20 first questions Flashcards

1
Q

Discuss and reason about the similarities and differences between the following:
Digital Forensics and Security

A

Similarities:
How to make data & information secure following implemented procedures. They can depend on each other

Differences:
DF is about how the security has been violated, finding the flaws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Discuss and reason about the similarities and differences between the following:
Digital Forensics and Auditing

A

Similarities:
Both are reactive
Both are done by external examiners

Differences:
Auditing can be done at any time, DF is more used after an occurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Discuss the concept of quality assurance in the context of digital evidence and
digital forensic examination. What are the key components of QA.

A
Digital evidece:
Integrity
Understandable
Admissible
Probative
Reliable
Accurate
Reproducible
Legally accepted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Please enumerate the three main computer crime categories and explain their
characteristics. Give an example for each one of the categories

A

Computer as target
Computer that have beenn hacked (object)

Computer as data storage
Store child pornograph, stolen passwords (object)

Computer as tool
For commiting a crime (subject)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain briefly the Locard’s principle? Provide at least two ways how
Locard’s principle might affect a digital event scene?

A

The perpetrator of a crime will both bring something to the crime scene and leave something

  1. The perpetrator steal identity via a Trojan horse an a computer - there may be lot of traces (the trojan itself, logs, changed password)
  2. USB inserted to steal something - registry of USB time and serial number
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are hypothesis formation and evaluation in the context of DFI?

A

The process of scientific metolodgy to proceed the case
A necessary start - may be proved or disproved
The prove hypotesis we perform multiple tests & experiments. If not succeded form another hypotesis and evalute that one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the essential characteristics of the CFSAP model?

A

Secure - obtain valuble data copy and store safley
Anayze - Use correct tools and metholodgy to analyze in order to obtain evidence
Present - Collect and present evidence, making them understandable to court

Computer Forensics Secure Analyze Present

important about CFSAP: iterative process about collecting and analyzing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Contrast live vs. frozen system processing with respect to digital forensic
examination. Pros and cons. Provide examples

A

Live:
Evidences changes in the live system
Duplicate main memory before doing operations
Maximum info to be reseved (RAM passwords, encryption keys, open connections)
Obtain order of volatility

Frozen:
prevents errors comitted after reported incident
may destroy evidence and ongoing processes

Malware that only resides in memory handled easily using live forensics dump of RAM - more difficult when frozen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the property of preimage resistance mean in a context of a hashing
function?

A

That its computonally infeasible to find the original message from the value in the hash sum. One way operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does it mean to forensically “wipe clean” an acquisition drive? Please
explain the ramifications of a forensically clean drive.

A

No data can be recoverd or carved from a wiped clean drive.

All the deleted files are owerwritten, a tool like eraser can be used to do this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

State the digital evidence extraction/acquisition hierarchy

A
Manual
Logical
Physical
Chipp-off
Micro read

Start from lowest level extracting as much data as possible manually (collect evidence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is meant by the term “Order of Volatility”? Why is it an important
principle to apply in a forensic acquisition

A

While collecting evidence order of volatility should be maintained = the most volatile memory on a system.

cache = more volatile then RAM
RAM = more volatile than drive

Less chance of data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain the concept of a ‘file header’ and discuss to what extent it can be
trusted as an indicator of a file’s contents

A

Info stored before tha actual data of the file. Tells the type (png, mp3, gif) - A kind of metadata about the file
Can be manipulated - like in the lab with mp3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why in the Windows operating system there is a difference between Logical
file size and Physical file size? What causes such a difference to appear

A

Every file has a logical and physical size. Physical larger or equal.
Its because how the system allocates space for the files - its arranged in clusters - all clusters are not filled = slack space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Briefly describe the usage of $LogFile

A

In MFT record
Data is persistent in logfile
Used in recovery in case of failure in MFT
Keeps track of transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of information can be retrieved from Standard Information
Attribute?
What type of information can be retrieved from File Name
Attribute?

A
SIA
Attribute in MFT
Holds info about files
Date-time, modification, access, creation
Frequently changed

FNA
Name, size parent directory
Date-time stamps not as frequently updated - maybe only creation date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Differentiate between Metadata and File System Metadata?

A

Metadata: data about data. Tells the characteristics of a file

File system metadata: Generic to all the files on that file system; File permissions, security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the importance of Thumbnail Cache in a Windows XP system for an
investigator?

A

When you view images = separate file is created thumbnail.db. Contains metadata about images.
If all images on a computer are deleted one might find them here

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In operating systems using NTFS, a term “slack space“ is very well know
phenomenon. Explain what it is and how it can be used in the context of
digital forensic investigations.

A

The “unused” space in a cluster. A cluster has a fixed space.
Sometimes it contain user deleted data .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Name one important forensic artifact that is present in a Windows 10 system,
and what evidentiary value it could hold.

A

Cortana artefacts - recorded activity, geo, location, timestamps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

If a Unix user tends to use a command line interface how might a systems
administrator easily review what that user had been doing on the system recently

A

By entering the “history” command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

With respect to content of this course; What is the definition of evidence on an overarching level?
With respect to the definition of evidence, what is the definition of the following:
e-Evidence or Digital evidence?

A

Evidence - includes everything that is used to determine and demonstrate the truth of a statement

E-evidence: is valuble info stored or transmitted in digital form and can be used at trial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The seven major types of evidence that has been presented during this course?
Please list and briefly explain the various types of evidence.

A

Circumstansial - not direct but can indicate something
Direct - first heard, eg letter
Real
Hearsay - gotten outside of court but re-produced in court
Documentation - documents
Testimony - produced by a person in front of court
Original

(Expert is a witness)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the major goal or purpose of a forensic examination process?
A) Which are the important attributes of the gathered evidence in order to maintain the forensic soundness of the evidence?
B) Why are these attributes so important?

A
To perform structured investigation while maintaining a documented chain of custody to find out what happend and who responsible
A) 
Understandable
Integrity
Reliable
Accurate
Reproducible
Legally accepted

B) To be admissible and probative and able to use in court

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Please provide an overarching description of the concept of data recovery. Also describe the following in more detail:
A) What various actions or processes can cause the need of data recovery?
B) Is the process of data recovery always the same? Explain and elaborate.

A

Trying to recover deleted or partially overwritten files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is residual data?

A

Data that was left after deleting something (ex a program) and the link file of the program is still on the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

As an investigator you have found a Link File on a Windows system. This link file points to a missing file. What could be the significance of this link file in your investigation? Explain what information can be retrieved from it

A

A link file can only be created if the target exist. It could therefore proove a file has existed. Evidence that may support the user knew about the target file. That the target file has been used frequently

28
Q

What is Hiberfil.sys and what information you can retrieve from it?

A

The file the system creates when going to hibernation mode. Contents: Basically a RAM image

29
Q

What is a Spool File in the context of printer files and what does it contain?

A

Contain actual data to be printed

30
Q

What information can you find from the System logs in a Windows system?

A

Events logged by Windows system. Like the faliure of a driver. Include events like errors, warnings, startup messages, external drives (like USB)

31
Q

In the context of the Windows $MFT, please answer the following questions:
A) What is the difference in the time stamps found in Standard Information Attribute and File Name Attribute?
B) What is the importance of Data Attribute?

A

A) SIA - more frequently updated & info about modifications
FNA - Timestamp when created

B) Can show whwre data is allocated (non residant or residant)
If not stored in DA it shows the cluster where its stored

32
Q

In the context of Windows OS file systems, please answer the following questions:
A) What is the file size potential of FAT?
B) What is the volume size potential of FAT?
C) What is the file size potential of NTFS?
D) What is the volume size potential of NTFS?

A

A) FAT file size = 4GB
B) FAT volume size = 2 TB
C) NTFS file size = 16 TB
D) NTFS volume size = 256TB

33
Q

The Windows setup log files are useful and important in order to identify the version or “flavor” of a Windows OS. In the context of Windows setup log files, please describe how the “setuplog.txt” log file is used with one sentence.

A

Keeps track of installations and problems with installations, errors, missing files, virus infections

34
Q

What is spoliation?

A

When evidence has been changed during investigation process

35
Q

What is a crime?

A

An act comitted in violation of the lae and after conviction its consequense is punishment

36
Q

Outline briefly the major differences between criminal and civil law.

A

Criminal:
Violates a statue
Punishment to perpetrator
Protection

Civil:
Cuases harm to induvidual, group or legal entity
Compensation for the injured party
Oppurtunity for injured party to bring lawsuit

37
Q

Explain how one can make digital evidence equivalent to scientific evidence

A

Once it can be used to prove the truth of an assertion, test hypotesis draw conclusions and publish findings.
Reliable methods must be used

38
Q

Explain the concept of the concept of ‘prefetch’ folder in Windows OS and how it can be used to infer user activity?

A

Contains info about programs used recently. Access times and dates of a program. By analysing the info the examiner can find out if a program has been used and when

39
Q

What is an alternate data stream (ADS), and how could a malicious entity use ADS for malicious purposes?

A

ADS - for some of its record keeping. The main idea is to store information about files.
Malware can be stored in the empty space of another file - it will not be displayed. And it could be run directly from the ADS without beeing extracted

40
Q

What is metadata in the context of Windows NTFS file systems?

A

The part of the file that contains info about ownership, permissions for the file

41
Q

Hashing is an identification method commonly used to catalogue and identify files. Explain how hashing may be used in forensic investigations.

A

Calculate a files fingerprint and verifying it
Key to make sure that authencity and integrity is beeing protected (chain of custody)
Classification - whitelisting or blacklisting

42
Q

What is the significance of SAM registry hive?

A

Info about all users accessed the system. attributes such as: names, logon count, last logon time, password change time.
Can be used to see if an application has been installed used by a specific user

43
Q

What is a ‘Shadow Copy’ process and why it is used?

