Lecture 2: Computer Forensics

IndustriousMoon2927 avatar
IndustriousMoon2927
·
·
Download

Start Quiz

Study Flashcards

24 Questions

What is the purpose of digital evidence collection in computer forensics?

To answer a specific question or reason for examination

What is essential to ensure that digital evidence is admissible in a court of law?

Evidential integrity

What is Chain of Custody in digital forensics?

The logical sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence

Why is it important to preserve the chain of custody?

To ensure the quality of evidence

What is the output of the forensic process?

Answer to the question or reason for examination

What is the role of phone tracing in digital forensics?

To identify the location of a suspect

What is the purpose of IMEI tracking in digital forensics?

To track the International Mobile Equipment Identity

What is the main goal of digital evidence collection?

To answer a specific question or reason for examination

What is digital forensics a synonym for?

Computer forensics

What is the primary goal of computer forensics?

To identify and extract evidence from a computer device

What is computer forensics used for?

To uncover evidence that could be used in a court of law

What is the practice of computer forensics?

Collecting, analyzing, and reporting on digital data

What is the similar process that computer forensics follows?

Other forensic disciplines

What is one of the uses of computer forensics?

In the detection and prevention of crime

What is the main objective of computer forensics?

To uncover evidence that could be used in a court of law

What is the term used to describe the collection of techniques and tools used to find evidence in a computer?

Computer forensics

What is the primary goal of Chain of Custody in digital evidence collection?

To protect the evidence from contamination

What should be used to prevent data alteration during digital evidence collection?

Write-Blocking devices

What is the primary function of secondary storage media?

To store data for long-term preservation

What is a characteristic of Solid-State Drive (SSD) drives?

They have a different process but same functionality

What is a challenge in data recovery from SSD drives?

Optimization processes

What is the purpose of hashing in digital evidence collection?

To verify data integrity

What is a benefit of using SSD drives in digital evidence collection?

They provide faster data transfer

What is a key principle of Chain of Custody in digital evidence collection?

Document every step

Study Notes

Computer Forensics

  • Digital forensics is a relatively new science that includes the forensics of all digital technology.
  • Computer forensics is a field of technology that uses investigative techniques to identify and extract evidence from a computer device.
  • It is used to uncover evidence that could be used in a court of law.
  • Computer forensics follows a similar process to other forensic disciplines and faces similar issues.

Forensic Process

  • Inputs: Target Person / Digital Device
  • Processes: Collect, Analyze, Report
  • Output: Answer to Question, well-grounded answers

Example Case

  • Phone tracing was used to determine the suspect's location at the time of the murder.
  • The IMEI number was used to track the phone.

Digital Evidence Integrity

  • Evidential integrity requires that any digital evidence being examined not be changed in any way by the digital forensic examiner.
  • Evidence integrity needs to be protected in order to make it admissible in the court of law.

Chain of Custody

  • Chain of Custody refers to the logical sequence that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence in legal cases.
  • Each step in the chain is essential as if broken, the evidence may be rendered inadmissible.
  • Preserving the chain of custody is about following the correct and consistent procedure and hence ensuring the quality of evidence.
  • The chain of custody ensures that evidence is protected, data integrity is preserved, proof is undeniable, and the case is closed.

Computer Hardware and Software

  • Topics to be covered include secondary storage media, file systems, file structure, data representation, Windows registry, encryption, hashing, and salting, memory and paging, and other notable artifacts.

Secondary Storage Media

  • Refers to media where data is stored for long-term preservation.
  • Examples include hard drive types (HDD, SSD) and their characteristics.
  • SSD drives have improvements of reliability and transfer speed, but are not as cost-effective as HDD.

This quiz covers the basics of computer forensics, including forensic processes, data collection, analysis, and reporting. It's designed for students of the Luxor Faculty of Computers and Information.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser