Lecture 9 - Process Of Digital Forensics Steps 1 & 2 Flashcards

1
Q

What are the steps of computer forensics?

A

1 . Seizure
2. Acquisition
3. Analysis
4. Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What should be done upon arriving at the crime scene.

A

The scene should be searched extensively , while labelling and registering (formally as this is an investigation) all hardware equipment found and place it safely in antistatic bags. Harddrives must be removed if computer is found powererd off , otherwise a decision needs to be made whether live forensics procedure will be undertaken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is essential in investigation for digital forensics?

A

Taking pictures and screenshots for supporting evidence is essential in the investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of a seizure?

A

to prevent digital devices in question from being used and data on them getting changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens in the step of a seizure?

A
  • equipment and hardware inspection
  • labelling
  • registry
  • bagging
  • bios time & harddrive details
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What should we be aware of when seizing the device?

A

tower bomb or even USBs
hidden inside a plug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a registry?

A

practically the Database for the OS itself. It contains all the configuration data for the system – and is organized in a hierarchical way.

contains e.g. recently used software, users, files, connected devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 5 areas of the registry for Windows.

A

HKEY_CURRENT_USER
HKEY_HKEY_USERS
HKEY_LOCAL_MACHINE
HKEY_CLASSES_ROOT
HKEY_CURRENT_CONFIG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is getting BIOS time important?

A

As if the computer time is set wrong, then the evidence might be pointing the investigation in the wrong direction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of the acquisition step?

A

To create a digital forensic copy of the device storage. This can be of any format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of the acquisition step?

A

To create a digital forensic copy of the device storage. This can be of made into any format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What tools can be used for the acquisition step?

A

FKT IMager or Data Duplication

-> these are both bit by bit copying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is important during acquisition?

A

use iof write blockers to avoid changing the original in unwanted ways. It helps in eliminating the possibility of contaminating evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is special about the cloned drive during the acquisition stage?

A

that it has a generated hash value (this is kept safely), in this way the forensic
examiner will ensure that while analysing the data he\she will not make any changes in the copy and use it as a proof that can be presented in court

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a good practice in digital forensics?

A

It is a good practice for an investigator to work on a second copy, then there is no need to recopy if there is a mistake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly