4.5 Flashcards
What is Digital Forensics
- Collect and protect information relating to an intrusion.
- Need to be detail oriented
What are the guidelines for Digital Forensics
RFC 3227
What is a legal hold
- a legal technique to preserve relevant information
- Hold notification
- Separate repository for electronically stored information (ESI)
- Ongoing preservation
What is a capture video
- A moving record of the event
- Captures the status of the screen and the other volatile information
- Don’t forget security cameras and your phone
- The video content must be archived
Name five points of admissibility
- Not all data can be sued in a court of law
- Legal authorization
- Procedures and tools
- Laboratories
- Technical and academic qualifications
Control evidence, everyone who contacts the evidence, and label and cataloging everything is part of what system
Chain of custody
Recording time offsets
- The time zone determines how the time is displayed
- Different file systems store timestamps differently
- Record the time offset from the operating system
Name an event log and what does it do. Where would it be stored
- A system log
- Exports and stores for future reference
- Log store:
Linux: /var/log
Windows: Event Viewer
What is the Order of Volatility
How long does data stick around.
Name the Order of volatility from most to least volatile
- CPU registers, CPU cache
- Router table, ARP cache, process table, kernel statistics, memory
- Temporary file systems
- Disk
- Remote logging and monitoring data
- Physical configuration, network topology
- Archival media
Right to audit clauses
a legal agreement that allows the following option(s):
- To perform a security audit at any time
- Allows the ability to verify security before a breach occurs
Data breach notification laws
If consumer data is breached, the consumer must be informed
How does Hashing help to preserve integrity
Hashing leaves a digital fingerprint
How do Checksums help to preserve integrity
Protects against accidental changes during transmission. It is not designed to replace a hash
How does a Provenance help to preserve integrity
Documentation of authenticity
a chain of custody for data handling