Chapter 6: Current Digital Forensics Tools

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards
Hardware Forensics Tools
Range from simple, single-purpose components to complete computer systems and servers.
2
New cards
Software Forensics Tools
Are grouped into command-line applications and GUI applications. These commonly copy data from a suspect’s drive to an image file.
3
New cards
Acquisition
The first task in digital forensics investigations, is making a copy of the original drive.
4
New cards
Validation
A way to confirm that a tool is functioning as intended.
5
New cards
Verification
Proves that two sets of data are identical by calculating hash values or using another similar method.
6
New cards
Filtering
Involves sorting and searching through investigation findings to separate good data and suspicious data.
7
New cards
Extraction
Functions as the recovery task in a digital investigation and is the most challenging of all tasks to master.
8
New cards
Reconstruction
Functions to recreate a suspect drive to show what happened during a crime or an incident.
9
New cards
Norton DiskEdit
One of the first MS-DOS tools used for digital investigations. This tool used manual processes that required investigators to spend considerable time on a typical 500 MB drive.
10
New cards
SMART
Designed to be installed on numerous Linux versions, including Gentoo, Fedora, SUSE, Debian, Knoppix, Ubuntu, and Slackware.
11
New cards
Hex Viewer
It color-codes hex values to make it easier to see where a file begins and ends.
12
New cards
Helix 3
It is one of the easiest suites to use because of its UI. You can load it on a live Windows system, and it loads as a bootable Linux OS from a cold boot. Its Windows component is used for live acquisitions.
13
New cards
Kali Linux
It is formerly known as BackTrack. It includes several tools such as Autopsy and Sleuth Kit, ophcrack, dcfldd, MemFetch, and MBoxGrep.
14
New cards
Forcepoint Threat Protection
It is a Linux memory analysis tool that was developed under a grant from the Air Force Research Lab for Pikewerks Corporation.
15
New cards
Stationary Workstation
A tower with several bays and many peripheral devices.
16
New cards
Portable workstation
A laptop computer with almost as many bays and peripherals as a stationary workstation.
17
New cards
Lightweight workstation
A laptop computer built into a carrying case with a small selection of peripheral options.
18
New cards
Write-blockers
These protect evidence disks by preventing data from being written to them.
19
New cards
National Institute of Standards and Technology (NIST)
Publishes articles, provides tools, and creates procedures for testing and validating computer forensics software.
20
New cards
Computer Forensic Reference Data Sets
The _________ has been created recently to provide data sets for tools, training, and hardware testing.
21
New cards
File Slack
Unused space allocated for a file.