Module 1 – Understanding the Digital Forensics Profession and Investigations

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/85

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

86 Terms

1
New cards

How is digital forensics defined?

Legal application of computer science and investigative procedures to analyze digital evidence.

2
New cards

What elements ensure valid digital forensic analysis?

Search authority, chain of custody, math validation, validated tools, repeatability, reporting, expert presentation.

3
New cards

What standard was ratified in 2012 for digital forensics?

An ISO standard defining personnel and methods for acquiring and preserving evidence.

4
New cards

Why were the Federal Rules of Evidence (FRE) created?

To ensure consistency in federal court proceedings.

5
New cards

When was the FRE signed into law?

In 1973.

6
New cards

How does the Fourth Amendment affect digital forensics?

It protects against unlawful search and seizure; separate warrants may not always be required for digital evidence.

7
New cards

Why must examiners be familiar with case law?

Each jurisdiction has rulings on admissibility of digital evidence.

8
New cards

What tasks are included in investigating digital devices?

Collecting data securely, examining suspect data, presenting findings to court, applying laws.

9
New cards

How is digital forensics different from data recovery?

Digital forensics investigates unknowns; data recovery retrieves known lost or deleted data.

10
New cards

What is the 'investigations triad'?

A team structure where forensic investigators often work together to solve cases.

11
New cards

What does vulnerability/threat assessment and risk management test?

The integrity of workstations and network servers.

12
New cards

What is network intrusion detection and response?

Detecting intruder attacks with automated tools and monitoring logs.

13
New cards

What is the role of digital investigations?

Managing investigations and analyzing systems suspected of containing evidence.

14
New cards

When did IACIS introduce training on digital forensics software?

Early 1990s.

15
New cards

Who created search-warrant programs?

The IRS.

16
New cards

What forensic tool was created for Macintosh?

Expert Witness by ASR Data.

17
New cards

Which forensic tool is maintained by the IRS Criminal Investigation Division?

ILook.

18
New cards

Name a popular commercial forensic product.

AccessData Forensic Toolkit (FTK).

19
New cards

Why can’t existing laws always address digital crimes?

Technology changes faster than laws.

20
New cards

What is case law?

Using past rulings to guide new cases where statutes don’t exist.

21
New cards

Why must examiners know recent rulings?

To understand search and seizure rules for electronic evidence.

22
New cards

What operating systems should forensic investigators know?

Linux, macOS, and current Windows versions.

23
New cards

Why maintain professional contacts?

To share knowledge and support investigations.

24
New cards

What is an example of a professional user group?

Computer Technology Investigators Network (CTIN).

25
New cards

When should outside experts be consulted?

When specialized expertise is needed.

26
New cards

What do public-sector investigations involve?

Government agencies handling criminal cases.

27
New cards

Which amendment restricts government searches and seizures?

The Fourth Amendment.

28
New cards

Who updates computer search and seizure guidelines?

The U.S. Department of Justice (DOJ).

29
New cards

What do private-sector investigations usually focus on?

Policy violations.

30
New cards

What must investigators know for public-sector cases?

Laws on computer crimes, legal processes, search and seizure guidelines, and building cases.

31
New cards

How does a criminal investigation usually begin?

A witness or victim reports evidence of a crime.

32
New cards

What is the role of a Digital Evidence First Responder (DEFR)?

To secure the scene and preserve evidence.

33
New cards

What is a Digital Evidence Specialist (DES)?

An expert who analyzes data and knows when to involve specialists.

34
New cards

What is an affidavit?

A sworn statement with exhibits supporting a crime allegation.

35
New cards

Who conducts private-sector investigations?

Companies and lawyers addressing policy violations or disputes.

36
New cards

Give examples of private-sector crimes.

Harassment, discrimination, data falsification, embezzlement, sabotage, industrial espionage.

37
New cards

What is an 'Acceptable Use Policy'?

Rules defining proper use of company computers and networks.

38
New cards

What is a line of authority in investigations?

Defines who can authorize investigations, access, or possession of evidence.

39
New cards

How can businesses avoid litigation?

By displaying warning banners on computers.

40
New cards

What is the purpose of a warning banner?

To notify employees about monitoring and usage policies.

41
New cards

Who should be specified as an authorized requester?

A person with power to initiate investigations.

42
New cards

What three common situations lead to private investigations?

Misuse of assets, email abuse, Internet abuse.

43
New cards

What is the main role of private investigators?

