Podcast
Questions and Answers
What is the first step when a digital forensic examination is required?
What is the first step when a digital forensic examination is required?
What role does the Procurator Fiscal play in the digital forensic process?
What role does the Procurator Fiscal play in the digital forensic process?
Which document summarizes the findings of the digital forensic examination?
Which document summarizes the findings of the digital forensic examination?
At what stage is the security of the site established in the digital forensics process?
At what stage is the security of the site established in the digital forensics process?
Signup and view all the answers
What must the examiner be prepared to do during the trial?
What must the examiner be prepared to do during the trial?
Signup and view all the answers
What happens after the forensic examination is completed?
What happens after the forensic examination is completed?
Signup and view all the answers
What determines if the case proceeds to trial?
What determines if the case proceeds to trial?
Signup and view all the answers
Who ultimately decides on the punishment if the defendant is found guilty?
Who ultimately decides on the punishment if the defendant is found guilty?
Signup and view all the answers
What is the primary function of a Write Blocker?
What is the primary function of a Write Blocker?
Signup and view all the answers
Which software is commonly used by professional Digital Forensics examiners?
Which software is commonly used by professional Digital Forensics examiners?
Signup and view all the answers
What capability does EnCase have that is significant in a legal context?
What capability does EnCase have that is significant in a legal context?
Signup and view all the answers
Which of the following can FTK Imager do?
Which of the following can FTK Imager do?
Signup and view all the answers
What type of files can be recovered using Digital Forensics software?
What type of files can be recovered using Digital Forensics software?
Signup and view all the answers
What is the main difference between EnCase and Autopsy?
What is the main difference between EnCase and Autopsy?
Signup and view all the answers
What additional devices can specialist Digital Forensics software typically analyze?
What additional devices can specialist Digital Forensics software typically analyze?
Signup and view all the answers
Which feature allows examiners to identify fragments of files?
Which feature allows examiners to identify fragments of files?
Signup and view all the answers
What is one of the criminal offenses created by the Computer Misuse Act, 1990?
What is one of the criminal offenses created by the Computer Misuse Act, 1990?
Signup and view all the answers
Which law specifically prohibits passing information on how to hack computers?
Which law specifically prohibits passing information on how to hack computers?
Signup and view all the answers
What potential penalty is associated with the first offense of the Computer Misuse Act?
What potential penalty is associated with the first offense of the Computer Misuse Act?
Signup and view all the answers
What does the Human Rights Act, 1998 primarily address?
What does the Human Rights Act, 1998 primarily address?
Signup and view all the answers
Which Act was created specifically in response to the rise of personal computers and related crimes?
Which Act was created specifically in response to the rise of personal computers and related crimes?
Signup and view all the answers
Which option is NOT one of the offenses outlined in the Computer Misuse Act, 1990?
Which option is NOT one of the offenses outlined in the Computer Misuse Act, 1990?
Signup and view all the answers
Which of the following laws is NOT mentioned as relevant for Digital Forensics examinations?
Which of the following laws is NOT mentioned as relevant for Digital Forensics examinations?
Signup and view all the answers
Which of these actions could result in a breach of the Computer Misuse Act, 1990?
Which of these actions could result in a breach of the Computer Misuse Act, 1990?
Signup and view all the answers
What will happen if the first letter of the string 'A quick brown fox jumps over the lazy dog.' is changed to lowercase?
What will happen if the first letter of the string 'A quick brown fox jumps over the lazy dog.' is changed to lowercase?
Signup and view all the answers
What basic details should be included in the System Information before an examination?
What basic details should be included in the System Information before an examination?
Signup and view all the answers
If the input command is changed to use SHA1 instead of MD5, what is expected?
If the input command is changed to use SHA1 instead of MD5, what is expected?
Signup and view all the answers
What is indicated by the term 'System Information' in the context of examinations?
What is indicated by the term 'System Information' in the context of examinations?
Signup and view all the answers
What will happen if a different single letter in the input name is modified before computing the hash?
What will happen if a different single letter in the input name is modified before computing the hash?
Signup and view all the answers
What type of file is commonly used to gather information about network traffic?
What type of file is commonly used to gather information about network traffic?
Signup and view all the answers
What records do phone service providers typically maintain?
What records do phone service providers typically maintain?
Signup and view all the answers
Which of the following pieces of information is NOT typically found in mobile device call records?
Which of the following pieces of information is NOT typically found in mobile device call records?
Signup and view all the answers
What challenge does encryption present to forensic examiners?
What challenge does encryption present to forensic examiners?
Signup and view all the answers
What is the primary purpose of using TOR by criminals?
What is the primary purpose of using TOR by criminals?
Signup and view all the answers
How does a VPN (Virtual Private Network) affect online communication?
How does a VPN (Virtual Private Network) affect online communication?
