Elements of digital forensics examination Flashcards
What is the key to forensic soundness?
Documentation!
Why does the standard “Preserve everything, change nothing” not work 100% ?
It is almost impossible to maintain in digital forensics, disk information sometimes alters the original, even if we use write-blockers
The legal standpoint of authentication is to determine the worthiness of the acquired data. How does it translate in the case of courts?
- the contents of the records have remained unchanged
- the info on the record originates from the purported source (human or machine)
- the extra info (like timestamps) that relate to the record is also accurate
Why is handling digital evidence sometimes harder than handling of “traditional” evidence?
- It´s volatile
- It´s abstract
- It´s transformative
The way we handle digital evidence may affect.. what?
- it´s veracity
- it´s fidelity
- It´s integrity
Veracity depends on fidelity, fidelity relies to integrity
What are the uses of hash functions?
- searching and filtering files during a forensic examination
- in security for storing passwords, electronic signatures for both integrity and authenticity
- to make sure to preserve the chain of custody
- classification to recognize well known files (white- and blacklisting)
What is the usual case for latent analysis? Step by step
- Hash the original - results in h1
- Make a copy of the disk
- Compute the hash value of the copy (image) - results in h2
- Analyze the copy in read-only mode
- Again compute the hash value of the copy to see that you have preserved the chain of custody
How do you make interpretation objective?
Objectivity - By keeping it free from bias and as clear as possible, let the evidence speak for itself.
Repeatability - independent validation and verification
Proper forensic processing should follow 4 steps, which?
- Collecting
- Examination
- Analysis
- Reporting
Which steps does the Casey model include? (6)
- Identification/Assessment
- Collection/Acquisition
- Preservation
- Examination
- Analysis
- Reporting
Explain acquisition and preservation
One needs to collect all the relevant information about:
Service providers - records of service, billings, subscribers and information from indirect providers that include utility companies, financial institutions and communication companies…
Storage devices - seizure of hardware, software, documentation, user notes and the media itself
What is the on-off principle and why is it needed?
What is on should stay on, what is off should stay off.
Going from on to off mat be a reason for a “lock-out”, going from off to on is modification of evidence
What can´t you forget while acquiring evidence?
Document everything if possible, even visually!
What is important while preserving the integrity of electronic devices?
The collection should be done according to the set of predefined policies. If transport is necessary, do it with extreme care!
Name two main things to think about while examining digital evidence
- Make a copy of the original evidence first, and work on that
- Plan the work ahead together with an investigator