Explain the key aspects of digital forensics Flashcards
Documentation/evidence
Legal hold Video Admissibility Chain of custody Timelines of sequence of events Tags Reports Event logs Interviews
Legal hold
Legal hold refers to the fact that information that may be relevant to a court case must be preserved. Information subject to legal hold might be defined by regulators or industry best practice, or there may be a litigation notice from law enforcement or lawyers pursuing a civil action. This means that computer systems may be taken as evidence, with all the obvious disruption to a network that entails.
Video
Making an audio or video recording of witness statements produces a more reliable record but may make witnesses less willing to make a statement. If a witness needs to be compelled to make a statement, there will be legal issues around employment contracts (if the witness is an employee) and right to legal representation.
Admissibility
Chain of custody
The record of evidence history from collection, to presentation in court, to disposal.
Timelines of sequence of events
Time stamps
Time offset
Time stamps
NTFS uses UTC “internally” but many OS and file systems record time stamps as the local system time. When collecting evidence, it is vital to establish how a timestamp is calculated and note the offset between the local system time and UTC.
Time offset
In forensics, identifying whether a time zone offset has been applied to a file’s time stamp.
Tags
Tags—apply standardized keywords or labels to files and metadata to help organize the evidence. Tags might be used to indicate relevancy to the case or part of the case or to show confidentiality, for instance.
Reports
A digital forensics report summarizes the significant contents of the digital data and the conclusions from the investigator’s analysis. It is important to note that strong ethical principles must guide forensics analysis.
Analysis must be performed without bias. Conclusions and opinions should be formed only from the direct evidence under analysis.
Analysis methods must be repeatable by third parties with access to the same evidence.
Ideally, the evidence must not be changed or manipulated. If a device used as evidence must be manipulated to facilitate analysis (disabling the lock feature of a mobile phone or preventing a remote wipe for example), the reasons for doing so must be sound and the process of doing so must be recorded.
Defense counsel may try to use any deviation of good ethical and professional behavior to have the forensics investigator’s findings dismissed.
Event logs
Digital evidence is not just drawn from analysis of host system memory and data drives. An investigation may also obtain the event logs for one or more network appliances and/or server hosts. Similarly, network packet captures and traces/flows might provide valuable evidence. On a typical network, sensor and logging systems are not configured to record all network traffic, as this would generate a very considerable amount of data. On the other hand, an organization with sufficient IT resources could choose to preserve a huge amount of data. A Retrospective Network Analysis (RNA) solution provides the means to record network events at either a packet header or payload level.
Interviews
As well as digital evidence, an investigator should interview witnesses to establish what they were doing at the scene, whether they observed any suspicious behavior or activity, and also to gather information about the computer system. An investigator might ask questions informally and record the answers as notes to gain an initial understanding of the circumstances surrounding an incident.
Acquisition
Order of volatility Disk Random-access memory (RAM) Swap/pagefile OS Device Firmware Snapshot Cache Network Artifacts
Order of volatility
The order in which volatile data should be recovered from various storage locations and devices after a security incident occurs.
Disk
Disk image acquisition refers to acquiring data from non-volatile storage. Non-volatile storage includes hard disk drives (HDDs), solid state drives (SSDs), firmware, other types of flash memory (USB thumb drives and memory cards), and optical media (CD, DVD, and Blu-Ray). This can also be referred to as device acquisition, meaning the SSD storage in a smartphone or media player. Disk acquisition will also capture the OS installation, if the boot volume is included.