*Refer to Table 5.1 for large number abbreviations.
R1. Explain the four general tasks that may play a role in recovering from a security incident.
R2. Describe the basic requirements evidence must meet to be used in a legal proceeding.
R3. List and explain the three general categories of legal systems used in the world. Give an example of each.
R4. List and describe four ways of resolving a security incident that could rise to the level of a legal dispute.
R5. Explain the concept of due diligence.
R6. Does an employer in the United States have an unconditional right to search employee desks or lockers on company premises? Why or why not? Is there a way by which the employer can legally perform such searches?
R7. Describe the three steps an investigator performs when collecting forensic evidence.
R8. Is it better to perform a clean “shutdown” or simply pull the plug when collecting a computer as evidence?
R9. Explain how an investigator can examine a hard drive and still convince a court that the examination is based on the information residing on the drive when the suspect last had possession of it.
R10. Draw a diagram showing the basic components of a hard drive and its controller.
R11. Explain the difference between “high-level” and “low-level” disk formatting. When we perform a “quick format,” what formatting do we perform?
R12. Describe two different ways of hiding data on a hard drive using partitions.
R13. What is the difference between 1 GB of storage and 1 GiB of storage? What is the difference between 1 KB of storage and 1 Kb of storage?
R14. Explain how to quickly convert a decimal number to a power of two by converting between decimal and binary exponents.
R15. What is Moore’s law?
R16. Describe how to recover a deleted FAT file and its contents.
R17. Summarize shortcomings of the FAT file system compared to other modern file systems.
R18. List the three major hard drive storage problems addressed by file systems.
R19. Outline major similarities and differences between FAT, NTFS, Unix, and HFS+ file systems.
R20. Identify which mobile device vendors use which file systems.
R21. Summarize the three strategies by which the operating system provides input/output services and a file system.
R22. Explain the relationship between device independence and device drivers.
R23. For each step in the example I/O operation described in Section 5.7.2, indicate which layer from Figure 5.18 performs the step.
R24. Indicate which layers from Figure 5.18 enforce which security measures in the I/O and file systems.
E1. Find the detailed technical specifications for a commercial hard drive. The specifications will identify a precise minimum or total amount of storage provided on the hard drive. Using this information, report the following:
The hard drive’s advertised size in bytes
The exact, or minimum, number of bytes of storage actually provided by the hard drive
The number of bytes of the power of two, or small multiple of a power of two, that is closest to the hard drive’s advertised size
E2. Search the internet for a description of a court action whose decision affected how computer equipment and information may be used as evidence. Describe the legal problem and the court’s decision.
E3. Unix has a mechanism called a hard link by which it creates additional directory entries that all point to the same file. This is easy to manage because most information resides in the file’s inode, including a count of the number of links. Bob is trying to create a hard link to a file in a FAT directory by duplicating the file’s existing directory entry and giving it a new name. How well will existing file read, write, and delete operations work?
Which operations work correctly if a FAT file has two directory entries?
What operations won’t work correctly? How do those operations fail to work correctly?
The following questions involve a forensic examination of a FAT file system. Find a “dump” utility and use it to examine the contents of a FAT file system. First, find an unused removable device, like a USB flash drive. Reformat it. Use online descriptions of the FAT format to locate the FAT and the file directories using the dump utility. Perform these exercises, print the results using the dump utility. Use a marker to highlight the results.
E4. Create a text file. Locate the file’s directory entry and print it out. Locate the first cluster in the file and print it out.
E5. Create a subdirectory and place two text files in it. Locate the subdirectory you created. Print out the subdirectory.
E6. Delete a file. Locate the file’s directory entry and print it out.
E7. TABLE 5.5 contains the partition table from the MBR for the volume in Figure 5.9. The following is a list of sectors stored in different partitions. For each sector and partition, calculate the absolute address of the sector. (Hint: Use a spreadsheet.)
Partition 0, sector 1
Partition 0, sector 8184
Partition 1, sector 2040
Partition 1, sector 10,000
Partition 2, sector 1
Partition 2, sector 4088
TABLE 5.5 Partition Table for the Drive in Figure 5.9 |
---|
The following questions involve TABLE 5.6, which contains part of a file allocation table. The “Cluster” column contains cluster numbers; the “Pointer” column contains the corresponding FAT entry.
TABLE 5.6 Part of a File Allocation Table |
---|
The FAT entry contains one of the following: 0 to indicate a free cluster, 9999 to indicate the end of file, and any value in between indicates the next cluster in the file. The following directory entries apply to these FAT entries:
■ Name: F1, Starting Cluster: 100
■ Name: F2, Starting Cluster: 106
■ Name: F3, Starting Cluster: 120
■ Name: F4, Starting Cluster: 126
E8. For each file named in the directory entries, give the number of clusters in the file.
E9. We want to read individual bytes from these files. Clusters on this volume contain 4096 bytes each. For each of the following file names and byte offsets, identify the cluster that contains that byte.
File F1, offset 1000
File F2, offset 10,000
File F2, offset 20,000
File F3, offset 1000
File F4, offset 10,000
File F4, offset 20,000
E10. We are writing additional data to file F1 and need to add another cluster to the end of the file. Locate a cluster in the FAT to add to the file. List the specific changes to make to the FAT to add the sector to F1.
E11. As in Exercise E10, we are writing data to file F2 and must add another cluster. List the specific changes to make to the FAT to add the cluster.
E12. We are deleting File F3. List the specific changes made to the FAT to delete F3.
E13. The engineering manager has decreed that we must discard the FAT and describe the disk contents in terms of extents. Use the FAT and file entries as they appear in Table 5.6.
List the clusters in files F1 and F2 using extents.
List the clusters in files F3 and F4 using extents.
List all free clusters appearing in Table 5.6 using extents.
The following exercises ask about files of yours that you have not used in a while and that you may safely modify. You should use “About” and “Info” commands, and look at folder or directory listings to collect this information. Depending on the file system, you may be able to retrieve a creation date, reference date, and modification date.
E14. Answer the following questions about a file stored on your computer’s main hard drive: the hard drive that contains your operating system.
What type of device is this: hard drive, solid state, removable, flash?
What file system does the drive use? If FAT, try to determine if it is FAT 12, FAT 16, or FAT 32.
Get information about the file: What dates can you retrieve and what do the dates say?
Open the file with an editor or other program. Look at the file but do not change it. Close the file. Now, collect information about the file and report which dates, if any, have changed.
Open the file again and make a minor, nondamaging change to it (e.g., rotate an image left, then right). Save the file without changing the name. Now, collect the information about the file and report which dates, if any, have changed.
E15. Answer these questions about a file of yours stored on a removable drive or USB flash memory.
What type of device is this: hard drive, solid state, flash?
What file system does the drive use? If FAT, try to determine if it is FAT 12, FAT 16, or FAT 32.
Get information about the file: What dates can you retrieve and what do the dates say?
Open the file with an editor or other program. Look at the file but do not change it. Close the file. Now, collect information about the file and report which dates, if any, have changed.
Open the file again and make a minor, nondamaging change to it (e.g., rotate an image). Save the file without changing the name. Now, collect the information about the file and report which dates, if any, have changed.
E16. Find a discarded hard drive to disassemble. As you disassemble it, keep a list of every part removed or cut. Remove the cover to display the drive mechanism. Identify the major parts.