Domain 7 - Security Operations Flashcards
What is Exigent Circumstances?
Evidence can legally be collected if it is danger of being destroyed
During a forensic investigation, what is the difference in outcome between examination and analysis?
Examination provides data, analysis gives information.
What makes a copy backup different from a full backup?
The archive bit is not reset when performing a copy backup
Evidence process
Evidence must be: identified, preserved, collected, examined, analyzed. Findings must be presented and a decision made.
Forensic Investigation steps
- Identification
- Presentation
- Collection
- Examination
- Analysis
- Presentation
- Decision
Forensic investigation - Step 1: Identification
The computer system is a crime scene. Identify and secure the crime scene. Review audits, logs, monitoring systems, user complaints, and analysis detection. Preserve and retain all evidence. When the computer is unavailable, capture related information (IP address, user names, and other identifiers).
Forensic investigation - Step 2: Preservation
Make system images, start the Chain of Custody (CoC), document evidence, and record timestamps.
Forensic investigation - Step 3: Collect Evidence
- Note the order of volatility before collecting.
- Create bit level images.
- Remove system from production.
- Use MDs to ensure data integrity.
- Capture data stored in the cache, process tables, memory, and registry.
- Use a bound wire notebook to keep notes.
- Use an evidence field kit (tags, bags, labels, pens, and supplies).
Order of Volatility
- Memory contents
- Swap files
- Network processes
- System processes
- File system information
- Raw disk blocks
Forensic investigation - Step 4: Examine; Step 5: Analysis
Collect and analyze using scientific methods. Review characteristics like timestamps, identification properties. Reconstruct and document the crime scene evidence was collected
Forensic investigation - Step 6: Present Findings
Prepare the evidence to be presented in court. Keep details but avoid non-tech jargon so the jury can understand.
Step 7: Decision (forensics investigation)
After the verdict, conduct lessons learned. Determine what can be done better next time. Evidence is not retained after the verdict.
IOCE and SWGDE functions
Establishes standards for digital forensics on mobiles, computers, and other computing systems. International Organization on Computer Evidence and the Scientific Working Group on Digital Evidence.
NIST SP 800-86 Guide to Investigating Forensic Techniques into Incident Response.
Guidelines on data collection, examination, analysis, reporting, selecting team personnel, incident response handling, and processes to follow in investigations.
Crime Scene
Environment in which potential evidence exists; can be multiple environments. Should be secured, systems isolated, not powered down until image is created. Access should be tightly controlled.
Motive, Opportunity, Means (MOM) This helps investigators narrow down the suspects. Any suspect must have all parts of this construct.
Used by investigators to narrow down a suspect, who must have all parts of this construct.
Motive
Explains why a crime was committed and who committed the crime.
Opportunity
Explains where and when a crime occurred.
Means
Explains how a crime was carried out by a suspect.
Chain of Custody (CoC)
Document used to ensure integrity of evidence is maintained and admissibility of evidence in court. Records all persons who secured, obtained, and accessed controlled evidence.
Interviewing and interview
Controlled by one person, who ensures the suspect understands their rights and why they are going through the process, which is to gather evidence. Process should be recorded. HR and management reps should be present. Only an employee senior to the subject can conduct this meeting.
evidence concepts
relevant, reliable, preservation, tagging, and five rules of evidence
Relevant (relevance)
This proves admissible evidence is material related to a crime. It describes MOM and can verify when the crime occurred.
Reliable (reliability)
Admissible evidence meets the criterial that it has not been modified or tampered with.