Computer and Digital Forensics Flashcards

(41 cards)

1
Q

What does computer forensics mostly involve?

A

preservation, acquisition, extraction, analysis and interpretation of digital data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is hardware?

A

physical components of the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is software?

A

set of instructions in a program that performs a particular task, contained in hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is ROM?

A

read only memory, chips on the motherboard that have firmware to start the boot process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is the system unit?

A

chassis, motherboard and other internal components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is RAM?

A

Random access memory, not permanent and is therefore volatile, chips on motherboard, stores data that is needed currently (ex the word doc ur working on)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the ‘brain’ of the computer

A

CPU, all operations are run through it, chip in the motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the HDD?

A

primary component of permanent storage. RAID is becoming more common and NAS are used to backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is the HDD divided?

A
  • Sector - 512bytes
  • Cluster - multiple of 2 sectors
  • Track - concentric circles around a plater
  • Cylinder - groups of tracks above and below each other
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a bit?

A

smallest unit of computer language, a one or zero in bianry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is a forensic image?

A

an exact duplicate of the entire contents of a HDD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is visible data?

A
  • data OS is aware of and visible to user
  • work product files, swap file data, temporary files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are swap file data and temporary files?

A
  • Swap: space on HDD swapped around to conserve RAM, sometimes data is left behind
  • Temporary: backup copy of presently worked on data in case of a crash
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is latent data?

A
  • data not typically apparent to OS or user, only visible in a forensic image
  • slack space, unallocated space, defragmentation, swap space, deleted files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is slack space and unallocated space?

A
  • Slack: empty space due to the way the HDD stores files (RAM and File types)
  • Unallocated: unused HDD area, OS may see as empty but may have old data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is defragmenting, swap space, and deleted files?

A
  • defrag. : moving noncontiguous data into contiguous clusters
  • Swap: orphaned data on RAM due to swap
  • delete: some os replace the file by changing the name and then review the space as available
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the internet cache?

A

portions of web pages stored on the HDD to make reconstruction easier when you revisit

18
Q

What are cookies?

A

placed on HDD by websites to track usage and store info like passwords

19
Q

What is an IP address?

A

Internet protocol address. Assigned to devices by networks to track location. can be masked using a vpn (virtual private network), vpns can also protect you online

20
Q

How are emails and DMs/chats stored?

A
  • emails are stored in compound files
  • dms/chats are stored in the RAM and require live data acquisition
21
Q

What is hacking?

A

unauthorized computer intrusion. computers have firewalls that are meant to protect from intrusions, require a password and keep log data. Investigators focus on log data, IP, and RAM data

22
Q

What are the different g’s (phones)?

A
  • 1G: analog - modulated radio signals
  • 2G: digital network - first ‘feature’ phones, 2 standards (global system for mobile communication, code divison with multiple access), circuit switched
  • 3G: broadband - high speed data communication
  • 4G: native IP networks - access internet directly
23
Q

What are some challenges based on the g’s?

A
  • older phones have no OS (only get a phone directory), 2G has an OS but very different from a computer
  • 3 and 4G similar architecturally to a PC, use location and GPS
  • many types of phones means many types of hardware and storage
24
Q

How to extract data from a cell phone?

A
  • first keep in a faraday bag
  • Logistical: snapshot of file system
  • Physical: more common, duplicate of data
  • select multiple tools
25
What is an SD card?
Secure Digital card for storage expansion, non-volatile
26
What is a SIM card?
subscriber identification module, connects user to a network, stores user data. useful for investigators to clone the SIM
27
What is the chain of evidence?
events of the crime in a chain - temporal: in order of occurrence - casual: in terms of cause and effect
28
What is a hybrid crime?
tying together a physical crime to a digital component
29
What is malware?
software programmed to be malicious
30
What is a virus?
software embedded into executable files that spread once run
31
What is a worm?
malware spread over a computer network
32
What is a trojan horse?
appears to be useful but is not, potentially phishing
33
what is ransomware?
locked screen plus a threat of extortion
34
What are rootkits?
software that allow other malware to stay hidden from the OS
35
what is a backdoor?
programs that allow for the bypassing of authentication procedures to access a network
36
what is spyware?
malware installed to see what the computer user is accessing
37
what is adware?
automatically generated ads that force a website to pay royalties
38
what are the different types of hackers?
- Crackers: ill-intent - White-hats: ethical, often hired to find vulnerabilities - Black hats: ill intent - Gray hats: un-hired, hack and find vulnerabilities force companies to pay them - Phreakers: hack into secure telecommunication networks
39
what is steganography?
concealing data within another file, type of anti-forensics
40
what is a forensic bridge?
write blocker, ensures read only access
41
what is encryption?
code data into an unreadable form that requires a password, anti-forensics