Introduction to Digital Forensics Flashcards

1
Q

Acquisition

A
  • the process of obtaining a forensic sound image (physically or remotely) of the evidence to be analyzed
  • the validity of other steps depends on the validity of this phase
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What should investigators be able to guarantee?

A
  • the delivery of the evidence is as it was found

- the evidence will not be exposed to alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does just opening a file affect it?

A
  • opening a file affects the temporal property of the file “time”, which will change the last access time of the file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the concealment steps?

A
  • use digital safe containers for evidence keeping, such as antistatic bags and antistatic pads
  • make sure the containers are well padded
  • write notes on the tape to prevent tampering with the evidence
  • ensure that the temperature and humidity ranges are adequate for all evidence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the most important part of the analysis phase?

A
  • preserving evidence without alteration
  • before starting your analysis, you should create a forensic image of the evidence and perform your analysis on this image
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the second most important part of the analysis phase?

A
  • validate all your analysis steps to ensure your results later, and to leave no holes for questioning by a defense attorney
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Inculpatory Evidence

A
  • supports a hypothesis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Exculpatory Evidence

A
  • contradicts a hypothesis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tampering Evidence

A
  • indicates system tampering with the aim of deception
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the 3rd investigation stage, and what should be included?

A
  • Presentation
  • a report of your analysis results
  • mentions the artifacts you found and the steps you followed to reveal these artifacts and the tools used for analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Active Data

A
  • all data and files that are created by the operating system or by a word processor, web browser, mail client or a scanner
  • Examples include: documents, cached files, emails, and images
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Archive and Backup Data

A
  • all data that is organized and preserved for long-term storage to avoid data loss due to attacks or disasters.
  • Backup data is created by making an identical copy of original files and folders
  • Example: data on a CD, USB drive, or SAN device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does Hidden Data Types encompass?

A
  • metadata
  • residual data
  • replicant data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Metadata

A
  • “data about data”
  • used to provide context or additional information about data and files, such as date of file creation, or information about the file structure
  • Metadata is considered one of the most valuable pieces of evidence as it contains a lot of information about a file, such as:
    • name of the file owner
    • file last access time
    • modification time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Residual Data

A
  • This is deleted data on the disk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Replicant Data

A
  • generated when a program like word processor creates a temporary copy of an opened file
  • this is needed as a backup to avoid data loss in case an error occurs and the file is forced to close without saving the changes
  • these can be retrieved even after the file was deleted
17
Q

What are examples of Residual Data?

A
  • web cache
  • temporary directories
  • data blocks resulting from a move
  • memory
18
Q

Non-volatile data

A
  • data that can be retrieved even if the computer has been turned off
19
Q

Volatile data

A
  • data that resides in RAM and is acquired only when the device is running
  • loss of power results in the loss of volatile data
20
Q

What characteristics should digital evidence have?

A
  • admissibility: accepted in court
  • authenticity: relevant to the case
  • complete: no missing information
21
Q

What are the basic requirements before starting forensic analysis?

A
  1. workstation running an OS
  2. write-blocker device
  3. digital forensic acquisition tools
  4. digital forensic analysis tools
  5. target drive to receive the source or suspect disk data
    - - spare PATA or SATA ports
    - - USB ports
22
Q

Forensic Image

A
  • duplicate of the evidence (bit-by-bit copy)
  • allocated, unallocated, and free sectors on the source evidence should be copied to the storage device
  • before copying, make sure the evidence is connected to a write blocker
23
Q

Image Verifying

A
  • after finishing the copy, you should make a has signature for both the original evidence and its copy and then compare the two hashes to ensure that the copy is an accurate duplicate of the evidence
  • you should also create another image and keep it as an archive for further analysis
24
Q

Crime Reconstruction

A
  • forensic science discipline in which one gains “explicit knowledge of the series of events that surround the commission of a crime using deductive and inductive reasoning, physical evidence, scientific methods, and their interrelationships
  • want to get a “full picture”: locations, devices, and events…how, when, and why…relationship between them and the crime
25
Q

Temporal Analysis

A
  • linking events together to get the timeline of the events that happened
26
Q

What are the characteristics of admissible evidence?

A
  • relevant
  • reliable
  • competent (acquired legally)