Understanding the Digital Forensics Profession and Investigations

studied byStudied by 3 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 79

80 Terms

1
White collar fraud
________ began when people in these industries saw a way to make money by manipulating computer data.
New cards
2
Digital images
________ are stored on hard disks, flash drives, removable hard drives, and the cloud and are circulated on the Internet.
New cards
3
Fourth Amendment
The ________ to the U.S. Constitution protects everyones right to be secure in their person, residence, and property from search and seizure.
New cards
4
private sector investigators job
A(n) ________ is to minimize risk to the company.
New cards
5
Forensics investigators
________ often work as part of a team to secure an organizations computers and networks.
New cards
6
Any documentation
________ written to the attorney must contain a header stating that its "Privileged Legal Communication- Confidential Work Product, "as defined under the attorney- work- product rule.
New cards
7
Examiners
________ must be familiar with recent court rulings on search and seizure in the electronic environment to avoid mistakes such as exceeding a search warrants authority.
New cards
8
Law enforcement
________ officers often find computers, smartphones, and other devices as theyre investigating crimes, gathering other evidence, or making arrests.
New cards
9
law enforcement agency
The ________ processes the report, and management decides to start an investigation or log the information into a police blotter, which provides a record of information about crimes that have been committed previously.
New cards
10
Forensic workstation
________ to copy and examine the evidence.
New cards
11
integrity check
This ________ covers the physical security of systems and the security of operating systems and applications.
New cards
12
Drug dealers
________, car theft rings, and other criminals often keep information about transactions on their computers, laptops, smartphones, and other devices.
New cards
13
ISO 27307
"Information technology- Security techniques, Guidelines for identification, collection, acquisition and preservation of digital evidence.”
New cards
14
criminal investigation
A(n) ________ generally begins when someone finds evidence of or witnesses an illegal act.
New cards
15
evidentiary artifacts
The method for locating ________ is to search for specific known data values.
New cards
16
Data values
________ can be unique words or non printable characters, such as hexadecimal codes.
New cards
17
former employees
Without defined policies, a business risks exposing itself to litigation from current or ________.
New cards
18
role of a digital forensics examiner
The ________ is to give management personnel complete and accurate information so that they can verify and correct abuse problems in an organization.
New cards
19
Executive management
________ should define a policy to avoid conflicts from competing interests in organizations.
New cards
20
Data Recovery
Involves retrieving information that was deleted by mistake or lost during a power surge or server crash.
New cards
21
Private sector computer crimes
________ can involve e- mail harassment; gender and age discrimination; white- collar crimes; such as falsification of data, embezzlement, and sabotage; and industrial espionage, which involves selling sensitive or confidential company information to a competitor.
New cards
22
intruder
If a(n) ________ launches an attack that causes damage or potential damage, this team collects the necessary evidence, which can be used for civil or criminal litigation against the ________ and to prevent future intrusions.
New cards
23
internal user
If a(n) ________ is engaged in illegal acts or policy violations, the network intrusion detection and incident response group might assist in locating the user.
New cards
24
acquisitions officer
The ________ gives you documentation of items the investigating officers collected with the computer, including a list of other storage media, such as removable disks and flash drives.
New cards
25
threat assessment specialist
The ________ (typically an attorney) whos familiar with federal and state laws and regulations related to ITAR or EAR and industrial espionage.
New cards
26
false allegations of misconduct
Competition for funding or management support can become so fierce that people might create ________ to prevent competing departments from delivering a proposal for the same source of funds.
New cards
27
Public sector investigations
________ involve government agencies responsible for criminal investigations and prosecution.
New cards
28
Data analysis
________ can be the most time- consuming task, even when you know exactly what to look for in the evidence.
New cards
29
external attack
When a(n) ________ is detected, the response team tracks, locates, and identifies the intrusion method and denies further access to the network.
New cards
30
Digital Forensic Science
The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting and possible expert presentation
New cards
31
International Organization for Standardization (ISO)
Standard for Digital Forensics
New cards
32
Federal Rules of Evidence (FRE)
Created to ensure consistency in federal proceedings
New cards
33
FBIs Computer Analysis and Response Team (CART)
Formed in 1984 to handle the increase in cases involving digital evidence
New cards
34
Digital Forensics
Used to investigate data that can be retrieved from a computers hard drive or other storage media
New cards
35
Data Recovery
Involves retrieving information that was deleted by mistake or lost during a power surge or server crash
New cards
36
Inculpatory Evidence
Evidence that shows, or tends to show, a persons involvement in an act, or evidence that can establish guilt
New cards
37
Exculpatory Evidence
Evidence that tends to clear the suspect
New cards
38
Penetration Testers
People who work in vulnerability/threat assessment and risk management group.
New cards
39
Xtree Gold
It recognized file types and retrieved lost or deleted files; a new tool that appeared in the mid 1980s
New cards
40
Mac SE
Produced by Apple in 1987; a Macintosh with an external EasyDrive hard disk with 60MB storage
New cards
41
International Association of Computer Investigative Specialists (IACIS)
Introduced training on software for digital forensics examinations, and the IRS created search warrant programs
New cards
42
ILook
Currently maintained by the IRS Criminal Investigation Division and limited to law enforcement, can analyze and read special files that are copies of a disk
New cards
43
AccessData Forensic Toolkit (FTK)
Has become a popular commercial product that performs similar tasks in the law enforcement and civilian markets
New cards
44
Computer Technology Investigators Network (CTIN)
Meets to discuss problems that digital forensics examiners encounter
New cards
45
Digital Evidence First Responder (DEFR)
Has the skill and training to arrive on an incident scene, assess the situation, and take precautions to acquire and preserve evidence
New cards
46
Digital Evidence Specialist (DES)
Has the skill to analyze the data and determine when another specialist should be called in to assist with the analysis
New cards
47
Due Process
Refers to fairness under the law and is meant to protect all
New cards
48
Warning Banner
Appears when a computer starts or connects to the company intranet, network, or virtual private network (VPN) and informs end users that the organization reserves the right to inspect computer systems and network traffic at will
New cards
49
End User
A person using a computer to perform routine tasks other than system administration
New cards
50
Abuse or misuse of digital assets
Often center on e-mail and Internet misuse by employees but could involve other digital resources
New cards
51
Internet abuse
Excessive viewing of contraband images;
New cards
52
Company Rules Violation
The misuse of rules
New cards
53
Chain of Custody
The route evidence takes from the time you find it until the case is closed or goes to court
New cards
54
Case number
The number your organization assigns when an investigation is initiated
New cards
55
Nature of case
A short description of the case
New cards
56
Vendor name
The name of the manufacturer of the computer component
New cards
57
Evidence recovered by
The name of the investigator who recovered the evidence
New cards
58
Interview
Conducted to collect information from a witness or suspect about specific facts related to an investigation
New cards
59
Interrogation
The process of trying to get a suspect to confess to a specific incident or crime
New cards
60
Forensic Workstation
A computer loaded with additional bays and forensics software
New cards
61
Bit-stream copy
A bit-by-bit copy or forensic copy of the original drive or storage medium and is an exact duplicate
New cards
62
Bit-stream image
The file containing the bit-stream copy of all data on a disk or disk partition
New cards
63
Vulnerability/threat assessment and risk management
  • This integrity check covers the physical security of systems and the security of operating systems and applications.

