Podcast
Questions and Answers
What is the first step when a digital forensic examination is required?
What is the first step when a digital forensic examination is required?
- A warrant is executed
- A lead investigator is appointed
- An incident is reported (correct)
- Digital devices are seized
What role does the Procurator Fiscal play in the digital forensic process?
What role does the Procurator Fiscal play in the digital forensic process?
- Decides if the evidence is sufficient for trial (correct)
- Juries the case
- Secures the site of the incident
- Conducts the forensic examination
Which document summarizes the findings of the digital forensic examination?
Which document summarizes the findings of the digital forensic examination?
- The jury's verdict
- The lead investigator's report
- The warrant
- The forensic report (correct)
At what stage is the security of the site established in the digital forensics process?
At what stage is the security of the site established in the digital forensics process?
What must the examiner be prepared to do during the trial?
What must the examiner be prepared to do during the trial?
What happens after the forensic examination is completed?
What happens after the forensic examination is completed?
What determines if the case proceeds to trial?
What determines if the case proceeds to trial?
Who ultimately decides on the punishment if the defendant is found guilty?
Who ultimately decides on the punishment if the defendant is found guilty?
What is the primary function of a Write Blocker?
What is the primary function of a Write Blocker?
Which software is commonly used by professional Digital Forensics examiners?
Which software is commonly used by professional Digital Forensics examiners?
What capability does EnCase have that is significant in a legal context?
What capability does EnCase have that is significant in a legal context?
Which of the following can FTK Imager do?
Which of the following can FTK Imager do?
What type of files can be recovered using Digital Forensics software?
What type of files can be recovered using Digital Forensics software?
What is the main difference between EnCase and Autopsy?
What is the main difference between EnCase and Autopsy?
What additional devices can specialist Digital Forensics software typically analyze?
What additional devices can specialist Digital Forensics software typically analyze?
Which feature allows examiners to identify fragments of files?
Which feature allows examiners to identify fragments of files?
What is one of the criminal offenses created by the Computer Misuse Act, 1990?
What is one of the criminal offenses created by the Computer Misuse Act, 1990?
Which law specifically prohibits passing information on how to hack computers?
Which law specifically prohibits passing information on how to hack computers?
What potential penalty is associated with the first offense of the Computer Misuse Act?
What potential penalty is associated with the first offense of the Computer Misuse Act?
What does the Human Rights Act, 1998 primarily address?
What does the Human Rights Act, 1998 primarily address?
Which Act was created specifically in response to the rise of personal computers and related crimes?
Which Act was created specifically in response to the rise of personal computers and related crimes?
Which option is NOT one of the offenses outlined in the Computer Misuse Act, 1990?
Which option is NOT one of the offenses outlined in the Computer Misuse Act, 1990?
Which of the following laws is NOT mentioned as relevant for Digital Forensics examinations?
Which of the following laws is NOT mentioned as relevant for Digital Forensics examinations?
Which of these actions could result in a breach of the Computer Misuse Act, 1990?
Which of these actions could result in a breach of the Computer Misuse Act, 1990?
What will happen if the first letter of the string 'A quick brown fox jumps over the lazy dog.' is changed to lowercase?
What will happen if the first letter of the string 'A quick brown fox jumps over the lazy dog.' is changed to lowercase?
What basic details should be included in the System Information before an examination?
What basic details should be included in the System Information before an examination?
If the input command is changed to use SHA1 instead of MD5, what is expected?
If the input command is changed to use SHA1 instead of MD5, what is expected?
What is indicated by the term 'System Information' in the context of examinations?
What is indicated by the term 'System Information' in the context of examinations?
What will happen if a different single letter in the input name is modified before computing the hash?
What will happen if a different single letter in the input name is modified before computing the hash?
What type of file is commonly used to gather information about network traffic?
What type of file is commonly used to gather information about network traffic?
What records do phone service providers typically maintain?
What records do phone service providers typically maintain?
Which of the following pieces of information is NOT typically found in mobile device call records?
Which of the following pieces of information is NOT typically found in mobile device call records?
