Week 3 - Evidence Collection Flashcards

1
Q

What is the acquisition stage of an investigation?

A

It involves capture and seizure of digital devices, hardware and data that is to be investigated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What happens during acquisition of digital evidence?

A

It begins when information and/or physical items are collected for investigation purposes. Preserving (Imaging) and processing the content and data of the device is the next stage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When acquiring digital devices/disks it is important to?

A

Where gloves when appropriate
Store in sealed backs
Sign by each person who the device with in possession of (Include name, and date obtained, and date passed on)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a device need to be connected to to faciliate imaging?

A

The analysts device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the steps involved in imaging?

A
  1. Remove the storage media from suspect’s device
  2. Connect to imagin workstation
  3. Assess size and contents (Use mmls command in sleuthkit to display the partition layout of disk, DO NOT to change contents)
  4. Make a bit for bit copy of the disk (Using dd, dcfldd command or similar)
  5. Verify the integrity of copy using checksums
  6. Return the original disk to an evidence locker
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How might you connect a disk to analysts machine?

A

Insert as an additional internal disk in the PC.

Add as an external drive (Using external connectors, disk caddy etc..).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What should be considered when storing an image copy?

A

Should you store the copy on a disk the same size as the original or bigger.
Should you use an identical disk
Should you use an local imaging fileserver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What must you do to a target disk for an image before it is used?

A

It must be forensic-ly cleaned/wiped as to not tamper with the new data being copied to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What commands are used to make a bit for bit iamge copy of a disk?

A

The dd command in linux

The dcfldd command in sleuthkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly