Podcast
Questions and Answers
What is the smallest physical storage unit on a disk?
What is the smallest physical storage unit on a disk?
- Track
- Cluster
- Cylinder
- Sector (correct)
Which of the following best describes logical drives in computer forensics?
Which of the following best describes logical drives in computer forensics?
- Allocated parts of a physical drive managed as independent units (correct)
- Actual space occupied by files on a disk
- Temporary storage used during computation
- Physical layout of a disk's surface
Which piece of hardware is responsible for reading and writing data on a disk?
Which piece of hardware is responsible for reading and writing data on a disk?
- Head (correct)
- Platter
- Actuator arm
- Spindle
What type of memory is referred to as volatile memory?
What type of memory is referred to as volatile memory?
In the context of data storage, what does a track refer to?
In the context of data storage, what does a track refer to?
What does the File Allocation Table (FAT) do?
What does the File Allocation Table (FAT) do?
Which file system is known for providing security and larger file size capabilities?
Which file system is known for providing security and larger file size capabilities?
What happens to a file's data when it is deleted by a user in a file system?
What happens to a file's data when it is deleted by a user in a file system?
What is the primary function of a file system?
What is the primary function of a file system?
Which of the following is NOT a file system available from Microsoft?
Which of the following is NOT a file system available from Microsoft?
What is a requirement for an imaging program as defined by NIST?
What is a requirement for an imaging program as defined by NIST?
During the physical extraction phase, what does keyword searching accomplish?
During the physical extraction phase, what does keyword searching accomplish?
Which characteristic is NOT identified during logical extraction?
Which characteristic is NOT identified during logical extraction?
What is the primary goal of computer forensics?
What is the primary goal of computer forensics?
Which of the following is NOT a traditional problem in computer investigations?
Which of the following is NOT a traditional problem in computer investigations?
What is the main purpose of data reduction in the logical extraction process?
What is the main purpose of data reduction in the logical extraction process?
What is the role of file carving during physical extraction?
What is the role of file carving during physical extraction?
What is a major reason for the low reporting rate of cyber crimes by victims?
What is a major reason for the low reporting rate of cyber crimes by victims?
Which of the following is one of the cardinal rules of computer investigations?
Which of the following is one of the cardinal rules of computer investigations?
What challenge arises from excessive dependence on automated programs in investigations?
What challenge arises from excessive dependence on automated programs in investigations?
What best describes the logical file size on a disk?
What best describes the logical file size on a disk?
Which term refers to arc-shaped portions of a disk track used for data storage?
Which term refers to arc-shaped portions of a disk track used for data storage?
Which storage type retains data without requiring power?
Which storage type retains data without requiring power?
What component in a disk drive is responsible for moving the read/write head across the platters?
What component in a disk drive is responsible for moving the read/write head across the platters?
Which of the following represents a system for encoding information in electronic devices?
Which of the following represents a system for encoding information in electronic devices?
What is the standard size of each sector on magnetic disks formatted for Windows?
What is the standard size of each sector on magnetic disks formatted for Windows?
Which of the following accurately describes file slack space?
Which of the following accurately describes file slack space?
What is the maximum number of primary partitions that can be created on a fixed disk?
What is the maximum number of primary partitions that can be created on a fixed disk?
What does the partition table NOT indicate?
What does the partition table NOT indicate?
Which statement is true regarding clusters in magnetic disk storage?
Which statement is true regarding clusters in magnetic disk storage?
What is one tool used for verifying data integrity?
What is one tool used for verifying data integrity?
Which category of software tools would you use for extracting deleted files?
Which category of software tools would you use for extracting deleted files?
Why should Standard Operating Procedures (SOP) be reviewed annually in forensic investigations?
Why should Standard Operating Procedures (SOP) be reviewed annually in forensic investigations?
What impact does the Encrypting File System (EFS) have on investigations?
What impact does the Encrypting File System (EFS) have on investigations?
What is NOT one of the five categories of minimum software requirements for forensic investigations?
What is NOT one of the five categories of minimum software requirements for forensic investigations?
What is a primary feature of the New Technology File System (NTFS)?
What is a primary feature of the New Technology File System (NTFS)?
Which statement accurately describes the purpose of the File Allocation Table (FAT)?
Which statement accurately describes the purpose of the File Allocation Table (FAT)?
What significant change did the introduction of disk operating systems bring to data management?
What significant change did the introduction of disk operating systems bring to data management?
Which characteristic of NTFS makes it more advantageous than FAT in terms of storage efficiency?
Which characteristic of NTFS makes it more advantageous than FAT in terms of storage efficiency?
Why might investigators become confused when analyzing a logical drive's size?
Why might investigators become confused when analyzing a logical drive's size?
Flashcards
Computer Forensics Goal
Computer Forensics Goal
Protecting digital evidence from alterations, damage, or corruption.
Inadequate Resources in Investigations
Inadequate Resources in Investigations
Limited funds and personnel in law enforcement hinder effective investigations.
Evidence Corruption in Investigations
Evidence Corruption in Investigations
Altering or damaging the original evidence affects the investigation's outcome.
Importance of Documentation
Importance of Documentation
Signup and view all the flashcards
Chain of Custody
Chain of Custody
Signup and view all the flashcards
Sector
Sector
Signup and view all the flashcards
Logical file size
Logical file size
Signup and view all the flashcards
Physical file size
Physical file size
Signup and view all the flashcards
Logical
Logical
Signup and view all the flashcards
Physical
Physical
Signup and view all the flashcards
Imaging Programs
Imaging Programs
Signup and view all the flashcards
Physical Extraction
Physical Extraction
Signup and view all the flashcards
Logical Extraction
Logical Extraction
Signup and view all the flashcards
Keyword Searching
Keyword Searching
Signup and view all the flashcards
File Carving
File Carving
Signup and view all the flashcards
What are File Systems?
What are File Systems?
Signup and view all the flashcards
FAT - How does it work?
FAT - How does it work?
Signup and view all the flashcards
File Deletion - FAT
File Deletion - FAT
Signup and view all the flashcards
What is NTFS?
What is NTFS?
Signup and view all the flashcards
What is the MFT?
What is the MFT?
Signup and view all the flashcards
What is a Sector?
What is a Sector?
Signup and view all the flashcards
What is a Track?
What is a Track?
Signup and view all the flashcards
What is a Cylinder?
What is a Cylinder?
Signup and view all the flashcards
What are Clusters?
What are Clusters?
Signup and view all the flashcards
What is the difference between Physical and Logical file size?
What is the difference between Physical and Logical file size?
Signup and view all the flashcards
What is a cluster?
What is a cluster?
Signup and view all the flashcards
What is file slack space?
What is file slack space?
Signup and view all the flashcards
What is a partition?
What is a partition?
Signup and view all the flashcards
What is a partition table?
What is a partition table?
Signup and view all the flashcards
BIOS
BIOS
Signup and view all the flashcards
POST
POST
Signup and view all the flashcards
Data Integrity Tools
Data Integrity Tools
Signup and view all the flashcards
CRC
CRC
Signup and view all the flashcards
MD5 Hash
MD5 Hash
Signup and view all the flashcards
What is a File System?
What is a File System?
Signup and view all the flashcards
FAT: What is it?
FAT: What is it?
Signup and view all the flashcards
What happens when you delete a file in FAT?
What happens when you delete a file in FAT?
Signup and view all the flashcards
Study Notes
Computer Forensics and Cyber Crime
- Computer forensics is the practice of collecting, analyzing, and reporting digital data legally. It aids in crime detection and prevention, resolving disputes
- Its purpose is to examine digital media, identify, preserve, recover, analyze, and report facts and opinions about the digital information
- Computer forensics is an emerging discipline, affected by new technologies, evolving criminal behavior, and changing police strategies
- Maintaining the integrity of evidence is crucial to computer forensic investigations. This involves maintaining a chain of custody, protecting the evidence from contamination, and ensuring any analysis preserves the original state
Evidence Integrity
- Chain of Custody (CoC) documents the seizure, handling, analysis, and disposition of evidence, ensuring its integrity. It involves detailed records of every stage
- Employing a chain of custody is crucial for legal admissibility
- The process requires procedures for maintaining accurate records at every stage
- Avoiding contamination or alteration of digital evidence is paramount
Traditional Problems in Computer Investigations
- Local law enforcement faces increasing responsibilities and dwindling budgets, limiting educational opportunities
- Cooperation and communication among agencies is frequently weak
- Overreliance on automated programs and self-proclaimed experts can be detrimental in computer investigations
- Insufficient reporting of crimes due to victims' perceptions of law enforcement's capabilities, self-serving behavior of corporate advisors and inadequate resources, hindering effective investigations
Evidence Corruption – Cardinal Rules of Computer Investigations
- Always work from a duplicate image, leaving the original hard drive unharmed
- Thorough documentation is essential in every step
- Maintain a meticulous chain of custody
Disk Structure and Digital Evidence
- Terms: Nonvolatile storage, computer storage, primary storage, secondary storage, floppy disks, CD-ROMs, CD-RWs, hard disks, operating systems, hardware, software, firmware, static memory, volatile memory
- Drives: Physical drives at the machine level; physical file size (actual space); logical drives (independent units) in forensic analysis, crucial for computer forensics.
