4.5: Explain the key aspects of digital forensics. Flashcards

1
Q

Documentation/Evidence

A

Direct evidence Oral testimony that proves a specific fact (such as an eyewitness’s statement). The knowledge of the facts is obtained through the five senses of the witness, with no inferences or presumptions.

  • Real evidence Also known as associative or physical evidence, this includes tangible objects that prove or disprove a fact. Physical evidence links the suspect to the scene of a crime.
  • Documentary evidence Evidence in the form of business records, printouts, manuals, and the like. Much of the evidence relating to computer crimes is documentary evidence.
  • Demonstrative evidence Used to aid the jury and can be in the form of a model, experiment, chart, and so on, offered to prove that an event occurred.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Legal Hold

A

In the U.S. legal system, legal precedent requires that potentially relevant information be preserved at the instant a party “reasonably anticipates” litigation or another type of formal dispute. Although this sounds technical, it is fairly easy to grasp: once an organization is aware that it needs to preserve evidence for a court case, it must do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Admissibility

A
  • Sufficient evidence The evidence must be convincing or measure up without question.
  • Competent evidence The evidence must be legally qualified and reliable.
  • Relevant evidence The evidence must be material to the case or have a bearing on the matter at hand.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Chain of Custody

A

After evidence is collected, it must be properly controlled to prevent tampering. The chain of custody accounts for all persons who handled or had access to the evidence. More specifically, the chain of custody shows who obtained the evidence, when and where it was obtained, where it was stored, and who had control or possession of the evidence for the entire time since the evidence was obtained. Any and all access to the evidence is recorded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The following are the critical steps in a chain of custody:

A
  1. Record each item collected as evidence.
  2. Record who collected the evidence along with the date and time it was collected or recorded.
  3. Write a description of the evidence in the documentation.
  4. Put the evidence in containers and tag the containers with the case number, the name of the person who collected it, and the date and time it was collected or put in the container.
  5. Record all message digest (hash) values in the documentation.
  6. Securely transport the evidence to a protected storage facility.
  7. Obtain a signature from the person who accepts the evidence at this storage facility.
  8. Provide controls to prevent access to and compromise of the evidence while it is being stored.
  9. Securely transport the evidence to court for proceedings.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

EXAM TIP

A

Never analyze the seized evidence directly. The original evidence must be secured and protected with a chain of custody. It should never be subjected to a forensic examination because of the fragile nature of digital evidence. A forensic copy, however, can be examined and, if something goes wrong, discarded, and the copy process can be repeated. A good forensics process will prove that the forensic copy is identical to the original at the start and at the end of the examination. From a practical standpoint, investigators usually make multiple forensic copies and perform their analysis in parallel on the multiple copies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Acquisition

A

Acquisition refers to the collection of information that may be evidence in an investigation. Evidence consists of the documents, verbal statements, and material objects admissible in a court of law. Evidence is critical to convincing management, juries, judges, or other authorities that a particular event has occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Order of Volatility

A

tems such as the state of the CPU and its registers, RAM, and even storage are always changing, which can make the collection of electronic data a difficult and delicate task. These elements tend to change at different rates, and you should pay attention to the order of volatility, or lifetime of the data, so that you can prioritize your collection efforts after a security incident to ensure you don’t lose valuable forensic evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Following is the order of volatility of digital information in a system:

A
  1. CPU, cache, and register contents (collect first)
  2. Routing tables, ARP cache, process tables, kernel statistics
  3. Live network connections and data flows
  4. Memory (RAM)
  5. Temporary file system/swap space
  6. Data on hard disk
  7. Remotely logged data
  8. Data stored on archival media/backups (collect last)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Right to Audit Clauses

A

The only rights the customer has are detailed in the service level agreements/contracts with the cloud provider. This makes the Right to Audit clause a critical requirement of any service level agreement, and its specificity needs to match the operational and regulatory scope of the cloud engagement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

E-Discovery

A

Electronic discovery, or e-discovery, is the term used for the document and data production requirements as part of legal discovery in civil litigation. When a civil lawsuit is filed, under court approval, a firm can be compelled to turn over specific data from systems pursuant to the legal issue at hand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Nonrepudiation

A

Nonrepudiation is a characteristic that refers to the inability to deny an action has taken place. This can be a very important issue in transactions via computers that involve money or things of value. Did the transaction occur and did the parties involved actually do it?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly