Digital Forensics Midterm

studied byStudied by 3 people
5.0(1)
Get a hint
Hint

Audio Steganography

1 / 142

flashcard set

Earn XP

Description and Tags

Digital Forensics (CIS4203.01)

143 Terms

1

Audio Steganography

The approach of hiding information within an audio signal

New cards
2

indistinguishable

As data is embedded in the signal, it gets changed. This modification should be ____ to the human ear.

New cards
3

digital description and transmission media

An audio environment is decided by two considerations:

New cards
4

Sample Quantization Rate

How many bits per unit time?

New cards
5

Temporal Sampling Rate

The range of the frequency.

New cards
6

LSB (least significant bit)

replacing the least significant bits of the cover media with secret data to embed information.

New cards
7

frames

A video is a collection of ___ which are jpeg images

New cards
8

Steganography

the practice of concealing information within another message or physical object to avoid detection

New cards
9

Encryption

Hides the content of the message

New cards
10

Steganography traits

Hides the existence of the message,
needs a common knowledge,
doesn’t alter overall structure of data,
visibility 0, decipherability 100

New cards
11

types of steganography

text, image, audio, video, network

New cards
12

Text in text

Hiding information inside Text files

New cards
13

Types of text in text

Format Based Method • Random and Statistical Generation • Linguistic Methods, invisible inks

New cards
14

format based

include altering physically the format of text to conceal the data.

New cards
15

format based flaws

If the stego file is opened with a word processor, misspellings and additional white spaces will get identified. • Changed fonts sizes can excite suspicion to a human reader. • if the initial plaintext is accessible, comparing this plaintext with the suspected steganographic text can create manipulated element of the text quite visible.

New cards
16

Random character sequences

Conceal information in a sequence of characters that looks random

New cards
17

Statistical properties

Use the statistical properties of letter frequencies and word length to create words that appear to have the same statistical properties as actual words in a language

New cards
18

Linguistic Approach

Synonym substitution • To embed messages, a cover text must provide information carriers that can be modified to represent the secret.

New cards
19

Most existing stegosystems consist of three independent modules

linguistic transformation, encoder generation, and text selection.

New cards
20

image

a collection of numbers that defines color intensities in different areas of the image.

New cards
21

pixel

defined by a fixed number of bits and this is its color scheme.

New cards
22

red, green and blue

All color variations for the pixels of a 24-bit image are derived from three primary colors:

New cards
23

8 bits

each primary color is represented by

New cards
24

24-bit pixel

Digital color images are typically stored in ____ depth and uses the RGB color model.

New cards
25

Lossy compression

removes redundancies that are too small for the human eye to differentiate which makes the compressed files a close approximate, but not an exact duplicate of the original one.

New cards
26

JPEG

example of lossy compression

New cards
27

PNG, GIF, BMP

example of lossless compression

New cards
28

Lossless compression

never removes any information from the original image, but instead represents data in mathematical formulas maintaining the integrity of the original image and when uncompressed, the file is a bit-by-bit copy of the original.

New cards
29

Spatial Domain

techniques embed the secret message/payload in the intensity of the pixels directly.

New cards
30

LSB Supstitution

Most popular spatial domain

New cards
31

Lossless images

best suited for these techniques as compression would not alter the embedded data

New cards
32

Frequency-domain techniques

first transform the image and then embed the data.

New cards
33

transformation step

ensures that the message is hidden in less sensitive areas of the image, making the hiding more robust and makes the entire process independent of the image format.

New cards
34

JPEG Compression

transforms the image from RGB color to YCbCr representation - separating brightness from color.

New cards
35

DCT

expresses a finite sequence of data points in terms of a sum of cosine functions oscillating at different frequencies

New cards
36

quantization step

the one that removes redundant information from the image by rounding 64 values into 1 by taking average

New cards
37

Line Shift

secret message is hidden by vertically shifting the text lines to some degree

New cards
38

Word Shift

secret message is hidden by shifting the words horizontally

New cards
39

Feature coding

some of the features of the text are altered.

New cards
40

Word Mapping

encrypts a secret message using genetic operator crossover and then embeds the resulting cipher text, taking two bits at a time, in a cover file by inserting blank spaces between words of even or odd length using a certain mapping technique

New cards
41

MS Word Document

In this technique, text segments in a document are degenerated, mimicking to be the work of an author with inferior writing skills, with secret message being embedded in the choice of degenerations which are then revised with changes being tracked

New cards
42

Syntactic Method

This technique uses punctuation marks such as full stop (.), comma (,), etc. to hide bits 0 and 1.

New cards
43

Semantic method

uses the synonym of certain words thereby hiding information in the text.

New cards
44

Where to find evidence

Forensic, Imaging, Physical and Logical Disk Structures, Main Memory, File System, System Storage

New cards
45

Raw Image

A raw image file contains only the data from the imaged volume.

New cards
46

EnCase (E01) file

contains metadata about the image. The metadata that is contained in both the header and footer captures and stores information about the drive type, operating system, and timestamps.

New cards
47

Cyclical Redundancy Check (CRC)

ensures the integrity of the preceding block of data over the entire image file.

New cards
48

File system

a method and data structure that the operating system uses to control how data is stored and retrieved.

New cards
49

Types of File System

Disk FS, Flash FS, Tape FS

New cards
50

Logical Disk Structures

partitions, mounts, formatting, hidden partitions

New cards
51

Types of Computer Files

Test, image, audio, video, log, exe, dii, others

New cards
52

File signatures

a unique identification number seen at the beginning of a file. It tells you the file’s type and provides information about the data it contains.

New cards
53

Switches

core switches for a range of network segment and edge switches for individual segments.

New cards
54

Content Addressable Memory

Maps the physical ports on the switch to the Network Interface Card

New cards
55

Routers

The Routing Table. Logs traffic and data flow.

New cards
56

Firewalls

NIDS, NIPS, DLP, Logs.

New cards
57

Authentication Servers:

Successful or unsuccessful login, credential manipulation

New cards
58

SIEM

Security Information and Event Management, and is a security management system that combines security information management (SIM) and security event management (SEM)

New cards
59

Network tap

a system that monitors events on a local network.

New cards
60

tap

typically a dedicated

hardware device, which provides a way to

access the data flowing across a computer

network

New cards
61

Switch Port Analyzer (SPAN)

the switch closest to the compromised host will have port mirroring enabled. This then sends the traffic from the entire segment the switch is on to the system that is on the mirrored port

New cards
62

tcpdump

a command-line tool specifically designed for packet capture.

New cards
63

File Name

Each log file or packet capture should have its own unique name.

New cards
64

Description

A brief description of the file.

New cards
65

Location

The location is important. Eg: the packet capture was obtained on the switch located at 192.168.2.1

New cards
66

Date and time

Record the date and time the file was transferred to the medium

New cards
67

Collected by

Initials are sufficient for the log file.

New cards
68

Command and Control (C2)

A technique used by threat actors to communicate with compromised devices over a network

New cards
69

C2 Works by

The attacker starts by establishing a foothold to infect the target machine, which may sit behind a Next-Generation Firewall. This can be done in a variety of ways: • Via a phishing email that: Tricks the user into following a link to a malicious website or opening an attachment that executes malicious code. • Through security holes in browser plugins. • Via other infected software

New cards
70

Types of C2

Centralized, P2P, Random Architecture

New cards
71

Random Architecture Model

hardest to detect. This is by design. The objective is to prevent security personnel from tracing and shutting down the C&C server or identifying the botnet’s chain of command. This model functions by transmitting communications to the infected host (or botnet) from disparate sources: • IRC chat rooms • CDNs • Social media comments • Email

New cards
72

C2 Subtechniques

Application Layer Protocol • Removable Media • Data Encoding, Obfuscation • Encrypted Channels, Fallback Channels • Non-Standard Port • Remote Access Software • Protocol Tunneling

New cards
73

Malware delivery

With control of a compromised machine within a victim’s network, adversaries can trigger the download of additional malware

New cards
74

Data theft

Sensitive data, such as financial documents, can be copied or transferred to an attacker’s server.

New cards
75

Shutdown

An attacker can shut down one or several machines, or even bring down a company’s network.

New cards
76

Reboot

Infected computers may suddenly and repeatedly shutdown and reboot, which can disrupt normal business operations.

New cards
77

Defense evasion

Adversaries commonly attempt to mimic normal, expected traffic to avoid detection. Depending on the victim’s network, attackers establish command and control with varying levels of stealth to circumvent security tools.

New cards
78

Distributed denial of service

overwhelm server or networks by flooding them with internet traffic. Once a botnet is established, an attacker can instruct each bot to send a request to the targeted IP address. This creates a jam of requests for the targeted server.

New cards
79

Memory Acquisition

Hard disk drive from a shut down computer – primary source.

New cards
80

USB device or writable medium directly connected to the system.

Running memory can be acquired locally in two ways:

New cards
81

live systems

systems that are running and are at the time of identification potentially holding evidence that may be lost or hard to acquire if the system is shut down.

New cards
82

dead systems

systems not running. Any data in temporary storage areas such as cache, main memory, running processes, or active application dialogues on a computer will normally be lost when the system is powered down.

New cards
83

Post-mortem analysis

associated with analysis of a “dead” (not running) computer or electronic device.

New cards
84

Local

Direct Physical Access to the system

New cards
85

Remote

Not onsite. Portability issues etc

New cards
86

Online

Live systems

New cards
87

Offline

Dead systems

New cards
88

Network-based Evidence

• Switches • Routers • Firewalls • NIDS/NIPS • Web Proxy Servers • DHCP Servers • Authentication Servers • Application Servers

New cards
89

Preservation Tasks

• Isolate • Secure • Document

New cards
90

Collection

• Acquisition of physical devices • Digital copies of Digital devices.

New cards
91

Evidence Integrity

to ensure that evidence is neither accidentally nor intentionally changed when collecting digital data from an original source.

New cards
92

order of volatility

prioritization wrt the volatility of the data. Most volitile data should be acquired before less volatile data

New cards
93

volatiility

data lifetime.

New cards
94

Access Restrictions and Encryption

Restricted or encrypted information should be acquired early if we cannot ensure access later

New cards
95

Powered On

Keeping a device on can make the data vailable at a later time, but running processes might overwrite data

New cards
96

Shutdown

Powering off a device might overwrite data. Pulling the battery will delete data from RAM that is not written to nonvolatile memory

New cards
97

Physical Interface

Different data can often be acquired from different interfaces

New cards
98

Communication Protocol

Different data can often be acquired using different communication protocols

New cards
99

Lab Resources

Availability of lab resources will often be a limiting factor when selecting acquisition method. Time is also a resource.

New cards
100

Interpretation

The data can be just gibberish if we are not able to interpret it correctly

New cards

Explore top notes

note Note
studied byStudied by 21 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 118 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 86 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 23 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 12 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 33 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 20 people
Updated ... ago
4.5 Stars(2)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard146 terms
studied byStudied by 14 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard85 terms
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard50 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard106 terms
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard118 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard52 terms
studied byStudied by 172 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard40 terms
studied byStudied by 13 people
Updated ... ago
4.0 Stars(5)
flashcards Flashcard164 terms
studied byStudied by 42 people
Updated ... ago
5.0 Stars(1)