Section 24.232 Digital Forensic Procedures Flashcards

Objective 4.8 Explain appropriate incident response activities

1
Q

Digital Forensics

A

Systematic process of investigating and analysing digital devices and data to uncover evidence for legal purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Four Main Phases of Digital Forensic Procedures

Identification

1

A

Focus on scene safety, prevention of evidence contamination, and scope determination

● Secure the scene, preserve evidence, and document the scene

● Identify where relevant data might be stored (e.g., tablets, smartphones,
servers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Four Main Phases of Digital Forensic Procedures

Collection

2

A

Requires proper authorization (e.g.warrant, executive authorisation)

● Order of volatility:
○ Dictates the sequence in which data sources should be collected and preserved based on their susceptibility to modification or loss

○ Following order of volatility minimises data loss

○ 5 Steps of Order of Volatility:
■ Collect data from the system’s memory
■ Capture data from the system state
■ Collect data from storage devices
■ Capture network traffic and logs
■ Collect remotely stored or archived data

● Chain of Custody: Documented and verifiable record that tracks the handling,
transfer, and preservation of digital evidence from the moment it
is collected until it is presented in a court of law

● Evidence Collecting techniques:
○ Disk imaging: Involves creating a bit-by-bit or logical copy of a storage
device, preserving its entire content, including deleted files and unallocated space

○ File Carving: Focuses on extracting files and data fragments from
storage media without relying on the file system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Four Main Phases of Digital Forensic Procedures

Analysis

3

A

Examine the forensically sound evidence copy

● Systematically scrutinise data for relevant information, timestamps, user
interactions, and signs of criminal activity

● Follow strict procedures and documented protocols for consistency and objectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Four Main Phases of Digital Forensic Procedures

Reporting

4

A

Document methods, tools used, actions performed, findings, and conclusions in a final report

● The report serves as crucial evidence in legal proceedings, and the forensic analyst may need to testify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Additional Concepts

Legal Hold

A

Issued when litigation is expected and preserves potentially relevant electronic data

● Ensures evidence is not tampered with, deleted, or lost

● Requires the implementation of preservation practices to protect systems
and evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Additional Concepts

E-Discovery (Electronic Discovery)

A

Process of identifying, collecting, and presenting electronically stored information for potential legal proceedings

● Involves searching, analysing, and formatting electronic data for litigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Additional Concepts

Ethical Considerations

A

Adherence to a code of ethics that emphasises avoiding bias, repeatable actions, and evidence preservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ethical Considerations

Avoiding bias

A

Analysis should be performed without bias or prejudice and be based solely on the evidence

○ Use forensic analysts who are removed from the situation to avoid potential bias

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ethical Considerations

Repeatable actions

A

All analysis must be based on repeatable processes documented in the final report

○ Ensuring the original evidence remains unchanged is critical to maintaining evidentiary integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ethical Considerations

Evidence preservation

A

Evidence includes both the device (e.g., laptop hard disk) and the data recovered from it

○ Perform analysis on a disk image, not the original drive, to prevent modifications or alterations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly