CYB 420 Digital Forensics

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/167

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

168 Terms

1
New cards

Digital Forensics

Application of computer science and investigative procedures for legal purposes involving digital evidence.

2
New cards

Key Concepts of Digital Forensics

Requires search authority, chain of custody, validation, and reporting.

3
New cards

Federal Rules of Evidence (FRE)

Governs the admissibility of digital evidence.

4
New cards

Fourth Amendment

Protects against unreasonable searches and seizures.

5
New cards

ISO Standard (2012)

Defines personnel qualifications and methods for acquiring and preserving digital evidence.

6
New cards

Public-Sector Investigations

Focus on criminal cases and are governed by the Fourth Amendment and DOJ guidelines.

7
New cards

Private-Sector Investigations

Focus on policy violations and civil disputes, governed by Acceptable Use Policy (AUP) and corporate policy.

8
New cards

Digital Evidence First Responder (DEFR)

Collects and preserves evidence.

9
New cards

Digital Evidence Specialist (DES)

Analyzes evidence.

10
New cards

Professional Conduct in Digital Forensics

Maintain objectivity, confidentiality, and credibility.

11
New cards

Five Steps of an Investigation

Acquire the evidence, Examine the evidence, Analyze the evidence, Report findings, Critique the case.

12
New cards

Chain of Custody

Tracks evidence from collection to courtroom.

13
New cards

Bit-Stream Copy

Exact sector-by-sector copy of a drive.

14
New cards

Bit-Stream Image

File containing the copy of a drive.

15
New cards

Forensic Tools

Tools used to recover deleted or hidden data, e.g., Autopsy.

16
New cards

Final Forensic Report

Documents the process and findings of an investigation.

17
New cards

Digital Forensics Workstations

Must have a data acquisition tool and a write-blocker.

18
New cards

Employee Termination Cases

Often involve asset misuse or hostile workplace behavior.

19
New cards

Internet Abuse Investigation

Compare web history with firewall/proxy logs.

20
New cards

Email Abuse Investigation

Analyze server, local, or web-based email data and headers.

21
New cards

Attorney-Client Privilege (ACP)

Confidential investigations; must document all steps and use hash verification.

22
New cards

Industrial Espionage

Gather logs, surveillance, and coordinate with management and legal counsel.

23
New cards

Knowledge Check - Digital Forensics

Digital forensics differs from data recovery because in data recovery, you typically know what you're looking for.

24
New cards

Knowledge Check - Workstations

Digital forensics workstations must have a data acquisition tool and a write-blocker.

25
New cards

Jurisdiction

The official power to make legal decisions and judgments.

26
New cards

Case name

The title of a legal case, typically including the parties involved.

27
New cards

Cause number

A unique number assigned to a legal case for identification.

28
New cards

Deposition date & location

The specific date and place where a deposition is conducted.

29
New cards

Job mission or goal

The primary objective of a report, such as finding information or recovering data.

30
New cards

Verbal Reports

Preliminary updates that cover unfinished tests, interrogatories, document requests, and deposition plans.

31
New cards

Written Reports

Reports that include affidavits or declarations.

32
New cards

Examination Plans

Documents that outline expected testimony questions and help attorneys understand technical terms.

33
New cards

Expert Witness Requirements

Criteria that an expert witness must meet, including specialized skill and reasonable certainty in testimony.

34
New cards

Preliminary Reports

Reports that are part of discovery between opposing attorneys and should be avoided if unnecessary.

35
New cards

Report Structure

The organized components of a report, including Abstract, Table of Contents, Body, Conclusion, Appendices, Glossary, References, and Acknowledgements.

36
New cards

Writing Clearly and Objectively

Guidelines for writing that emphasize logical order, active voice, and conciseness.

37
New cards

Layout and Presentation

Elements that should be included in a report, such as evidence, consistent formatting, methods, hash values, limitations, results, and references.

38
New cards

Writing the Digital Forensics Report

The process of creating a digital forensics report, including analyzing data and writing drafts.

