Elements of digital forensics examination Flashcards

1
Q

What is the key to forensic soundness?

A

Documentation!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why does the standard “Preserve everything, change nothing” not work 100% ?

A

It is almost impossible to maintain in digital forensics, disk information sometimes alters the original, even if we use write-blockers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The legal standpoint of authentication is to determine the worthiness of the acquired data. How does it translate in the case of courts?

A
  • the contents of the records have remained unchanged
  • the info on the record originates from the purported source (human or machine)
  • the extra info (like timestamps) that relate to the record is also accurate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is handling digital evidence sometimes harder than handling of “traditional” evidence?

A
  • It´s volatile
  • It´s abstract
  • It´s transformative
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The way we handle digital evidence may affect.. what?

A
  • it´s veracity
  • it´s fidelity
  • It´s integrity

Veracity depends on fidelity, fidelity relies to integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the uses of hash functions?

A
  • searching and filtering files during a forensic examination
  • in security for storing passwords, electronic signatures for both integrity and authenticity
  • to make sure to preserve the chain of custody
  • classification to recognize well known files (white- and blacklisting)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the usual case for latent analysis? Step by step

A
  1. Hash the original - results in h1
  2. Make a copy of the disk
  3. Compute the hash value of the copy (image) - results in h2
  4. Analyze the copy in read-only mode
  5. Again compute the hash value of the copy to see that you have preserved the chain of custody
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do you make interpretation objective?

A

Objectivity - By keeping it free from bias and as clear as possible, let the evidence speak for itself.
Repeatability - independent validation and verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Proper forensic processing should follow 4 steps, which?

A
  1. Collecting
  2. Examination
  3. Analysis
  4. Reporting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which steps does the Casey model include? (6)

A
  1. Identification/Assessment
  2. Collection/Acquisition
  3. Preservation
  4. Examination
  5. Analysis
  6. Reporting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain acquisition and preservation

A

One needs to collect all the relevant information about:
Service providers - records of service, billings, subscribers and information from indirect providers that include utility companies, financial institutions and communication companies…
Storage devices - seizure of hardware, software, documentation, user notes and the media itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the on-off principle and why is it needed?

A

What is on should stay on, what is off should stay off.

Going from on to off mat be a reason for a “lock-out”, going from off to on is modification of evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What can´t you forget while acquiring evidence?

A

Document everything if possible, even visually!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is important while preserving the integrity of electronic devices?

A

The collection should be done according to the set of predefined policies. If transport is necessary, do it with extreme care!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name two main things to think about while examining digital evidence

A
  1. Make a copy of the original evidence first, and work on that
  2. Plan the work ahead together with an investigator
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name to problems with digital evidence

A
  • it´s omnipresent

- often large volumes that need to be reduced

17
Q

Which 2 levels of evidence reduction is there?

A
  1. Digital evidence in its entirety pertinent to a specific case based on well defined set of criteria, goals and objectives
  2. Digital reduction on the digital evidence selected for examination and analysis
18
Q

When do you need data recovery?

A

When data is:

  • deleted
  • damaged or corrupted
  • hidden
19
Q

When do you need data reduction?

A

When you need to:

  • compare
  • filter
  • eliminate (duplication)
  • search

Remember to document everything you do!

20
Q

What should a forensic report include?

A
  • a full description of the examination
  • all the relevant information
  • all activities, steps taken
  • the documents found and used
  • the forensic tools used
  • the source of the evidence (primary or secondary)
21
Q

What do you do in the analysis phase?

A

Make an evaluation and organization of the information extracted from the process. An investigating analyst does this with respect to its relevance and reliability

22
Q

What is the ultimate goal with a forensic examination?

A

To generate knowledge that would assist in an investigation.

23
Q

How should the result be presented?

A

via written reports, oral presentation or testimonies.
The presentation should be factual and clear, even to someone with limited technical understanding, but still explain the technology behind the findings and the conclusions