Section 24.233 Data Collection Procedures Flashcards

Objective 4.8 Explain appropriate incident response activities

1
Q

Digital Forensic Collection Techniques

A

Involve making forensic images of data for later analysis

■ This approach allows incident response teams to resume operations quickly
while maintaining evidence

■ Evidence may be required for potential legal action and cooperation with law
enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data collection involves

A

■ Capturing and hashing system images

■ Analysing data with forensic tools:
● FTK (Forensic Toolkit)
● EnCase

■ Capturing machine screenshots
■ Reviewing network logs
■ Collecting CCTV video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Order of Volatility

A

Guides the sequence of collecting data, from most volatile (CPU registers and
cache) to least volatile (archival media)

Target things that could be changed quickly to cover up malicious actitvity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Licensing and documentation

A

Licensing and documentation reviews ensure system configurations align with their design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Acquisition

A

The method and tools used to create a forensically sound copy of data from a source device, such as system memory or a hard disk

■ Policies for bringing one’s own device (BYOD) complicate data acquisition
because it may not be legally possible to search or seize the devices

■ Some data can only be collected once the system is shutdown or the power is
disconnected

Data Acquisition: First thing you need to ask is have you got legal go ahead to capture the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Order of Volatility

A

● CPU registers and cache memory
● System memory (RAM), routing tables, ARP caches, process table, temporary swap files
● Data on persistent mass storage
● Remote logging and monitoring data
● Physical configuration and network topology
● Archival data

WARNING: Some Windows registry keys, like HKLM/Hardware, are only in memory
and require a memory dump to analyse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly