Topic 5 Flashcards

1
Q

What are some ways to determine file ownership? (4)

A

Passwords on the computer/account
File metadata
network logs (for networked users)
who else lives there?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are 2 ways companies bypass privacy issues to conduct investigations?

A
  • Company policies stating that internet use can be investigated
  • warning banners at logon
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can you prepare for a search warrant? (7 ways)

A
  • Get case background
  • Identify the type of OS or Digital Device
  • Determining whether you can seize computers and digital devices
  • Getting a detailed description of the location (safety concerns)
  • Determining who is in charge
  • Using additional technical expertise (if necessary)
  • Determining the tools you need
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name 6 tools that should be in a digital forensic field kit

A
  • Laptop computer
  • Digital Camera
  • Flashlight
  • Gloves
  • computer toolkit(screwdrivers, etc)
  • Cables (SATA, IDE ribbon
  • Evidence log forms
  • Notebook
  • Computer evidence bag
  • Evidence labels, tape and tags
  • portable hard drive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What steps should you take when examining a device at a search? (5 + 3)

A
  • Take photos of the device in place
  • Make a sketch of the area and crime scene
  • note any peripherals - USB keys etc.
  • check if device is on
  • If on, note any windows that are open
    • examine temporary files and registry
    • examine memory
    • turn off
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 5 overall steps in any digital forensics case?

A
  • Identify the case requirements
  • Plan your investigation
  • Conduct the investigation
  • Complete the case report
  • Critique the case
How well did you know this?
1
Not at all
2
3
4
5
Perfectly