What challenge does encryption present to forensic examiners?
What challenge does encryption present to forensic examiners?
What is the primary purpose of using TOR by criminals?
What is the primary purpose of using TOR by criminals?
How does a VPN (Virtual Private Network) affect online communication?
How does a VPN (Virtual Private Network) affect online communication?
What additional information can smartphones record even when not actively used?
What additional information can smartphones record even when not actively used?
What is a possible consequence of data encryption in mobile devices?
What is a possible consequence of data encryption in mobile devices?
What is the purpose of user profiles in modern computer operating systems?
What is the purpose of user profiles in modern computer operating systems?
Where can user profiles be found on a Windows 10-based computer?
Where can user profiles be found on a Windows 10-based computer?
What type of account provides very limited access to the computer?
What type of account provides very limited access to the computer?
Which folder contains information about applications that have been used on the computer?
Which folder contains information about applications that have been used on the computer?
What is commonly stored on the Desktop folder of a user profile?
What is commonly stored on the Desktop folder of a user profile?
How can the hidden 'AppData' folder be revealed in Windows 10?
How can the hidden 'AppData' folder be revealed in Windows 10?
Which of the following statements about the Recycling or Trash folder is true?
Which of the following statements about the Recycling or Trash folder is true?
What characteristic distinguishes the Contacts folder in a user profile?
What characteristic distinguishes the Contacts folder in a user profile?
Flashcards
Digital Forensics Process
Digital Forensics Process
A sequence of events from incident reporting to trial, involving digital evidence examination and legal procedures.
Incident Report
Incident Report
Formal notification of a digital crime/incident, initiating the forensic process.
Warrant Execution
Warrant Execution
Legal authorization to seize digital devices, ensuring proper preservation of evidence.
Digital Device Seizure
Digital Device Seizure
Signup and view all the flashcards
Forensic Examination
Forensic Examination
Signup and view all the flashcards
Forensic Report
Forensic Report
Signup and view all the flashcards
Procurator Fiscal
Procurator Fiscal
Signup and view all the flashcards
Trial Evidence
Trial Evidence
Signup and view all the flashcards
Computer Misuse Act, 1990
Computer Misuse Act, 1990
Signup and view all the flashcards
Unauthorized Computer Access
Unauthorized Computer Access
Signup and view all the flashcards
Illegal Modification
Illegal Modification
Signup and view all the flashcards
Criminal Offenses, Computer Misuse Act
Criminal Offenses, Computer Misuse Act
Signup and view all the flashcards
Sharing Hacking Information
Sharing Hacking Information
Signup and view all the flashcards
Encouraging Illegal Hacking
Encouraging Illegal Hacking
Signup and view all the flashcards
Computer Malware
Computer Malware
Signup and view all the flashcards
Consequences of Computer Misuse Act Violation
Consequences of Computer Misuse Act Violation
Signup and view all the flashcards
Write Blocker
Write Blocker
Signup and view all the flashcards
FTK Imager
FTK Imager
Signup and view all the flashcards
Digital Forensics Software
Digital Forensics Software
Signup and view all the flashcards
EnCase
EnCase
Signup and view all the flashcards
Autopsy
Autopsy
Signup and view all the flashcards
Deleted Files
Deleted Files
Signup and view all the flashcards
Formatted Storage Device
Formatted Storage Device
Signup and view all the flashcards
File Fragments
File Fragments
Signup and view all the flashcards
Network Traffic Data
Network Traffic Data
Signup and view all the flashcards
Packet Capture File
Packet Capture File
Signup and view all the flashcards
Mobile Device Records
Mobile Device Records
Signup and view all the flashcards
Encrypted Mobile Devices
Encrypted Mobile Devices
Signup and view all the flashcards
MD5 Hash
MD5 Hash
Signup and view all the flashcards
TOR Network
TOR Network
Signup and view all the flashcards
SHA1 Hash
SHA1 Hash
Signup and view all the flashcards
VPN (Virtual Private Network)
VPN (Virtual Private Network)
Signup and view all the flashcards
Data Encryption
Data Encryption
Signup and view all the flashcards
System Information
System Information
Signup and view all the flashcards
Forensic Challenges with Encryption
