IA - DIGITAL FORENSICS Flashcards

1
Q

Branches of Digital Forensics

A
  1. Computer Forensics
  2. Mobile Device Forensics
  3. Network Forensics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a branch of digital forensics concerned with evidence found in computers and digital storage media

A

Computer Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

focused on the recovery of digital evidence form mobile devices using forensically sound methods

A

mobile device forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

involved the alleged breaking of laws and law enforcement agencies and their digital forensic examiners

A

criminal cases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

examiners specialize in one area of digital evidence; either at broad level or sub-specialisst

A

Digital Evidence Examiners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

focused on monitoring and analyzing computer network traffic for information gathering, legal evidence or intrusion detention

A

network forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • gather or process evidence at crime scenes
  • trained on the correct handling of technology
A

Digital Forensic Technician

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Purpose of digital forensics

A
  1. criminal cases
  2. civil cases
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • someone who has a desire to follow the evidence and solve a crime virtually
  • recover data like documents, photos, and emails from a computer hard drive and other storage devices such as zip and flash drives with deleted, damaged, or otherwise manipulated
A

Digital Forensics Investigator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

involved the protection of rights and property of individuals or contractual disputes between commercial entities where a form of digital forensics called electronic discovery may be involved

A

civil cases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • the admissibility of digital evidence relies on the tool used to extract it
  • Forensic tools are subjected to the Daubert standard, where judge is responsible for ensuring that the processes and software used were acceptable
A

Investigative tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Example Uses of Digital Forensics

A
  1. Intellectual Property Theft
  2. Industrial Espionage
  3. Employment Disputes
  4. Fraud Investigations
  5. Forgeries Related Matters
  6. Bankruptcy Investigations
  7. Inappropriate Use of The Internet and Email in workplace
  8. Issues Concern with the regulatory compliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

GENERAL TOOLS USED IN FOLLOWING CATEGORIES

A
  1. disk and data capture tools
  2. file viewer tools
  3. file analysis tools
  4. internet analysis tools
  5. email analysis tools
  6. registry analysis tools
  7. mobile device analysis tools
  8. mac os analysis tools
  9. network forensics tools
  10. database forensics tools
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Internet crime is for investigators, laboratory and technical personnel to understand and how the process works and to stay closely engaged with advances in software and tracking techologies

A

Internet-Based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

crims such as pornography, copyright infringement, extortion or counterfeiting have digital evidence which is on the computer’s hard drive and general equipment, including removable devices such as thumb drive and CRDOM

A

Stand-Alone Computers or Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • allow criminals to engage in an ever-growing variety of activities and devices keep track of every move and message
  • it is th tracking capability that truns mobile devices into key evidence in many cases
A

Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Stages of Digital Forensics Investigation

A
  1. identification
  2. preservation
  3. analysis
  4. documentation
  5. presentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is any probative information stored or transmitted in digital form that a party to a court case may use in trial

A

digital evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

physical evidence cannot be wrong. it cannot perjure itself, it cannot be wholly absent. only human failure to find it, study and understand it, can diminish its value

A

Locard’s Principle

11
Q
  • deter any alteration in evidence, either intentionally or unintentionally, states that the court prefers original evidence in trial rather than a copy
  • are used to establish a credible link between the attacker, victime, and crime scene
A

Best Evidence Rule

12
Q

types of investigation

A
  1. criminal forensics
  2. intelligence gathering
  3. electronic discovery
  4. intrusion investigation
12
Q

is usually part of a wider investigation conducted by law enforcement and other specialists with reports being intended to facilitate that investigation and ultimately be entered as an expert evidence before court

A

criminal forensics

12
Q

is often associated with crime providing intelligence to help track, stop, or identify criminal activity

A

intelligence gathering

12
Q

has a specific legal limitations and restrictions, usually in relation to the scope of any investigation

A

electronic discovery

13
* final form of investigation is different from previous ones * instigated as a response to a network intrusion
intrusion investigation
14
techniques of digital forensics
1. cross-drive analysis 2. live analysis 2.1 volatile analysis 3.recovery of deleted files 4.stochastic forensics 5.stenography
15
* a forensic technique that correlates information found on multiple hard drives. * this process, still being researched can be used to identify social networks and perform anomaly detection
cross-drive analysis
16
* the examination of computers from within the operating system using custom forensics to extract evidence * this practice is useful when dealing with encrypting file system
live analysis
17
is data that is lost when power is switched off
volatile data
18
a method uses stochastric properties of the computer system to investigate activities lacking digital artifacts
stochastic forensics
18
order of voladility of digital evidences
1. CPU 2. ARP Cache 3. Memory 4. Temporary File System 5. Data on Hard Disk 6. remotely lagged data 7. data contained on archival media
19
computer forensics professionals can fight this by looking at the hash of the file and comparing it to the original image
stenography
19
* modern forensic softwares have their own tools for recovering deleted data * most OS and file systems fo not always rease physical file data, allowing investifators to reconstruct it from physical disk sectors
recovery of deleted files
20
the **testbed should be created from the trusted source** and functionality of the testbed should be checked in advance before using them in the build
create forensic tool testbed
20
chracteristics of digital evidence
1. admissibility 2. reliability 3. convincing to judges 4. completeness 5. authentication 6. assessment 7. acquisition 8. preservation 9. examination and analysis 10. documentation and reporting
20
first responder toolkit
1. create forensic tool testbed 2. document the forensic tool testbed 3. document the summary of the forensic tools 4. test the tools
21
for every tool that is acquired for the testbed, the **follwiing information is documented for easy reference and record**
document the summary of the forensic tools
22
now the tools selected and installed are testedd in the testbed and its performance and output is examined
test the tools
23
some common mistakes first responder should avoid
1. do not shu off or reboot machine 2. do not assume that any parts of the victim is reliable 3. take precaution 4. follow procedures
24
issues facing computer forensics
1. technical issues 2. legal issues 3. administartive issues
25
technical issues
1. encryption 2. increasing storage space 3. new technologies 4. anti-forensics
26
* may confuse or distract computer examiner's findings. In such cases, a competent opposing lawyer supplied with evidence from competent computer forensic analysit shoulw be able to dismiss such argument
Legal Issues
27
3 Famous Cases Solved Through Digital Forensics
1. BTK Killer 2. The Craigslist Killer 3. Larry J Thomas Vs State of Indiana
28
dennis rader tortured and killed 10 people but the digital forensics experts were able to trace the metadata contained within the disk helping unveil the killers identity
BTK Killer
29
when investigators traced emails exchanged between victims and ip address led them to unlikely suspect
the craigslist killer
30
during the investigation, the authorities took the current posted on the culprits facebook account under consideration
Larry J. Thomas vs the state of Indiana