Signup and view all the answers
What additional information can smartphones record even when not actively used?
What additional information can smartphones record even when not actively used?
Signup and view all the answers
What is a possible consequence of data encryption in mobile devices?
What is a possible consequence of data encryption in mobile devices?
Signup and view all the answers
What is the purpose of user profiles in modern computer operating systems?
What is the purpose of user profiles in modern computer operating systems?
Signup and view all the answers
Where can user profiles be found on a Windows 10-based computer?
Where can user profiles be found on a Windows 10-based computer?
Signup and view all the answers
What type of account provides very limited access to the computer?
What type of account provides very limited access to the computer?
Signup and view all the answers
Which folder contains information about applications that have been used on the computer?
Which folder contains information about applications that have been used on the computer?
Signup and view all the answers
What is commonly stored on the Desktop folder of a user profile?
What is commonly stored on the Desktop folder of a user profile?
Signup and view all the answers
How can the hidden 'AppData' folder be revealed in Windows 10?
How can the hidden 'AppData' folder be revealed in Windows 10?
Signup and view all the answers
Which of the following statements about the Recycling or Trash folder is true?
Which of the following statements about the Recycling or Trash folder is true?
Signup and view all the answers
What characteristic distinguishes the Contacts folder in a user profile?
What characteristic distinguishes the Contacts folder in a user profile?
Signup and view all the answers
Study Notes
NPA Cyber Security - Digital Forensics
- This learner guide covers Digital Forensics for the National Progression Award in Cyber Security
- The content is split into three levels: National 4, National 5 and Higher
- Practical tasks are recommended to aid learning and improve practical skills
- The study material is designed for use with the guidance of a teacher
- It is funded by the Scottish Government and in partnership with the National Cyber Resilience Leaders' Board
Contents
-
Introduction: Covers the four principles of digital evidence and how to use the notes
-
Four Principles of Digital Evidence:
- No action taken should change data that may be relied upon in court
- Persons accessing original data must be competent and able to explain actions
- All actions applied to digital evidence should be recorded and preserved
- Overall responsibility rests with the person in charge of the investigation
-
Four Principles of Digital Evidence:
-
The Digital Forensics Process: Covers the stages of an investigation
- Incident: An incident triggering the need for a Digital Forensics investigation
-
Investigation Starts: Lead investigator appointment, warrant application, device seizure
- Computer Misuse Act 1990, Human Rights Act 1998, Regulation of Investigatory Powers (Scotland) Act 2000: Laws underpinning investigations
-
Seizure: Either by warrant or voluntary surrender
- By Warrant: Secure the crime scene, identify devices, and record the 'chain of custody'
- By Voluntary Surrender: The owner gives permission to examine; maintaining records
-
Digital Forensic Examination: This is split into acquisition, analysis and reporting.
-
Acquisition: Collecting digital information while preserving the originals
- Capturing Digital Evidence: Imaging memory, imaging drives, verification, system information
- Chain of Custody: Detailed recording of actions taken with evidence
- Analysis: Putting evidence in chronological order, examining trends, and searching for correlations
- Reporting: Creating a forensic report and submitting to Procurator Fiscal
-
Acquisition: Collecting digital information while preserving the originals
- Trial: The forensic report is used as evidence in court; examiner must be able to explain findings to the jury
- Verdict: Jury decides on guilt or innocence, Judge imposes any penalties if found guilty
Data Acquisition
- At the Crime Scene: First responders secure the scene, preserve evidence, and provide records including photographs and video
- Digital examination: This is a thorough looking at the entire systems. This is done to preserve the original state to enable repeatability to be confirmed.
- Imaging Memory: Creating a copy of the device's memory, while the device is 'on'. This is to preserve the memory's contents. A 'working copy' and a 'prime copy' are created
- Imaging Drives: Copying all storage media to preserve their contents. A 'working copy' and a 'prime copy' are created
- Verification: Using 'Hashing' to verify the accuracy of copies. This process ensures the copy is a precise reproduction of the original
- System Information: Gathering details like make, model, serial number, operating system, and applications on the device
Analysing Digital Evidence
- Timeline: Creating a timeline of events, linking them to specific users, and correlating them with other evidence
- Relationships: Identifying relationships between users, devices, and files.
- Network Analysis (Level 6): Investigating network traffic and connections for evidence
- Reporting Findings: Summarizing the findings, remaining objective, and using 'likelihood' based conclusions to present them
Further Study
- The use of smartphones, social media, cloud computing and 'Internet of Things' devices, along with the rise of digital assistants, require new techniques and tools
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore the fundamental aspects of digital forensics in this quiz. From the initial steps in a digital forensic examination to the roles of key players in the legal process, test your knowledge on how digital evidence is handled and presented in court. Whether you're a beginner or looking to refresh your skills, this quiz covers essential concepts in digital forensic analysis.