CF2019
CF2019
67110 Page 1 of 2
Q. 2 Attempt the following (Any THREE) (15)
(a) Define Data Acquisition. State its types and goals
What guidelines an investigator has to keep in mind while seizing digital evidence at
(b)
the scene?
List standard systems analysis steps to be applied when preparing a for forensic
(c)
investigation case
(d) What is the standard procedure used for network forensics?
(e) State and explain various sub functions of extractions
(f) What is an Investigation triad? State and Explain its parts
*******************************************
67110 Page 2 of 2
Q. 1 Attempt ~ 1 (Each
1 of 5Marks)
(a) Multiple Choice Questions
i) b. RegMon
ii) b. hash values
iii) b. silver platter
iv) a. client/server architecture
v) a. technical/ scientific
v) A technique for sending requests through a set of intermediate end points is called
onion routing.
Since this process wraps your message under layers of encryption which have to
be peeled off at each different hop just like an onion that's why its called an onion
router.(TOR)
(b) With proper search warrants, law enforcement can seize all computing
systems and peripherals.
Depending on company policies, corporate investigators rarely have the
authority to seize all computers and peripherals.
When seizing computer evidence in criminal investigations, follow the U.S.
DO] standards for seizing digital data.
For civil investigations, follow the same rules of evidence as for criminal
.investigation.
(4
When preparing a case, you can apply standard systems analysis steps, explained
in the following list, to problem solving.
Make an initial assessment about the type of case you're investigating
Determine a preliminary design or approach to the.case
Create a detailed checklist
Determine the resources you need
Obtain and copy an evidence drive
Identify the risks
Mitigate or mir.Lz-iZe &2 risks.
Test the design
Analyze and recover the 'digital evidence
Investigate the data you recover
Complete the case report
Critique the case
(e) The extraction function is the recovery task in a computing investigation and
is the most challenging of ali tasks to master.
Recovering data is the first step in analysing an investigation's data.
The following sub-functions of extraction are 'used in investigations:
Dataviewing
Keyword searching
Decompressing
Carving
Decrypting
Bookmarking
(f) Investigators often work as a team to make computers and networks secure in an
organization.
The computer investigations function is one of three in ,a triad that makes up
computing security. In a i enterprise
~ network environment, the triad consists of
the following parts
Vulnerability assessment and risk management
Network intrusion detection and incident response
Computer investigations
lnt~slcnResponse
To differentiate the training and experience officers have, CTIN has established
three levels of law enforcement expertise:
Level 1- Acquiring and seizing digital evidence, normally performed by a
police officer on the scene.
Level 2- Managing high-tech investigations, teaching investigators what to ask
for, and understanding computer terminology and what can and can't be
retrieved from digital evidence. The assigned detectives usually handle the
case.
Level 3- Specialist training in retrieving digital evidence, normally conducted
by a data recovery or computer forensics expert, network forensics expert, or
Internet fraud investigator. This person might also be qualified to manage a
case, depending on his or her background.
In a criminal or public case, if we have enough information to support a search
warrant, the prosecuting attorney might direct to submit an affidavit.
We must then have theaffidavit notarized under sworn oath to verlfy that the
information in the affidavit is true.
After a judge approves and signs a search warrant, it's ready to be executed,
meaning we can collect evidence as defined by the warrant.
After we collect the evidence, we process and analyse it to determine whether
a crime actually occurred. The evidence can then be presented in court in a
hearing or trial.
(b) Following are steps to create image files:
1. Copy all image files to a large drive.
2. Start your forensics tool to analyse the evidence.
3. Run an MD5 or SHA-1 hashing algorithm-onthe image files to get a digital
hash.
4. When we finish copying image files to a larger drive, secure the original
media in an evidence locker. Don't work with the original media; it should
be stored in a locker that has an et.idence custody form. Be sure to fill out
the form and date it.
(d) The typical order of trial proceedings, whether civil or criminal, is as follows:
Motion in limine
Empaneling the jury
Opening statements
Plaintiff
Defendant
Rebuttal
Closing arguments
Jury instructions
(b) The following sections explore some options for command-line and GUI tools in
both Windows and UNIX/Linux:
Command-Line Forensics Tools:-
UNXX/Linux Forensics Tools:-
SMART:
Helix:
BackTrack:
Autopsy and Sleuth Kit:
Knoppix-STD:
Other GUI Forensics Tools:-
* Privacy controls allow social media users to control who can see their content.
(c)
These can be simple settings that toggle an account between public and
restricted to an appl.oved group, or they can be sophisticated that give users
control over every person who can see each individual.post.
While privacy controls are important for users, especially when they are
sharing sensitive personal information, people often do not fully understand
how public their data is nor how to use all the controls at their disposal.