Chapter 3- Data Aquisition Flashcards
Advanced Forensic Format (AFF)
A file format designed for the storage and exchange of forensic evidence. It is a flexible format that allows for the inclusion of metadata and can handle multiple images and data types. An example of its use would be a digital forensic investigator using AFF to create a forensic image of a hard drive during an investigation.
Host protected area (HPA)
A hidden area on a hard drive that can be used to store data or software. It can be used by manufacturers to store firmware or diagnostic tools, but it can also be used by attackers to hide malicious code. An example of its use would be a manufacturer using HPA to store diagnostic tools on a hard drive to make it easier to service.
Live acquisitions
The process of collecting evidence from a running system or device, while it is still operational. This can include collecting data from memory, network connections, and running processes. An example of its use would be a digital forensic investigator collecting data from a computer that is still turned on and in use during an investigation.
Logical acquisition
The process of collecting data from a device or system based on its logical structure, such as files and directories. This can include data recovery from deleted files or partitions. An example of its use would be a digital forensic investigator recovering data from a deleted file on a hard drive during an investigation.
Raw format
A file format that contains the entire contents of a disk or other storage device, including any unused space. It can be used for forensic imaging, but is not suitable for data recovery or analysis. An example of its use would be a digital forensic investigator creating a raw image of a hard drive during an investigation.
Redundant array of independent disks (RAID)
A storage system that uses multiple disks to improve performance and reliability. RAID can be challenging to image and analyze, as data can be distributed across multiple disks. An example of its use would be a company using RAID to store important data and files on their server to improve performance and reliability.
Sparse acquisition
A type of forensic imaging that only captures the used portions of a disk or other storage device, rather than imaging the entire device. This can be useful for reducing the time and storage space required for forensic imaging. An example of its use would be a digital forensic investigator capturing only the used portions of a hard drive during an investigation to reduce the amount of data that needs to be analyzed.
Static acquisitions
The process of collecting evidence from a device or system that is turned off or disconnected. This can include removing hard drives or other storage devices for forensic analysis. An example of its use would be a digital forensic investigator removing a hard drive from a computer for analysis during an investigation.
Whole disk encryption
A security measure that encrypts the entire contents of a disk or other storage device, rather than individual files or directories. It can make data recovery and forensic analysis more challenging, as the data is inaccessible without the encryption key. An example of its use would be a company encrypting their hard drives to protect sensitive data from unauthorized access.
The main goal of a static acquisition is to
collect evidence from a device or system that is turned off or disconnected.
The three formats for digital forensics data acquisitions are
raw format, proprietary format, and logical format.
Two advantages of the raw format are that it
captures the entire contents of a disk and can be used for forensic imaging. Two disadvantages are that it can be large in size and is not suitable for data recovery or analysis.
Two features common with proprietary format acquisition files are that they
may include encryption and may require specialized software for analysis.
The unofficial standard for proprietary formats is
EnCase
Two commercial tools that can make a forensic sector-by-sector copy of a drive to a larger drive are
FTK Imager and EnCase.