Final Exam fall 2019 Flashcards

1
Q

Discuss the similarities and the differences between Digital Forensics and Digital Security

A

Similarites:
Work with risk assessments.
Work with policies

but different aims and functions.

Security wants to keep malware of the computer by upholding policies and like.
Security wants to sanitize the computer from all malware and other malicious files.

Forensics investigates how the computer came to be infected and if any policies were violated.
Forensics wants to preserve the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Discuss the similarities and the differences between Digital Forensics and Auditing

A

Both want to extract hidden data an analyze it.
Both imply methodical and systematic examination or processes.
Both are reactive.
Both should be done externally to ensure impartiality and independence.

Auditing can be scheduled as a recurring process.

???????

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Please enumerate the three main computer crime categories and explain their characteristics.

A

Computer as a target; system locked by ransomware, stolen company information

Computer as data repositories; storing illegal material

Computer as a tool; Sending virus, hacking, deleting files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Discuss the concept of Quality Assurance in the context of digital evidence and digital forensic examination.

A

Digital Evidence and Digital Forensics should produce high quality results that are; Reliable, Accurate, Reproducible and legally acceptable. Therefore it is necessary that the investigation and documentation is according to the QA Documentation set and upheld by the QA Manager

QA Manager makes sure all these policies and other do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain briefly the Locard’s principle.

How might Locard’s principle affect a digital event scene?

A

Contact between two items will result in an exchange of data and/or physical evidence.

Offender - evidence transf. - Crime Scene - evidence transf. - Victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is Daubert standard so important with respect to Digital Evidence?

A

Daubert standard defines the principles that makes the expert witness testimony admissible in the court of law.
( Judge as a gatekeeper, Reliable, Relevant, Scientific knowledge )

This is easy to apply in any situation and sets the standard for expert witness and the evidence presented. The Daubert standard is intensively tested, commonly agreed on and has known potential error rates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What makes the transportation of digital evidence such a critical factor in a digital forensic investigation?

A

It is always important to protect the chain of custody
Transportation makes it extra important to ensure that the transported evidence is the same as the original data and that nothing has been altered.
The transportation and packaging should be done with care to make sure that the evidence is protected from the environment and theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Contras live vs frozen system processing with respect to digital forensic examination.
Pros and Cons?

A

Live evidence:
Pros;
Possibility to find the live connections to other evidence and/or suspects.
Possibility of the system being unlocked/decrypted
Access to RAM
Possibility to find encryption keys in the memory

Cons;
Limited time
Might tip off or interfere with the attacker
Restricted by the order of volatility.
Risk of ruining evidence.
Transient process

Frozen evidence:
Pros;
More time
Less risk of accidentally contamination/destroying evidence

Cons;
Evidence can have been altered/hidden or destroyed by the offender before the system was frozen
No access to RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the property of preimage resistance mean in a context of a hashing function?

A

Preimage resistance = Shouldn’t be able to recreate a document with the hash value

Second Preimage Resistance = Shouldn’t be possible to create a new document with the same hash sum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does it mean to forensically “wipe clean” an acquisition drive?
Explain the ramifications of a forensically clean drive

A

To “wipe clean” an acquisition drive means that you “remove” all data from a drive to make it impossible to recover the data.

Ramification:
Being unable to recover any data from the drive.
Can’t find files from old case by mistake.
Chain of Custody

?????

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

State the digital evidence extraction/acquisition hierarchy.

A

The higher up the harder to do, less commonly used.

Micro-read
Chip-off
Physical
Logical
Manual
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is meant by the principle “Order of Volatility”?

Why is it important to apply this principal to a digital forensic acquisition?

A

You should collect your evidence in order of volatility; from the most volatile to the least volatile.

Registers, cash
Routing table, ARP cache, process table memory
Disk
Remote logging and monitoring data
Physical configuration, Network topology
Archival media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In the context of the Windows $MFT, please answer the following question:

What type of information can be retrieved from Standard Information attribute (SIA)?

A

A resident attribute identifier

Contains information about date and timestamps displayed by Windows and most forensics tools.

FYLL PÅ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the context of the Windows $MFT, please answer the following question:

What type of information can be retrieved from File Name Attribute (FNA)?

A

A resident attribute identifier

Reference to parent folder (by MFT Record Number)
File Names (Unicode)
File’s physical and logical size
Usually not updated through system usage
Useful for investigating date-time tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

As an investigator you have found a Link File on Windows system. This link file point to a missing file.

What could be the significance of this link file in your investigation?
Explain what information can be retrieved from it?

A

Link Files contain important user knowledge such as timestamps, volume label, UID an path to target.

It could provide knowledge about the existence of another disk. Might indicate knowledge, existence or usage of the linked file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why in the Windows operation system is there a difference between Logical file size and Physical file size?
What is the reason behind the appearance of the difference?

A

Logical size = Actual size of the file
Physical size = Represents the space the file allocates on the disk

When a file is saved the data is stored in clusters. If the cluster size is 512 bytes and a files Logical size is 678 bytes it will require two clusters to fit the 678 bytes, rendering the files Physical size to 1024 bytes. The unused space is called file slack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of information can be redrived from Standard Information Attribute (SIA)?

A

Resident attribute identifiers

Information about date and timestamps displayed by windows and most forensic tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of information can be retrieved from File Name Attribute (FNA)?

A

Reference to parent folder (by MFT Record Number)
File name (Unicode)
Files Physical and Logical Size
Usually not updated through system usage and is useful for investigating date-time tempering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Explain the concept of the “prefetch” folder in a Windows operation system and how it can be used to infer user activity.

A

Prefetch is a Windows program that speeds up programs and files by pre loading the ones that are used regularly by the user in order to be able to start them faster. In the Prefetch folder you see the last run time and run count.
If a file/program is shown in the prefetch folder it may prove that the program file has been opened by the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Differentiate between File Metadata and File System Metadata

A

File System Metadata contains informations such as timestamps, permissions, status of a file, resident or non resident and file path. (Data från att man hanterar filerna) (Attributes about the data in a spcific file)

File Metadata is created when the file is created and changed. GPS coordinates from a picture, camera model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does the “MAC times” stand for and what each for the properties represents. Explain how and when the violation of MAC times metadata can happen.

A

mtime - Modification - When were the file last modified?

atime - Access - When did the file last get opened?

ctime - Creation/Change - When did the file get created? (win) / When did the metadata last change? (unix)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Name one important forensic artifact that is present in a Windows 10 System, and what evidentiary value could it hold.

A

Link file, prefetch and the system hive all contain vital information about the user, the OS and it’s changes.

23
Q

If a Unix user tends to use a command line interface how might a systems administrator easily review what tha user had been doing on the system recently?

A

~/.bash_history

24
Q

Briefly outline the first tier and the second tier phases of the Digital Forensics Investigation Processing Framework

A
First tier; 
Preparation
Incidence response
Data collection
Data analysis
Presentation
Incident closure
Digital investigations principles

Second tier;
Complex processes from the first tear can be extended to the required level of details - for example the Data Analysis Phase can be extended to three objective sub-phases such as Survey, Extract and Examine.
Every sub phase may also be viewed as an abstraction. For instance the survey sub phase has four sub phases such as Physical medium, Media management event, File system application and Network.

25
Q

What is the highest level in the hierarchical model for the examination of digital evidence?

A

Few - Principles of examination

Large scape concepts
Consensus among professionals
Collective Scientific experience

26
Q

Who is the plaintiff and the accused in the case of a criminal investigation?

A

The Plaintiff (victim) is the party that contends that some actions took place which require legal remedy.

The Accused (perp) is the party who is accused of breaking the law and is responsible to answer the claim by the plaintiff.

27
Q

Discuss the concept of mutability in the context of digital evidence.

A

Evidence and a systems structure might change from its original state.
This is mainly a problem on transient evidence (RAM, cashe, register) compared to non volatile (disks, CD, DVD) . This is why its important to collect evidence following the order of volatility.

28
Q

What are the five concerns that should be addressed by a Digital Forensic Investigator (DFI) according to the FBI handbook of Forensic service?

A

Content - What type of data files are stored?
Comparison - Compare found data with known data
Transaction - Time and sequence of data files creation
Extraction - Retrieving the files from the computer
Format conversion - Convert to wanted format

29
Q

What is the avalanche effect when it refers to a specific hashing function?

A

If the input for a hashing function is changed the output will behave pseudo-randomly and there in no control over the new output.

Even if you only change 1 byte the hash sum will be totally different.

30
Q

Explain the concept of a file header and discuss to what extent it can be trusted as an indicator of a files contents.

A

A file header is the file’s signature and will hold information about the files format.

The file header might be an indication to the file’s content but can not be fully trusted. The header can be altered to hide the content of a file.

31
Q

What are the major differences between NTFS and FAT systems?

A
NTFS
16TB max file 
More efficient, faster and secure
Follows UTC time
Different compression alternatives

FAT
Only 4GB max file size
Compatible with most operation systems
Follows local time

32
Q

What is time frame analysis and why is it important?

A

Time frame analysis = timeline of incident events

Timeline analysis is mainly used for various purposes in the investigation which mainly involves collection information within particular time frame.

It is a great technique to determine the activity occurring on a system at a certain time. It helps to make inferences very fast in an easy manner.

33
Q

How can you differentiate between a Manual, User scheduled and Windows automatic defragmentation?

A

Manual Defrag. - mmc.exe has been utilized and you will be able to find timestamps and other information in the prefetch file.

User Scheduled Defrag. - Check the task scheduler id the task has been scheduled by the user.

Windows automatic Defrag. - WAD is scheduled to run about every three days by default on newer systems. Run on files listed in layout.ini

34
Q

What is Alternate Data Stream (ADS) and how can it by used in a malicious fashion?

A

(NTFS) ADS are files that can be tied to other “original” files and contain information about it. The size of an ADS in not accounted for in the size of the file.
Malicious software can be hidden in this entry.

The ADS is hidden unless you specifically look for it

Stored in $data attribute

35
Q

What is the purpose and the content of a file descriptor in a Unix-like OS?

A

????????

36
Q

What are the 7 main category’s of evidence

A

Hearsay - Heard outside court but used in cour

Testimony - Given by expert in a field to help court understand the case

Documentary - Provided by document

Real - Must be real

Direct - Firsthand - verbal

Original - First hand evidence - letters, financial statements

Circumstantial - No concrete evidence in it self but becomes evidence when used together with other evidende

37
Q

What are the significance of the Frye principle concerning digital evidence, its probative value and the admissibility in the court of law

A

All methods and techniques used to provide evidence in court should be publicly known, well tested, and its correctness of it should be known (accuracy or fail rate).

This ensures that the probative value and admissibility of the evidence are stronger since no untested or newly invented methods are used to decide if someone is is being charged or not.

38
Q

Which are types of forensics services according to FBI?

A

(FETCC)
Format Converting - Convert the evidence file for a more suitable file type
Extraction - from computer, external drive ect.
Transaction - Time and sequence of datafiles creation
Content - Find out the context of an evidence
Compare - Compare evidence to known files

39
Q

Casey Model?

A

Assess - Acquire - Analyze - Report

40
Q

Which duplication method produces an exact replica of the original drive?

A

Bit-by-Bit should give a close to exact replica of a drive. A physical copy gives more information (unallocated space and deleted items) which won’t be given by logical copy

41
Q

What is a residual data?

A

Residual data are data accidentally left behind on a computer when trying to completely remove files. Residual data stays on the computer and will be able to be found by a forensics investigator later on.

42
Q

Explain the concept of a “registry hive” in a Windows operation system and give examples of what kind of forensically interesting data may be found within.

A

The registry hives a major folder of the registry containing
keys
Subkeys
information about how the system is configured.
usernames/accounts
passwords
OS configured

43
Q

Briefly describe the usage of $Boot

A

Boot process of the system. Points to the files that are needed for initiating the system.

MBR?

44
Q

What is spoliation?

A

The act of intentionally destroy/remove/alter the evidence of interest in an investigation. This is a crime

45
Q

Where to you find information about when and how many times a USB device where connected to the system?

A

System/USBstor

All devices are identified with a unique ID. Can tell how man y times each device has been connected.
(Can also look in other places such as windows/setuplog)

46
Q

What is a Spool File in the context of printer files and what does it contain?

A

Spool file is created when a printing job is initiated. The file is only “alive as ling as the job is going and then deleted. A Spool File contains information about the printing;
name of the file, printer name and name of user account, size and format of the file and printing format.
Files can be left in the system if the job is never succefully printed

47
Q

When an operation system starts, what is the role of a boot-loader such as GRUB.

A

boot loaders job is to initiate the booting process, check the file needed and the process
check integrity of files loaded from MFT so nothing goes wrong

48
Q

Where will you search for artifacts from installed programs?

A

Programs installed are stored in a folder “installed programs”

Check prefetch files to see what programs are regularly used and run times.

Event log - When was the program installed.

SIA attribute to see what was last run/accessed

Can also check RAM for active sessions

49
Q

What is Data Run?

A

when data is too large to fit in $MFT (>600kb) a pointer is used to indicate where the data is being stored.

50
Q

What are the essential characteristics of the CFSAP model?

A

Computer Forensics Secure Analyze Present

CFSAP is the most abstract and least granular model. This model is an iterative model and not a linear model.

Secure;
Identify the source - Preserve digital evidence

Analysis;
Analysis of the evidence, extract, process, interpret

Present;
Presentation, report, testimony

51
Q

What kind of questions can be answered based on digital evidence using various methods for sequencing, linkage, source evaluation, and attribution?

A

Sequencing - What happened?

Linkage - The extent and the relations of interactions

Source evaluation - Sources and where they come from

Attribution - Allocation of responsibilities

52
Q

What is the first concern of the DF investigator when she/he wants to establish what evidence is admissible?

A
Relevant
Legal
Reliable
???
???
???
53
Q

Which are the main stakeholders in Digital Forensics?

A

Principals (Accused/Accuser)
Mediators
Regulators