computer forensics exam 2

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/86

flashcard set

Earn XP

Description and Tags

chapters 15, 16, 17, 18, & 19

Last updated 2:53 AM on 3/25/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

87 Terms

1
New cards

cpu

performs mathematical calculations and runs programs

2
New cards

bios

basic input and output system — contains information necessary for computer components to communicate with one another and stores some basic preferences

3
New cards

bios passwords

can present a barrier when digital investigators need to boot a computer. circumvent the password by resetting the cmos or having an expert control the heads to overwrite the password

4
New cards

post

(power on self test) part of bios that checks hardware at power on to ensure it is operating correctly

5
New cards

cmos

(complementary metal oxide silicon)

6
New cards

what is data on disks stored based on

“endianess” of the processor

7
New cards

binary

ones and zeroes, representing on and off. most basic number system

8
New cards

file format

standard way that information is encoded for storage in a computer file

9
New cards

hard disk drive

stores data by magnetizing physical spots on a spinning disk

10
New cards

solid state drive

uses nand flash memory cells to store bits(?)

11
New cards

one sector

512 bytes

12
New cards

one cluster

4-8 sectors

13
New cards

how can data be hidden on a disk

unallocated areas, slack spaces, changed name or file extensions, hidden within other files, limits of forensic tools, encryption

14
New cards

private key encryption

one shared private key is used for encryption and decryption

15
New cards

public key encryption

one private key and one public key is used for encryption and decryption respectively

16
New cards

encryption

changing original text into a secret message using cryptography

17
New cards

decryption

changing secret message back to original form

18
New cards

cleartext data

data stored or transmitted without encryption

19
New cards

plaintext

data to be encrypted

20
New cards

key

mathematical value entered into the algorithm to produce cyphertext

21
New cards

hash algorithms

creates a unique digital fingerprint for a set of data

22
New cards

hashing algorithm characteristics

fixed size, unique, original, secure

23
New cards

most common hash algorithms

message digest, secure hash algorithm, whirlpool, ripemd, password hashes

24
New cards

message digest 2 (MD)

added padding to make short messages 128 bits, 32byte output

25
New cards

message digest 4

length of message padded to 512 bits, has flaws

26
New cards

message digest 5

addresses md4’s flaws, uses four variables of 32 bits each in a round-robin fashion to create a value

27
New cards

secure hash algorithm (SHA)

more secure than MD

28
New cards

original cryptographic algorithms

data encryption standard, triple data encryption standard, advanced encryption standard

29
New cards

data encryption standard

block cipher that divides plaintext into 64-bit blocks and then executes the algorithm 16 times

30
New cards

advanced encryption standards

official encryption standard used by the U.S government, replaced DES

31
New cards

weakness of symmetric algorithms

distributing and maintaining a secure single key among multiple users distributed geographically

32
New cards

asymmetric cryptographic algorithms / public key cryptography

requires a pair of keys

33
New cards

RSA

Ron Rivest, Adi Shamir, and Leonard Adleman; most common asymmetric cryptography algorithm that uses two large prime numbers

34
New cards

elliptic curve cryptography

uses sloping curves; add the values of two points on the curve to derive a third one

35
New cards

file systems

tells operating systems where to find files and pieces of files

36
New cards

FAT file systems

maps file clusters in a table

37
New cards

ntfs

much more complex than FAT, more efficient. uses unicode instead of ascii

38
New cards

MFT

master file table, contains a list of records that store most of the information needed to locate data on the disk

39
New cards

uninitialized space

space that is allocated to a file that is not in use

40
New cards

data recovery

recovering deleted data from unallocated space

41
New cards

file carving

another approach to recovering deleted files

42
New cards

slack space

leftover storage space on a computer's hard disk drive when a file does not need all the space it has been allocated

43
New cards

log files

stores various records of events; may contain information about user accounts that were used to commit a crime and can show that a user account might have been stolen

44
New cards

log data analysis process

analyze number of events, variety of events, network behaviors, ability, capacity, and performance metrics of hardware, software security matrices according to some compromised methods

45
New cards

windows registry

database of information, settings, options, and other values for software and hardware installed on all versions of microsoft windows operating systems

46
New cards

registry

database that contains default settings, user, and system defined settings in windows computers; monitors, observes, and records the activities performed by the user in the computer

47
New cards

chrome history file

contains urls visited, timestamps, and typed urls

48
New cards

chrome cookies and sessions

stored in a sqlite database named cookies, contains session tokens, authentication states, and tracking data

