Shared Flashcard Set

Details

IS 463 Test 1 Week 2 Digital Forensics Foundation
Investigation, Crime Scene Processing
20
Other
Undergraduate 4
08/26/2018

Additional Other Flashcards

 


 

Cards

Term
Digital Forensic Investigation
Definition
  • A process that develops and tests hypotheses to answer questions about already occurred digital events
    • What/who caused the event
    • When/why did the event occur
  • Driven by practical needs and available tools, not by fundamental theories
Term

Forensic Investigation Process

American Board of Information Security and Computer Forensics

Definition
  • Collection
  • Examination
  • Analysis
  • Reporting
Term
Collection (Acquisition)
Definition
  • Identify, isolate, label, record, and collect the data and physical evidence related to the incident being investigated, while establishing and maintaining integrity of the evidence through chain-of-custody
Term
Examination
Definition
  • Identify and extract the relevant information from the collected data, using appropriate forensic tools and techniques, while continuing to maintain integrity of the evidence
Term
Analysis
Definition
  • Analyze the results of the examination to generate useful answers  to the questions presented in the previous phases
  • The case is typically "solved" in this phase
Term
Reporting
Definition
  • Reporting the results of the analysis, including:
    • Findings relevant to the case
    • Actions that were performed
    • Recommended improvements to procedures and tools
Term
Investigation Process models
Definition
  • DOJ guidelines - Late 90's
    • Preparation: prepare equipment and tools
    • Collection: Search physical location for possible digital evidence and acquire (e.g., collect or copy digital media)
    • Examination: review the media for evidence (initial screening)
    • Analysis: review the results for their value in the case
    • Reporting: document results of investigation
Term

Digital Investigation in 6 Steps

Casey (2004)

Definition
  • Identification/Assessment
  • Collection/Acquisition
  • Preservation 
  • Examination
  • Analysis
  • Reporting
Term

Digital Investigation Process Model

(Carrier, 2003)

 

Physical Phase Goals

Definition
  • Preservation - Secure entrance/exit, Prevent changes
  • Survey - Walking through scene, identify evidence
  • Documentation - Photograph, sketches, evidence/scene maps
  • Search & Collection - In-depth search
  • Reconstruction - Develop theories

 

Computer being investigated is considered a digital crime scene

The end goal of most digital investigation is to identify a person who is responsible and therefore digital investigation needs to be tied to a physical investigation.

Term

Digital Investigation Process Model

(Carrier, 2003)

 

Digital Phase Goals

Definition
  • Preservation - Prevent changes (network isolation, collecting volatile data, copy entire digital environment)
  • Survey - Identify obvious evidence (in lab)
  • Documentation - Photo & description of digital device
  • Search & Collection - Analysis of system for non-obvious evidence
  • Reconstruction - Similar to physical

 

Computer being investigated is considered a digital crime scene

The end goal of most digital investigation is to identify a person who is responsible and therefore digital investigation needs to be tied to a physical investigation.

Term
Incident Response
Definition
  • Response to a computer crime, security policy violation, or similar event
  • Secure, preserve, and document digital evidence
  • Happens BEFORE the forensic analysis begins
  • Incident responder is not necessarily the forensic specialist who will conduct the analysis of the digital evidence
Term
Incident Response - Corporate
Definition
  • Large Company
    • incident responder might be a technician-level employee in security or information technology 
  • Small company
    • Network administrator or security officer might also be the incident responder
Term
Incident Response - Criminal Investigation
Definition
  • a sworn law enforcement officer or "crime lab" technician can be incident responder 
  • In a company, after corporate personnel have done their own incident response, law enforcement personnel can be called in if there is a criminal activity
Term
First thing to do at the scene
Definition
  • Determining who is in charge (or who do you report to)
    • DFI is not in charge of the scene for sure
  • Identify what is the crime scene
  • what "area" is allowed to enter
Term

Securing the scene

(by first responder or DFI)

Definition
  • Safety first
  • Integrity second (computer, data, network)
  • Then secure evidence 
  • Not just computers but any digital devices that can contain data (or encryption key)
    • Network switches, routers, servers
    • Mobile phone, printer, digital camera, USB, Flash memory, external HDD, activity/fitness tracking devices, MP3 players, digital audio recorder, etc. (use Faraday bags)
    • RSA secure-ID, USB dongle with encryption key
  • Identify data sources
    • USB cables attached to a computer
    • Owner's manuals for any unidentified digital devices (DSLR, external HDD, etc.)
    • Internet storage, Cloud
    • Clues for passwords
    • Interview anyone who may have useful info.
Term

Guideline for First Responder

When you see a computer

Definition
  • If computer is on, leave it on (for now)
  • If computer is off, leave it off
  • No technical assist from anyone unauthorized should be allowed
  • Avoid compromising physical evidence (fingerprint, blood, DNA, etc.)
  • Protect yourself from biohazards
Term

Guideline for First Responder

2 ways to turn off a computer

Definition
  • Pull the plug
    • Immediately halts processing but destroys data in memory and can corrupt files
    • Data in memory could be collected using "cold boot" attack or DMA attack
  • Shut down
    • Writes entries into system activity logs (change of the state of evidence)
Term

Hard Drive Duplication Methods

American Board of Information Security and Computer Forensics

Definition

 

  • Disk Imaging on a Dedicated Forensic System
    • Platform specifically built and designed to accommodate numerous types of hard drive connections
    • Specialized bit-level imaging software transfers an exact copy of the contents of the original hard drive (or other data source) to one or more blanks
    • Typically, an investigator will make more than one copy of the suspect hard drive using this method
      • If the forensic analysis is correct, the investigation should produce the same results on identical copies f the drive.
Term

Hard Drive Duplication Methods (Cont)

American Board of Information Security and Computer Forensics

Definition
  • System-to-System Disk Imaging
    • This method uses two separate computer systems - the suspect and a specialized forensics imaging system
    • Depending on the type of drives and connections available, both systems are booted from CD-ROM, DVD, USB drive, or floppy disk which loads the imaging software
    • Data is transferred between the computers using serial, parallel, Ethernet, or USB ports
    • This method can be slow, and is often not suited to on-the-scene incident response
Term

Hard Drive Duplication Methods (Cont)

American Board of Information Security and Computer Forensics

Definition
  • Using the original system
    • Uses the original (suspect) computer to perform the disk imaging transfer process
    • A blank drive matching the original hard drive's capacity and configuration is added to the system
    • A forensic boot disk is used to create a bit-level image of the original disk
    • This method id typically used in on-the-scene incident response when it is impractical to transport a computer to the investigator's laboratory
Supporting users have an ad free experience!