4.8 Digital Forensics Flashcards

(17 cards)

1
Q

What is digital forensics?

A

The process of collecting data when a security event occurs to understand what happened and how to protect against future incidents.

Digital forensics is crucial for legal proceedings and ensuring data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is RFC 3227?

A

Guidelines for evidence collection and archiving.

This RFC documents best practices for digital forensics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are best practices in digital forensics?

A

Best practices for acquisition, analysis, and reporting of data.

Following these practices is essential for data integrity and legal compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a legal hold?

A

A process initiated by a lawyer or legal entity to inform about the type of data that needs to be stored and how much needs to be available.

This ensures that relevant data is preserved for potential legal proceedings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who is a data custodian?

A

The individual responsible for evaluating legal holds and acquiring the requested data.

They have access to all data related to the legal hold request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ESI?

A

Electronically Stored Information.

This refers to data that is held in electronic format and is often subject to legal holds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How should acquired data be preserved?

A

The data must remain in its pristine or unmodified form during analysis.

Ensuring data integrity is critical for legal proceedings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a chain of custody?

A

A process to document who accessed the data and to maintain its integrity.

This is akin to sealing evidence in a physical bag in the digital realm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What methods are used to maintain data integrity?

A

Hashes and digital signatures.

These techniques help confirm that the data has not changed during access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What types of data might need to be collected in a security event?

A
  • Data stored on disk
  • Data in memory
  • Files in the file system
  • Logs from network devices
  • Data from multiple systems

Collecting data from various sources is essential for a comprehensive analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the importance of documenting the data acquisition process?

A

To provide clarity on how data was acquired and ensure it can be used in legal proceedings.

Detailed reports help maintain transparency and trust in the data’s integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is e-discovery?

A

The process of collecting, preparing, reviewing, interpreting, and producing electronic documents.

E-discovery is crucial for legal cases and often works alongside formal forensic processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the primary requirement of the e-discovery process?

A

To acquire data without analyzing it.

This involves simply listing out the types of data needed and ensuring proper acquisition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What should be done with mobile devices during data acquisition?

A

Make copies of mobile device data before analyzing it.

This prevents data loss and ensures the original data remains unchanged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the first step in the forensics process?

A

The acquisition of data from various sources.

Proper acquisition is critical for effective forensic analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the benefit of collecting data in a live form?

A

It allows for data acquisition from systems that may lock down or erase data when powered off.

Live data collection is especially important in cases with encryption.

17
Q

What is required after data acquisition in a forensic investigation?

A

Creating an analysis and conclusion based on the acquired data.

This helps understand the relationship of the data to the security event.