Cyber Forensics & Incident Response

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/140

flashcard set

Earn XP

Description and Tags

Flashcards on Cyber Forensics, Incident Response, Mobile Device Forensics, and IoT Forensics

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

141 Terms

1
New cards

Overview of Mobile Device Forensics

The operation of cellular networks and service provider metadata.

2
New cards

Mobile Phone Technology Evolution

Mobile phone technology has advanced rapidly through analog, digital PCS, 3G, 4G, and 5G cellular networks.

3
New cards

3G Standard

Developed by the ITU, it's compatible with CDMA, GSM, and TDMA; EDGE was specifically developed for it.

4
New cards

4G Network Technologies

Orthogonal Frequency Division Multiplexing (OFDM), Mobile WiMAX, Ultra Mobile Broadband (UMB), Multiple Input Multiple Output (MIMO) and Long Term Evolution (LTE)

5
New cards

CDMA Networks

Networks conforming to IS-95 and using CDMAOne. They became CDMA2000 when they went to 3G services.

6
New cards

Global System for Mobile Communications (GSM)

Uses the Time Division Multiple Access (TDMA) technique, allowing multiple phones to share a channel.

7
New cards

Main Components for Cellular Communication

Base Transceiver Station (BTS), Base Station Controller (BSC), and Mobile Switching Center (MSC).

8
New cards

MSC

Mobile Switching Center.

9
New cards

Cellular Network Characteristics

Cell sizes range from 1-20km; calls are transferred between cells. The network tracks detailed information for cell handoff, billing, and usage.

10
New cards

Data Set Contents from Cell Networks

Phone numbers (hidden by unique codes), call duration, time of communication, and location of cell towers contacted for calls, SMS, and internet connections.

11
New cards

Metadata Retention in Australia

Metadata retention laws in Australia include storing information such as the origin, destination, and time of calls, texts, and emails for at least two years.

12
New cards

Items Stored on Cell Phones

Incoming/outgoing/missed calls, SMS/MMS messages, email accounts, IM logs, web pages, pictures, video, and music files.

13
New cards

Understanding Mobile Device Forensics

Investigating cell phones and mobile devices, which is challenging because no single standard exists for data storage and new phones are released frequently.

14
New cards

Hardware Components of Mobile Devices

Microprocessor, ROM, RAM, digital signal processor, radio module, microphone, speaker, hardware interfaces, and LCD display.

15
New cards

EEPROM

Electronically Erasable Programmable Read-Only Memory (EEPROM).

16
New cards

Peripheral Memory Cards for PDAs

Compact Flash (CF), MultiMediaCard (MMC), and Secure Digital (SD).

17
New cards

SIM Cards

Subscriber Identity Module (SIM) cards, which consist of a microprocessor and internal memory.

18
New cards

Main Concerns in Mobile Device Acquisition

Loss of power, synchronization with cloud services, and remote wiping.

19
New cards

Areas to Check in Forensics Lab

Internal memory, SIM card, and removable or external memory cards.

20
New cards

File System for SIM Cards

Hierarchical structure consisting of Master File (MF), Dedicated File (DF), and Elementary File (EF).

21
New cards

SIM Security

Always Access, Card Holder Verification1 (CHV1), Card Holder Verification2 (CHV2), Administrative Access, and Never Access.

22
New cards

Procedures for Mobile Forensics Software

Identifying the mobile device, ensuring mobile device forensics software is installed, attaching the phone to power and connecting cables, starting the forensics software, and downloading information.

23
New cards

SIM Card Readers

A combination hardware/software device used to access the SIM card.

24
New cards

Mobile Forensic Tools

Eclipse, Project-A-Phone(Manual Extraction), Paraben’s Device Seizure, Susteen’s Data Pilot (Logical extraction), CeleBrite’s UFED Touch Ultimate, RIFF Box (Physical extraction), SD Flash Doctor, UP-828(Chip-off).

25
New cards

Common Methods for Mobile Forensic Data Acquisition

Logical acquisition, physical acquisition, and manual acquisition.

26
New cards

Logical Acquisition

Most practical, offering an acceptable compromise of completeness vs. convenience

27
New cards

Mobile Forensics Tools

Paraben Software (E3:DS, DataPilot, BitPam), Cellebrite UFED Forensic System, and MOBILedit Forensic.

28
New cards

Main IOS operating modes

Normal mode, Recovery mode and DCFU mode.

29
New cards

Backup files in iTunes

Contains a copy of SMS, photos, calendar, music, call logs, configuration files, documents, keychains, network settings, cookies, etc.

30
New cards

IOS Forensic Investigations Data base file systems

SMS Messages, Address Book/Contacts and Photo metadata.

31
New cards

IOS Forensics Tools

Elcomsoft Phone Breaker for logical data acquisition and Tenorshare for data recovery.

32
New cards

Android Platform Architecture

Linux Kernel, Native C/C++ Libraries, Android Runtime, Java API Framework and System Apps.

33
New cards

Android Security features

Secure Kernel, Application Sandbox, the permission model, application signing, Security Enhanced Linux, Full Disk Encryption, Trusted Execution Environment etc.

34
New cards

Main Partitions on Android

/boot, /system, /data, /cache, /recovery, /misc and /sdcard.

35
New cards

Apps locations for Android forensic investigations

Google Chrome, Gmail, WhatsApp and Skype.

36
New cards

Android Forensic Tools

Santoku Linux, Android Debug Bridge (adb) and Android SDK.

37
New cards

Android Forensic Tool

Oxygen Forensics Extractor

38
New cards

Evolution of IoT

From Internet of Thing (IoT) to Internet of Everything (IoE) to Internet of Anything (IoA).

39
New cards

IoT Architecture Layers

Application Layer, Middleware Layer, Internet Layer, Access Gateway Layer and Edge Technology Layer.

40
New cards

Potential IoT Vulnerabilities

No automatic security updates, Improper communications and encryption, Lack of secure storage and authentication and an Insecure web interface.

41
New cards

Attacker breach IoT critical areas

Device firmware & mobile application, Device memory, Device physical interface & network services, Local data storage & Cloud web interface and Device web interface & network traffic.

42
New cards

IoT attacks

DoS, Jamming, Ransomware, Sybil, Man-in-the-Middle, Replay, Side channel, Rolling code and Remote access attacks.

43
New cards

IoT sensor attacks

Jamming attack and BlueBorne attack.

44
New cards

Standard forensic examination

Evidence identification and collection, Preservation, Analysis and Presentation and reporting.

45
New cards

Data Acquisition Smartwatch

Data API; Message API; and Node API.

46
New cards

Logical Acquisition of Android Wearable

Enable developer options, Connect to Wi-Fi and enable Wi-Fi debugging in Settings, Check IP address and use adb connect

47
New cards

Files to be checked in Android Wearable Image Forensic Examination

Log files, database logs, media files, cache files, application files, etc.

48
New cards

Investigator examine data at hardware level

Through JTAG Forensics and through memory chip extraction in Chip-off Forensics.

49
New cards

Overview of Mobile Device Forensics

The operation of cellular networks and service provider metadata.

50
New cards

Mobile Phone Technology Evolution

Mobile phone technology has advanced rapidly through analog, digital PCS, 3G, 4G, and 5G cellular networks.

51
New cards

3G Standard

Developed by the ITU, it's compatible with CDMA, GSM, and TDMA; EDGE was specifically developed for it.

52
New cards

4G Network Technologies

Orthogonal Frequency Division Multiplexing (OFDM), Mobile WiMAX, Ultra Mobile Broadband (UMB), Multiple Input Multiple Output (MIMO) and Long Term Evolution (LTE)

53
New cards

CDMA Networks

Networks conforming to IS-95 and using CDMAOne. They became CDMA2000 when they went to 3G services.

54
New cards

Global System for Mobile Communications (GSM)

Uses the Time Division Multiple Access (TDMA) technique, allowing multiple phones to share a channel.

55
New cards

Main Components for Cellular Communication

Base Transceiver Station (BTS), Base Station Controller (BSC), and Mobile Switching Center (MSC).

56
New cards

MSC

Mobile Switching Center.

57
New cards

Cellular Network Characteristics

Cell sizes range from 1-20km; calls are transferred between cells. The network tracks detailed information for cell handoff, billing, and usage.

58
New cards

Data Set Contents from Cell Networks

Phone numbers (hidden by unique codes), call duration, time of communication, and location of cell towers contacted for calls, SMS, and internet connections.

59
New cards

Metadata Retention in Australia

Metadata retention laws in Australia include storing information such as the origin, destination, and time of calls, texts, and emails for at least two years.

60
New cards

Items Stored on Cell Phones

Incoming/outgoing/missed calls, SMS/MMS messages, email accounts, IM logs, web pages, pictures, video, and music files.

61
New cards

Understanding Mobile Device Forensics

Investigating cell phones and mobile devices, which is challenging because no single standard exists for data storage and new phones are released frequently.

62
New cards

Hardware Components of Mobile Devices

Microprocessor, ROM, RAM, digital signal processor, radio module, microphone, speaker, hardware interfaces, and LCD display.

63
New cards

EEPROM

Electronically Erasable Programmable Read-Only Memory (EEPROM).

64
New cards

Peripheral Memory Cards for PDAs

Compact Flash (CF), MultiMediaCard (MMC), and Secure Digital (SD).

