computer forensics Flashcards

1
Q

List examples of input devices?

A
  1. Keyboard
  2. Mouse
  3. JoyStick
  4. Scanner
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List examples of output devices?

A
  1. Monitor
  2. Printer
  3. Speakers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is true of data storage and retrieval?

A

A. Examiners must be familiar with the file system they are examining
B. Evidence may be found in various computer locations and formats
C. There are two categories for data-related evidence:
1. Visible data
2. Latent data
D. The formatting process initializes portions of the hard drive so that it can store data, and it creates the structure of the file system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Compare and contrast ROM and RAM.

A

Read Only Memory (ROM) – chips that store programs called firmware and are used to
start the boot process and configure a computer’s components
Random Access Memory (RAM) – the location in a computer where the operating system that
is in use can be stored and retrieved for quick reference by the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the initial steps in crime scene documentation for cyber crimes?

A
  1. The scene should be initially documented in as much detail as possible before any
    evidence is moved and examined
  2. Crime scene documentation is accomplished through two actions:
    a) Sketching – the crime scene must be thoroughly diagramed and sketched
    in a floor plan format
    b) Photographing – from all locations and all possible angles, and include
    wide and close-up images
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the correct way to process a computerized crime scene?

A

-Similar to processing a traditional crime scene (i.e. warrants, documentation, investigation techniques)
- Documentation is a significant component in the computerized crime scene

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is data obtained from a system so that a forensic image can be created?

A

Because booting a HDD to its operating system changes many files and could destroy
evidentiary data, the data is generally obtained by removing the HDD from the system and
placing it in a laboratory forensic computer so that a forensic image can be created
F. Occasionally, in cases with specialized or unique equipment/systems the image of the
HDD must be obtained by using the seized computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identify examples of user-created data.

A

Visible data is Data from a computer that is openly visible and easily available to users. It can encompass (from an evidentiary standpoint) any type of user- created data like
1. Word processing documents
2. Spreadsheets
3. Accounting records
4. Databases
5. Pictures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is meant by temporary files?

A

Files temporarily written by an application to perform a function
1. Most programs automatically save a temporary copy of the file in progress
2. Can be valuable as evidence
3. Can sometimes be recovered during a forensic examination including some of the data
that may have been altered from a previous version
Another type of temporary file valuable to the computer investigator is the printer spool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why can data be recovered from a printer spool?

A
  1. When a print job is sent to the printer a spooling process delays the sending of the
    data so the application can continue to work while the printing takes place in the
    background
  2. When the print job occurs, a temporary print spool file is created
  3. This file contains a copy of all of the data from the printer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define forensic image acquisition.

A

The process of creating a bit for bit copy of data on a storage device in a forensically sound manner.
Because booting a HDD to its operating system changes many files and could destroy
evidentiary data, the data is generally obtained by removing the HDD from the system and
placing it in a laboratory forensic computer so that a forensic image can be created

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between visible data and latent data?

A

Visible data is data from a computer that is openly visible and easily available to users
1. Word processing documents
2. Spreadsheets
3. Accounting records
4. Databases
5. Pictures

Latent data is the areas of files and disks that are typically not apparent to the computer user
Includes data in
1. Swap space (used to conserve the valuable RAM within the computer system)
2. RAM slack – the area from the end of the logical file to the end of the sector
3. File slack – the remaining area from the end of the final sector containing data to the
end of the cluster
4. Unallocated space – the space on a hard drive that contains available space; the
space may also contain temporary and deleted files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Compare and contrast a sector and a cluster.

A

Sector – the smallest unit of data addressable by a hard disk drive, generally consisting of 512 bytes
Cluster – a group of sectors in multiples of two, typically the minimum space allocated in a file commonly, a cluster will have four or eight sectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is meant by defragmenting a Hard Disk Drive?

A

Defragmenting a HDD involves reconnecting noncontiguous data, a method of storing data in sectors of memory that are not adjoining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can degrade the performance of a HDD, causing the read/write heads to have to traverse the platters to locate the data?

A

Fragmentation of numerous files can degrade the performance of a HDD, causing the read/write heads to have to traverse the platters to locate the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When a user deletes files, what happens to the data that remains behind?

A
  1. The first character in the files directory entry (its name) is replaced with the Greek letter sigma
  2. When the sigma replaces the first character, the file is no longer viewable through
    conventional methods and the operating system views the space previously occupied by the file as available
17
Q

Differentiate between modems, DSL lines, and WiFi.

A

An aspect of the internet includes various methods of connection that include
3. Wire
a) Modem – a device that allows computers to exchange and transmit information
through telephone lines
b) Cable lines or DSL telephone lines – provide higher speed broadband
Connections
4. Wireless (Wi-Fi)
Each computer that connects to the Internet has a unique numerical Internet Provider
(IP) address and usually a name

18
Q

Define search engines and web browsers.

A

A browser is a piece of software that retrieves and displays web pages; a search engine is a website that helps people find web pages from other websites

19
Q

Law enforcement faces new challenges with Internet crimes. What are these challenges?

A
  1. Most law enforcement officers are not trained in the technologies
  2. Internet crimes span multiple jurisdictions
  3. There is a need to retrofit new crimes to existing laws

Computers are used to commit a variety of crimes
1. Identity Theft
2. Fraud
3. Industrial espionage
4. Child pornography
5. Harassment
6. Gambling
7. Piracy
8. Computer viruses and spam

20
Q

What are the tasks of forensic investigators?

A

The task of forensic investigators includes
1. Restoring deleted files and emails
2. Finding the hidden files through complex password encryption programs and searching
techniques
3. Tracking criminals through the digital trail — IP addresses, to ISPs, to the offender

21
Q

What is the difference between hardware and software?

A
  • Hardware is the physical material that creates a computer
  • Software are the programs and applications that carry out a set of instructions on the hardware
22
Q

Why do forensic examiner’s remove the HDD from the system and place it in a laboratory forensic computer?

A

Because booting a HDD to its operating system changes many files and could destroy evidentiary data, the data is generally obtained by removing the HDD from the system and placing it in a laboratory forensic computer so that a forensic image can be created.