Helix Jeopardy"
  9. ^ [2] "It's All Relative: DNA Testing and the Fourth Amendment"