- Logical file size, exact size of a file in bytes
- Data Storage Scheme: Sectors: smallest physical unit, arc-shaped portion of a track. Sectors are sequentially numbered.
- Magnetic disks formatted for Windows use 512 bytes per sector
- Clusters grouped adjacent sectors, minimum space allocation for individual files
- File slack space, unused area between a file's end and the cluster's end
- Partitions: Disk partitions that operating systems divide the disk into (maximum four).
- Partition of the "boot" drive that the operating system resides on has to be bootable
- Extended partitions can be subdivided into logical drives. A master boot record and partition table are created for the hard drive to track partitions
- Partition table: identifies locations of partitions and indicates which partition is bootable. Also contains MBR and partition data at specific locations on the disk
- File systems: Underlying structure for computer data organization on a hard disk. Examples are FAT16, FAT32, and NTFS. The file system structure greatly impacts how data is retrieved after crimes occur
- FAT (File Allocation Table): Map or directory of each part of a file
- File stored in a nonphysical space until the clusters are used
- Deleting a file does not delete its data on the disk, just marks the cluster as available
- NTFS (New Technology File System): developed by Microsoft, provides security, performance, and larger file sizes.
- Data is structured using a table-based system where data is indexed
- Fragmentation means that data is stored in different locations on the disk, which can impact forensics but is a feature of the file system itself
Firmware – Operating Instructions
- BIOS (Basic Input/Output System): initial commands concerning the bootstrap loader
- POST (Power-on Self-Test): process verifying devices after power on
Data Integrity
- Cyclical redundancy checksum (CRC): tool for data validation
- MD5 Hash: data verification tool
- Hashkeeper: software listing known files
Developing Computer Forensic Science Capabilities
- SOPs must be clear and easily accessible, current, and include different software, hardware, and specific investigative procedures
- SOPs should undergo annual review due to the field's dynamic nature
Minimum Software Requirements
- Categories: Data preservation, duplication, and verification; Data recovery/extraction; Data analysis; Data reporting; Network utilities
Data Preservation, Duplication and Verification Tools
- NIST defines imaging programs as tools that create a bit-by-bit copy of a disk or partition, onto a fixed or removable media. The tool must not alter the original disk and must be able to access IDE and SCSI devices. It must verify the integrity of the image file and log all errors, providing extensive documentation.
Data Recovery/Extraction Tools
- Physical Extraction: identifying data across the entire physical hard drive without regard to file system structure
- Logical Extraction: identifying data based on the installed file system(s) and application(s), including active files, deleted files, slack space, and unallocated file space. Includes keyword searching, file carving, or the analysis of unused space on the disk partitions.
Data Analysis Tools
- Categories: Indexing, text searching, viewers, time frame analysis, and application analysis
- Examples: analyzing file names, identifying different operating systems, correlating data to applications, assessing relations between files (such as emails), and determining the value of unknown file types to investigations. One can examine where files were stored in the OS or the disk structure
Data Reporting Tools
- Reports must include lab name, address, report date, investigating officer name, agency, case number, case details, case information, lab case identifier, evidence log, and the physical description of any evidence.
Other Required Software
- Miscellaneous software needed includes presentation software (like PowerPoint), word processors, spreadsheet software, wiping software, antivirus software, and networking tools.
Conclusions
- Poor investigations usually stem from inadequate resources, inadequate training, and lack of administrative initiative
- Need for sufficient training and tools for forensic computer science
- Collaboration between forensic investigators and civilian or corporate experts is frequently important.
- Meeting minimum requirements like appropriate equipment and housing is important
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the fundamentals of computer forensics, focusing on the techniques used for collecting and analyzing digital data. It also emphasizes the importance of maintaining evidence integrity through proper chain of custody procedures. Test your knowledge on how these practices aid in crime detection and legal processes.