Domain 7: Security Operations Flashcards
Process at an incident scene
Ensure you identify the scene, protect the environment, identify evidence and potential sources of evidence, collect evidence (hash) and minimise the degree of contamination
Locard’s Exchange Principle
Perpetrator of a crime will bring something into the crime scene and leave with something from it
Sufficient: Evidence
Persuasive enough to convince one of its validity
Reliable: Evidence
Consistent with fact, evidence has not been tampered with or modified
Relevant: Evidence
Relationship to the findings must be reasonable and sensible, proof of crime, documentation of events, proof of acts and methods used, motive proof, identification of acts
Permissible: Evidence
Lawful obtaining of evidence, avoid: unlawful search and seizure, secret recording, privacy violations, forced confessions
Techniques to Identify Evidence
Labeling, recording serial number. Evidence must be preserved and identifiable.
Evidence lifecycle
- Discovery
- Protection
- Recording
- Collection and identification
- Analysis
- Storage, preservation, transportation
- Present in court
- Return to owner
Witnesses that evidence is trustworthy, description of procedures, normal business methods collections, error precaution and correction
Best Evidence
Primary evidence is used at the trial because it is the most reliable. Original documents are used to document things such as contracts. This means NO COPIES. Further, oral evidence is not the best evidence, however, it can be used for interpretation of documents.
Secondary Evidence
Not as strong as best evidence, a copy is not permitted if the original is available. Further examples include, oral evidence like Witness testimony.
Direct Evidence
Can prove fact by itself and does not need any type of backup. Testimony from a witness - one of their five senses. Oral evidence is a type of secondary evidence so the case can’t simply stand on it alone. But it is Direct Evidence and does not need other evidence to substantiate.
Conclusive Evidence
Irrefutable and cannot be contradicted. Requires no other corroboration.
Circumstantial Evidence
Used to help assume another fact, however, cannot stand on its own to directly prove a fact
Corroborative Evidence
Supports or substantiates other evidence presented in a case
Hearsay Evidence
Something a witness hears another one say. Also business records are hearsay and all that’s printed or displayed. One exception to business records: audit trails and business records are not considered hearsay when the documents are created in the normal course of business.
Interviewing
Gather facts and determine the substance of the case
Interrogation
Evidence retrieval method, ultimately obtain a confession
The process - Due Care
- Prepare questions and topics, put witness at ease, summarise information - interview/interrogation plan
- Have one person as lead and 1-2 others involved aswell
- Never interrogate or interview alone
Opinion Rule
Requires witnesses to testify only about the facts of the case, cannot be used as evidence in the case
Expert Witnesses
Used to educate the jury, can be used as evidence
Six Principles of Digital Evidence
- Ensure you apply all of the general forensic and procedural principles
- Upon seizing digital evidence, ensure evidence is not changed
- When it is necessary for a person to access original digital evidence, that person should be trained for the purpose
- All activity relating to the seizure, access, storage, or transfer of digital evidence must be fully documented, preserved and available for review
- An individual is responsible for all actions taken to the digital evidence while it is in their possession
- Any agency seizing, accessing, storing, or transferring digital evidence is responsible for compliance with these principles.
Media Analysis
Involves the identification and extraction of information from storage media, such as hard disks and RAM. This may include recovery of deleted files or static analysis of forensic images of storage media.
Network Analysis
Analysis of network activity, such as network logs, packet captures. Focus is on collecting and correlating information from these disparate sources and produce as comprehensive a picture of network activity as possible.
Hardware/Embedded Device Analysis
Review the contents of hardware and embedded devices, such as phones and laptops.