Chapter 1: Foundations of Digital Forensics Flashcards

(27 cards)

1
Q

Mujahiden Secrets 2

A

A tool developed by Islamist extremist to avoid detection and apprehension

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Positive aspect of increasing use of technologies by crminals

A

Abundance of digital evidence can be obtained to apprehend and prosecute criminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat to life and limb

A

A provision in the USA patriot Act which enables Internet Service Provider to provide law enforcement with information quickly, without waiting for search warrant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Digital evidence

A

Any data stored or transmitted using a computer that support or refute a theory of how an offense occurred or that address critical elements of the offense such as intent or alibi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What can digital evidence reveal

A

How a crime was committed, provide investigative leads, disprove or support witness statements, and identify likely suspects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Three group of computer systems

A

1- Open computer systems : Systems comprised of hard drives, keyboard, and monitors, and servers that obey standards.

2-Communication systems : Traditional telephone systems, wireless telecommunication systems, internet, network

3- Embedded computer systems: Mobile devices, smart card, navigation system,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What organizations anticipate by properly processing digital evidence

A

Protecting themselves against liabilities such as invasion of privacy and unfair dismissal claim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Term Forensic

A

Characteristic of evidence that satisfies its suitability for admission as fact and its ability to persuade based upon proof .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Forensic Science

A

The application of science to investigation and prosecution of crime to the just resolution of conflict.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What else forensic science provide in addition to scientific techniques and theories

A

Help reconstruct crimes and generate leads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Main goal in any ivestigation

A

To follow the trails that offenders leave during the commission of a crime and to tie perpetrators to the victims and crime scenes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Locard;s Exchange principle

A

Contact between two items will result in an exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trace evidence

A

Is the evidence that is produced during the exchange between individual and crime scene.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Categories of trait evidence

A
1- class characteristics : common traits in similar items
2- Individual characteristics: More unique, can be linked to a specific person or activity with greater certainty.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Forensic Soundness

A

In order to be useful in an investigation, digital evidence must be preserved and examined in a forensically sound manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Key to forensic soundness

A

Documentation

17
Q

Autentification

A

The process of ensuring that the recovered evidence is the same as the originally seized data,.

18
Q

How many steps are involved in autentification

A

Two steps :
1- Examination of the evidence to determine that it is what its proponent claims.
2- closer analysis to determine its probative value.

19
Q

Most important aspects of authentification

A

Maintaining and documenting the chain of custody.

20
Q

Potential consequences of breaking chain of custody includes:

A

Misidentification of evidence, contamination of evidence, lost of evidence or pertinent elements

21
Q

Purpose of integrity check

A

To show that evidence has not been altered from the time it was collected, thus supporting the authentication process.

22
Q

How integrity of evidence is checked in digital forensics

A

A comparison of the digital fingerprint for that evidence taken at the time of collection with the digital fingerprint of the evidence in its currents state.

23
Q

Message digest algorithm

A

Can be thought of a black box that accepts a digital object (file, program, or disk) and produces a number.

A message digest algorithm always produce the same number for a given input.

Also, a good message digest algorithm will produce a different number for different inputs.

24
Q

MD5 Alogorith

A

Takes as input a message arbitrary length and produce as output a 128-bit ‘fingerprint - unique characteristic” or “message digest”.

MD5 algorithm do not indicate that the associated evidence is reliable, as someone could have modified the evidence before the hash value was calculated..

25
Objectivity in forensic analysis
Interpretation and presentation of evidence should be free from bias to provide decision makers the clearest view of the facts.
26
Most effective approach to objectivity
1- Let the evidence speaks for it self as much as possible | 2-Peer review process that assesses a forensic analyst's finding from bias or any weakness.
27
Evidence dynamics
Any influence that changes, relocates, obscures, or obliterates evidence regardless of intent between the time evidence is transferred and the time the case is resolved.