Explain the four general tasks that may place a role in recovering from a security incident.
A __________ has had defenses weakened and possibly no other damage
compromised system
Recovery from a compromise is ____________
remediation
Explain digital forensics:
The process of collecting and/or analyzing evidence from computers and other digital storage devices
Issues in evidence gathering:
List and explain the three general categories of legal systems used in the world. Give an example of each.
List and describe four ways of resolving a security incident that could arise to the level of a legal dispute
When can we use informal evidence, and when must evidence be legally admissible?
Private actions and Mediation - Informal evidence might be considered when resolving the complaint or dispute. Mediators might demand admissible evidence
Civil and criminal complaints - Only admissible evidence may be used in court proceedings
Explain the concept of due diligence
The notion that there are customary acts that parties take for safety and security.
Parties are less at fault if they show due diligence in their actions.
Describe the basic requirements evidence must meet to be used in a legal proceeding.
Must yield admissible evidence
Describe the three steps an investigator performs when collecting forensic evidence.
Securing the Scene – Securing the scene means restricting access by removing unauthorized individuals to preserve the integrity of the evidence.
Documenting the Scene – Documenting the scene involves recording detailed information, descriptions, and photographs of the location and evidence as they are found.
Collecting the Evidence – Collecting evidence is the careful process of gathering, preserving, and labeling items for further analysis and investigation.
Digital evidence procedures
Is it better to perform a clean “shutdown” or simply pull the plug when collecting a computer as evidence?
As noted, the best strategy in most cases is to simply unplug a running computer. The shutdown operation in many operating systems may wipe out evidence that a forensics investigation could otherwise recover. In particular, Microsoft Windows is likely to save more information if we simply “pull the plug” than if we perform a clean “shutdown.”
Forensic hard drive analysis
Two elements of storing data on a hard drive
Two ways to handle magnetic data:
Basic components of a hard drive:
Arm
Disk head motor
Platter spindle (motor underneath)
Read/write head
Two platters
Drive size has followed __________
Moore’s Law
Explain the difference between “high-level” and “low-level” disk formatting. When we perform a “quick format,” what formatting do we perform?
High-level format: Provides the structure to store files, directories, folders, and free space.
Upon doing a “quick format” we perform high-level formatting.
Low-level format: Places the numbered sectors on the drive. Rewrites each one to ensure that all sectors can be read and written
Two error detection
Parity and Checksum
Modern error detection
Difference of address variables and range of address
Address variable: tells where data resides. Typically a RAM address. Sometimes called a pointer variable. May also be an array index variable
Range of address: Indicates the size required for the address variable
What is the difference between 1 GB of storage and 1 GiB of storage? What is the difference between 1 KB of storage and 1 Kb of storage?
1 GB (gigabyte) = 1,000,000,000 bytes (10⁹) → decimal-based.
1 GiB (gibibyte) = 1,073,741,824 bytes (2³⁰) → the “i” in GiB means it uses binary (a large power of 2).
1 KB (kilobyte) = 1,024 bytes (binary) or 1,000 bytes (decimal).
1 Kb (kilobit) = 1,000 bits (decimal).
👉 B = Byte (8 bits), b = bit.
What is Moore’s law?
Predicted that computing power and efficiency will increase every 18 months