Data Hiding Tactics for Windows and Unix File Systems Flashcards

1
Q

What were the two early incarnations of data hiding mentioned in the article?

A

Out-of-standard tracks on floppy disks and non-data fields of network patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

According to the article, hidden data may be thought of as a special case of what?

A

Data that is concealed, undiscovered, misplaced, absent, accidentally erased, and so on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the example given in the article of dark data that resides within light data?

A

Watermarking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Provide two examples of nonphysical data hiding

A

Cryptography and watermarking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary goal of cryptography?

A

Obscuring the content of a message, but not the communication of the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the primary goal of steganography?

A

Hiding the communication of a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary goal of digital watermarking?

A

Adding metadata to a message to establish ownership, provenance, source, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(T/F) The number of tracks/cylinders recognized by a disk controller has to be the same as the number of tracks/cylinders recognized by the operating system.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two structures of a hard disk drive?

A

Geometric structure and a set of nested data structures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the name of the area of a secondary storage device where vendors could store data that is protected from normal user activities?

A

The Host Protected Area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the feature that allows modification of the characteristics of a hard drive (e.g., the number of available clusters)?

A

Device Configuration Overlay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the name of the set of consecutive blocks on a hard disk that appear to an operating system as a separate volume (aka, drive in Windows or directory of mount point in Unix)?

A

A partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the name of the DOS partition at the beginning of a drive that contains the boot code and partition table?

A

Master Boot Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the name of the remaining area of a partition on a hard drive that cannot be accessed by the operating system by conventional means?

A

Volume slack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the name given to the unused sectors at the end of a partition that cannot be accessed by the operating system?

A

Superblock slack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(T/F) Bad blocks/sectors (e.g., $BadClus in NTFS) are not accessible to the operating system.

A

True

17
Q

(T/F) Hidden data may be stored in bad blocks/sectors (e.g., $BadClus in NTFS).

A

True

18
Q

What is “ram slack?”

A

OS pads a file that is not an exact multiple of sector size from memory

19
Q

What is Microsoft’s version of a resource fork?

A

Alternate Data Streams

20
Q

How long will an alternate data stream persist?

A

For the life of the attached file or folder and if it remains in an NTFS file structure

21
Q

What is a file carver?

A

Forensic tool to analyze data on a drive

22
Q

Eleven digital disk warrens in Windows and Unix file systems were discussed in this article. List 5.

A

Host Protected Area & Device Configuration Overlay, Volume Slack, Partition Slack, Superblock Slack, and Boot Record