39
New cards

Fact Witness

A witness who provides only facts and explains how evidence was obtained without drawing conclusions.

40
New cards

Expert Witness

A witness who offers opinions based on experience and analysis, connecting them to case theory.

41
New cards

Documenting and Preparing Evidence

The process of recording all steps for repeatability and maintaining the chain of custody.

42
New cards

Curriculum Vitae (CV)

A document used to qualify testimony in court, including education, experience, publications, and testimony history.

43
New cards

Preparing Definitions

The process of having personal definitions ready for key terms in digital forensics.

44
New cards

Dealing with the News Media

Guidelines for avoiding direct contact with the press to prevent harm to the case.

45
New cards

Trial Process

The sequence of events in a trial, including motions, jury selection, and closing arguments.

46
New cards

General Testimony Guidelines

Best practices for giving testimony, including being polite, maintaining eye contact, and answering only what's asked.

47
New cards

Graphics and Exhibits

Visual aids that must be clear and simple, reviewed with an attorney before presentation.

48
New cards

Cross-Examination

Maintain eye contact with jury.

49
New cards

Depositions

No jury or judge; part of discovery.

50
New cards

Hearings

Similar to trials but no jury present.

51
New cards

Knowledge Check 2-1

Verbal reports cover: Unfinished testing, Interrogatories, Document production, Deposition planning.

52
New cards

Knowledge Check 2-2

During cross-examination: Maintain eye contact with jury, Watch attorney objections, Pay attention to opposing counsel, Keep answers short.

53
New cards

Self-Assessment

Be able to explain: What topics are covered in verbal reports between expert and hiring attorney?

54
New cards

Module Objectives

By the end of this module, you should be able to: Describe certification requirements for digital forensics labs, List physical lab requirements, Explain criteria for selecting a forensic workstation, Build a business case for a forensics lab, Evaluate digital forensics tools, Identify software and hardware tools used in forensics, Explain validation and testing methods for tools.

55
New cards

Lab Accreditation

A digital forensics lab is a secure facility for investigations, evidence storage, and analysis.

56
New cards

Lab Manager & Staff Duties

Manage case workflow and scheduling.

57
New cards

Lab Budget Planning

Expenses Include: Hardware, software, facilities, travel, and training.

58
New cards

Certifications & Training

Common forensics certifications: CFCE - Certified Forensic Computer Examiner (IACIS), HTCN - Certified Computer Crime Investigator / Forensic Technician, EnCE - EnCase Certified Examiner, Exterro Ace - Formerly AccessData Certified Examiner.

59
New cards

Physical Requirements of a Lab

Security Requirements: Secure room (floor-to-ceiling walls, locking door).

60
New cards

Evidence Storage Containers

Best Practices: Use steel containers or safes.

61
New cards

Facility Maintenance

Immediately repair damages.

62
New cards

Auditing the Lab

Audit checks include: Walls, ceiling, floor, doors, and locks.

63
New cards

Lab Floor Plans

Common Layouts: Small/home-based lab - limited workstations.

64
New cards

Regional lab

Full-scale, multi-room setup.

65
New cards

Ideal setup

Two forensic workstations + one non-forensic Internet workstation.

66
New cards

Law Enforcement Workstations

May need legacy systems & diverse tools.

67
New cards

Private Sector Workstations

Tailored to company systems & investigation type.

68
New cards

Small Departments Workstations

Use portable or multipurpose stations.

69
New cards

Mobile labs

Laptops with USB 3.0/4.0, SATA, or SSD drives.

70
New cards

Hardware Peripherals

Stock essentials: Digital cameras, antistatic bags, IDE/SATA cables, FireWire and USB adapters, Hard drives, external drives, Hand tools and adapters.

71
New cards

Software Inventory

Maintain licensed and current copies of: Windows, macOS, and Linux, Office suites (Microsoft, LibreOffice, WPS), Hex editors, programming tools (Python, C++), Specialized viewers (ACDSee, IrfanView), Accounting software (QuickBooks, Quicken).

