05 Digital Forensics Flashcards

(27 cards)

1
Q

What is Digital Forensics?

A

Digital forensics involves extracting, analyzing, and preserving digital evidence from electronic devices such as computers, mobile phones, networks, and even drones. It’s used in cybersecurity investigations to uncover the “who, what, where, when, why, and how” behind cyber incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 5 steps of Forensics Workflow

A

Acquire
Examine
Timeline
Document
Present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is ACQUIRE in Forensics Workflow

A

Secure and preserve original evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is EXAMINE in Forensics Workflow

A

Analyse artifacts (digital, physical, network).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is TIMELINE in Forensics Workflow

A

Build a timeline of events and activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is DOCUMENT in Forensics Workflow

A

Record findings clearly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is PRESENT in Forensics Workflow

A

Report results in a defensible, understandable manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the Types of Digital Artifacts

A

Digital Artifact Data (DAD)– Files, logs, system traces.
Physical Artifact Data (PAD) – Device details, firmware.
Network Artifact Data (NAD) – Packet captures, logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the main Technical Challenges in digital forensics?

A

Data location, data size, data incompatibility, and anti-forensic tools (data wiping, data hiding, encrypted data).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the Big-Data Challenges?

A

Heterogeneous data, massive volume, inconsistent formats, data validation, trust, processing speed and accuracy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the Legal Challenges?

A

Privacy concerns, cross-jurisdiction issues, lack of clear legal process, security constraints, and insufficient support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the Mobile/Computer Challenges?

A

Heterogeneous devices, multiple platforms, malicious applications, lack of specialized forensic tools, tool bugs and varied communication protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the Operational Challenges?

A

Lack of standardized procedures, mobile/computer-specific hurdles, low forensic readiness, and weak incident management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the Investigative Challenges?

A

Shortage of qualified personnel, unclear investigation thresholds, lack of forensic knowledge and skills.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are common Anti-Forensics Techniques?

A

Encryption, data wiping, and data hiding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What emerging data issues further complicate investigations?

A

New file formats, cloud dependencies, and explosive growth in data volume.

17
Q

What is Network Forensics?

A

Capturing and analyzing network traffic with tools like Wireshark, Snort and Zeek.

18
Q

What is Log Analysis?

A

Aggregating, indexing and searching system/application logs to identify relevant events.

19
Q

What is Cloud Forensics?

A

Conducting investigations in cloud environments—requires cooperation from the provider and adapts to limited native tooling.

20
Q

What is Email Forensics?

A

Examining email headers, message paths and content to detect phishing and trace senders.

21
Q

What is Malware Analysis?

A

Studying malicious code via static, dynamic, behavioral analysis and reverse engineering.

22
Q

What is File System Analysis?

A

Recovering deleted or hidden data by examining the underlying file system structures.

23
Q

What is Memory Forensics?

A

Capturing and analyzing RAM snapshots (e.g. with Volatility) to uncover in-memory artefacts.

24
Q

What is Mobile Forensics?

A

Extracting SMS, call logs, GPS, Wi-Fi and app data from smartphones and tablets.

25
Which technical skills are key for a forensics practitioner?
Strong teamwork, clear communication—especially under time pressure.
26
How is OSINT used in attacker analysis?
Gathering open-source intelligence on attacker identities, relationships and online activity.
27
What’s the goal of attacker analysis?
To reconstruct the attacker’s behavior and map their connections.