4 - Evidence acquisition Flashcards

1
Q

Outer boxes/Inner boxes

A

Computers holding potential evidence/

Network components connecting outer boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Properties of forensic tools

A

Usability - present data at a useful layer of abstraction
Comprehensiveness - reveal all relevant data
Accuracy
Determinism
Verifiability
Performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

First responder forensic toolkit

A

Mobile forensic workstation
Bootable forensically sound OS and storage devices
Write blocker
Faraday bag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Obstacles to evidence acquisition

A
Heterogeneity of technology
High dynamism of system state
Volatility of the system - tells how long data can survive in a system and depends on a consistent power supply and how fast data changes
Accessibility of digital artifacts
Potentially large amount of data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Procedure for data extraction from device

A

Copy the data
Calculate the hash
Create at least another copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Methods for copying the data

A

Logical acquisition - select relevant files
Bit-stream copy - exact bit-by-bit copy
Over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Computer is off

A

Leave it off, tape the power receptacle, bag the power cable. If it is a laptop bag the battery
If you cant bring the computer bring the hard disks, if you cant do that boot a trusted OS and perform a bit-stream copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Computer is on

A

Pull the plug and that may help preserve evidence but it can also loose evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Unplug the network cable

A

Generally advisable
Destroys the opportunity to list the active connections and gather network traffic and it can seriously impact a business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Password

A

Do live forensics if not protected, else turn off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Useful data to collect

A
File and network connections
Processes
Users
Memory
Volumes and file systems
Applications
System specific structures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly