Domain 7 - Security Operations Flashcards
Describe the proper process during an Incident Scene.
- ID the Scene
- Protect the environment
- ID evidence and potential sources of evidence
- Collect evidence
– hash + - Minimize the degree of contamination
Locard’s Exchange Principle
– perps leave something behind
What are the important factors within Evidence?
Sufficient Reliable Relevant Permissible Preserved and identifiable
Sufficient
persuasive enough to convince one of its validity
Reliable
consistent with fact, evidence has not been tampered with or modified
Relevant
relationship to the findings must be reasonable and sensible, Proof of crime, documentation of events, proof of acts and methods used, motive proof, identification of acts
Permissible
lawful obtaining of evidence, avoid: unlawful search and seizure, secret recording, privacy violations, forced confessions, unlawful obtaining of evidence
Preserved and identifiable
collection, reconstruction
Identification
labeling, recording serial number etc. Evidence must be preserved and identifiable
•Collection, documentation, classification, comparison, reconstruction
EVIDENCE LIFECYCLE
- Discovery
- Protection
- Recording
- Collection and identification
- Analysis
- Storage, preservation, transportation
- Present in court
- Return to owner
Witnesses that evidence is trustworthy, description of procedures, normal business methods collections, error precaution and correction
Best Evidence
–Primary Evidence–is used at the trial because it is the most reliable.
–Original documents–are used to document things such as contracts
– NOTE: no copies!
–Note: Oral is not best evidence though it may provide interpretation of documents, etc.
Secondary Evidence
–Not as strong as best evidence.
–A copy, Secondary Evidence, is not permitted if the original, Best Evidence, is available –Copies of documents.
–Oral evidence like Witness testimony
Direct Evidence
–Can prove fact by itself and does not need any type of backup.
–Testimony from a witness –one of their 5 senses:
•Oral Evidence is a type of Secondary Evidence so the case can’t simply stand on it alone But it is Direct Evidence and does not need other evidence to substantiate
Conclusive evidence
–Irrefutable and cannot be contradicted
–Requires no other corroboration
Circumstantial evidence
–Used to help assume another fact
–Cannot stand on its own to directly prove a fact
Corroborative Evidence
Supports or substantiates other evidence presented in a case
Hearsay Evidence
something a witness hears another one say. Also business records are hearsay and all that’s printed or displayed. One exception to business records: audit trails and business records are not considered hearsay when the documents are created in the normal course of business.
Interviewing
gather facts and determine the substance of the case.
Interrogation
–Evidence retrieval method, ultimately obtain a confession
The Process - Due Process
–Prepare questions and topics, put witness at ease, summarize information
–interview/interrogation plan
–Have one person as lead and 1-2 others involved as well
–never interrogate or interview alone
Opinion Rule
Requires witnesses to testify only about the facts of the case, cannot be used as evidence in the case.
Expert Witnesses
–Used to educate the jury, can be used as evidence
Six principles to guide digital evidence technicians as they perform media analysis, network analysis, and software analysis in the pursuit of forensically recovered evidence:
When dealing with digital evidence, all of the general forensic and procedural principles must be applied. Upon seizing digital evidence, actions taken should not change that evidence.
When it is necessary for a person to access original digital evidence, that person should be trained for the purpose.
All activity relating to the seizure, access, storage, or transfer of digital evidence must be fully documented, preserved, and available for review.
An individual is responsible for all actions taken with respect to digital evidence while the digital evidence is in their possession.
Any agency that is responsible for seizing, accessing, storing, or transferring digital evidence is responsible for compliance with these principles.
Media analysis
a branch of computer forensic analysis, involves the identification and extraction of information from storage media. This may include the following: Magnetic media (e.g., hard disks, tapes) Optical media (e.g., CDs, DVDs, Blu-ray discs) Memory (e.g., RAM, solid state storage) Techniques used for media analysis may include the recovery of deleted files from unallocated sectors of the physical disk, the live analysis of storage media connected to a computer system (especially useful when examining encrypted media), and the static analysis of forensic images of storage media.
Network Analysis
Forensic investigators are also often interested in the activity that took place over the network during a security incident. Network forensic analysis, therefore, often depends on either prior knowledge that an incident is underway or the use of preexisting security controls that log network activity. These include: Intrusion detection and prevention system logs Network flow data captured by a flow monitoring system Packet captures deliberately collected during an incident Logs from firewalls and other network security devices The task of the network forensic analyst is to collect and correlate information from these disparate sources and produce as comprehensive a picture of network activity as possible.