CHAPTER 5 PPT Flashcards

(42 cards)

1
Q

Explain the four general tasks that may place a role in recovering from a security incident.

A
  1. Identify shortcomings in risk assessment, policy, or implementation
  2. Repair problems caused by the incident
  3. If the incident is caused by an individual’s malicious act, and we can hold that person accountable, then we collect evidence to clearly tie the person to the incident
  4. If someone uses our computer to violate laws, then we need to preserve evidence so that a prosecutor may use it in a trial
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A __________ has had defenses weakened and possibly no other damage

A

compromised system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Recovery from a compromise is ____________

A

remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain digital forensics:

A

The process of collecting and/or analyzing evidence from computers and other digital storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Issues in evidence gathering:

A
  1. What data should we collect before an incident occurs
  2. What data are we allowed to collect from an individual’s personal computer
  3. What data can we retrieve from persistent memories like USBs and hard drives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List and explain the three general categories of legal systems used in the world. Give an example of each.

A
  1. Civil law - based on legislative enactments. Example: Roman and Napoleonic laws
  2. Common law - based on judicial decisions. Example: English common law and the US legal system
  3. Religious law - based on religious systems and/or documents.. Example: Jewish, Islamic, and Christian canon law systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List and describe four ways of resolving a security incident that could arise to the level of a legal dispute

A
  1. Private action - One party acts agains another, based on a shared relationship
  2. Meditation - two Parties relies on a third party (mediator), to help negotiate a settlement
  3. Civil complaint - One party files a lawsuit against another. Settled in a court trial u n l e s s settled
    informally ahead of time.
  4. Criminal complaint - A person is charged with breaking specific laws.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When can we use informal evidence, and when must evidence be legally admissible?

A

Private actions and Mediation - Informal evidence might be considered when resolving the complaint or dispute. Mediators might demand admissible evidence

Civil and criminal complaints - Only admissible evidence may be used in court proceedings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain the concept of due diligence

A

The notion that there are customary acts that parties take for safety and security.

Parties are less at fault if they show due diligence in their actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the basic requirements evidence must meet to be used in a legal proceeding.

A

Must yield admissible evidence

  1. Legal constraints: US 4th Amendment, expectations of privacy, private ownership, consent to search
  2. Records collected for routine business use
  3. No modifications since collection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the three steps an investigator performs when collecting forensic evidence.

A

Securing the Scene – Securing the scene means restricting access by removing unauthorized individuals to preserve the integrity of the evidence.

Documenting the Scene – Documenting the scene involves recording detailed information, descriptions, and photographs of the location and evidence as they are found.

Collecting the Evidence – Collecting evidence is the careful process of gathering, preserving, and labeling items for further analysis and investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Digital evidence procedures

A
  1. Photograph the screens of powered-on devices
  2. For most powered-on devices, simply remove the power source (cord and/or battery)
  3. Document all serial numbers, cords, and other connections before removal
  4. Seal each item in an evidence bag
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is it better to perform a clean “shutdown” or simply pull the plug when collecting a computer as evidence?

A

As noted, the best strategy in most cases is to simply unplug a running computer. The shutdown operation in many operating systems may wipe out evidence that a forensics investigation could otherwise recover. In particular, Microsoft Windows is likely to save more information if we simply “pull the plug” than if we perform a clean “shutdown.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Forensic hard drive analysis

A
  1. We calculate an integrity check on the hard drive: a very large integer (48 digits or more)
  2. We copy the hard drive and recalculate the integrity check - it must match
  3. Then we analyze the copy, not the original. After collecting evidence, we recalculate the integrity check - must still match
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Two elements of storing data on a hard drive

A
  • a coil of wire
  • magnetic surface
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Two ways to handle magnetic data:

A
  1. Reading data: We generate a current if a coil of wire moves past a magnet
  2. Writing data: We magnetize a surface if it moves past a coil of wire containing a current
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Basic components of a hard drive:

A

Arm
Disk head motor
Platter spindle (motor underneath)
Read/write head
Two platters

18
Q

Drive size has followed __________

A

Moore’s Law

19
Q

Explain the difference between “high-level” and “low-level” disk formatting. When we perform a “quick format,” what formatting do we perform?

A

High-level format: Provides the structure to store files, directories, folders, and free space.
Upon doing a “quick format” we perform high-level formatting.

Low-level format: Places the numbered sectors on the drive. Rewrites each one to ensure that all sectors can be read and written

20
Q

Two error detection

A

Parity and Checksum

21
Q

Modern error detection

A
  1. Cyclic Redundancy Checks (CRCs):
    - Can detect a burts of errors. A series of all 0’s replacing the real data.
    - More sensitive to a change of order. Simple checksum won’t detect swaps
  2. Error Correcting Codes (ECC):
    - Can detect larger-scale errors.
    - Can correct smaller errors.
    - Used on RAMs and DVDs
22
Q

Difference of address variables and range of address

A

Address variable: tells where data resides. Typically a RAM address. Sometimes called a pointer variable. May also be an array index variable

Range of address: Indicates the size required for the address variable

23
Q

What is the difference between 1 GB of storage and 1 GiB of storage? What is the difference between 1 KB of storage and 1 Kb of storage?

A

1 GB (gigabyte) = 1,000,000,000 bytes (10⁹) → decimal-based.

1 GiB (gibibyte) = 1,073,741,824 bytes (2³⁰) → the “i” in GiB means it uses binary (a large power of 2).

1 KB (kilobyte) = 1,024 bytes (binary) or 1,000 bytes (decimal).

1 Kb (kilobit) = 1,000 bits (decimal).
👉 B = Byte (8 bits), b = bit.

24
Q

What is Moore’s law?

A

Predicted that computing power and efficiency will increase every 18 months

25
Modern features that FAT supports:
- longer, mixed-case file names - hierarchical directories - individual files sized up to 4GB
26
FAT Volume Layout
- All data is stored in special areas - Boot blocks: Contain bootstrap program on bootable drive. Containes details of the volume format - FAT (File Allocation Table): Locates free clusters and clusters in files - Root directory: top-level directory - Cluster storage: contains all other clusters on the drive
27
FAT directories entry contains the following:
1. File name, or special character if empty 2. Attributes of this directory entry 3. Date and time created, last read, modified 4. Address variable pointing to first cluster 5. Total number of data bytes in the file
28
How are long file names created:
Constructed from a series of old-format directory entries, each holding 11 bytes of the file name
29
FAT file deletion
For file: Locate the file's directory entry: Mark it as empty, if the file has a long file name, mark those entries as empty too For cluster in file For each cluster in the file: Retrieve the cluster's FAT entry. Change the entry to show the cluster is free. If there is another cluster in the file, continue Use the same steps to delete empty directories
30
Sometimes we can retrieve the file's data if:
1. The file's clusters were all stored in sequence on the hard drive 2. Another file hasn't overwritten its clusters
31
Describe how to recover a deleted FAT file and its contents.
- Find the directory entry - Extract the first cluster number and length - Retrieve the series of clusters
32
Summarize shortcomings of the FAT file system compared to other modern file systems.
- File sizes limited to 4GB - Smaller FAT systems (FAT 12, FAT 16) can't recover if errors strike the root directory - Simple directory structure slows down searches of really large directories - FAT files can't identify a file's owner - FAT files can't support access restrictions beyond very simple ones
33
Three major file systems used today:
- Apple's Hierarchical File System Plus (HFS+) - Microsoft's NFT File System (NFTS) - Unix File System (UFS)
34
Three design challenges of file systems / three major hard drive storage problems addressed by file systems
1. How to store files 2. How to find files 3. How to manage the drive’s free space
35
Conflicting Design Objectives
1. Make the system as simple as possible. Simpler systems are easier to test and verify 2. Make every action as fast as possible 3. Random access must be efficient 4. The system must work effectively with state of the art hard drives 5. The system should be robust so that unexpected system or hardware failures will not lose data or make the system unstable
36
Summarize the three strategies by which the operating system provides input/output services and a file system.
1. Applicaion Programming Interface: A simple, standard way for programs to use I/O devices and files 2. Device Independence: Converts API operation sinto specific commands for individual devices 3. File System: Converts file operations into API operations performed on the hard drive
37
A typical I/O operation in 4 parts:
* Part A: Call the Operating System - A program uses the API to read several bytes of data from a file * Part B: OS constructs the I/O Operation - The file system converts the program's 1/0 request into a disk drive operation * Part C: The driver starts the 1/0 device - The hardware does its work * Part D: The 1/0 operation ends - The system signals that all is finished
38
I/O Device Restrictions
- Drive controllers often rely on storage registers visible in RAM or via 1/0 instructions - Only privileged programs can use them
39
Parameter restrictions on I/0 operations
- Process A can't do I/O to Process B's RAM - Process A can only retrieve sectors from files it has the right to access - Process A must have access rights to files it tries to read or modify
40
To estimate the size of the address variable, we:
- Divide the number of digital digits by 3 - Multiply the result by 10 to estimate the number of bits
41
There are two simple and relatively obvious ways to hide data in a system using partitions:
1. Invisible partition 2. Undersized file system
42
The inode also contains a file’s attributes. These include:
• Type of file • Identity of the file’s owner • Associated group identifier • File permission flags • Access dates