Digital Forensics Flashcards

(27 cards)

1
Q

What is Digital Forensics?

A

The process of applying computer science to investigate cybercrime by identifying and extracting digital evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Cybercrime?

A

Crime involving the use of a computer system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Cyber-dependent crime?

A

Crime carried out solely using technology, e.g., hacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Cyber-enabled crime?

A

Traditional crimes enhanced by technology, e.g., fraud or theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three phases of forensic investigation?

A

Pre-investigation, Investigation, Post-investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Steganography?

A

The art of hiding information within other non-secret text or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is Steganography different from Cryptography?

A

Cryptography obscures meaning; steganography hides the existence of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Chain of Custody?

A

The documented process that tracks the collection, transfer, and storage of evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Volatile Data examples?

A

Data lost after shutdown: RAM contents, running processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Non-volatile Data examples?

A

Data retained after shutdown: files on hard disks, system logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Write Blocker?

A

A tool that allows read-only access to storage media to prevent modification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Hash Value?

A

A numeric value that uniquely identifies data, ensuring evidence integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Live and Dead Acquisition?

A

Live: collecting data from a running system; Dead: collecting from a powered-off system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Bit-stream Imaging?

A

A bit-by-bit copy of an entire storage device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Slack Space?

A

Unused space within a disk cluster after a file is stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Lost Cluster?

A

A cluster marked used but not linked to any file.

17
Q

What is the File Allocation Table (FAT)?

A

A file system used with DOS and early Windows versions.

18
Q

What is NTFS?

A

New Technology File System, standard for modern Windows systems.

19
Q

Name a forensic imaging tool.

A

AccessData FTK Imager.

20
Q

What are the ACPO Principles?

A

Guidelines ensuring proper handling of digital evidence.

21
Q

What are examples of digital forensic tools?

A

Autopsy, Sleuth Kit, EnCase.

22
Q

What is an SSD?

A

A Solid-State Drive, faster than HDDs because it has no moving parts.

23
Q

What is the importance of documenting a crime scene?

A

To preserve the integrity and authenticity of evidence.

24
Q

What does Data Acquisition mean?

A

Extracting electronically stored information from devices for investigation.

25
What is Sparse Acquisition?
Capturing fragments of unallocated data for forensic investigation.
26
What happens during the Booting process?
The OS is loaded from storage into RAM.
27
What is the purpose of hashing in forensic investigations?
To verify that acquired data has not been altered.