Module 6 - Digital Forensics Flashcards

1
Q

Digital Forensics

A

Digital forensics is the recovery and investigation of information found on digital devices as it relates to criminal activity. Indicators of compromise are the evidence that a cybersecurity incident has occurred. This information could be data on storage devices, in volatile computer memory, or the traces of cybercrime that are preserved in network data, such as pcaps and logs. It is essential that all indicators of compromise be preserved for future analysis and attack attribution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Private Investigations

A

Cybercriminal activity can be broadly characterized as originating from inside of or outside of the organization. Private investigations are concerned with individuals inside the organization. These individuals could simply be behaving in ways that violate user agreements or other non-criminal conduct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data breach involving Patient information

A

under the US HIPAA regulations, if a data breach has occurred that involves patient information, notification of the breach must be made to the affected individuals. If the breach involves more than 500 individuals in a state or jurisdiction, the media, as well as the affected individuals, must be notified. Digital forensic investigation must be used to determine which individuals were affected, and to certify the number of affected individuals so that appropriate notification can be made in compliance with HIPAA regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NIST Special Publication 800-86 Guide to Integrating Forensic Techniques into Incident Response

A

NIST Special Publication 800-86 Guide to Integrating Forensic Techniques into Incident Response is a valuable resource for organizations that require guidance in developing digital forensics plans. For example, it recommends that forensics be performed using the four-phase process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital Evidence Forensic Process

A
  • Collection
  • Examination
  • Analysis
  • Reporting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Collection

A

This is the identification of potential sources of forensic data and acquisition, handling, and storage of that data. This stage is critical because special care must be taken not to damage, lose, or omit important data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Examination

A

This entails assessing and extracting relevant information from the collected data. This may involve decompression or decryption of the data. Information that is irrelevant to the investigation may need to be removed. Identifying actual evidence in large collections of data can be very difficult and time-consuming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Analysis

A

This entails drawing conclusions from the data. Salient features, such as people, places, times, events, and so on should be documented. This step may also involve the correlation of data from multiple sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Reporting

A

This entails preparing and presenting information that resulted from the analysis. Reporting should be impartial and alternative explanations should be offered if appropriate. Limitations of the analysis and problems encountered should be included. Suggestions for further investigation and next steps should also be made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of Evidence

A
  • Best evidence
  • Corroborating evidence
  • Indirect evidence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Best evidence

A

This is evidence that is in its original state. This evidence could be storage devices used by an accused, or archives of files that can be proven to be unaltered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Corroborating evidence

A

This is evidence that supports an assertion that is developed from best evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Incident Evidence

A

This is evidence that, in combination with other facts, establishes a hypothesis. This is also known as circumstantial evidence. For example, evidence that an individual has committed similar crimes can support the assertion that the person committed the crime of which they are accused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Direct Evidence

A

Direct evidence is evidence that was indisputably in the possession of the accused, or is eyewitness evidence from someone who directly observed criminal behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IETF RFC 3227

A

IETF RFC 3227 provides guidelines for the collection of digital evidence. It describes an order for the collection of digital evidence based on the volatility of the data. Data stored in RAM is the most volatile, and it will be lost when the device is turned off. In addition, important data in volatile memory could be overwritten by routine machine processes. Therefore, the collection of digital evidence should begin with the most volatile evidence and proceed to the least volatile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Chain of Custody

A

Chain of custody involves the collection, handling, and secure storage of evidence. Detailed records should be kept of the following:

  • Who discovered and collected the evidence?
  • All details about the handling of evidence including times, places, and personnel involved.
  • Who has primary responsibility for the evidence, when responsibility was assigned, and when custody changed?
  • Who has physical access to the evidence while it was stored? Access should be restricted to only the most essential personnel.
17
Q

Preservation of Original Data

A
  • When collecting data, it is crucial to maintain its original condition.
  • Timestamps of files must be preserved as they may be part of the evidence.
  • Analysis should only be conducted on copies of the original data to prevent accidental loss or alteration of evidence.
  • Avoid opening files directly from the original media.
18
Q

Recording the Copying Process

A
  • Document the process used to create copies of the evidence for the investigation.
  • Prefer direct bit-level copies of the original storage volumes when making copies.
  • Enable comparison between the archived disc image and the investigated disk image to detect tampering.
  • Archive and protect the original disk to maintain its untampered condition.
19
Q

Preservation of Volatile Memory

A

Volatile memory may contain forensic evidence. Use special tools to preserve this evidence before shutting down the device to prevent data loss. Do not disconnect, unplug, or turn off infected machines unless instructed to do so by security personnel.

20
Q

Ensure Evidence Preservation

A
  • Preservation of original data
  • Recording the copying process
  • Preservation of volatile memory
21
Q

Attack Attribution

A

The process of identifying the source of a cyberattack, which involves determining the responsible individual, organization, or nation.

22
Q

Principled Investigation

A

Identifying responsible threat actors should be based on a principled and systematic investigation of evidence, avoiding bias in attributing attacks.

23
Q

Correlating Tactics, Techniques, and Procedures (TTP)

A

Incident response teams correlate TTPs used in the attack with known exploits and utilize threat intelligence sources to map them to similar attacks.

24
Q

Attribution Factors

A

Key factors aiding attribution include the location of originating hosts or domains, characteristics of malware code, tools used, and techniques employed.

25
Q

Asset Management in Attribution

A

For internal threats, asset management, including IP addresses, MAC addresses, DHCP logs, and AAA logs, plays a crucial role in tracing the source of an attack.

26
Q

The MITRE ATT&CK Framework

A

The MITRE ATT&CK Framework is a global knowledge base of threat actor behavior. It is based on observation and analysis of real-world exploits with the purpose of describing the behavior of the attacker, not the attack itself. It is designed to enable automated information sharing by defining data structures for the exchange of information between its community of users and MITRE