Introduction to Digital Forensics Flashcards
1
Q
Acquisition
A
- the process of obtaining a forensic sound image (physically or remotely) of the evidence to be analyzed
- the validity of other steps depends on the validity of this phase
2
Q
What should investigators be able to guarantee?
A
- the delivery of the evidence is as it was found
- the evidence will not be exposed to alteration
3
Q
How does just opening a file affect it?
A
- opening a file affects the temporal property of the file “time”, which will change the last access time of the file
4
Q
What are the concealment steps?
A
- use digital safe containers for evidence keeping, such as antistatic bags and antistatic pads
- make sure the containers are well padded
- write notes on the tape to prevent tampering with the evidence
- ensure that the temperature and humidity ranges are adequate for all evidence
5
Q
What is the most important part of the analysis phase?
A
- preserving evidence without alteration
- before starting your analysis, you should create a forensic image of the evidence and perform your analysis on this image
6
Q
What is the second most important part of the analysis phase?
A
- validate all your analysis steps to ensure your results later, and to leave no holes for questioning by a defense attorney
7
Q
Inculpatory Evidence
A
- supports a hypothesis
8
Q
Exculpatory Evidence
A
- contradicts a hypothesis
9
Q
Tampering Evidence
A
- indicates system tampering with the aim of deception
10
Q
What is the 3rd investigation stage, and what should be included?
A
- Presentation
- a report of your analysis results
- mentions the artifacts you found and the steps you followed to reveal these artifacts and the tools used for analysis
11
Q
Active Data
A
- all data and files that are created by the operating system or by a word processor, web browser, mail client or a scanner
- Examples include: documents, cached files, emails, and images
12
Q
Archive and Backup Data
A
- all data that is organized and preserved for long-term storage to avoid data loss due to attacks or disasters.
- Backup data is created by making an identical copy of original files and folders
- Example: data on a CD, USB drive, or SAN device
13
Q
What does Hidden Data Types encompass?
A
- metadata
- residual data
- replicant data
14
Q
Metadata
A
- “data about data”
- used to provide context or additional information about data and files, such as date of file creation, or information about the file structure
- Metadata is considered one of the most valuable pieces of evidence as it contains a lot of information about a file, such as:
- name of the file owner
- file last access time
- modification time
15
Q
Residual Data
A
- This is deleted data on the disk