Minimize company risk.

44
New cards

Why is distinguishing personal vs. company property difficult?

Devices like phones and tablets blur ownership lines.

45
New cards

What does BYOD policy state?

Personal devices on the business network are treated as company property.

46
New cards

How does digital forensics differ from data recovery?

In data recovery, you typically know what you are looking for.

47
New cards

What does professional conduct include?

Ethics, morals, and behavior standards.

48
New cards

How should an investigator maintain credibility?

By being objective and keeping information confidential.

49
New cards

Why should investigators attend training?

To stay current with tools and technologies.

50
New cards

What is the role of a digital forensics professional?

Gather evidence for legal or corporate cases.

51
New cards

How should evidence be preserved?

On a separate computer.

52
New cards

What is the chain of custody?

The documented path evidence takes until case closure.

53
New cards

What are the five steps of an investigation?

Identify, preserve, analyze, present, critique evidence.

54
New cards

What can computers reveal in criminal cases?

Chain of events and evidence leading to conviction.

55
New cards

Why follow procedure in acquiring evidence?

To ensure admissibility in court.

56
New cards

What are initial problem-solving steps in digital forensics?

Assess case, design approach, checklist, resources, copy drive, identify risks.

57
New cards

Why test the design?

To ensure reliability before analyzing evidence.

58
New cards

What details should be outlined in case assessment?

Situation, case type, evidence, disk format, and evidence location.

59
New cards

What does a basic investigation plan include?

Acquire evidence, document chain of custody, transport securely, prepare workstation, forensic copy, return and process.

60
New cards

How should evidence be secured?

With evidence bags, antistatic materials, padding, tape with initials.

61
New cards

What type of private-sector cases are most common?

Employee abuse of corporate assets, especially hostile work environment incidents.

62
New cards

What steps are recommended for Internet abuse cases?

Forensic analysis, extract URLs, review proxy logs, compare data, analyze disk drive.

63
New cards

How should email evidence be examined?

Using forensic techniques for local, server-based, and web-based data.

64
New cards

What is important in email analysis?

Examining message headers.

65
New cards

What is ACP in investigations?

Attorney-client privilege requiring confidentiality.

66
New cards

What steps are taken in ACP cases?

Attorney memo, keyword list, dual disk images, hash comparison, thorough disk analysis, keyword search, Registry analysis, correct tools for file types, recovery of unallocated data.

67
New cards

What steps are taken in espionage cases?

Brief team, gather resources, place surveillance, collect discreet evidence, review logs, report to management, review scope with attorneys.

68
New cards

What is the difference between an interview and interrogation?

Interview gathers facts; interrogation seeks confession.

69
New cards

What makes a successful interview/interrogation?

Patience, repetition, persistence.

70
New cards

What is a forensic workstation?

A specialized computer with forensic tools and extra bays.

71
New cards

What is a write-blocker?

A device/software that prevents writing to evidence drives.

72
New cards

What are basic workstation requirements?

Windows 10+, write-blocker, acquisition tool, analysis tool, target drive, spare ports.

73
New cards

What are useful extras?

NIC, extra ports, FireWire, SCSI card, disk/text editors, viewers.

74
New cards

What resources are needed to start?

Original media, custody form, evidence container, imaging tool, forensic workstation, secure locker.

75
New cards

What are evidence gathering steps?

Interview IT manager, fill custody forms, bag evidence, transport to lab, secure evidence.

76
New cards

What is a bit-stream copy?

A bit-by-bit copy of storage medium.

77
New cards

How is it different from backups?

Backups copy known files only; bit-stream includes deleted and hidden data.

78
New cards

What is a bit-stream image?

The file containing the full disk copy.

79
New cards

What is the job of digital evidence analysis?

To recover and interpret data.

80
New cards

Why can deleted files often be recovered?

They remain until overwritten.

81
New cards

What tool can retrieve deleted files?

Autopsy.

82
New cards

What must final reports include?

Methods, findings, repeatable steps, conclusive evidence, and supporting documents.

83
New cards

What should be asked in critiquing a case?

How to improve, expectations vs. results, thoroughness, feedback, new problems, new techniques.

84
New cards

What must digital forensic workstations include?

A data acquisition tool and a write-blocker.

85
New cards

What are the five planning steps for investigations?

Identify, preserve, analyze, present, critique.

86
New cards

What three actions are important in corporate investigations?

Follow policy, secure evidence, minimize risk.