A

A function in windows that allows takning manual or automatic backup copies or snapshots of files or volumes, even when in use

44
Q

Define what digital forensics is?

A

To perform structured investigation while maintaining a documented chain of custody to find out what happend and who responsible

45
Q

Which are the main stakeholders with respect to Digital Forensics?

A
Principals - accused or accuser
Decision makers - in the authority of investigations
Mediators
regulators
Management
Product owners
46
Q

What is a crime? With respect to the definition of a crime or unwanted event what is the purpose of (a) a criminal law, and (b) a civil law?

A

Crime - action that violate a law wich result in a punishment

a) a statue is violated and a guilty person is punished
b) a party has gained injuries in some way and need to get compensated - in court

47
Q

What is the significance of the Frye principle concerning digital evidence, its probative value, and the admissibility in the court of law?

A

All methods and techniques used to provide evidence in court should be publicy known and well tested. Correctness of it should be known - the accuracy or fail rate
This ensures that evidence is probative and admissible no untested methods are used to make a conviction

48
Q

Which are (according to FBI) types of forensic services?

A
content
Transportation
Extraction
Format converting
Compare
49
Q

What are the actions and the considerations to be taken account of during the access phase of the Casey model?

A

Is there really an access phase?

Assess phase:
Policies, laws, identify roles, identify evidence

Investigation type (Internal, civil, criminal)
Authority requierd (permissions, subpoena, warrant)
50
Q

What does the property of second preimage mean in a context of a hashing function?

A

Hash functions should have to property of 1 & 2 preimage.
Second preimage is that two message files should not result in the same hash value

51
Q

Which duplication method produces an exact replica of the original drive?

A

A bit-by-bit copy give close to exact replica of drive. A physical copy gives more information (unollacted space ex)

52
Q

What is a residual data?

A

Data accidentally left behind on a computer when trying to remove files, can be found by examiner

53
Q

Explain the concept of a ‘registry hive’ in a Windows operating system and give three examples of what kind of forensically interesting data may be found within

A

Folder of the registry containg keys, subkeys and values. Info about how the system is configurated, usernames, accounts, passwords. How OS is configed

54
Q

Briefly describe the usage of $Boot.

A

Points on files needed for the bootup process of the system

55
Q

As an investigator you have to answer when, how many and what types of USB devices were connected to the system under investigation? What are the important places that you as a forensic examiner need to look for in this context?

A

USB devices connected will be stord in a folder/ USBSTORE/ and identified with a unique id. Could tell how many times it has been connected. Look also in windows system logs and registry hives

56
Q

What is a Spool File in the context of printer files and what does it contain?

A

created when printer job is initiated. Contains info about the job, name of file, user account, size and format. Can be left on system if printing was not sucessfully done

57
Q

When an operating system starts, what is the role of a boot-loader such as GRUB.

A

Initiate the booting process - load the OS- check the files needed so that nothing goes wrong, check and load files.

58
Q

You are investigating a program “X” which was installed on a system running Windows OS. Please name the places where you will be searching for related artifacts?

A

Installed programs, check users permissions, SIA = when program was last accessed. Prefetch folder, hiber.sys, sys.log

59
Q

What is a Data Run? Give an example of how data runs work.

A

When data is non-resident in MFT a pointer shows in wich cluster data is stored. Data run = list of places where non resident files are stored

60
Q

What are the key features of digital evidence - explain!

A

Volatile - easy to lose, RAM, cache, registry temp data

Abstract - Difficult to present in court of law, loss of information when evidence is prepared for presentation

Transformative - Can change or transform. data can be lost or affected

61
Q

State the Dauberts standard

A

principles for the testimony of an expert witness

Judge is a gatekeeper
Evidence must be relevant
Evidence must be reliable
Scientific knowledge and methods used

62
Q

How can a forensic examiner use the Daubert standard

A

Evidence found = great value to the case, and must be handled with care to reach the standard. If not - its not admissible / probative. Standard = relevant evidence treach the court

63
Q

What is the chain of custody and how can it be used

A

Chain of custody = Preserve integrity of evidence

  1. House search - computer found and taken to station
  2. bit-by-bit cpoy of hard drive. Store original evidence safetly. A second bit - by bit copy and hash identification
  3. Copy is acquierd by examiner, verifyed be hash

All documented, keeping the people involved to a minimum

64
Q

A file system can identify wich OS was used to operate on the files within - discuss to what extent this is true

A

The filesystem cannot always identify the OS - but it can rule out some OS. FAT = prior to windows XP
NTFS = Windows XP or later
Mac and LInux - different file systems (Mac = APFS)

65
Q

What does the “MAC times” stand for and explain what each of the property represents. Explain how and when violation of MAC times metadata can happen

A

Modification time
Access time
Creation time

Should not be trusted blindly. In linux they can be manually changed.
When copying and movning files this can change