Page 297 - CISSO_Prep_ Guide
P. 297

•  A.k.a. Electronic data discovery.
                   •  Digital forensic science (DFS):
                          •  Media analysis (computer forensics) –
                              physical media.
                          •  Software analysis (software forensics)
                              – review software for malicious
                              signatures, the identity of the author.
                          •  Network analysis – network traffic &
                              logs
                   •  Rules of Evidence: electronic evidence is
                       fragile, and you must maintain the integrity
                       of the scene to ensure it is admissible in
                       court.
                   •  Chain of Custody = maintains the integrity of
                       reliability.
                   •  Hearsay rule – An out-of-court statement
                       offered as proof of an assertion.
                   •  Business records exemption: a record used
                       on the normal course of business can be
                       admitted.  Computer records may not be
                       hearsay if there was 1) no human
                       intervention; 2) system was operating
                       correctly; and, 3) you can prove no one
                       changed the data.
                   •  Forensic copies:
                          •  Bit-for-bit – includes hidden & residual
                              data.
                          •  Ensure integrity with the hash (e.g.,
                              MD5, SHA1).  Should use duplicate
                              hashes because there are weaknesses
   292   293   294   295   296   297   298   299   300   301   302