Sec+ - Data volatility

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

14 Terms

1
New cards

Data volatility

This is a measure of how quickly data disappears from a system and is an essential part of assessing the likelihood of collecting the most valuable evidence.

2
New cards

CPU Registers and Cache

The volatility of data stored in these two places is extremely high; data can be lost within milliseconds.

3
New cards

High

The data held in the RAM, routing table, ARP cache, process table, and kernel statistics has __ volatility (very high, high, moderate, low, or very low)

4
New cards

Random Access Memory

What does RAM stand for?

5
New cards

RAM

This part of your computer is short-term memory where the data and instructions for currently running programs is held.

6
New cards

ARP cache

This cache keeps a list of each IP address and its matching MAC address.

7
New cards

Temporary File Systems

This type of data storage stores locations for temporary files used by the operating system and applications, like swap files

8
New cards

Disk and Storage

In this category, data remains until it is intentionally erased or overwritten. It includes hard drives, USB drives, and SSDs.

9
New cards

Moderate

Temporary File Systems have __ volatility (very high, high, moderate, low, or very low)

10
New cards

Remote Logging

The volatility of this data storage varies. This group logs and monitors data stored on remote servers.

11
New cards

Archival Media

This type of media has extremely low volatility. It includes tape backups and off-site drives.

12
New cards

Physical Configuration, Network Topology.

This is the hardware setup and network structure of a system. It has low volatility, but is not the lowest in the hierarchy.

13
New cards

Disk imaging

This process involves creating a bit-by-bit or logical copy of a storage device, preserving its entire content, including deleted files and unallocated space

14
New cards

Legal hold

This concept requires the implementation of preservation practices to protect systems and evidence. It ensures evidence is not tampered with, deleted, or lost in the case litigation is expected.