Week 1 - Further Overview Flashcards

1
Q

What is Digital Forensics?

A

The procedure of revealing, securing, retrieving and intrepreting electronic content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who do digital forensics experts work with?

A

Law enforcement
Private companies
Forensic consultants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the major components of Digital Forensics? What happens during Digitial Forensics?

A

Secure and detect evidence - IMPORTANT that evidence is secured first!
Following appropriate standards of practice
Analysis and investigate techniques
Using software tools
Determine the presence and nature of computer-based criminal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What devices are investigated in digital forensics?

A

PCs
Mobile phones
Game consoles
E.g. any digital device part of a cybercrime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the ACPO guidelines?

A

The Association of Chief Police Officers guidelines iis a standard of practice set in place to ensure good practice when collecting computer-based electronic evidence, to ensure that it is secure and can be used as evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the first step of securing and detecting evidence?

A

The seizure of relevent devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the process that happens afte seizure of a digital device?

A

The device is seized, bagged, labelled and documented. A ‘chain of evidence’ log is maintained to provide an audit trail. All actions on the device are also logged for future reference to ensure integrity and security. The identity of investigators managing the devices at any time must also be recorded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the second step of securing and detecting evidence?

A

The data storage is imaged (aka. copied) and stored securely. A MD5 or a SHA-1 hash is created to validate the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why might a digital device be imaged?

A

To ensure that if data is corrupted or changed during investigation, the original data is still valid and correct. It ensures that the data can be showed to have integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TRUE OR FALSE: Investigations are only conducted on images of the original data?

A

TRUE, this means that the original can be kept safe and used to validate the data collected during investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the steps of Securing and Detecting?

A

Seizure of devices.
Imaging the data.
Evidence is detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the third step of securing and detecting?

A

The image is investigated, and the investigators look for any data/evidence that relates to the cybercrime. To do this they use digital forensics software tools. The searches may focus on different varieties of information: images, videos, web activitiy, specific document types, history/usgae, email content, key word searches etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What data may be investigated during a digital forensics investigations?

A
Images
videos
web activitiy
specific document types
history/usgae
email content
key word searches
OS data
etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the main use of Digital Forensics?

A

In cyber crime investigations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly