4.5 Digital Forensics
Digital Forensics
Collecting and protecting information relating to an intrusion
RFC 3227 - Guidelines for Evidence Collection and Archiving
Legal hold - legal technique to preserve relevant information
Admissibility - the determination of whether evidence will be allowed at trial
Chain of custody - controlling the evidence, maintaining the integrity, everyone who contacts the evidence
Forensics Data Acquisition
Volatility - duration that a data will remain. frequency at which data changes or is modified over time - most volatile (which loses its state or changes rapidly, such as data in RAM) - least volatile (like data on hard drives or archived storage)

RAM, swap/pagefile, cache, network, artifacts
Managing Evidence
Integrity - hashing - checksum
Provenance = documentation of authenticity, chain of custody for data handling - block chain technology can be used for detailed tracking
E-discovery = collect, prepare, review, interpret, and produce electronic document
Data recovery = extract missing data without altering the integrity
Non-repudiation = proof of data integrity and the origin of the data - MAC (message authentication code) provides non-repudiation - digital signature provides non-repudiation
Strategic intelligence = focusing on key threat activities for a domain
Strategic counterintelligence (CI) = we identify someone performing intelligence on us, and disrupt their operations, then we start to perform intelligence, gather threat intelligence on them
Last updated
Was this helpful?