Data Acquisition

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/57

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

58 Terms

1
New cards
Forensic boot
________ CD /DVD or USB drive gives you a way to acquire data from a suspect computer and write- protect the disk drive.
2
New cards
Runtime
________ has designed its tools to be file system specific, so DiskExplorer versions for both FAT and NTFS are available.
3
New cards
F Response
With ________, examiners can access remote drives at the physical level and view raw data.
4
New cards
static acquisition
A(n) ________ is done on a computer seized during a police raid.
5
New cards
Data acquisition
The process of copying data
6
New cards
Logical Acquisition
Captures only specific files of interest to the case or specific types of files
7
New cards
Sparse Acquisition
Collects fragments of unallocated (deleted) data; use this method only when you dont need to examine the entire drive
8
New cards
Mini-WinFE
It enables you to build a Windows forensic boot CD/DVD or USB drive with a modification in its Windows Registry file so that connected drives are mounted as read-only
9
New cards
FTK Imager
A data acquisition tool included with a licensed copy of AccessData Forensic Toolkit
10
New cards
Hexadecimal Editors
X-Ways WinHex or Breakpoint Software Hex Workshop
11
New cards
Forensic Programs
OSForensics, Autopsy, EnCase, and FTK
12
New cards
Redundant array of independent disks (RAID)
A computer configuration involving two or more physical disks
13
New cards
RAID 0
Provides rapid access and increased data storage
14
New cards
RAID 1
Made up of two disks for each volume and is designed for data recovery in the event of a disk failure
15
New cards
RAID 2
Provides rapid access and increased storage by configuring two or more disks as one large volume
16
New cards
RAID 3
Uses data striping and dedicated parity and requires at least three disks
17
New cards
RAID 4
Uses data striping and dedicated parity (block writing), except data is written in blocks rather than bytes
18
New cards
RAID 5
Uses distributed data and distributed parity and stripes data tracks across all disks in the RAID array
19
New cards
RAID 6
Distributed data and distributed parity (double parity) function the same way as RAID 5, except each disk in the RAID array has redundant parity
20
New cards
RAID 10
A combination of RAID 1 and RAID 0
21
New cards
RAID 15
A combination of RAID 1 and RAID 5
22
New cards
Data acquisition
The process of copying data. It’s the task of collecting digital evidence from electronic media.
23
New cards
raw format
As a practical way to preserve digital evidence, vendors made it possible to write bit-stream data to files. This copying technique creates simple sequential flat files of a suspect drive or data set. The output of these flat files is referred to as a ____.
24
New cards
Advanced Forensic Format
Developed by *Dr. Simson L. Garfinkel*; an open-source acquisition format.
25
New cards
Static acquisition
It is done on a computer seized during a police raid.
26
New cards
live acquisition
If the computer has an encrypted drive, a ____ is done if the password or passphrase is available—meaning the computer is powered on and has been logged on to by the suspect.
27
New cards
Static acquisitions
These are always the preferred way to collect digital evidence.
28
New cards
Logical Acquisition
Captures only specific files of interest to the case or specific types of files.
29
New cards
Sparse Acquisition
Collects fragments of unallocated (deleted) data; use this method only when you don’t need to examine the entire drive.
30
New cards
Forensic boot CD/DVD or USB drive
_____ gives you a way to acquire data from a suspect computer and write-protect the disk drive.
31
New cards
Mini-WinFE
It enables you to build a Windows forensic boot CD/DVD or USB drive with a modification in its Windows Registry file so that connected drives are mounted as read-only.
32
New cards
FTK Imager
A data acquisition tool included with a licensed copy of AccessData Forensic Toolkit.
33
New cards
Hexadecimal Editors:
X-Ways WinHex or Breakpoint Software Hex Workshop
34
New cards
Forensic Programs
OSForensics, Autopsy, EnCase, and FTK
35
New cards
MD5
Autopsy use ____ to validate an image. It reads the metadata in Expert Witness Compression or AFF image files to get the original hash.
36
New cards
Redundant array of independent disks (RAID)
A computer configuration involving two or more physical disks.
37
New cards
Software RAID
It is typically implemented from the host computer’s OS.
38
New cards
Hardware RAID
____ uses its own controller as well as a processor and memory connected to the host computer.
39
New cards
RAID 0
Provides rapid access and increased data storage. Two or more disk drives become one large volume, so the computer views the disks as a single disk.
40
New cards
RAID 1
Made up of two disks for each volume and is designed for data recovery in the event of a disk failure.
41
New cards
RAID 2
Provides rapid access and increased storage by configuring two or more disks as one large volume.
42
New cards
Error-correcting code (ECC)
It is used to verify whether the write is successful.
43
New cards
RAID 3
Uses data striping and dedicated parity and requires at least three disks.
44
New cards
RAID 4
Uses data striping and dedicated parity (block writing), except data is written in blocks rather than bytes.
45
New cards
RAID 5
Uses distributed data and distributed parity and stripes data tracks across all disks in the RAID array. It places parity data on each disk.
46
New cards
RAID 6
Distributed data and distributed parity (double parity) function the same way as RAID 5, except each disk in the RAID array has redundant parity.
47
New cards
RAID 10
A combination of RAID 1 and RAID 0. It provides fast access and redundancy of data storage. Also known as *Mirrored Striping.*
48
New cards
RAID 15
A combination of RAID 1 and RAID 5. It offers the most robust data recovery capability and speed of access to all RAID configurations and is also more costly. Also known as *Mirrored Striping with Parity.*
49
New cards
ProDiscover Incident Response
It is designed to be integrated as a network intrusion analysis tool and is useful for performing remote acquisitions.
50
New cards
Guidance Software
It was the first forensics vendor to develop a remote acquisition and analysis tool based on its desktop tool EnCase.
51
New cards
R-Studio network
The _____ edition can remotely access networked computer systems.
52
New cards
R-Studio network edition
Data acquired with ________ creates raw format acquisitions, and it’s capable of recovering many different file systems.
53
New cards
US-LATT PRO
part of a suite of tools developed by WetStone, can connect to a networked computer remotely and perform a live acquisition of all drives connected to it.
54
New cards
F-Response
It is a vendor-neutral specialty remote access utility designed to work with any digital forensics program.
55
New cards
PassMark Software
It has an acquisition tool called ImageUSB for its OSForensics analysis product.
56
New cards
ASR Data SMART
It is a Linux forensics analysis tool that can make image files of a suspect drive. SMART can produce proprietary or raw format images and includes the following capabilities:
57
New cards
Runtime Software
It offers several compact shareware programs for data acquisition and recovery, including DiskExplorer for FAT and DiskExplorer for NTFS.
58
New cards
IXImager
* It’s a stand-alone proprietary format acquisition tool designed to work only with ILookIX.
* It can acquire single drives and RAID drives.
* It supports IDE (PATA), SCSI, USB, and FireWire devices.