Untitled Document
Untitled Document
1. Prepare the Acquisition System: Ensure the system used for acquisition is secure
and has necessary tools installed.
2. Connect to the Target System: Use secure protocols (e.g., SSH, FTK Imager) to
connect to the target system.
3. Create a Forensic Image: Use imaging tools to capture a bit-by-bit copy of the
target's storage.
4. Verification: Calculate and compare hash values (e.g., MD5, SHA-256) to verify
the integrity of the image.
5. Documentation: Record all steps, tools used, and hash values for documentation.
Q2.
Lifecycle:
Q3.
a) Describe Steps to prevent cybercrime and explain Hackers, Crackers, and Phreakers
Steps to Prevent Cybercrime:
Definitions:
Q4.
Forensic Formats:
1. E01 Format: Use tools like FTK Imager to create E01 images, which include
metadata and hash values.
2. AFF Format: Use afflib-tools to create AFF images, providing compression
and encryption options.
Q5.
1. NTFS (New Technology File System): Used by Windows, supports large files, and
includes security features.
2. FAT32 (File Allocation Table): Older file system with wide compatibility but limited
to 4GB file sizes.
3. EXT4 (Fourth Extended File System): Used by Linux, supports large files and
journaling.
4. HFS+ (Hierarchical File System Plus): Used by macOS, supports large files and
efficient storage management.
1. Packet Sniffing: Using tools like Wireshark to capture and analyze network traffic.
2. Log Analysis: Reviewing logs from firewalls, routers, and servers to identify
suspicious activity.
3. Network Forensic Appliances: Deploying devices that continuously monitor and
capture network traffic for forensic analysis.
Q6.
Types of Investigation:
Module 1
1. Define Cybercrimes
Cybercrimes are criminal activities that involve the use of computers and networks,
particularly the internet. They can include hacking, identity theft, cyberstalking,
cyberbullying, and the distribution of illegal digital content.
● Use Strong Passwords: Create complex passwords and change them regularly.
● Enable Multi-Factor Authentication: Add an extra layer of security.
● Update Software Regularly: Ensure all systems and applications are up to date.
● Install Security Software: Use antivirus, anti-malware, and firewalls.
● Educate Users: Train employees on security best practices.
Module 2
15. What is digital forensic? Explain the life cycle of digital forensic.
Digital Forensics is the process of identifying, preserving, analyzing, and presenting
digital evidence in a manner that is legally admissible.
Life Cycle:
1. Preservation: Ensuring that the digital evidence remains unchanged and intact.
2. Identification: Detecting and documenting potential digital evidence.
3. Extraction: Retrieving relevant data from various digital sources.
4. Analysis: Interpreting the extracted data to draw meaningful conclusions.
5. Documentation: Keeping detailed records of all forensic processes.
6. Presentation: Presenting findings in a manner that is understandable and legally
acceptable.
Module 3
20. Explain windows file system FAT32 and NTFS in detail.
● FAT32 (File Allocation Table): An older file system with wide compatibility but
limited to 4GB file sizes and lacking modern security features.
● NTFS (New Technology File System): A modern file system used by Windows
that supports large files, file compression, encryption, and detailed permissions.
22. Explain memory forensic? What are the steps to follow to create a RAM memory
image.
Memory Forensic: The process of analyzing volatile data stored in RAM to uncover
malicious activity.
Steps to Create RAM Memory Image:
23. What are the various tasks performed by computer forensic tools.
Module 4
4. Define Investigation.
Investigation involves the systematic collection, analysis, and interpretation of evidence
to understand the nature, cause, and impact of a security incident, and to identify those
responsible.
5. Define Remediation.
Remediation encompasses the steps taken to eliminate the root cause of a security
incident, restore affected systems and data to normal operation, and implement
measures to prevent recurrence.
6. Explain Forensic Duplicates as Admissible Evidence.
Forensic duplicates are exact copies of digital evidence created using specialized tools
and methods that ensure the integrity and authenticity of the data. These duplicates are
admissible in court as they are considered reliable and unaltered representations of the
original evidence.
Module 6