CYBR 4305 - Chapter 13

Ace your homework & exams now with Quizwiz!

nested search,

search within a search once all of the data that contains the name "Donna Smith" is located, the examiner can conduct an additional keyword search (e.g., "murder for hire") within that data,

partitions,

similar to storage bins in the real world.

hard drive

simply a data storage device for storing and retrieving data

Data reduction and filtering

After recovering the data during the examination phase, the next step is data reduction and filtering which occurs during the analysis phase Filtering may involve removing duplicate files, searching for keywords, or grouping data based on file types a hash value is a number generated by an algorithm to substantiate the integrity of digital evidence a hash value may also be used to identify unique or duplicate files. A hash value can be created for every file, and is a unique number similar to a digital fingerprint. Hash values may also be compared to datasets that contain known hash values for specific files, such as illicit materials (e.g., child pornography), steganography, or proprietary software The ultimate goal of data reduction and filtering is creating the smallest dataset with the highest potential of containing relevant digital evidence The final result of the examination/analysis phase is a reconstruction of the digital crime scene, so any disregarded evidence could significantly impact the findings of an investigation

the two most commonly used digital forensic tools

EnCase and FTK

bridges,

Hardware write blockers digital evidence is connected to the examiner's computer through the write blocker

drive slack

If there is any unused space between the start of the next sector and the end of the cluster, the operating system uses this space could contain fragments of deleted word-processing documents or old emails

Data analysis

The analysis phase of the investigation refers to the interpretation and reconstruction of the digital crime scene not an easy task due to the large amounts of data uncovered during a digital forensic investigation With so much data, one of the most important steps in the analysis phase of the digital forensic investigation is the filtering and reduction of evidence

Reporting of findings

The final stage in the digital forensic investigation is the report/presentation phase report/presentation stage the findings determined to be relevant to the investigation are finalized in a report Only relevant evidence should be included in the final report, rather than hypothetical or theoretical evidence this report should reflect complete transparency, meaning each step is described in detail so as to leave no mystery in the digital forensics process the digital forensic technicians should be prepared to testify in court Along with transparency, the digital forensic examiner should remain objective when drawing conclusions from the digital evidence

wiping

The process of cleaning a digital storage device to ensure that there are no remnants of data present is known as

hashing

The process of creating a hash value from a variable amount of data

de-NISTing.

The process of filtering the dataset and removing non-user-created files (e.g., operating system, program files) is sometimes referred to as comes from the fact that the known hash values for these noise files are maintained and published by NIST's NSRL

slack space

Therefore, this leftover space between the end of the file and the end of the last storage unit for that file is known the leftover area not used between the current allocated file and the end of the last cluster in which the file is stored can be a rich source of information because this leftover space does not remain unused The computer's operating system wants to use all available space in a cluster, so it will either write random bits of data (known as padding) or store whatever bits of old data remain in the unused sectors.

blind

This independent forensic examiner should also be completely unaware to the conclusions reached by the initial examine

write blocker

To ensure that no changes are made to the original data source a device that allows read-only access to all accessible data on a drive, as well as preventing anything from being written to the original drive, which would alter or modify the original evidence sending read-only commands to the drive, and not write or modify commands

EnCase

a digital forensics tool created by Guidance Software in 1997 capable of acquiring data from a variety of digital devices, including smart phones, hard drives, and removable media can image the drive, without altering its contents, and then verify that the image is an exact copy of the original drive capable of searching the unallocated space locating hidden data and deleted files the first court case specifically addressing the validity of EnCase was State (Ohio) vs. Cook has been involved in a number of high-profile cases

deleted file

a file whose entry has been removed from the computer's file system so that this space is now marked as usable again.

partition table

a reference description for how the operating system has divided the hard drive into partitions contain important information, such as the sizes and locations of the partitions and the file systems operating within each of these partitions on the hard drive can reveal to a digital forensics examiner whether or not space on the hard drive is hidden or contains leftover data from prior partitioning.

hash algorithm

a set of calculations that takes any amount of data (input) and creates a fixed-length value - hash,- acts as a unique reference number for the original data Hash values are fixed in length and made up of a unique combination of hexadecimal digits act as digital fingerprints since they are unique to the original data they reference play an integral part in the verification of digital evidence because they are extremely sensitive to any changes in the original data

authentic,

a true and unaltered copy of the original data source

MD5 (Message Digest Version 5)

a type of hashing algorithm that takes a large amount of data of arbitrary length (input) and calculates a unique "fingerprint" of this data (known as hashing) expressed as a unique combination of digits and letters of a specified length (output) produces a 128-bit hash value represented in text as a unique string of 32 digits and letters

File extensions

an individual attempting to hide a file may try to alter the file extension that part of the file's name that tells the operating system what program to use when you want to open it

Forensic Toolkit® (FTK®)

another commercial software application commonly used in digital forensic investigations, and was created by Access-Data founded in 1987 are more than 130,000 FTK users in law enforcement, government, and industry worldwide standard computer forensics tool used by the United States Federal Bureau of Investigation (FBI) capable of imaging a hard drive, scanning slack space, and identifying steganography; however, it is also capable of cracking passwords and decrypting files data visualization tool Explicit Image Detection (EID) The first court case to establish the validity of Forensic Toolkit was the civil lawsuit Gutman vs. Klein

One easy way to conceal or hide a file is

change the file extension so that the operating system will use the wrong program to open the file, resulting in an error File headers may be identified and compared to the file extensions using basic digital forensic tools.

magic numbers,

common file signatures,

National Software Reference Library (NSRL)

datasets designed to exclude "known to be good" hash value supported by the DHS and NIST

I/O error log

input/output errors, and these errors are often the result of a bad sector on the hard drive If the imaging tool maintains an error log identifying the bad sectors, it will be possible for the examiner to verify that the original and duplicate copy are in fact the same despite the mismatching hash values important for the imaging tool to document the examination process

free space

portion of the hard drive that has yet to be assigned to a partition any non-partitioned space on the hard drive

incriminating

potential evidence exonerating a suspect may be overlooked or evidence may be labeled as

partition recovery

process of evaluating the partition table and the unused space on the physical drive Evaluating the partition tables is considered a physical extraction method because all partition tables conform to a standard layout regardless of the operating system a hard drive is installed in a computer, it must be partitioned before it can be used

fragmented

A file that is stored in non-consecutive sectors is considered to be

Random Access Memory (RAM)

"working memory" because it stores that part of the data which is currently being used by the computer considered volatile in nature, meaning the data disappears when the computer is powered off When randomly selected data from RAM is stored in the file slack, it is known as RAM slack it is possible for RAM slack to contain important information, such as network login names and passwords.

To ensure reliability, NIST established specific criteria, as recommendations, for imaging tools used in digital investigations:

1. the tool shall make a bit-stream duplicate or an image of an original disk or partition, 2. the tool shall not alter the original disk, 3. the tool shall be able to verify the integrity of a disk image file, 4. the tool shall log I/O errors, and 5. the tool's documentation shall be correct

collision

In the hashing world, when two different sets of data (input) result in the same hash value (output), occurs when hashing a hard drive does not result in a unique "digi-tal fingerprint," but instead the same hash value is produced (e.g. X-copy and Y-copy have the same hash value). the digital forensics examiner is unable to verify and authenticate the imaged drive Research suggests that it is theoretically possible for a collision to occur with MD5 and SHA-1

the two most common hash algorithms are

MD5 and SHA

access key,

Most encryption programs require a password that unlocks the file so that the same algorithm that encrypted the information is now used to decrypt it the same algorithm used to encrypt the illegible message (ciphertext) now decrypts it back into the original legible message (plaintext).

Computer Forensic Tool Testing project (CFTT).

NIST, an agency of the United States Department of Commerce, launched the 150 different digital forensic tools currently being used by law enforcement worldwide provide unbiased, open, and objective means for manufacturers, law enforcement, and the legal community to assess the validity of tools used in computer forensics test results must be repeatable and reproducible

steganography medium,

Once the carrier medium has the secret message embedded, it becomes the only those individuals with the appropriate knowledge and software can reveal the secret message hidden within the carrier

examination/analysis stage.

Once the digital drive is imaged and verified, the digital forensic investigation moves into the concerned with the recovery or extraction of digital data

Active files

existing files that are currently available on a hard drive, meaning they have not been deleted

Data recovery

extraction the process of salvaging digital information two types of extraction: physical and logical

Hidden files

files that have been manipulated in such a way as to conceal the contents of the original file

physical extraction

identifies and recovers data across the entire physical drive regardless of the file systems present on the drive pulls all of the digital data from a computer hard drive but does not take into account how the data was stored on the drive three methods of physical extraction: keyword searching, file carving, and extraction of the partition table and unused space on the physical drive.

Password-protected files

locked files that require a password to gain access, which prevents other people from opening or modifying these files specialized cracking dictionaries and software in order to circumvent the protection, such as Access-Data's Distributed Network Attack (DNA) and Password Recovery Toolkit time-consuming

Data preservation

make a copy of the original data files for examination in a way that minimizes the possibility of any changes being made to the original data files the first step toward uncovering digital evidence occurs during the collection/acquisition phase of the digital forensic investigation refers specifically to the ability to make a duplicate copy of the original digital evidence.

unallocated space

not written to

Secure Hash Algorithm

originally created by the National Security Agency in 1993 follows the same basic principles as MD5 an arbitrary amount of information can be uniquely represented by a combination of hexadecimal digits, resulting in a "digital fingerprint." the original SHA algorithm was revised to SHA-1 due to unspecified cryptographic flaws

forensic confirmation bias

summarize the class of effects through which an individual's preexisting beliefs, expectations, motives, and situational context influence the collection, perception, and interpretation of evidence during the course of a criminal case

header

the first few bytes that mark the beginning of a file,

NTFS (New Technology File System)

the later file system for the Windows NT operating systems ( offers better security, since it can restrict access to specific partitions or files on a hard drive, making it more difficult to recover files creates a Master File Table (MFT), which contains information about all of the files and folders on a drive The MFT can provide valuable information to a forensic examiner, including file type, size, and the data/time of creation and modification

file carving

the "process of searching for a certain file signature and attempting to extract the associated data" without regard for the file systems extracting pieces of information from a larger dataset without taking into consideration how the files were stored on the computer a great method for recovering files when the file allocation table is corrupt or a file has been deleted because in both cases there will no longer be an entry in the directory for that file's location the digital forensics examiner will first identify a particular header of interest (e.g., FF D8 FF E0) and then locate the footer By extracting the information in the middle, the examiner is essentially carving out a block of data

keyword search

the digital forensic examiner is able to look for a word or series of words (i.e., a phrase) in the entire physical drive regardless of the file systems.

forensically sound,

the digital forensics tool must eliminate the possibility of making any changes to the original data source

Verification

the final step in the preservation process of digital evidence.. establishes the integrity of the digital evidence by proving that the duplicate is authentic hash algorithm values a hash value is created for the original drive and its image. If the hash values match, the investigator has verified that the original and duplicate copies are one and the same during the imaging process any changes occur to the original drive, the hash values will be different, indicating that the image is not an exact copy of the original drive

Imaging

the initial step in the preservation process of digital evidence process of making an exact copy (bit-by-bit) of the original drive onto a new digital storage device

footer

the last few bytes that mark the end of the file

steganography

the practice of hiding information in such a way that others are not aware that a hidden message exists different from encryption because the goal of steganography is secrecy rather than privacy The primary purpose of steganography is to hide a secret message within a transport medium such as an image or video file may be used to conceal a variety of criminal activities

partitioning

the process of dividing up the hard drive into separate storage spaces, known as partitions, is referred to as

logical extraction

the process of identifying and recovering data based on the file systems present on the computer hard drive

Encryption

the process of transforming information (plaintext) so that it is no longer legible (ciphertext) by using a mathematical algorithm

sector

the smallest physical storage unit on a computer disk drive and is almost always 512 bytes Data files are assigned to the different sectors by the file system the smallest physical storage unit on a computer disk drive

Confirmation bias

the tendency to accept information that confirms our beliefs while rejecting information that contradicts those beliefs

FAT32 (File Allocation Table)

the type of file system used in older versions of Windows operating systems (e.g., Windows 98, Windows ME), identifies where on the hard drive a particular file is stored, or which clusters have been allocated to that file manages the space on a hard drive more efficiently by using smaller cluster sizes, which reduces slack space

Unallocated space

the unused portion of the hard drive that the operating system can write t that part of the hard drive which is not currently storing any files, but unallocated space is not empty per se

File systems

the way in which data is organized and retrieved on a computer drive, and each piece of data is called a file

Logical extraction

to the process of identifying and recovering data based on the file systems present on the computer hard drive takes into consideration the operating system (e.g., Windows XP) and file systems (e.g., NTFS) installed on the drive data may be retrieved from a variety of sources, such as active files, deleted files, file slack, and unallocated file space may recover digital evidence from hidden files, password-protected files, encrypted files, and steganography

carrier

transport medium

cluster

two or more consecutive sectors. It is the job of the computer's file system to allocate space The space allocated to these clusters is fixed in length depending on the operating system, but the files saved to these clusters rarely equal the same size of the allocated space

file signature

used to identify the content of a file, which in this case describes common file headers may be used to locate and salvage deleted files

repeatability

where independent test results are obtained with the same method, on identical test items, in the same laboratory, by the same operator, using the same equipment within short intervals of time the digital forensics tool replicates the same results when using the exact same methodology

reproducibility

where test results are obtained with the same method on identical test items in different laboratories with different operators using different equipment the digital forensic tool produces the same results even in a different testing environment.


Related study sets

Nursing Care Delivery Models & Staffing (6Q)

View Set

Module 10 Computer Concepts Exam

View Set

Psych Exam 1, ABNORMAL PSYCH CH 1

View Set

Computer Concepts Module One: Impact of Digital Literacy

View Set

Big ideas math geometry- Chapter 9 vocab

View Set