Introduction to Forensics

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

flashcard set

Earn XP

Description and Tags

Flashcards covering key concepts in computer forensics.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

What is Computer Forensics?

The use of analytical and investigative techniques to identify, collect, examine, and preserve evidence/information which is magnetically stored or encoded.

2
New cards

What is the role of first responders in computer forensics?

First responders play a critical role; improper handling of evidence can render it unusable for prosecution.

3
New cards

What are the five principles outlined in the Council of Europe’s Electronic Evidence Guide?

Data integrity, Audit trail, Specialist support, Appropriate training, and Legality.

4
New cards

What are the four steps of examination according to the Scientific Working Group on Digital Evidence (SWGDE)?

Visual inspection, Forensic duplication, Media examination, and Evidence return.

5
New cards

What are the initial steps in the U.S. Secret Service Forensics Guidelines?

Secure the scene and make it safe, take immediate steps to preserve evidence, and determine whether you have a legal basis to seize the computer.

6
New cards

According to U.S Secret Service Forensics Guidelines, what action should be taken if a computer is believed to be destroying evidence?

Shut down the computer by pulling the power cord.

7
New cards

List three evidence gathering principles.

Touch as little as possible, leave a document trail, and secure the evidence.

8
New cards

What elements should be included in the chain of custody?

Discovery of the evidence, collection location, date and time of collection, names of everyone who had access, and names of everyone who “owned” the evidence.

9
New cards

What does the FBI recommend regarding the preservation of a computer's state by the first responder?

Making a backup copy of any logs, damaged or altered files, and files left by the intruder.

10
New cards

Name four locations where evidence can be found on a PC.

Browser history, index.dat file, system logs, and Windows Registry.

11
New cards

Name four examples of computer evidence beyond PCs and laptops.

Logs, portable storage devices, e-mails, and devices capable of storing data like iPods, iPads, and cell phones.

12
New cards

What information can be found in the Windows Registry regarding USB devices?

HKEYLOCALMACHINE\SYSTEM\ControlSet\Enum\USBSTOR lists USB devices that have been connected to the machine; MountPoints2 will indicate what user was logged onto the system when the USB device was connected.

13
New cards

What type of information can be gathered from a cell phone for forensics?

Photos, videos, text messages, call times and durations, and contact names and phone numbers.

14
New cards

What are some general rules for gathering evidence from a cell phone?

Document the cell phone make, model, and condition and photograph the initial screen of the phone. The SIM card will be the location of most of what you need to find.

15
New cards

What is Logical Acquisition of a cell phone?

Copying the active file system from the device into another file.

16
New cards

What is Physical Acquisition of a cell phone?

Creating a physical bit-by-bit copy of the phone's memory.

17
New cards

What is Chip-off Forensics?

The practice of removing a memory chip, or any chip, from a circuit board and reading it.

18
New cards

What is JTAG in cell phone forensics?

Joint Test Action Group is a less extreme method where JTAG ports can be used to retrieve a physical image of the data without removing the chip.

19
New cards

Name four common cellular network technologies.

GSM (2G), EDGE (Pre-3G), UMTS (3G), and LTE (4G).

20
New cards

What does SIM stand for in cell phone terminology?

Subscriber Identity Module.

21
New cards

What is an IMEI?

International Mobile Equipment Identity; unique ID for GSM, UMTS, LTE, and satellite phones; can be “blacklisted” even if the user changes the SIM card.

22
New cards

List four forensic tools.

AccessData Forensic Toolkit, EnCase, The Sleuth Kit, OSForensics.

23
New cards

What is the Daubert Standard?

Any scientific evidence presented in a trial must have been reviewed and tested by the relevant scientific community.

24
New cards

What is the initial step in the scientific method?

Formulating a hypothesis which is a question that can be tested.

25
New cards

Give three examples of Computer Forensics Certifications.

Computer Hacking Forensic Investigator (CHFI), Certified Forensic Computer Examiner (CFCE), SANS certifications.