Data Acquisition & Duplication Flashcards

1
Q

What is Data Acquisition?

A

The process of imaging or otherwise obtaining information from a digital device and its peripheral equipment and media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Static

A

Non-Volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Live

A

Volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Order of Volatility

A
  1. Registers/Caches
  2. Routing tables/process table/memory
  3. Temporary files
  4. Disk and storage media
  5. Remote logging and monitoring data
  6. System configuration / topology
  7. Archival media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

First step in data collection?

A

Record the time, date, and command history of the system to establish an audit trail generate dates and times while executing each forensic tool or command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Static Data Collection:

Bit Stream vs. Backups (What’s the big difference?)

A
  1. Bit-stream disk to image

2. Bit-stream disk to disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NIST SP 800-88 R1 guidance defines three sanitization methods:

A
  1. Clear: Logical techniques applied to sanitize data in all storage areas using the standard read and write commands.
  2. Purge: Involves physical or logical techniques to make the target data recovery infeasible by using state-of-the-art laboratory techniques.
  3. Destroy: Enables target data recovery to be infeasible with the use of state- of-the-art laboratory techniques, which result in an inability to use the media for data storage.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Acquisition Formats

A
  1. Raw - understood by everything
  2. Proprietary - (by tool vendor)
  3. Advanced Forensics Format (AFF) - open source; file extensions include .afm for AFF metadata and .afd for segmented image files. Supports two compression formats: zlib and LZMA
  4. Advanced Forensics Framework 4 (AFF4) - AFF4 supports image signing and cryptography. Adopts a scheme of globally unique identifiers for identifying and referring to all evidence.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Basic AFF4 object types include:

A

Volumes: They store segments, which are indivisible blocks of data
Streams: These data objects can help in reading or writing
Graphs: Collections of RDF statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Generic Forensic Zip (gfzip)

A

provides an open file format for compressed, forensically complete, and signed disk image data files. It is a set of tools and libraries that can help in creating and accessing randomly accessible zip files. It uses multi-level SHA256 digests to safeguard the files. It also embeds the user’s metadata within the file metadata. This file format focuses on signed data and metadata sections using x509 certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logical vs. Sparse

A

Logical - Only specific types of files or specific files of interest to the case are captured
Sparse - Similar to logical, but also captures fragments of unallocated (deleted) data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CRC-32 - Cyclic Redundancy Code algorithm-32 (CRC-32)

A

is a hash function based on the idea of polynomial division.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MD5 - Message Digest 5

A

is an algorithm used to check data integrity by creating a 128-bit message digest from data input of any length.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SHA-1 - Secure Hash Algorithm-160

A

is a cryptographic hash function developed by the United States National Security Agency (NSA), and it is a US Federal Information Processing Standard (FIPS) issued by NIST. It creates a 160-bit (20-byte) hash value called a message digest. This hash value is a hexadecimal number, 40 digits long.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SHA-256

A

A cryptographic hash algorithm that creates a unique and fixed-size 256-bit (32-byte) hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly