Chapter 15 - Digital Forensics Flashcards

1
Q

Legal Hold

A

A Legal Hold is a notice that informs an organization that they must preserve data and records that might be destroyed or modified in the course of their normal operations. Backups, paper documents, and electronic files of all sorts must be preserved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

e-discovery

A

The e-discovery process allows each side of a legal case to obtain evidence from each other and other parties involved in the case, and e-discovery is simply an electronic discovery process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Order of Volatility

A

The Order of Volatility documents what data is most likely to be lost due to system operations or normal processes. Frequently changing information like the state of the CPU’s registers and cache is first and thus most volatile. Backups are least likely to change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Chain-of-Custody

A

Chain-of-Custody forms are simple sign-off and documentation forms. Each time the drive, device, or artifact is accessed, transferred, or otherwise handled, it is documented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Admissibility

A

Admissibility for digital forensics requires that the data be intact and unaltered and have provably remained unaltered before and during the forensic process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

dd

A

In Linux, dd is a command-line utility that allows you to create images for forensic or other purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FTK Imager

A

FTK Imager is a free tool for creating forensic images. It supports raw (dd)-style format as well as SMART, E01, and AFF formats commonly used for forensic tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WinHex

A

WinHex is a disk editing tool that can also acquire disk images in raw format, as well as its own dedicated WinHex format. WinHex is useful for directly reading and modifying data from a drive, memory, RAID arrays, and other filesystems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Provenance

A

Provenance describes where an image or drive came from and what happened with it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Write Blocker

A

Write Blockers allow a drive or image to be read and accessed without allowing any writes to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Electronic Discovery Reference Model (EDRM)

A

EDRM is a useful model for viewing the e-discovery process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the nine stages of the EDRM model?

A
  1. Information governance before the fact to assess what data exists and to allow scoping of what needs to be provided.
  2. Identification of electronically stored information so that you know what you have and where it is.
  3. Preservation of the information to ensure that it isn’t changed or destroyed.
  4. Collection of the information so that it can be processed and managed as part of the collection process.
  5. Processing of the data to remove unneeded or irrelevant information.
  6. Review of the data to ensure that it only contains what it is supposed to, and that information that should not be shared is not included.
  7. Analysis of the information to identify key elements like topics, terms, and individuals or organizations.
  8. Production of the data to provide the information to third parties or those involved in legal proceedings.
  9. Presentation of the data, both for testimony in court and for further analysis with experts or involved parties.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Checksum

A

A Checksum generally has more collisions than a hash. Checksums are primarily used as a quick means of checking that the integrity of a file is maintained, whereas hashes are used for many other purposes such as secure password validation without retaining the original password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly