Shared Flashcard Set

Details

CompTIA Sec+ 5.5
Basic concepts of forensics
21
Computer Science
Professional
12/01/2018

Additional Computer Science Flashcards

 


 

Cards

Term
Data acquisition
Definition
- Capture system image
- Network traffic and logs
- Capture video
- Record time offset
- Take hashes
- Screenshots
- Witness interviews
Term
Computer evidence
Definition
-Admissible
-Authentic
-Complete
-Reliable: Nothing about how evidence was collected or handled casts doubt about its authenticity and veracity.
-Believable
Term
Capture system image
Definition
-Disk Duplicator
-Software image capture with boot media
-Add drive to hardware write blocker prior to accessing
Term
Record time offset
Definition
-Document time zone include daylight saving
-NTFS systems use GMT or UTC
-Time offset is stored in registry, must be recorded
-FAT uses local time
Term
Things to avoid
Definition
-Don't shutdown until you've completed evidence collection.
Much evidence may be lost and the attacker may have altered the
startup/shutdown scripts/services to destroy evidence.

-Don't trust the programs on the system. Run your evidence
gathering programs from appropriately protected media (see
below).

-Don't run programs that modify the access time of all files on
the system (e.g., 'tar' or 'xcopy').
Term
Preservation
Definition
-ESI repository
-Ongoing" includes old and new data
-Includes emails, personal files, documents
Term
Capture video
Definition
-Event outside the scope of a computer and a network
-Security and surveillance recordings
-External Capture
-Internal Capture screen shot
Term
Track man-hours
Definition
-Log hours gathering information
-May be used for restitution later
-Cost of incident including labor hours and expenses should be documented
Term
Active logging
Definition
-Logging everything from anywhere
-Maybe able to replay attack from start to finish
Term
Network traffic and logs
Definition
-Logs from switches, routers, firewalls
-Exact network stream recording
-NIDS/NIPS logs
Term
Witness interviews
Definition
-anyone who may have seen information
-document anything that they may have seen
-do it as quickly as possible
-able to build more evidence by interviewing more people and being able to correlate all of those different stories
Term
Screenshots
Definition
-capture what the state might be of a particular screen
-valuable forensic information on screen
Term
Take hashes
Definition
-catalog and seal that evidence so there’s no tampering
-take md5 or crc checksum value of digital evidence
Term
Recovery
Definition
-collect and process all of these details
-important information may protect from future incidents
-make policy changes
-modifications to processes and procedures
Term
Strategic intelligence/
counterintelligence gathering
Definition
-details about the attacker
-may be able to learn more information about who they are
-find different habits or different methods that are unique to this particular attacker
-log as much information as possible
-may track exactly what an attacker does from the very beginning until the very end of their attack
Term
Avoid disconnecting from the network
Definition
-may trigger "deadman switches" that detect when they're off the net and wipe evidence.
Term
Order of volatility
Definition
1. registers, cache
2. routing table, arp cache, process table, kernel statistics, memory
3. temporary file systems
4. disk
5. remote logging and monitoring data that is relevant to the system in question
6. physical configuration, network topology
7. archival media
Term
Legal hold
Definition
A legal technique to preserve relevant information

Used to prepare for litigation
Initiated by legal counsel
Term
Chain of custody
Definition
Control Evidence
-Maintain Ingegrity
Everyone who contacts the evidence must be documented
-Avoid tampering
Label and catalog everything
-Seal and store
Term
Order of Volatility
Definition
1. CPU, cache, registers
2. Routing table, ARP cache process table kernel stats
3. Memory
4. Swap File, Temp files
5. Data on Hard Disk
6. Remotely Logged Data
7. Archives
Term
Order of data collection
Definition
1. Photograph computer and scene, screen shots
2. If it is off do not turn on. If it is on do not turn it off.
3. Separate People from devices
4. Collect Live data - start with RAM image, collect info pm processes that are running or terminated
5. Collect logical image of hard disk using forensic tool like dd, helix3, encase, f-repsonse
6. Take hashes of system image
7. Note time offsets
8. Unplug power cord or remove battery do not use power switch in case it is rigged
9. Diagram and label all cords, document device model numbers and serial numbers
10. Preserve evidence. Legal Hold - Data that has been identified as material to an investigation is copied or moved to an immutable location
11. Examine image copy
Supporting users have an ad free experience!