topic 7A : infocomm security Flashcards

1
Q

What is digital FORENSICS?

A
  • involves the preservation, identification, extraction, documentation and interpretation of computer media for evidentiary and/or root cause analysis
  • evidence might be required for a wide range of computer crimes and misuses

multiple methods of :
1) discovering data on computer system
2) recovering deleted, encrypted, or damaged file
3) monitoring live activity
4) detecting violations of corporate policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is digital EVIDENCE?

A
  • any information that can be extracted from a computer
  • in human-readable format

eg :
- recover deleted emails
- investigate post employment termination
- recover evidence from post formatted hard drive
- extract data created by different users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why evidences are needed?

A
  • wide range of computer crimes and misuses

evidences are needed by local authorities, organization and individual for investigation relating to :

1) fraud
2) extortion
3) virus/trojan distribution
4) unauthorized use of personal information
5) forgery
6) theft of/destruction of intellectual property
7) tracking internet browsing habits
8) software piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who uses digital evidence?

A

1) criminal prosecutors
- to prosecute suspects by using extracted data as evidence

2) civil litigations
- data discovered on a computer can be used in fraud, divorce, harassment or discrimination cases

3) insurance companies
- evidence discovered can be used to mollify (reduce) costs

4) private corporations
- can be used as evidence in harassment, fraud and embezzlement cases

5) law enforcement officials
- data kept in storage devices often are found to be important evidence in courts and would help in post-seizure handling

6) individual/private citizens
- obtain help from forensic specialists to support claims of harassment, abuse or wrongful termination from employment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital forensics for incident response

A
  • malicious code
  • unauthorized access
  • inappropriate usage
  • denial of services

will trigger :
> containment, eradication and recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

4 phases of digital forensics process

A

1) collection
- to identify, label, record and acquire data from possible sources
KEY ISSUES : preserve data integrity, collect timely data to avoid losing dynamic data or data from battery powered devices

2) examination
- to search and process large amounts of collected data to assess and extract data of interest
KEY ISSUES : preserve data integrity, need to use suitable automated tools and manual methods

3) analysis
- to analyze results of examination and derive useful information
KEY ISSUES : only use for legally justifiable means. required to handle many events and timelines

4) reporting
- to report results of analysis, including how tools and procedures were selected
- recommend improvements (eg forensic examination of additional data sources, securing identified vulnerabilities)
KEY ISSUE : formality of reporting steps depend on situation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information handling during COLLECTION phase (non-volatile information)

A

for non-volatile information :
- includes information, configuration settings, system files and registry settings that are available AFTER reboot
- can be investigated from a backup copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information handling during COLLECTION phase (volatile information)

A

challenges

for volatile information :
1) network information
- communication between system and network
2) active processes
- programs and daemons currently active on the system
3) logged-on users
- users/employees currently using system
4) open files
- libraries in use
- hidden files
- trojans (rootkit) loaded in system
5) can be saved from the system core dump while system is powered on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Challenges for handling information in collection phase

A

1) anti-forensics software that limits and/or corrupts evidence that could be collected by an investigator

2) performs data hiding and distortion

3) exploits limitations of known and used forensic tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Handling of data sources for analysis

A

details of investigation depend on the incident but generally, these are the steps :

  • check the recycle bin for deleted files
  • check the web browser history files and address bar histories
  • check the cookie files
  • check the temporary internet files folder
  • search files for suspicious character strings
  • search the slack and free space for suspicious character strings
  • conduct event or timeline analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Key factors to determine handling of each phase of forensics by internal/external parties

A

1) cost
- software, hardware, and equipment used to collect and examine data may carry significant costs
- staff training, labor costs, which are particularly significant for dedicated forensic specialists

2) response time
- personnel located on-site might be able to initiate computer forensic activity more quickly than off-site personnel
- off-site outsourcers located near distant facilities might be able to respond more quickly than personnel located at the organization’s headquarters (FOR ORGANIZATION’S THAT ARE GEOGRAPHICAL DISPERSED)

3) data sensitivity
- some organizations might be reluctant to allow external parties to image hard drives and perform other actions that provide access to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Methods of hiding data

A

1) steganography
- the art of storing information in such a way that the existence of the information is hidden

2) watermarking : hiding data within data
- information can be hidden in almost any file format
- file formats with more room for compression are the best (JPEG, GIF, MP3, MPG)
- the hidden information may be encrypted, but not necessarily
- numerous software applications will do this for you (many are available online)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Methods of detecting/recovering data

A

steg-analysis : the art of detecting and decoding hidden data

  • hiding information within electronic media requires alterations of the media properties that may introduce some for of degradation or unusual characteristics
  • the pattern degradation or the unusual characteristic of a specific type of steganography method
  • steganalysis software can be trained to look for a signature
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Steg-analysis methods : detection

A

1) human observation
- opening a text document in a common word processor may show appended spaces and “invisible” characters
- images and sound/video clips can be viewed or listened to and distortions may be found
> generally, this only occurs if the amount of data hidden inside the media is too large to be successfully hidden within the media

2) software analysis
- even small amounts of processing can filter out echoes and shadow noise within an audio file to search for hidden information
- if the original media file is available, hash values can easily detect modifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

File deletion

A
  • when a user deletes a file on a storage device, the file is not physically deleted

instead, only a pointer in the file allocation table is deleted

  • a second file that is saved in the same area may not occupy as many sectors as the first file (there will be possibility that a fragment, with data, from the previous file may still remain)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Free space

A
  • the sector that holds the fragment of the deleted file is referred to as FREE SPACE because the OS MARKS IT USABLE WHEN NEEDED
    > when the OS stores something else in this sector, it is referred to as ALLOCATED

UNALLOCATED SECTORS still contain the data, from the previous files, until the operating system overwrites them

17
Q

Slack space

A
  • when a file is saved to a storage media, the OS allocates space in blocks of a predefined size called sectors
  • the size of all sectors is the same on a given system/hard drive
  • even if a file contains 10 characters, the OS will allocate a full sector a say 1024 Bytes. the space LEFT OVER IN THE SECTOR is called SLACK SPACE

it is possible for malicious code/tools/clues to be hidden in slack space AND free space

  • slack space from files that previously occupied that same physical sector on the drive may contain information

so, an investigator should REVIEW slack space using utilities that can display the information in these areas