Week 3 Flashcards

1
Q

Data Encoding Schemas

A

How is data stored?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Binary

A

0s, 1s, base-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

8 binary digits

A

1 byte/character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

hexadecimal

A

base 16 representation of a character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ASCII

A

American Standard Code for Information Interchange

  • limited to 256 character codes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does formatting a drive do? (3)

A

Makes partitions. Partitions organize the disk space into different sections with different purposes.

  • installs a file table. A file table is a catalog keeping track of where different files are stored on the drive.

-erases the “pointers” to the data on the drive, but the data itself is not erased.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Partitioning Physical Disk

A

Partition 1- Reserved
2- Data
3- Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unallocated space

A

is not part of partitions, Recycled/deleted goes here.
hard to make cases w/ data in unallocated space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

FAT

A

File Allocation Table

  • traces lifespan of files in data storage medium
  • when was file created, modified
  • some, but not all, varieties of FAT can track ownership, deletion
  • data is stored in sectors and then clusters
  • these can have many redundancies
  • limited in ability to track metadata
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NTFS

A

New Technology File System

  • tracks life span of file
  • higher degree of detail in tracking files
  • flexibility for growth
  • lots of file organization available
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Acquisition

A
  • should be forensically sound
  • defensible
    -repeatable
  • make copy of original
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Physical

A
  • bit by bit, bitstream
  • all data, undeleted, deleted, unallocated space, entire OS
  • gets more metadata
  • slower, more expensive, takes more physical, digital space
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Logical

A

just user files, folders
slack space - space in bwtn clusters of stored logical data where other data existed

usually no deleted/unallocated space

usually quicker, cheaper, less space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Metadata

A

“data about data”
-info about file
- ownership, authorship
- file names, dates, times, size, mod, location,

changing metadata doesn’t change the file

can only change metadata for your view

EXIF data in cams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hardware and Software

A

Forensic Stand Alone Imagers

Software-based imaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Forensic Stand Alone Imagers (3)

A
  • Tableau TD Series
  • Forensic Falcon
  • Atola Task Force
17
Q

Software-based imaging

A

FTK Imager
Paladin
Macquisition
Magnet Acquire

18
Q

Secure Evidence File Formats

A

DD/Data Dump
-exact copy of full medium = no compression

RAW
IMG
E01, EX01

19
Q

Data Acquisition File Formats

A

L01 - Logical only

20
Q

collision

A

different files with same hash values, can implicate the innocent

21
Q

MD5

A

Message Digest 5 (base 32/64)

22
Q

SHA-1

A

Secure Hash Algorithm - base 64 - higher numbers more secure

23
Q

What is usually hashed?

A

known CSAM
known malware
phone biometrics
phone pics
passwords

24
Q

Data Acquisition Steps

A

Identify what needs to be acquired
▪ What size is the storage medium?
▪ Do you have an equal or larger
storage medium on which to place
data?
 Photograph original evidence
▪ Multiple angles/sides
▪ Close-up of serial & model numbers
▪ Ensure to get connections,
Damage, etc., in photographs

Prepare target media (definition)
▪ Target media should be wiped & validated to
ensure no cross-contamination
▪ How do we validate wiped data medium?
▪ Target media should be formatted in same
formatting scheme as original evidence

Ensure evidence is handled properly
▪ Anti-static mat, no magnets in the area
 Connect to validated forensic write-blocker
▪ Can be hardware or software-based**
▪ Can be combined with stand-alone forensic disk
imager
▪ May also be installed as part of your
Forensic workstation
▪ Needs to be validated & logged

Direct imager or imaging software which
medium you want to acquire
▪ Can be physical (full disk) or logical (files/folders)
▪ VERY IMPORTANT STEP
▪ If you acquire the wrong thing, you’ve wasted time
 Direct imager or imaging software what type
of image file you want to create
▪ DD/RAW, E01, etc.
 Format your target storage medium

Direct imager or imaging software where to
place the newly-created forensic image
▪ Ensure the target medium is at least as large as
the original evidence medium
▪ Be careful not to create a “clone” disk at this stage
– will not verify
 Choose verification status & hashing
algorithm (if available)
 Create image
▪ General rule: 100GB per hour

25
Q

RAID

A

Redundant Array of Independent Disks

can be set up in different formats

26
Q

Challenges to Data Acquisition

A

Physical damage to storage medium
 Encryption
 Secure startup and/or BIOS password
 Trim or other secure data erasure
 Anti-forensic tools
 Overall size of medium(s) to be acquired
 Improper formatting of target media
 “Always on” devices = Data always changing
 Cloud-based primary storage