CF Module II
CF Module II
Investigations
Module 2
Objectives
A. Evidence form
B. Antistatic bag
C. Approved Secure Container
D. Evidence tape
E. Evidence tape with initials written on
it
Which of these protects a
computer from accidental
electrical damage?
A. Chain of custody
B. Antistatic bag
C. Approved Secure Container
D. Evidence tape
E. Evidence tape with initials written on
it
Which of these is the best way to
ensure that nothing has been added
or removed from a floppy drive?
A. Forensic image
B. Antistatic bag
C. Approved Secure Container
D. Evidence tape
E. Evidence tape with initials written on
it
Procedures for Corporate High-Tech
Investigations
Procedures for Corporate High-
Tech Investigations
Steps (continued)
Place surveillance systems
Discreetly gather any additional evidence
Collect all log data from networks and e-mail
servers
Report regularly to management and
corporate attorneys
Review the investigation’s scope with
management and corporate attorneys
Interviews and Interrogations in
High-Tech Investigations
A. Attorney-client privilege
B. Media leaks
C. Industrial espionage
D. E-mail abuse
E. Internet abuse
Which type of investigation
would gain the most from proxy
server logs?
A. Attorney-client privilege
B. Media leaks
C. Industrial espionage
D. E-mail abuse
E. Internet abuse
Which of these should you avoid
using during attorney-client
privilege investigations?
A. Written communications
B. Telephone calls
C. Bit-stream images
D. Keywords
E. Hash signatures
Understanding Data Recovery Workstations
and Software
Understanding Data Recovery
Workstations and Software
Connects a hard
drive in trusted
read-only mode
There are also
Linux boot CDs
that mount all
drives read-only,
such as Helix
and some
Knoppix
distributions
write-blockers
Hardware Write-Blockers
Digital Intelligence Ultra-Kit
UltraBlock
FireFly
FireChief 800
USB Write Blocker
WiebeTECH Forensic DriveDock;
Guidance Software FastBloc;
Paralan’s SCSI Write Blockers;
Tableu UltraBlock,SAS Write Blocker
Setting Up your Computer for
Computer Forensics
Basic requirements
A workstation running Windows XP or Vista
A write-blocker device
Computer forensics acquisition tool
Like FTK Imager
Computer forensics analysis tool
Like FTK
Target drive to receive the source or suspect
disk data
Spare Parallel Advanced Technology
Attachment (PATA) or SATA ports
USB ports
Setting Up your Computer for
Computer Forensics (continued)
A. Write-blocker
B. Acquisition tool
C. Analysis tool
D. Target drive
E. Safe
Which process is used to create
a complete image of an
evidence disk?
A. Backup copy
B. Norton Ghost image
C. Microsoft System Image Backup
D. Bit-stream image
E. Disk Mirror RAID
Which tool ensures that the
evidence is not changed during the
creation of a bit-stream image?
A. Write-blocker
B. Acquisition tool
C. Analysis tool
D. Target drive
E. Safe