CHFI Flashcards
(212 cards)
What is computer forensics?
A set of methodological procedures and techniques to identify, gather, preserve, extract, interpret, document, and present evidence from computing equipment that is acceptable in a court of law
What is cybercrime?
Any illegal act involving a computing device, network, its systems, or its applications. Categorized into:
internal - Attack performed by an entrusted person who has authorized access to the network
external - An attacker from outside the organization exploits security loopholes or uses social engineering to infiltrate the network
What are the different approaches to investigating cybercrime?
Civil, criminal, and administrative
Why are computer crimes challenging?
Due to their speed, anonymity, volatile nature of evidence, global origin and differences in laws, and limited legal understanding
What is digital evidence?
Any information of a probative value that is either stored or transmitted in a digital form. Comes in two forms:
volatile - Lost as soon as the device is powered off, such as system time, logged-on users, open files, memory, clipboard contents, command history
non-volatile - Data stored on secondary storage, such as hard disks. Includes hidden files, slack space, unallocated clusters, hidden partitions, etc.
What is forensic readiness?
an organization’s ability to optimally use digital evidence in a limited period of time and with minimal investigation costs
What are the 5 rules of evidence?
1: Evidence must be clear and understandable to the judges
2: Evidence must be related to the fact being proved
3: Evidence must be real and appropriately related to the incident
4: There must be no doubt about the authenticity or veracity of the evidence
5: The evidence must prove the attacker’s actions or his/her innocence
Describe a civil investigation
Investigators show the opposite party some proof to support the claims and induce settlement.
Search is based on mutual understanding and provides wider window to hide evidence.
More informal.
Claimant responsible for collection and analysis of evidence.
Punishment is typically monetary.
Sometimes evidence can be in third-party control.
Describe a criminal investigation
Set of standard forensic processes must be followed as accepted by law
Computing devices may be forcibly seized under warrant
Formal report required
Law enforcement agencies responsible for collecting and analyzing evidence
Punishment includes fines, jail, or both
High standard of proof
Difficult to capture certain evidence, such as GPS device evidence
Describe an administrative investigation
Generally involve an agency or government performing inquiries to identify facts
Non-criminal in nature
Related to misconduct or activities of an employee that include violation of orgs policies, rules, etc.; resource misuse or damage or theft, threatening or violent behaviour, improper promotion or pay raise
Any violation may result in disciplinary action
What is the best evidence rule?
the court only allows the original evidence of a document, photograph, or recording at the trial rather than a copy. However, a duplicate may be accepted if the reasons for duplication are genuine. Essentially, the original evidence is considered as the best evidence
What is federal rule 1001 of evidence?
1001 includes definitions of writings and recordings, photographs, original evidence, and duplicate evidence.
Describe federal rule 1002 of evidence
To prove the content of a writing, recording, or photograph, the original writing, recording, or photograph is required, except as otherwise provided in these rules or by an Act of Congress
Describe federal rule 1003
A duplicate is admissible to the same extent as an original unless:
a genuine question is raised as to the authenticity of the original or:
In the circumstances it would be unfair to admit the duplicate in lieu of the original
Describe federal rule 1004
The original is not required and other evidence of the contents of writing, recording, or photograph is admissible if: OGs are lost or destroyed; OGs not obtainable OG is in possession of the opponent Collateral matters
What are the steps to the forensic investigation process?
- Examination/Investigation goals
- Hypothesis Formulation / Criteria
- Experimental Design
- Tool Selection
- Results Review and Evaluation
- Conclusion and Opinion Formulation
What are some considerations that must be made when setting up a computer forensics lab?
- Planning and budgeting
- Physical and Structural design (size, HVAC, access, etc.)
- Work Area (ambience, lighting, internet, etc.)
- Physical security (intrusion alarm, fire suppression, etc.)
- Human resource (required personnel, training and certs)
- Forensics lab licensing
What are some considerations when building the investigation team?
- Keep team small to protect confidentiality
- ID team members and assign responsibilities
- Ensure everyone has proper clearance and authorization
- Assign one member as technical lead
What are the steps to ensuring QA in Forensic Lab ops?
- Arrange formal, documented trainings
- Validate equipment and document it
- Conduct annual proficiency tests
- Follow standards and/or controls in casework
- Have policies and procedures in place
- Attain accreditation
- Perform quality audits and management system review
- Ensure physical security
- Assure health and safety
- Review, update, and document policy standards annually
What is the first response role for non-forensics staff?
protect the crime scene and ensure it remains secure
Make notes and take photographs
Secure surrounding area linked to the incident
What is the first response role for system/network admins?
- Report incident according to organizational incident reporting procedures
- DO NOT perform actions unless directed to do so by forensics team
- May record what is on screen if computer is on, transfer copies of logs to clean media, isolate the system, or document every detail relevant to the incident
What is the first response role for Lab forensics staff?
- Document the electronic crime scene
- Collect incident information
- Plan search and seizure
- Identify and collect electronic evidence
- Package electronic evidence
- Transport Electronic evidence
What are best practices when dealing with powered-on computers?
- Photograph the screen and document running programs, open files, or data
- Pull the power cord immediately IF: Indication of data being overwritten/deleted; destructive processes observed
- Do NOT disconnect power If: evidential data visible on display; there are active programs or files in use such as chatrooms, open text files, etc.
- Perform volatile data collection and preservation process
- after collecting volatile data, pull plug from back of computer
- For portable computers, remove battery and unplug. If battery removal not possible, press power switch for 30 seconds
What are best practices for dealing with powered-off computers
- Leave it OFF
- Disassemble and package it (remove power supply cord; disconnect all wires and cables; check for removable media and secure it; tag evidence; document chain of custody)
- If monitor is off, turn it on and move mouse slightly. Photograph screen
- do not press any keys