Cyber Forensics and Incident Response

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/37

flashcard set

Earn XP

Description and Tags

Flashcards from Cyber Forensics and Incident Response Unit Review

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards

Digital Forensics

The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation, use of validated tools, repeatability, reporting, and possible expert presentation.

2
New cards

Vulnerability/threat assessment and risk management

Tests and verifies the integrity of stand-along workstations and network servers.

3
New cards

Network intrusion detection and incident response

Detects intruder attacks by using automated tools and monitoring network firewall logs.

4
New cards

Digital investigations

Manages investigations and conducts forensics analysis of systems suspected of containing evidence.

5
New cards

Forensic Readiness and Business Continuity

Helps maintain business continuity by easy identification of the evidence. Quickly identify the incidents. Analyze the chain of evidence. Collect admissible and legally source evidence. Eliminate threats of reoccurrence of the incident. Efficient recovery plans. Collect information to legally prosecute perpetrators and claim damages.

6
New cards

Security Operations (SecOps)

An organizational approach that combines security teams and IT operations teams to safeguard against escalating and complex cyber threats. It aims to bridge the gap between security and IT operations to meet both objectives effectively, ensuring the safety of IT infrastructure networks, and data.

7
New cards

Cyber Incident Response Process (CIRP)

To support a swift and effective response to cyber incidents aligned with the organisation’s security and business objectives, such as Cyber Forensics.

8
New cards

Digital Evidence

Must establish a credible link between attacker, victim, crime scene “anyone or anything that enters a crime scene takes something of the scene with them, and leaves something of themselves behind when they leave”

9
New cards

Residual Data

Left behind when a document is deleted. This can be retrieved until the space is reused

10
New cards

Metadata

Records about a particular document or file. May include authorship information, modification timestamps etc

11
New cards

Data Acquisition Formats

Raw, Proprietary, AFF

12
New cards

Identifying Digital Evidence

Identify digital information or artifacts that can be used as evidence. Collect, preserve, and document evidence. Analyze, identify, and organize evidence. Rebuild evidence or repeat a situation to verify that the results can be reproduced reliably Collecting digital devices and processing a criminal or incident scene must be done systematically.

13
New cards

Order of Volatility

Registers/Cache Memory > Temporary file system > Disk media > Remote logs or monitoring data > Physical config or topology > Archive media (Most to Least Volatile)

14
New cards

Requirements for Identification, Collection, Acquisition and Preservation of Digital Evidence

Auditable, Repeatable, Reproducible, Justifiability

15
New cards

Write-blocker

Prevents data writes to a hard disk

16
New cards

File system

Gives OS a road map to data on a disk. Type of file system an OS uses determines how data is stored on the disk

17
New cards

Partition

A logical drive. Windows OSs can have three primary partitions followed by an extended partition that can contain one or more logical drives.

18
New cards

FAT (File Allocation Table)

File structure database that Microsoft originally designed for floppy disks
FAT database is typically written to a disk’s outermost track and contains:
Filenames, directory names, date and time stamps, the starting cluster number, and file attributes

19
New cards

NT File System (NTFS)

Introduced with Windows NT. Primary file system for Windows

20
New cards

Registry

A database that stores hardware and software configuration information, network connections, user preferences, and setup information

21
New cards

Second Extended File System (Ext2)

The early file system standard

22
New cards

Third Extended File System (Ext3)

Replaced Ext2 in most Linux distributions

23
New cards

Fourth Extended File System (Ext4)

Added support for partitions larger than 16 TB

24
New cards

Hierarchical File System(HFS)

Files stored in nested directories (folders) (Before OS X)

25
New cards

Extended Format File System(HFS+)

Introduced with Mac OS8.1. Supports smaller file sizes on larger volumes, resulting in more efficient disk use

26
New cards

Apple File System(APFS)

Introduced in macOSHighSierra. When data is written to a device, metadata is also copied to help with crash protection

27
New cards

Active acquisition

Network acquisition that changes the packets

28
New cards

Passive acquisition

Network acquisition that should not change the packets

29
New cards

Cloud Forensics

A subset of network forensics. Can have three dimensions: Organizational, Legal, Technical

30
New cards

Cloud service agreements (CSAs)

A contract between a CSP and the customer that describes what services are being provided and at what level. Includes service legal agreements (SLAs)

31
New cards

Abstract

Condenses the report to concentrate on the essential information

32
New cards

The Body

Consists of the introduction and discussion sections

33
New cards

The Conclusion

Starts by referring to the report’s purpose, states the main points, draws conclusions, and possibly renders an opinion

34
New cards

Steganography

practice of concealing a file, message,image, or video within another file, message, image, or video.

35
New cards

Lossless Compression

Reduces file size without removing data

36
New cards

Lossy Compression

Permanently discards bits of information

37
New cards

The 3G standard

was developed by the International Telecommunications Union (ITU) under the United Nations. It is compatible with Code Division Multiple Access (CDMA), Global System for Mobile (GSM), and Time Division Multiple Access (TDMA)

38
New cards

4G networks

can use the following technologies: Orthogonal Frequency Division Multiplexing (OFDM), Mobile WiMAX, Ultra Mobile Broadband (UMB), Multiple Input Multiple Output (MIMO), Long Term Evolution (LTE)