Forensic Challenges with Encryption
Signup and view all the flashcards
Make, Model, Serial Number
Make, Model, Serial Number
Signup and view all the flashcards
User Profile
User Profile
Signup and view all the flashcards
AppData Folder
AppData Folder
Signup and view all the flashcards
Contacts Folder
Contacts Folder
Signup and view all the flashcards
Desktop Folder
Desktop Folder
Signup and view all the flashcards
Recycling/Trash Folder
Recycling/Trash Folder
Signup and view all the flashcards
Hidden Files
Hidden Files
Signup and view all the flashcards
Public Account
Public Account
Signup and view all the flashcards
User Profile Location
User Profile Location
Signup and view all the flashcards
Study Notes
NPA Cyber Security - Digital Forensics
- This learner guide covers Digital Forensics for the National Progression Award in Cyber Security
- The content is split into three levels: National 4, National 5 and Higher
- Practical tasks are recommended to aid learning and improve practical skills
- The study material is designed for use with the guidance of a teacher
- It is funded by the Scottish Government and in partnership with the National Cyber Resilience Leaders' Board
Contents
- Introduction: Covers the four principles of digital evidence and how to use the notes
- Four Principles of Digital Evidence:
- No action taken should change data that may be relied upon in court
- Persons accessing original data must be competent and able to explain actions
- All actions applied to digital evidence should be recorded and preserved
- Overall responsibility rests with the person in charge of the investigation
- Four Principles of Digital Evidence:
- The Digital Forensics Process: Covers the stages of an investigation
- Incident: An incident triggering the need for a Digital Forensics investigation
- Investigation Starts: Lead investigator appointment, warrant application, device seizure
- Computer Misuse Act 1990, Human Rights Act 1998, Regulation of Investigatory Powers (Scotland) Act 2000: Laws underpinning investigations
- Seizure: Either by warrant or voluntary surrender
- By Warrant: Secure the crime scene, identify devices, and record the 'chain of custody'
- By Voluntary Surrender: The owner gives permission to examine; maintaining records
- Digital Forensic Examination: This is split into acquisition, analysis and reporting.
- Acquisition: Collecting digital information while preserving the originals
- Capturing Digital Evidence: Imaging memory, imaging drives, verification, system information
- Chain of Custody: Detailed recording of actions taken with evidence
- Analysis: Putting evidence in chronological order, examining trends, and searching for correlations
- Reporting: Creating a forensic report and submitting to Procurator Fiscal
- Acquisition: Collecting digital information while preserving the originals
- Trial: The forensic report is used as evidence in court; examiner must be able to explain findings to the jury
- Verdict: Jury decides on guilt or innocence, Judge imposes any penalties if found guilty
Data Acquisition
- At the Crime Scene: First responders secure the scene, preserve evidence, and provide records including photographs and video
- Digital examination: This is a thorough looking at the entire systems. This is done to preserve the original state to enable repeatability to be confirmed.
- Imaging Memory: Creating a copy of the device's memory, while the device is 'on'. This is to preserve the memory's contents. A 'working copy' and a 'prime copy' are created
- Imaging Drives: Copying all storage media to preserve their contents. A 'working copy' and a 'prime copy' are created
- Verification: Using 'Hashing' to verify the accuracy of copies. This process ensures the copy is a precise reproduction of the original
- System Information: Gathering details like make, model, serial number, operating system, and applications on the device
Analysing Digital Evidence
- Timeline: Creating a timeline of events, linking them to specific users, and correlating them with other evidence
- Relationships: Identifying relationships between users, devices, and files.
- Network Analysis (Level 6): Investigating network traffic and connections for evidence
- Reporting Findings: Summarizing the findings, remaining objective, and using 'likelihood' based conclusions to present them
Further Study
- The use of smartphones, social media, cloud computing and 'Internet of Things' devices, along with the rise of digital assistants, require new techniques and tools
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.