Chapter 7 Flashcards
what is a vital source of digital evidence that historically has been neglected and ignored
RAM
what does RAM stand for
random access memory
what info does RAM contain
- info about the current running state of the system before you shut it down
- any running programs (legit AND malware)
- info related to network connections the host has w other peers (legit peer-peer sharing AND attackers host)
where would you look to find if a user has been sharing illicit images
RAM
what is the kitchen table of the computer system
RAM
where may we only find evidence of data being hosted in the cloud
RAM
can you recover encryption keys for closed encryted containers that have been created by the user
sometimes through RAM
if you were to take a forensic image of RAM at 2 diff times, what would you find
diff results
are you changing evidence when you collect RAM
yes
how is analyzing RAM diff from analyzing a hard drive
- RAM is a snapshot of a live running system
- hard drive examination is static
is storing on RAM quick
extremely fast
the data stored within RAM chips is considered to be _____
volatile
when do we lose volatile data
when the computer system is no longer powered on
what are the 2 diff types of RAM
- static RAM (SRAM)
- dynamic RAM (DRAM)
what are the differences between SRAM and DRAM
- SRAM
- faster
- more efficient w respect to energy use
- DRAM
- cheaper to produce
what is SRAM and DRAM typically used for
- SRAM cache memory for the CPU
- DRAM used for memory chips for the computer system
what does ROM stand for
read-only memory
what does ROM do
- permanently stores data within the memory chips
- NOT volatile
for the CPU to access the data/execute code being stored in the memory chips, what must exist
a unique location identifier to that data (an address)
what is privilege separation
- determines what a user, user account, the process is allowed to access
- a form of access control
- when used by the OS, helps provide system stability
how does privilege separation provide system stability
isolates users and the CPU kernel’s actions