65
New cards

SIM Cards

Subscriber Identity Module (SIM) cards, which consist of a microprocessor and internal memory.

66
New cards

Main Concerns in Mobile Device Acquisition

Loss of power, synchronization with cloud services, and remote wiping.

67
New cards

Areas to Check in Forensics Lab

Internal memory, SIM card, and removable or external memory cards.

68
New cards

File System for SIM Cards

Hierarchical structure consisting of Master File (MF), Dedicated File (DF), and Elementary File (EF).

69
New cards

SIM Security

Always Access, Card Holder Verification1 (CHV1), Card Holder Verification2 (CHV2), Administrative Access, and Never Access.

70
New cards

Procedures for Mobile Forensics Software

Identifying the mobile device, ensuring mobile device forensics software is installed, attaching the phone to power and connecting cables, starting the forensics software, and downloading information.

71
New cards

SIM Card Readers

A combination hardware/software device used to access the SIM card.

72
New cards

Mobile Forensic Tools

Eclipse, Project-A-Phone(Manual Extraction), Paraben’s Device Seizure, Susteen’s Data Pilot (Logical extraction), CeleBrite’s UFED Touch Ultimate, RIFF Box (Physical extraction), SD Flash Doctor, UP-828(Chip-off).

73
New cards

Common Methods for Mobile Forensic Data Acquisition

Logical acquisition, physical acquisition, and manual acquisition.

74
New cards

Logical Acquisition

Most practical, offering an acceptable compromise of completeness vs. convenience

75
New cards

Mobile Forensics Tools

Paraben Software (E3:DS, DataPilot, BitPam), Cellebrite UFED Forensic System, and MOBILedit Forensic.

76
New cards

Main IOS operating modes

Normal mode, Recovery mode and DCFU mode.

77
New cards

Backup files in iTunes

Contains a copy of SMS, photos, calendar, music, call logs, configuration files, documents, keychains, network settings, cookies, etc.

78
New cards

IOS Forensic Investigations Data base file systems

SMS Messages, Address Book/Contacts and Photo metadata.

79
New cards

IOS Forensics Tools

Elcomsoft Phone Breaker for logical data acquisition and Tenorshare for data recovery.

80
New cards

Android Platform Architecture

Linux Kernel, Native C/C++ Libraries, Android Runtime, Java API Framework and System Apps.

81
New cards

Android Security features

Secure Kernel, Application Sandbox, the permission model, application signing, Security Enhanced Linux, Full Disk Encryption, Trusted Execution Environment etc.

82
New cards

Main Partitions on Android

/boot, /system, /data, /cache, /recovery, /misc and /sdcard.

83
New cards

Apps locations for Android forensic investigations

Google Chrome, Gmail, WhatsApp and Skype.

84
New cards

Android Forensic Tools

Santoku Linux, Android Debug Bridge (adb) and Android SDK.

85
New cards

Android Forensic Tool

Oxygen Forensics Extractor

86
New cards

Evolution of IoT

From Internet of Thing (IoT) to Internet of Everything (IoE) to Internet of Anything (IoA).

87
New cards

IoT Architecture Layers

Application Layer, Middleware Layer, Internet Layer, Access Gateway Layer and Edge Technology Layer.

88
New cards

Potential IoT Vulnerabilities

No automatic security updates, Improper communications and encryption, Lack of secure storage and authentication and an Insecure web interface.

89
New cards

Attacker breach IoT critical areas

Device firmware & mobile application, Device memory, Device physical interface & network services, Local data storage & Cloud web interface and Device web interface & network traffic.

90
New cards

IoT attacks

DoS, Jamming, Ransomware, Sybil, Man-in-the-Middle, Replay, Side channel, Rolling code and Remote access attacks.

91
New cards

IoT sensor attacks

Jamming attack and BlueBorne attack.

92
New cards

Standard forensic examination

Evidence identification and collection, Preservation, Analysis and Presentation and reporting.

93
New cards

Data Acquisition Smartwatch

Data API; Message API; and Node API.

94
New cards

Logical Acquisition of Android Wearable

Enable developer options, Connect to Wi-Fi and enable Wi-Fi debugging in Settings, Check IP address and use adb connect

95
New cards

Files to be checked in Android Wearable Image Forensic Examination

Log files, database logs, media files, cache files, application files, etc.

96
New cards
97
New cards

Standard forensic examination

Evidence identification and collection, Preservation, Analysis and Presentation and reporting.

98
New cards

Data Acquisition Smartwatch

Data API; Message API; and Node API.

99
New cards

Logical Acquisition of Android Wearable

Enable developer options, Connect to Wi-Fi and enable Wi-Fi debugging in Settings, Check IP address and use adb connect

100
New cards

Files to be checked in Android Wearable Image Forensic Examination

Log files, database logs, media files, cache files, application files, etc.