  • Their job is to poke holes in the network to help an organization be better prepared for a real attack.

New cards
64
Network intrusion detection and incident response.
This group detects intruder attacks by using automated tools and monitoring network firewall logs.
New cards
65
Digital investigations.
This group manages investigations and conducts forensics analysis of systems suspected of containing evidence related to an incident or a crime.
New cards
66
Expert Witness for Macintosh
No commercial GUI software for digital forensics was available until ASR Data created ______.
New cards
67
allegation
The witness or victim makes an _____ to the police, an accusation of fact that a crime has been committed.
New cards
68
police officer
A _______ interviews the complainant and writes a report about the crime.
New cards
69
police blotters
Criminals often repeat actions in their illegal activities, and these patterns can be discovered by examining _____.
New cards
70
affidavit
In a criminal or public-sector case, if the police officer or investigator has sufficient cause to support a search warrant, the prosecuting attorney might direct him or her to submit an ______.
New cards
71
verdict
A judge or an administrative law judge then renders a judgment, or a jury hands down a ______ (after which a judge can enter a judgment).
New cards
72
risk of litigation
One way that businesses can reduce the _____ is to publish and maintain policies that employees find easy to read and follow.
New cards
73
acceptable use policy
The most important policies are those defining rules for using the company’s computers and networks; this type of policy is commonly known as an “__________.”
New cards
74
line of authority
Published company policies also provide a ______ for conducting internal investigations; it states who has the legal right to initiate an investigation, who can take possession of evidence, and who can have access to evidence.
New cards
75
antistatic
Make you use _______ bags when collecting computer evidence.
New cards
76
hostile work environment
Incidents that create a ________, such as viewing pornography in the workplace and sending inappropriate emails, are the predominant types of cases investigated.
New cards
77
Repeatable Findings
Repeating the steps that you took in any digital investigation producing the same results.
New cards
78
computer-based email data files
For _______, use the standard forensics analysis techniques and procedures described in this book for the drive examination.
New cards
79
server-based email data files
For ______, contact the e-mail server administrator and obtain an electronic copy of the suspect’s and victim’s email folder or data.
New cards
80
Web-based e-mail
For _____ (Gmail, for example) investigations, search for Internet keywords to extract all related e-mail address information.
New cards
robot