Digital Forensics & Log Data Flashcards

(17 cards)

1
Q

Digital Forensics

A

Digital forensics → process of identifying, collecting, preserving, analyzing, and reporting digital evidence in a way that maintains integrity and supports legal or investigative use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RFC 3227 Best Practices

A

Request for comments 3227 best practices → digital forensics guidelines that emphasize collecting volatile data first, minimizing system changes, documenting every action taken, preserving original evidence, and maintaining a clear chain of custody.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Legal Hold

A

Legal hold → formal directive that requires organizations to preserve relevant data and suspend deletion or modification when litigation or investigation is anticipated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ESI

A

Electronically stored information (ESI) → digital data such as emails, documents, databases, logs, and backups that can be used as evidence in investigations or legal proceedings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Chain of Custody

A

Chain of custody → documented record that tracks who collected, handled, transferred, and stored evidence to prove it was not altered or tampered with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Acquisition

A

Data acquisition → forensic collection of data from sources such as disks, memory, firmware, operating system files, virtual machines, and snapshots while preserving evidence integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Forensics Reporting

A

Data forensics reporting → creation of clear, factual documentation that explains how evidence was collected, analyzed, and interpreted so findings can be understood and defended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Preservation

A

Data preservation → process of protecting evidence from alteration or loss by using write blockers, secure storage, hashing, and controlled access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

E-discovery

A

Electronic discovery (e-discovery) → legal process of identifying, collecting, and producing electronically stored information for litigation or regulatory investigations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firewall Logs

A

Firewall logs → records of allowed and blocked network traffic that help identify unauthorized access attempts, scanning activity, or policy violations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Application Logs

A

Application logs → records generated by software applications that track errors, user actions, and system events relevant to troubleshooting and security analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Endpoint Logs

A

Endpoint logs → records generated by endpoint devices such as laptops and servers that capture authentication attempts, system activity, and security events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OS-Specific Security Logs

A

Operating system-specific security logs → logs maintained by the operating system that record authentication events, privilege changes, and system-level security actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IPS/IDS Logs

A

Intrusion prevention system and intrusion detection system logs → records of detected or blocked malicious activity that help identify attacks and validate security alerts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network Logs

A

Network logs → records of network activity such as connections, flows, and traffic patterns used to detect anomalies and trace attacker movement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Metadata

A

Metadata → data about data that provides context such as creation time, modification history, file owner, or location, often critical in forensic investigations.

17
Q

Email Metadata/Header

A

Email metadata and headers → routing and transmission details within an email that reveal sender, recipient, mail servers used, timestamps, and potential spoofing indicators.