Chapter 1: Foundations of Digital Forensics Flashcards

1
Q

Mujahiden Secrets 2

A

A tool developed by Islamist extremist to avoid detection and apprehension

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Positive aspect of increasing use of technologies by crminals

A

Abundance of digital evidence can be obtained to apprehend and prosecute criminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat to life and limb

A

A provision in the USA patriot Act which enables Internet Service Provider to provide law enforcement with information quickly, without waiting for search warrant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Digital evidence

A

Any data stored or transmitted using a computer that support or refute a theory of how an offense occurred or that address critical elements of the offense such as intent or alibi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What can digital evidence reveal

A

How a crime was committed, provide investigative leads, disprove or support witness statements, and identify likely suspects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Three group of computer systems

A

1- Open computer systems : Systems comprised of hard drives, keyboard, and monitors, and servers that obey standards.

2-Communication systems : Traditional telephone systems, wireless telecommunication systems, internet, network

3- Embedded computer systems: Mobile devices, smart card, navigation system,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What organizations anticipate by properly processing digital evidence

A

Protecting themselves against liabilities such as invasion of privacy and unfair dismissal claim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Term Forensic

A

Characteristic of evidence that satisfies its suitability for admission as fact and its ability to persuade based upon proof .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Forensic Science

A

The application of science to investigation and prosecution of crime to the just resolution of conflict.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What else forensic science provide in addition to scientific techniques and theories

A

Help reconstruct crimes and generate leads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Main goal in any ivestigation

A

To follow the trails that offenders leave during the commission of a crime and to tie perpetrators to the victims and crime scenes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Locard;s Exchange principle

A

Contact between two items will result in an exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trace evidence

A

Is the evidence that is produced during the exchange between individual and crime scene.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Categories of trait evidence

A
1- class characteristics : common traits in similar items
2- Individual characteristics: More unique, can be linked to a specific person or activity with greater certainty.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Forensic Soundness

A

In order to be useful in an investigation, digital evidence must be preserved and examined in a forensically sound manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Key to forensic soundness

A

Documentation

17
Q

Autentification

A

The process of ensuring that the recovered evidence is the same as the originally seized data,.

18
Q

How many steps are involved in autentification

A

Two steps :
1- Examination of the evidence to determine that it is what its proponent claims.
2- closer analysis to determine its probative value.

19
Q

Most important aspects of authentification

A

Maintaining and documenting the chain of custody.

20
Q

Potential consequences of breaking chain of custody includes:

A

Misidentification of evidence, contamination of evidence, lost of evidence or pertinent elements

21
Q

Purpose of integrity check

A

To show that evidence has not been altered from the time it was collected, thus supporting the authentication process.

22
Q

How integrity of evidence is checked in digital forensics

A

A comparison of the digital fingerprint for that evidence taken at the time of collection with the digital fingerprint of the evidence in its currents state.

23
Q

Message digest algorithm

A

Can be thought of a black box that accepts a digital object (file, program, or disk) and produces a number.

A message digest algorithm always produce the same number for a given input.

Also, a good message digest algorithm will produce a different number for different inputs.

24
Q

MD5 Alogorith

A

Takes as input a message arbitrary length and produce as output a 128-bit ‘fingerprint - unique characteristic” or “message digest”.

MD5 algorithm do not indicate that the associated evidence is reliable, as someone could have modified the evidence before the hash value was calculated..

25
Q

Objectivity in forensic analysis

A

Interpretation and presentation of evidence should be free from bias to provide decision makers the clearest view of the facts.

26
Q

Most effective approach to objectivity

A

1- Let the evidence speaks for it self as much as possible

2-Peer review process that assesses a forensic analyst’s finding from bias or any weakness.

27
Q

Evidence dynamics

A

Any influence that changes, relocates, obscures, or obliterates evidence regardless of intent between the time evidence is transferred and the time the case is resolved.