Introduction to Digital Forensics Flashcards
Acquisition
- the process of obtaining a forensic sound image (physically or remotely) of the evidence to be analyzed
- the validity of other steps depends on the validity of this phase
What should investigators be able to guarantee?
- the delivery of the evidence is as it was found
- the evidence will not be exposed to alteration
How does just opening a file affect it?
- opening a file affects the temporal property of the file “time”, which will change the last access time of the file
What are the concealment steps?
- use digital safe containers for evidence keeping, such as antistatic bags and antistatic pads
- make sure the containers are well padded
- write notes on the tape to prevent tampering with the evidence
- ensure that the temperature and humidity ranges are adequate for all evidence
What is the most important part of the analysis phase?
- preserving evidence without alteration
- before starting your analysis, you should create a forensic image of the evidence and perform your analysis on this image
What is the second most important part of the analysis phase?
- validate all your analysis steps to ensure your results later, and to leave no holes for questioning by a defense attorney
Inculpatory Evidence
- supports a hypothesis
Exculpatory Evidence
- contradicts a hypothesis
Tampering Evidence
- indicates system tampering with the aim of deception
What is the 3rd investigation stage, and what should be included?
- Presentation
- a report of your analysis results
- mentions the artifacts you found and the steps you followed to reveal these artifacts and the tools used for analysis
Active Data
- all data and files that are created by the operating system or by a word processor, web browser, mail client or a scanner
- Examples include: documents, cached files, emails, and images
Archive and Backup Data
- all data that is organized and preserved for long-term storage to avoid data loss due to attacks or disasters.
- Backup data is created by making an identical copy of original files and folders
- Example: data on a CD, USB drive, or SAN device
What does Hidden Data Types encompass?
- metadata
- residual data
- replicant data
Metadata
- “data about data”
- used to provide context or additional information about data and files, such as date of file creation, or information about the file structure
- Metadata is considered one of the most valuable pieces of evidence as it contains a lot of information about a file, such as:
- name of the file owner
- file last access time
- modification time
Residual Data
- This is deleted data on the disk
Replicant Data
- generated when a program like word processor creates a temporary copy of an opened file
- this is needed as a backup to avoid data loss in case an error occurs and the file is forced to close without saving the changes
- these can be retrieved even after the file was deleted
What are examples of Residual Data?
- web cache
- temporary directories
- data blocks resulting from a move
- memory
Non-volatile data
- data that can be retrieved even if the computer has been turned off
Volatile data
- data that resides in RAM and is acquired only when the device is running
- loss of power results in the loss of volatile data
What characteristics should digital evidence have?
- admissibility: accepted in court
- authenticity: relevant to the case
- complete: no missing information
What are the basic requirements before starting forensic analysis?
- workstation running an OS
- write-blocker device
- digital forensic acquisition tools
- digital forensic analysis tools
- target drive to receive the source or suspect disk data
- - spare PATA or SATA ports
- - USB ports
Forensic Image
- duplicate of the evidence (bit-by-bit copy)
- allocated, unallocated, and free sectors on the source evidence should be copied to the storage device
- before copying, make sure the evidence is connected to a write blocker
Image Verifying
- after finishing the copy, you should make a has signature for both the original evidence and its copy and then compare the two hashes to ensure that the copy is an accurate duplicate of the evidence
- you should also create another image and keep it as an archive for further analysis
Crime Reconstruction
- forensic science discipline in which one gains “explicit knowledge of the series of events that surround the commission of a crime using deductive and inductive reasoning, physical evidence, scientific methods, and their interrelationships
- want to get a “full picture”: locations, devices, and events…how, when, and why…relationship between them and the crime
Temporal Analysis
- linking events together to get the timeline of the events that happened
What are the characteristics of admissible evidence?
- relevant
- reliable
- competent (acquired legally)