Introduction to Digital Forensics Flashcards
What is Digital Forensics?
A specialized branch of cybersecurity that involves the collection, preservation, analysis, & presentation of digital evidence to investigate cyber incidents, criminal activities, and security breaches. It applies forensic techniques to digital artifacts to uncover the truth behind cyber-related events.
What is the aim of digital forensics?
To reconstruct timelines, identify malicious activities, assess the impact of incidents, and provide evidence for legal or regulatory proceedings.
Where is electronic evidence collected from and what is collected?
Electronic evidence is collected from computers, mobile devices, servers, cloud services, and other digital sources. And the evidence can include files, emails, logs, databases, network traffic, and more.
Preservation of Evidence
Ensuring the integrity and authenticity of digital evidence is crucial.
Stages in the Forensic Process
- Identification
- Collection
- Examination
- Analysis
- Presentation
Forensic Process: Identification
Determining potential sources of evidence
Forensic Process: Collection
Gathering data using forensically sound methods
Forensic Process: Examination
Analyzing the collected data for relevant information
Forensic Process: Analysis
Interpreting the data to draw conclusions about the incident
Forensic Process: Presentation
Presenting findings in a clear and comprehensible manner
Types of Cases
- Cybercrime investigations (hacking, fraud, data theft)
- Intellectual property theft
- Employee misconduct investigations
- Data breaches and incidents affecting organizations
- Litigation support in legal proceedings
Basic steps for performing a forensic investigation
- Create a Forensic Image
- Document the System’s State
- Identify and Preserve Evidence
- Analyze the Evidence
- Timeline Analysis
- Identify Indicators of Compromise (IOCs)
- Report and Documentation
New Technology File System (NTFS)
A proprietary file system developed by Microsoft
Predecessor of NTFS
File Allocation Table (FAT)
What File Metada is stored in NTFS
Creation time, modification time, & attribute information
Master File Table (MFT)
A crucial component of NTFS that stores metadata for all files and directories on a volume. When files are deleted, their MFT entries are marked as available, but the data may remain on the disk untiil overwritten.
What do MFT Entries provide during examination?
Insights into file names, sizes, timestamps, and data storage locations
Unallocated Space on an NTFS volume
May contain remnants of deleted files or fragments of data
File slack
The unused portion of a cluster that may contain data from a previous file
File Signatures
Useful, along with file headers, in identifying file types.
Update Sequence Number (USN) Journal
A log maintained by NTFS to record changes made to files and directories
LNK Files
Windows shortcut files (LNK files) contain information about the target file or program, as well as timestamps and metdata
Prefetch Files
Generated by Windows to improve the startup performance of applications. Can indicate which programs have been run on the system & when they were last executed