• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/185

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

185 Cards in this Set

  • Front
  • Back
What kind of authorization document(s) is required to conduct a criminal or civil investigation?
search warrant or subpoena.
2. What kind of authorization document(s) is required to conduct a criminal or civil investigation?
search warrant or subpoena.
3. What U.S. Constitution amendment protects against unreasonable search and seizure?
: The Fourth Amendment
4. What two conditions be must be met for authorized search to satisfy the Fourth Amendment requires seizure?
1.Probable cause
2.describing the place to be searched and the persons or things to be seized
5. What must be done in order to obtain a search warrant and affidavit ?
An application must be filed.
A _________should be established before drafting the application and warrant .
search strategy
What are the following roles search strategies generally consider of the computer in a crime investigation?
1.Contraband,
2.repository of evidence of a crime,
3.an instrument of a crime
What are the six levels of abstraction from a storage device’s file system?
1. DISK 2. VOLUME 3. FILE SYSTEM
4. DATA UNIT 5. META DATA 6. FILE NAME
A data unit in Windows is called_____?
clusters
A data unit in UNIX/Linux is called_______?
Blocks
Clusters and blocks are multiples of ________?
512 byte sectors.
What are common artifacts of the file name layer ?
Files, folders, and directories
To be protected under the Fourth Amendment, an individual must have_____?
the reasonable expectation of privacy, meaning they must demonstrate an expectation of privacy through their behavior society must be prepared to accept that expectation of privacy as reasonable
Give 3 examples of when privacy has been found to be NOT established by the courts.
1) Activities conducted in plain view
2) Garbage disposed of outside a person’s property
3) Passwords displayed openly
When may No-Knock Warrants be requested?
when there is reason to believe a suspect may destroy evidence, and can be requested for searches involving digital evidence.
What are Three exceptions allow warrantless searches?
1. Plain View
2.Searching a individual when being arrested
3.When Voluntary consent is given
What factors of voluntary consent does the Supreme Court recognizes?
1. Age 2.intelligence 3. physical 4.mental condition
What should be done concerning a search warrant when possible?
: consent should be written to explicitly state the scope of the search.
Do Subpoenas give the authorization to search or seize property?
subpoenas order a person to
appear in court
surrender evidence
What are the three categories Privacy legislation can be grouped into?
1.General Privacy
2.Financial Legislation
3.Healthcare And Education Legislation
For evidence or testimony to be considered in a court of law, it must be _______.
Admissible
What three conditions must be met for evidence to be admissible established as Federal Rules of Evidence as legal requirements of?
1.relevance
2.authenticity or credibility
3.competence.
What two conditions must be evaluated so that the evidence is relevant?
evidence must be material, relating directly to the case

evidence must be probative, meaning it proves something significant in determining the case
What two conditions must be met for evidence to be authentic?
1.factual
2.credible
__________must demonstrate the source and integrity of evidence to demonstrate it is credible .
Investigators
What are the most critical steps digital investigators can take to ensure evidence is not ruled inadmissible due to statutory or constitutional violations?
Understanding and complying with the authority to search and seize evidence
In order for evidence to be competent it must _________?
Not be prejudicial, have any statutory constraints , and not be in violation of the suspects Constitutional rights
What rules are particularly important to digital investigations?
Hearsay rules
The 3 categories Digital evidence falls into are?
1.hearsay
2.Non-hearsay
3.Mix of hearsay and non-hearsay
Any statement made outside of the court by an individual who is not under oath at the time the statement is made is called?
Hearsay
How many exceptions are there to the Hearsay Rule________, and how many of them of those rules are applicable to digital investigations____?
24 and 6
What are the exceptions that are applicable to digital investigations?
Business records
Certain public records and reports
Evidence of the absence of a business record or entry
Learned treatises used to question an expert witness
Statements of the absence of a public record or entry A catch all rule
How is the reliability of digital evidence often established?
hash values
What is the two step process pertaining to Rule 901(b)(4) allowing digital evidence from storage media to be introduced.
1. Introduce the storage media, with unique identifiers. Ex. Serial numbers.

