Chapter 6 : Conducting Digital Investigations Flashcards

1
Q

What the use of forensics trusted methodologies and techniques ensure

A

That the analysis, interpretation, and reporting of evidence are reliable, objective, and transparent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

forensic computing

A

The process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The most common steps for conducting a complete and competent
digital investigation

A
  • *Preparation
  • *Survey/Identification
  • *Preservation
  • *Examination and Analysis
  • *Presentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Preparation

A

Generating a plan of action to conduct an effective digital investigation, and obtaining supporting resources and materials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Survey/Identification:

A

Finding potential sources of digital evidence (e.g., at a

crime scene, within an organization, or on the Internet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Preservation:

A

Preventing changes of in situ digital evidence, including isolating the system on the network, securing relevant log files, and collecting volatile data that would be lost when the system is turned off. This step includes subsequent collection or acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Examination and Analysis

A

Searching for and interpreting trace evidence.

Some process models use the terms examination and analysis interchangeably

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Presentation

A

Reporting of findings in a manner which satisfies the

context of the investigation, whether it be legal, corporate, military, or any other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Distinction between examination and Analysis in forensic

A

**forensic examination is the process of extracting and
viewing information from the evidence, and making it available for analysis.
**forensic analysis is the application of the scientific method and
critical thinking to address the fundamental questions in an investigation:
who, what, where, when, how, and why

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the end goal of most digital

investigation

A

To identify a person who is responsible and therefore the digital investigation needs to be tied to a physical investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital Crime scene preservation

A

Preventing changes in potential digital evidence, including network isolation, collecting volatile
data, and copying entire digital environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Accusation or Incident Alert

A

Every process has a starting point—a place, event, or for lack of a better term, a “shot from a starting gun” that signals that the race has begun

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What Computer security professionals should obtain

A

instructions and written authorization

from their attorneys before gathering digital evidence relating to an investigation within their organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why digital investigators should establish thresholds

A

in order to prioritize cases and make decisions about how to allocate resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What threshold considerations include

A

the likelihood of missing exculpatory evidence and seriousness of the offense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What threshold considerations disctates

A

When the considerations are not met, no further action is required. But when they are met, Continue to apply investigative resources based on the merits of evidence examined to this point with priority based on initial available information

17
Q

The history model

A

The history model is then related to
the general scientific method of observation, hypothesis formulation, and predicting
and testing, by casting the digital examination as a process of formulating
and testing hypotheses about previous states and events.

18
Q

the scientific method

A

is applied to each step of a digital investigation (preparation, survey, preservation, examination,
and analysis), which can guide a digital investigator through almost any investigative situation,

19
Q

Steps of the the scientific method

A

1-Observation:One or more events will occur that will initiate your investigation. These events will include several observations that will represent the initial facts of the incident. Digital investigators will proceed
from these facts to form their investigation.

2-Hypothesis: Based on the current facts of the incident, digital investigators will form a theory of what may have occurred

3-Prediction: Based on the hypothesis, digital investigators will then predict where the artifacts related to that event may be located

4 -Experimentation/Testing: Digital investigators will then analyze the available evidence to test the hypothesis, looking for the presence of the predicted artifacts.

5- Conclusion: Digital investigators will then form a conclusion based upon the results of their findings