Week 2 - Digital Forensics Process Flashcards

(27 cards)

1
Q

What are the 8 main steps in the digital forensics process (plus Step 0)?

A

0: Secure Scene & Preparation
1: Identification
2: Preservation
3: Collection
4: Examination
5: Analysis
6: Interpretation
7: Documentation
8: Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three key roles at a crime scene?

A

Investigator in Charge: Coordinates and controls contamination.
Evidence Custodian: Handles seized items.
Log Officer: Maintains the entry log.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to prepare before attending crime scene?

A

Computer tool kit ready
Forensic paraphernalia (e.g. for live acquisition of RAM, for triage, i.e., evidence collection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does step 0 consist of? (secure the scene and prep)

A

Secure the whole scene
Minimise people (only auhtorised)
Use protection e.g. gloves, foot protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Purpose of Step 1 (Identification)

A

Recognise and pinpoint potential digital evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does step 1 consist of?

A

Initial briefing - understand nature of crime
Scope definition
Device and media recognition
Prioritisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is meant by scope definition in step 1?

A

It establishes legal boundaries (e.g., RIPA 2000, CMA 1990) to ensure the search is authorized and targeted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Purpose of Step 2 (preservation)

A

protect integrity, prevent alteration (isolate first, analyse later)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tasks done in step 2

A

Imaging - capture volatile data (RAM)
Environmental logging - document scene (photos, cables, serial numbers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Isolation techniques used

A

Faraday bag - blocks wireless signals (Wi-Fi, Bluetooth, Cellular) to prevent a mobile device from being remotely wiped

Remove SIM card

Disconnect physical network connections

Disable wireless communications - airplane mode

Network isolation tools - firewalls, VPNs

Avoid user interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Power off policy

A

Keep it on - active encryption, volatile data needed, malware active
Keep it off - no encryption, volatile not required, risk of wipe/alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the first priority when handling Volatile Data?

A

Capture a RAM dump using trusted acquisition tools before the data is lost when power is removed. Save to external media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Purpose of step 3 (collection)

A

Gather evidence forensically soundly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Difference between physical and logical collection?

A

Physical: Seizing the hardware (PC, phone).

Logical: Collecting specific files, logs, or cloud data with legal permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Chain of Custody?

A

A chronological paper trail that tracks the handling, transfer, and storage of evidence to ensure it hasn’t been tampered with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What must be documented in a Chain of Custody log?

A

Case/offence details
Victim/suspect
Date/time/location
Item description
Signatures of everyone who handled it.

17
Q

Purpose of step 4 (examination)

A

Methodically review/extract data

18
Q

Tasks carried our in step 4

A

Imaging - bit for bit copies (use write blocker)
Data recovery - deleted/hidden files, file carving
Keyword searches

19
Q

Purpose of Step 5 (Analysis)

A

derive context/meaning

20
Q

Tasks carried out in step 5

A

Timeline construction
Data correlation across sources
Pattern recognition

21
Q

Purpose of Step 6 (Interpretation)

A

Understand significance in case context

22
Q

Tasks carried out in step 6

A

Scenario formulation
Evidence relevance
Legal implications

23
Q

Purpose of Step 7 (documentation)

A

clear unambiguous records/reports

24
Q

Tasks carried out in step 7

A

Evidence logs
Activity reports
Findings summary

25
Purpose of Step 8 (presentation)
convey findings to stakeholders (court, law, enforcement, etc.)
26
Task carried out in Step 8
Visual aids (chart, timelines( Oral delivery
27
What can be challenged in court?
Evidence - reliability, authenticity, legally obtained Process - handling/chain of custody People - expert competence/ethics + personal integrity/credibility