2. Media introduced with hash values or other accepted forensic identifiers
The courts have established that investigators need not have a detailed understanding about the hashing algorithms or the software used to implement those algorithms, but must have knowledge on the operation of the tools they use TRUE or FALSE?
TRUE
Hashing is a _________function that computes a ________that uniquely identifies any arbitrary length input
lossy compression, fixed-length value
Hash values are generally presented as a____?
hexadecimal string
A hexadecimal string is a______ not a_____, which is a more readable representation of a_____.
value (number), text string binary value
MD5 hashing algorithm produces a _____hash value.
128-bit
_____are required to represent a single hexadecimal digit.
Four binary bits
A 128-bit MD5 hash value is represented with a ____hexadecimal value.
32-digit
Hash functions are____, meaning the original content _____be recovered from the hash value.
Lossy cannot
Any change of the_______, even a_______, must result in a change to _____the bits in the hash value (digest). This quality is known as the_______.
input message, single, bit at least half, avalanche effect
It must be computationally infeasible to find ______input messages which produce the same digest.
two different
A ________is when two different messages produce the same digest.
collision
It must be ____________to determine the input from a given hash value. This quality is referred to as________.
computationally infeasible, preimage resistance
It must be computationally infeasible to determine _____message from a given digest. This is
referred to as
any input, secondary preimage resistance.
Commonly used hash functions for forensics include?
MD5 and SHA-1
Fuzzy hashing techniques can be used to search_____, but not _____.
Similar, identical files
MD5 produces a _____hash value, while SHA-1 produces a ____hash value.
128-bit, 160-bit
Stronger hash functions are available, including RIPEMD and SHA-2. Both of these hash functions produce hash values from _______in length.
160 to 512 bits
Digital forensics uses hashing for multiple purposes, to include _____and _____large bodies of data to find evidence of interest, ______integrity, and ensuring ____.
Sorting, filtering, verifying, confidentiality
Name a Tool that uses fuzzy hashing to compare multiple, smaller portions of content within files to match similar files.
ssdeep
What are the three principles for digital evidence that the DOJ holds as standards?
The process of collecting, securing, and transporting digital evidence should not change the evidence.

Digital evidence should be examined only by those trained specifically for that purpose.

