Forensics: Chapter 18- Forensic Computing

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/69

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

70 Terms

1
New cards

footprints and data trails

The usage of computers and other electronic data storage devices leaves the _________________ and __________ ___________

2
New cards

preservation, acquisition, extraction, and interpretation

Computer forensics involves the ... of computer data

3
New cards

Hardware

comprises the physical and tangible components of the computer

4
New cards

Software

a set of instructions compiled into a program that performs a particular task

5
New cards

Software

those programs and applications that carry out a set of instructions on the hardware

6
New cards

Computer Case/Chassis

This is the physical box holding the fixed internal computer components in place

7
New cards

Power Supply

PC's power supply converts the power it gets from the wall outlet to a useable format for the computer and its components

8
New cards

Motherboard

the main circuit board contained within a computer (or other electronic devices) is referred to as the __________________

9
New cards

System Bus

contained on the motherboard, the system bus is a vast complex network of wires that serves to carry data from one hardware device to another

10
New cards

Read-Only Terminology Memory (ROM)

ROM chips store programs called firmware, used to start the boot process and configure a computer's components

11
New cards

Random access memory (RAM)

RAM serves to take the burden off of the computer's processor and Hard Disk Drive (HDD)

12
New cards

RAM

The computer, aware that it may need certain data at a moments notice, stores the data in the ________

13
New cards

volatile memory

RAM is referred to as ____________ ___________ because it is not permanent; its contents undergo constant change and are forever lost once power is taken away from the computer

14
New cards

Central Processing Unit (CPU)

The CPU, also referred to as a processor, is essentially the brains of the computer

15
New cards

Input devices

The devices used to get data into the computer: keyboard, image, joystick, scanner

16
New cards

Output devices

Equipment through which data is obtained from the computer: monitor, printer, speakers

17
New cards

The Hard Disk Drive (HDD)

typically the primary location of data storage within the computer

18
New cards

different manners

Different operating systems map out HDDs in _________________ _______________

19
New cards

different locations; numerous forms

Evidence exists in many ________________ _______________ and in _______________ __________ on an HDD

20
New cards

visible and latent data

The type of evidence can be grouped under two major sub-headings in the HDD:

21
New cards

first step

partitioning the HDD is the

22
New cards

space defined

An HDD needs to have its ___________ _____________ before it is ready for use

23
New cards

mapped; defined layout

When partitioned, HDDs are ______________ and have a ______________ ___________

24
New cards

sectors, clusters, tracks, and cylinders

HDDs are logically divided into

25
New cards

512 bytes in size

Sectors are typically

26
New cards

8 bits

A byte is

27
New cards

1 or 0

A bit is a single

28
New cards

Clusters

groups of sectors and their size is defined by the operating system

29
New cards

2, 4, 6, 8, etc.

A cluster will consist of

30
New cards

Tracks

Concentric circles that are defined around the platter

31
New cards

Cylinders

groups of tracks that reside directly above and below each other

32
New cards

a map of the layout of the defined space in that partition

After partitioning and formatting processes are complete, the HDD will have

33
New cards

File Allocation Table (FAT)

Partitions utilize a ________ _________________ __________ to keep track of the location of files and folders (data) on the HDD

34
New cards

different ways

Each partition table (map) tracks data in...

35
New cards

a map

It is sufficient for purposes here, however, to merely visualize the partition table as __ _________ to where the data is located

36
New cards

numbering sectors, clusters, tracks, and cylinders

The map uses ...to keep track of the data

37
New cards

warrants, documentation, good investigative techniques

Processing the electronic crime scene is similar to processing a traditional crime scene because it requires:

38
New cards

encrypt the data rendering it unreadable

If encryption is being used, pulling the plug will ... without a password or key; therefore, pulling the plug would not be prudent

39
New cards

it will be lost with discontinuation of power to the system

If crucial evidentiary data exists in RAM and has not been saved to the HDD, ...

40
New cards

1) encryption 2) if data exists in the RAM, but has not been saved to the HDD

Two situations where you would avoid pulling the plug

41
New cards

cipher-text only

the cryptanalyst has access only to a collection of ciphertexts or codetexts

42
New cards

Known-plaintext

the attacker has a set of ciphertexts to which he knows the corresponding plaintext

43
New cards

Chosen-plaintext (cipher text)

the attacker can obtain the ciphertexts (plaintexts) corresponding to an arbitrary set of plaintexts (ciphertexts) of his own choosing

44
New cards

Adaptive chosen-plaintext

like a chosen-plaintext attack, except the attacker can choose subsequent plaintexts based on information learned from previous encryptions. Similarly adaptive chosen ciphertext attack

45
New cards

Related-key attack

Like a chosen-plaintext attack, except the attacker can obtain cipher texts encrypted under two different keys. The keys are unknown, but the relationship between them is known; for example, two keys that differ in the one bit

46
New cards

least intrusive

Throughout the entire forensic image acquisition process, the computer forensic examiner must adopt the method that is ___________ _______________

47
New cards

altering even one bit of data

The goal with obtaining data from an HDD is to do so without

48
New cards

removing the HDD from the system and placing it in a laboratory forensic computer, so that a forensic image can be created

Because booting a HDD to its operating system changes many files and could potentially destroy evidentiary data, obtaining data is generally accomplished by...

49
New cards

no changes

Regardless, the examiner needs to be able to prove that the forensic image he/she obtained includes every bit of data and caused _____ ____________ (writes) to the HDD

50
New cards

"fingerprint"

A sort of " " of the drive is taken before and after imaging

51
New cards

MD5, SHA, or similar validated algorithm

The fingerprint is accomplished through the use of a

52
New cards

32-character alphanumeric string

Before imaging the drive, the algorithm is run and a ... is produced based on the drive's contents

53
New cards

Visible data

that data which the operating system is aware of

54
New cards

easily accessible

Visible data is _________ _________________ to the user

55
New cards

word processing documents, spreadsheets, accounting records, databases, pictures

Visible data can encompass any type of user created data, such as:

56
New cards

latent data

that data that the operating system is not aware of

57
New cards

swap space

utilized to conserve the valuable RAM within the computer system

58
New cards

RAM slack

is the area from the end of the logical file to the end of the sector

59
New cards

File slack

the remaining area from the end of the final sector containing data to the end of the cluster

60
New cards

unallocated space

Another place where latent data might be found is in an

61
New cards

unallocated space

that space on a HDD the operating system sees as empty and ready for data

62
New cards

remains behind

when a user deletes files, the data typically _______________ ______________

63
New cards

deleted files

________________ __________ are another source of latent data

64
New cards

1) internet cache 2) cookies 3) internet history

Places where a forensic computer examiner might look to determine what websites a computer user has visited recently are:

65
New cards

bookmarks and favorite places

Another way to access web sites that have been visited is by examining _________________ and _____________ _____________

66
New cards

0 to 255

IP addresses can be any number from ____ to _________

67
New cards

IP addresses

provide the means by which data can be routed to the appropriate location, and they also provide the means by which most internet investigations are conducted

68
New cards

IP address in the email's header

An investigator tracking the origin of an email seeks out the sender's...

69
New cards

RAM

chat and instant messages are typically located in a computer's ________

70
New cards

firewall

designed to protect against intrusions into a computer network