49
New cards

chrome cache and temporary files

stored in the cache folder; contains cached web pages and other temporary data

50
New cards

internet trace forensic recovery

investigators can extract and analyze files using sqlite database viewers, forensic tools, and cache viewers

51
New cards

web browsercookies

temporary data set by website, keeps track of who you are, what sites you have visited, things you may have searched for, etc

52
New cards

first party cookie

cookie created by website user is currently visiting

53
New cards

third-party cookie

tracks the user’s browsing history

54
New cards

session cookie

stored in ram and expires when browser is closed

55
New cards

persistent cookie

recorded on computer’s hard drive

56
New cards

secure cookie

used only when browser visits server over secure connection, always encrypted

57
New cards

cookie attributes

name/value, domain/host, path, expires / max-age, creation / last access timestamps, secure / httponly flags, encrypted value / storage

58
New cards

forensic process

identify running browsers, acquire evidence, file system image and record hashes, document processes if live, collect relevant artifacts, preserve chain of custody and metadata, parse cookie stores, decrypt encrypted cookie values, convert timestamps & make timeline, correlate with server logs, and document findings and significance

59
New cards

linux

core of the operating system

60
New cards

third extended file system

journaling file system which has a built-in file recovery mechanism

61
New cards

fourth extended file system

added support for partitions larger than 16 tb, improved management of large files, more flexibility, considers everything a file

62
New cards

boot block

contains instructions for startup (bootstrap code)

63
New cards

superblock

contains vital information about the system and is considered metadata (disk geometry & available space)

64
New cards

inode block

contains the first data after the superblock

65
New cards

data block

stores files and directories

66
New cards

inodes

contains file and directory metadata

67
New cards

hard link

a pointer that allows accessing the same file by different filenames, acts as a copy of the selected file

68
New cards

link count

field inside each inode that specifies the number of hard links

69
New cards

symbolic links

an actual link to the original file

70
New cards

catalog

listing of all files and directories on the volume

71
New cards

data fork

contains data the user creates, such as text or spreadsheets

72
New cards

resource fork

contains information such as menus, dialog boxes, icons, executable code, and controls when working with an application

73
New cards

logical block

collection of data that can’t’ exceed 512 bytes

74
New cards

clumps

groups of contiguous allocation blocks

75
New cards

plist

property list ; preference files for installed applications on a system

76
New cards

keychains

used to manage passwords

77
New cards

preparation

prepare to seize evidence with a search warrant

78
New cards

write blockers

hardware devices connected between a drive you wish to copy and the drive to which you wish to copy

79
New cards

portable RAID system

redundant array of inexpensive disks ; a collection of hard drives designed to be tolerant of the loss of one or more hard disks while retaining data

80
New cards

survey

a methodical process of finding all potential sources of digital evidence and making informed, reasoned decisions about what digital evidence to preserve

81
New cards

documentation

note chain of custody, evidence intake & inventory, preservation guidelines, and preservation notes

82
New cards

preservation

digital evidence needs to be preserved in a way that it is not altered / minimal alterations; use hashes to ensure data is not changed

83
New cards

how to preserve digital evidence

place the computers and media in secure storage, extract only the information needed, acquire everything from evidential computer and storage media // work on a copy of the data

84
New cards

bit-stream copies

identical copies of hard disk data

85
New cards

swap files

portion of disk storage that the operating system uses as an extension of physical memory

86
New cards

hibernation files

a system file that stores the contents of ram to disk when the computer enters hibernation or sleep mode

87
New cards

reporting

take everything done in an investigation and tie it together in a report that can be given to others; clear communication, description of evidence, and analysis of evidence

Explore top notes

note
NOUNS
Updated 1100d ago
0.0(0)
note
AP Physics 1: Ultimate Guide
Updated 693d ago
0.0(0)
note
CELLULAR RESPIRATION
Updated 1728d ago
0.0(0)
note
Chemistry
Updated 279d ago
0.0(0)
note
Chapter 23- Alkenes
Updated 1278d ago
0.0(0)
note
Chapter 5: Foundations: History
Updated 1082d ago
0.0(0)
note
NOUNS
Updated 1100d ago
0.0(0)
note
AP Physics 1: Ultimate Guide
Updated 693d ago
0.0(0)
note
CELLULAR RESPIRATION
Updated 1728d ago
0.0(0)
note
Chemistry
Updated 279d ago
0.0(0)
note
Chapter 23- Alkenes
Updated 1278d ago
0.0(0)
note
Chapter 5: Foundations: History
Updated 1082d ago
0.0(0)

Explore top flashcards