Everything done during the seizure, transportation, and storage of digital evidence should be fully documented, preserved, and available for review
What does Locard’s Exchange Principle state?
Everything that enters a crime scene leaves part of itself at the crime scene and takes part of the crime scene with it
Locard’s Exchange Principle is not limited to interactions between_____ and the, but rather ____and the______.
Suspects, crime scene, all subjects crime scene
The cardinal rule for first responders is ____.
safety first
What is a first responders second priority?
safety and integrity of the evidence
When Documenting the scene – Documentation should include?
a) photographic
b) video
c) descriptive documentation including
documentation of all personnel present at the scene
what should evidence details include?
Make, model, and serial number of every device present
Note whether devices are on, off, or in sleep mode
Determine if devices are connected to a network, whether wireless or wired
Record status of lights and indicators
Listen to devices for indications of processing or disk activity
Identify and document installed peripherals
Look for documentation to other devices that are not present. This may indicate those devices exist elsewhere.
Photograph front and back of all devices.
What two questions must be asked when identifying data sources?
What are the obvious data sources?
Ask what data sources may exist that are not obvious?
What are examples of other data sources that may not be obvious?
remote storage, which might be indicated by software or links to cloud- or network-based storage
What are potential consequences from compromises in the chain of custody?
1. Misidentification of evidence
2. Contamination or loss of evidence
3. Tampering with evidence
Evidence should be stored in a designated storage facility that?
1. limits access to only the evidence custodian,
2. documents all access to evidence,
3. maintains a thorough chain of custody,
4. provides independent auditing
The chain of custody ends with the_____.
disposal of evidence
_____is destroyed under court order.
Contraband
What tools should Investigators be familiar for destroying digital content?
1. data dump (dd)
2. shred
3. Disk Scrub
4. WIPE.EXE utilities.
What is beginning of computer forensic investigation.
Acquisition
What are three categories: Data acquisition tools generally fall into
1. live acquisition,
2. static acquisition
3. mobile device acquisition
What are the five data analysis and recovery functions all digital forensic tools serve.
Acquisition
1. Validation and discrimination
2. Extraction
3. Reconstruction
4. Reporting
Name a tool that can create images from both static and live sources.
FTK Imager
________tools can also be contrasted by their capability to copy either physical drives or logical partitions.
Acquisition
When are Logical acquisitions are useful ?
1. the evidence drive is encrypted
2. when only a portion of a physical drive is required
When are Logical acquisitions are more suitable?
When it is not be practical or permissible to complete a physical acquisition of large or critical storage systems such as network storage, server storage, or RAID
Simple bit-by-bit copies are known as a______, and are usually created with the ____command .
raw data formats, Linux dd
Raw formatted copies do not use _______and do not include______, so they can be viewed in _____and are compatible with most forensic tools.
Compression, image metadata,
hexadecimal editors
__________provide compression and store metadata with the image file, and the metadata includes______, ________, and other results from data discrimination
Proprietary formats, file hashes, data carving results
The Linux dd command does not perform verification concurrently when creating a raw image file True or False.
True
What are two Linux commands are digital forensic specific versions of the dd command, and perform verification concurrently during copying.
dcfldd and dc3dd
________ensures integrity while a forensic copy is being made, where _______ensures the integrity of complete image copies and individual files.
Verification, validation
_________ is the process of sorting and searching investigation data to locate items of interest.
Discrimination
In________, hashes are calculated not only for the entire image file, but also for individual files within the image, these hashes can be used during discrimination
Validation
The goal of ______is to quickly filter data that is of no investigative interest from the full body of data.
Discrimination
The ___________maintains a comprehensive list of file profiles in the _______.
National Software Reference Library (NSRL), Reference Data Set (RDS)
An _____can be filtered using a pre-compiled list of hashes for OS files, thereby efficiently tagging those files as known good files.
image file
The____ has signatures for both known good (applications, operating systems, and graphic files) and known bad software (i.e., steganography applications and hacking scripts), but does not include signatures for contraband (i.e., graphic files of child pornography).
RDS
_____compares hashes from the investigation data to the known hashes from sources such as the NSRL, and quickly filters known good and known bad files.
Discrimination
_______provides a server and query tool to look up_____ information, while the _____provides an online search capability to look up individual MD5 hash values.
NSRLquery, NSRL RDS, NSRL Hash Search Engine
______can also be performed on header values.
Data discrimination
_____ is the process of recovering data in a digital investigation.
Extraction
What are the sub functions of Extraction ?
1. Data viewing
2. Keyword searching
3. Decompressing
4. Data carving
5. Decrypting
6. Bookmarking
_____ allows an investigator to view data in multiple ways. Examples of the ways are hexadecimal or ASCII format, or by sector.
Data viewing
______could be deliberately hidden storage space, and could contain evidence. Likewise, _____that contains data flagged as deleted could also contain evidence.
Un-partitioned space, unallocated space
______includes RAM and file slack.
Slack space
RAM slack is the portion of RAM memory allocated to a file, but not ____.
used by that file
______ refers to the space on a physical disk allocated to a file, but not written to by that file.
File slack
A ___ may have both RAM slack and file slack.
Sector
____,and ____searches is an important sub functions of extraction.
Text, hexadecimal string
String searches can help to efficiently locate specific data of interest, but can also generate significant numbers of ____.
false positives
_____is another important sub function of extraction.
Decompression
______ the process of reconstructing files from file fragments in unallocated space.
Data carving, or carving
Carving often attempts to recover file fragments based on ____and _____.
Header end-of-file markers
______ is another sub function of extraction.
File and file system decryption
________ iteratively attempt words, and common variations of those words, to crack passwords.
Dictionary attacks
____attacks attempt every possible combination of potential passwords.
Brute force
_____are pre-computed hash values.
Rainbow tables
Techniques, such as_____, are used to counter rainbow table attacks.
Salting
True or False Most UNIX and Linux distributions do not salt passwords, but Windows operating systems do.
FALSE it is the opposite linux does and windows does not.
______features reduce investigator workload.
Bookmarking
How can recreating evidence be accomplished?
1. Disk-to-disk copy
2. Image-to-disk copy
3. Partition-to-partition copy
4. Image-to-partition copy
____ allow investigators to operate applications on the original evidence without altering that evidence.
Shadow drives
Because shadow drives expose the original evidence to risk when should they be used.
only when necessary for court proceedings.
The____ provides support through the Computer Forensics Tool Testing (CFTT) project, and forensic tool testing products (images and data), procedures, and results.
National Institute of Standards and Technology (NIST)
Analysis of digital evidence can be very resource intensive, what components should be sufficient to meet immediate and future requirements?
1. RAM
2. storage
3. ports
4. networking capacities
the major steps in the digital forensics process are
1. Preparation
2. Survey/Identification
3. Preservation
4. Examination & Analysis
5. Presentation
Preparation served two primary objectives: to ______the collection of evidence and to ____the cost of response and investigation
Maximize, minimize
An organization is prepared to perform digital investigations when they have _____and _____
operational readiness, infrastructure readiness
Is established by developing and implementing the policies and procedures to direct and support the digital investigators.
Operational readiness
____________ensures the systems and tools to process various types of digital evidence are in place
infrastructure readiness
_____begins when an incident is detected and verified, and culminates with the seizure of evidence
Survey/Identification
________incident is an event that compromises the confidentiality, integrity, or availability of an information system
information system security
_______incident detection is limited to detection of events where the computer is an instrument of a crime or possibly contains contraband
computer security
True or False__ Detection of other events that do not directly impact the CIA of an information system may also lead to identification of digital evidence
True
example, a computer may serve as a repository of evidence of a crime, such as fraud
digital investigations is limited to criminal and cybercrime incidents. Digital evidence may also be discovered and presented in property, contract, and tort litigation
False
digital investigations are not limited criminal and cybercrime incidents
Investigators begin the ___when digital evidence is seized
chain of custody
____is the acquisition of the current state of potentially volatile digital and physical items.
Preservation
_______is the process of collecting digital evidence for examination, and produces one or more forensically sound ___of the evidence item
Data acquisition, bit-by-bit copies
_______recovers, harvests, organizes, searches, and reduces data collected during preservation.
Examination and analysis
____extracts data from the data sources
Recovery
A ___is the smallest element, and consists of a single piece of data.
bit
A ___is an aggregate of eight bits, and is commonly referred to as a word.
Byte
The smallest elements managed by file systems is a____.
sector
What are the most common sector sizes for Windows_____
512-byte sectors
What does Linux refer to as Blocks___, and what is the block size that Linux uses___?

s
FAUs, 1024 byte
Physical devices are divided into ___?
millions of sectors.
The beginning of the physical device contains the _____?
master boot record (MBR).
The MBR identifies the _____on the drive and allocates specific sectors to each partition
primary partitions
Partitions manage storage by______, more commonly referred to as clusters.
file allocation units FAUs
Clusters are a collection of ___?
adjacent sectors
____is also widely used on removable media, such as USB flash and hard disk drives.
FAT
What are Three versions of FAT?
FAT12, FAT16, and FAT32.
Both the FAT and Master File Table MFT contain the records for each file stored in the partition, include____ and ____.
a flag for active , deleted files.
UNIX uses the_____, and Linux uses ___,___,___,or___ file systems. ____is the latest release of the Linux file systems
UNIX File System Ext2, Ext3, Ext4 or Reiser Ext4
The superblock serves as the “______” and contains data about the file system, to include___ and____.
master node, inodes, dentries
_____represent the directories and files that the user recognizes.
Inodes
_____about these objects is also maintained in the inode.
Metadata
____index the inodes to specific files.
Dentries
_____are first marked simply as unallocated space
Deleted files
Open source tools designed or useful for data carving include:
1. hachoir-subfile
2. Foremost
3. Scalpel
4. Photorec
5. Autopsy
True or False__ When working with live memory, attempting to perform forensic analysis on the original evidence is not even practical
True
Data that would be lost by the disruption of power is ____.
Volatile data
Data that is permanently preserved if power is disrupted is ___.
Nonvolatile
Examples of volatile data include the contents of____.
RAM and cache
True or False__Router or switch configurations may have temporary files stored in flash memory that are deleted during an orderly shutdown.
True
Regardless of where or how volatile data is stored, investigators have ___opportunity to acquire that data
one
Registers and cache are the___?
most volatile data
Digital Forensics The process of____,____,____,and____ in a manner that is legally acceptable
identifying, preserving, [analyzing] and presenting digital evidence
___acquisition process preserves a complete and accurate representation of the original data, and its authenticity and integrity can be validated
Forensic Soundness
______ Interpreting evidence free from bias whether inculpatory (directs blame) or exculpatory (reflects blame
Objectivity
______ experiments and observations must be repeatable so that they can be independently verified. Documentation is critical to ensure repeatability.
Repeatability
is the examination of a person’s body or property or any area considered private True or False
TRUE
______derived when the property to be searched belongs to person granting consent or when person granting consent has been authorized to do so
Actual Authority
_____ a person who has the genuine appearance of authority to give consent.
Apparent Authority
______ material relates to the case being investigated it probative meaning it proves something significant to the case
Relevance
_____ evidence is factual not an opinion(except for expert witness) computer evidence is generally a fact, but interpretation of evidence may be opinion…must demonstrate the source is valid and honest
Authenticity
evidence cannot be prejudicial, not subject to statutory constraints, not in violation of the Constitution
Competence
_____limits government on collecting personal information for approved purposes, notifying individuals about the information collected and the purpose of those records. Only protects US citizens and legal residents
Privacy Act 1974
_______restricts government use of wire taps. May not intercept wired or wireless communications without due process
Electronic and Communication Privacy Act (ECPA) 1986
_____mathematical representation of a specific data repository that verifies that data has not been altered verifies integrity
Hashes
____,_____, – levels of forensic examination are survey/triage( preliminary examination and in-depth examination.
Examination & Analysis
_______– when the hypothesis and results are presented to people other that investigators. ..details the entire investigation process, chain of evidence/custody, findings, alternative theories that were eliminated.
Presentation
_______—may contain illegal content or computer may be stolen
Contraband
______ – contain records of a crime
Repository
_______– Malware distribution
Instrument
____ –At the lowest level, a disk’s content is the physical alignment of magnetic particles.
Disk
____ could be done at this level, but requires expertise and tools beyond the means of most investigators.
Analysis
______–A single physical disk could contain multiple volumes, or a single volume may span multiple disks. A volume is a logical organization of disk sectors used to create a single file system.
Volume
_______– describe the layout of files and associated metadata for the file system’s operation.
File System
_____is the smallest available freestanding unit for data storage in a given file system.
Data Unit–
_____–Humans operate at this layer
File Name
_______ is data about data. It is used by the file system to manage content from the data unit layer, and typically contains time stamps, file ownership information, and permissions.
Metadata
______Control the crime scene by determining who is in charge, secure the scene, document the scene, identify data sources
FIRST RESPONDERS
____ attempts to explain what happened during a crime or incident in an attempt to explain who did what, when, where, and how.
Reconstruction
_____– recording what was done many tools have features that maintain the logs, metadata, evidences files needed to demonstrate reliability and repeatability
Reporting
ADVANTAGES TO IMAGE COPIES OVER LIVE MEMORY
1. The ability to verify image authenticity through hash functions and hash values. Using multiple acquisition tools and hash functions improves the robustness of an investigator’s claim of authenticity.

2. The ability to recover from processing errors or mistakes with a fresh copy.

3. The ability to use fresh copies when completing analysis processes that may not be
compatible.

4. The ability to convert image copies from one format to another, and verify it’s integrity, to process evidence with multiple tools or utilities that use different input formats.

5. The ability to recover from loss, theft, or corruption of an image copy without compromising the investigation.

6. Courts generally insist investigators work from image copies