72
New cards

Disaster Recovery Plan

Purpose: Restore systems and files after a failure. Includes: Backup software (e.g., Paragon Backup & Recovery), Track software updates and OS changes, RAID servers or private clouds must have large-scale backup systems.

73
New cards

Equipment Upgrades

Replace critical hardware every 18-36 months (preferably every 12). Plan for risk management and equipment dependency.

74
New cards

Building a Business Case

Purpose: Justify lab setup or upgrades. Components: Justification - show need and purpose, Budget Development - detail facility, hardware, software, and other costs, Approval - submit proposal to management, Implementation - include delivery/installation timeline, Acceptance Testing - inspect security, test hardware/software, Production - finalize corrections and begin operations.

75
New cards

Evaluating Digital Forensics Tools

Ask: Which OS does it support? Can it analyze multiple file systems? Can it be scripted or automated? Does the vendor provide strong support? Is it open-source or commercial?

76
New cards

Types of Tools

Hardware Tools: Devices and equipment for data acquisition or analysis, Software Tools: Command-line or GUI-based applications.

77
New cards

Common Tasks

Acquisition: Copy drives (physical or logical), Validation & Verification: Confirm accuracy using hash values, Extraction: Recover deleted/encrypted data, Reconstruction: Rebuild drives or files, Reporting: Document findings (logs, bookmarks, timelines).

78
New cards

Command-Line vs GUI Tools

Command-Line: Lightweight, minimal system resources, fast; GUI Tools: User-friendly, easier for beginners.

79
New cards

Common Tools

Linux Tools: Sleuth Kit, Autopsy, Kali Linux; Windows Tools: EnCase, FTK, Magnet Axiom; Write-Blockers: Tableau, WiebeTech, Logicube Talon; Editors: WinHex, HxD, Hex Workshop.

80
New cards

Validation & Testing Standards

NIST (CFTT Project): Tests & validates forensic tools; ISO 17025 / ISO 5725: Require repeatable and reproducible results.

81
New cards

Validation Steps

Use at least two tools to verify findings, Compare hash values, Test new releases and patches before use, Report bugs to vendors and use test drives for validation.

82
New cards

Digital Evidence Image

A bit-for-bit copy of a storage device used for forensic analysis.

83
New cards

Physical acquisition

Complete disk copy (bit-for-bit)

84
New cards

Logical acquisition

Captures specific files/folders

85
New cards

Sparse acquisition

Collects fragments of unallocated (deleted) data

86
New cards

Partition-to-partition / disk-to-disk

Copies partitions or entire drives directly

87
New cards

Raw (dd)

Fast, compatible, but large in size

88
New cards

Advanced Forensic Format (AFF)

Open source, supports compression, includes metadata

89
New cards

Proprietary formats

Tool-specific, may include metadata, but not shareable across platforms

90
New cards

Planning an Acquisition

Create an action plan: List required resources, Define acquisition steps, Detail evidence preservation and security, Review technical specs of target drives before imaging.

91
New cards

Determining the Best Method

Consider: Size of suspect drive, Whether original media must be preserved, Time available, Location and system type

92
New cards

Windows Tools

FTK Imager, EnCase, X-Ways

93
New cards

Linux Tools

Guymager, dd, dc3dd

94
New cards

Bootable Environments

Mini-WinFE (Windows Forensics Environment), Linux Live CDs: CAINE, Kali, SIFT, Knoppix

95
New cards

Validation Techniques

Use hashing algorithms to verify integrity: CRC-32, MD5, SHA-1 to SHA-512

96
New cards

Linux Hashing Tools

md5sum, sha1sum, dcfldd, dc3dd

97
New cards

Windows Hashing Tool

PowerShell Get-FileHash

98
New cards

RAID Acquisition

Understand RAID levels (0, 1, 2, 3, 5)

99
New cards

RAID 0

Striping - fast, no redundancy

100
New cards

RAID 1

Mirroring - data recovery