CYCS200 INVESTIGATIONS -- week 11

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/33

flashcard set

Earn XP

Description and Tags

cycs 200. information security investigations

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

what is online investigation?

the process of collecting, analyzing, and validating digital information to support cybersecurity or law enforcement work.

2
New cards

what is the purpose of online investigation?

understand cybercriminal behaviour, collect evidence, and protect systems.

3
New cards

an example of online investigation?

tracking a phishing attack back to the originating IP and server

4
New cards

what is a cyber incident?

any event that threatens confidentiality, integrity, or availability of information. 

5
New cards

categories of cyber incidents?

  • unauthorized access

  • malware infection

  • data breach

  • network intrusion

ex. ransomware attack encrypting a company’s payroll system

6
New cards

what is a threat actor?

any individual or group responsible for malicious cyber behaviour

7
New cards

types of threat actors?

  • hactivists

  • cybercriminals

  • nation-state actors

  • insider threats

ex. insider leaking customer records for money

8
New cards

motives and techniques of a hacker group?

motives:

  • politics

  • challenge

  • revenge

  • activism

techniques:

  • DDoS

  • defacement

  • intrusion

ex. anonymous attacking a government portal during protests

9
New cards

goal, common scams, and techniques of a fraud group

goal: financial gain

common scams: 

  • romance scams

  • CRA scams

  • investment scams

techniques:

  • social engineering

  • phishing

  • fake payment links

ex. scam email claiming tax refund requiring credit card details

10
New cards

name some law enforcement agencies in canada

  • RCMP national cybercrime coordination

  • CSIS (Canadian Security Intelligence Service)

    • responsible for gathering, processing, and analyzing national security information from around the world and conducting covert action within Canada and abroad

  • CSE (Communications Security Establishment)

    • provides the government of Canada with information technology security and foreign signals intelligence

their roles: investigate, respond, coordinate, gather intelligence

11
New cards

charter rights and privacy

police searches require:

  • reasonable grounds

  • judicial authorization

exception ex: police acting without warrant to prevent imminent harm

12
New cards

search warrant exceptions

  1. consent

  • the consent must be voluntary and given by someone with the proper authority

  1. exigent circumstances

  • emergency situations that allow law enforcement to conduct a warrantless search or seizure when it is impractical to obtain a warrant.

    • imminent threat to public safety

    • imminent destruction of evidence

    • imminent escape of a suspect

    • mobile vehicles

  1. plain view

  • allows police officers to seize evidence without a warrant if they are lawfully in a position to see the item and its incriminating nature is immediately apparent (officer sees hacking tools visibly on desk)

13
New cards

digital evidence what are you

information stored or transmitted in digital form that may be relevant to investigations

14
New cards

types of digital evidence

  • logs

  • emails

  • social media posts

  • network packets

ex. web server log showing external brute force attempts

15
New cards

investigative workflow step by step

  1. identify evidence sources

  • find out where the digital evidence lives

    • laptops, phones, tablets

    • cloud storage

    • email accounts

    • server logs

    • network traffic logs

    • usb drives

    • socmed accounts

  1. preserve data

  • before touching anything, the original evidence must be protected so it can’t be altered, overwritten, or corrupted. 

    • disconnect the device from the network

    • capture snapshots of volatile data (RAM)

    • lock user accounts to prevent logins

    • use write-blockers to prevent modifying storage devices

  1. forensic imaging

  • creating a bit-for-bit exact copy of the data from the device or system

    • do not analyze the original device, but the copy

    • imaging includes deleted files, hidden partitions, slack space, metadata

  1. analyze evidence

  • looking for

    • malware

    • unauthorized logins

    • file transfers

    • sus emails

    • artifacts of user activity

    • deleted data

    • timestamps and log correlations

  • rebuilding what happened, when it happened, and who did it

  1. interview witnesses

  • employees who noticed weird activity

  • IT staff who managed affected systems

  • victims targeted in phishing attacks

  • witnesses who saw suspicious behaviour

  1. execute warrants

  • if the investigation expands, law enforcement may need:

    • search warrants for devices

    • warrants for cloud service providers

  1. produce reports for court

  • investigators document everything in a way that judges, lawyers, and non-tech people can understand

    • what was collected and how

    • chain of custody

    • tools used

    • findings (screenshots & logs)

    • timeline of events

    • conclusion about what happened

16
New cards

email investigations techniques

what to extract:

  • header metadata

  • sender IP

  • SPF/DKIM validation

tools: MXToolbox, Email tracker pro

ex. header reveals sender actually from Nigeria, not CRA

17
New cards

open source intelligence (OSINT)

intelligence gathered from publicly available sources

users: police, journalists, analysts, ethical hackers

challenge: verification and authenticity

ex. tracking suspects social media photos for location clues

18
New cards

OSINT methodologies

  1. triage (simple search)

  • googling a name, email, or company

  • checking social media profiles

  • looking at public news articles

  • searching usernames on common platforms

  1. deep search (advanced operators)

  • google dorks (site:, filetype:, intitle:, inurl:)

  • specific government/public databases

  • checking breach data (HaveIBeenPwned, LeakCheck)

  • archived sites (Wayback Machine)

  1. automation (tools/scripts)

  • scrape, correlate, and visualize data automatically

    • python scripts that check multiple websites

    • tools that map relationships, IPs, leaked data, etc

tools: maltego (maps relationships b/w people, emails, IPs, companies), shodan (search engine for internet-connected devices), spiderfoot (automated OSINT scanner)

19
New cards

social media investigations

platforms: facebook, instagram, tiktok, reddit

challenges: privacy settings, manipulation, false identities

definition: sock puppet - fake account used for investigation

ex. officer using sock puppet to join criminal groupchat

20
New cards

geolocation data

identifying the physical location of a device

  • IP addess

  • GPS

  • wifi networks

ex. tracking criminal using IP logs from VPN exit nodes

21
New cards

EXIF data in photos

: metadata embedded in photos (GPS, time, camera type)

  • identify location

  • confirm timeline

ex. kidnapper’s photo reveals exact coords of hideout

22
New cards

video evidence and verification

video clues:

  • background noises

  • landmarks

  • language and accents

verification tools: InVid, Forensically

23
New cards

deep web vs dark web

DEEP WEB

  • not indexed, private databases

DARK WEB

  • requires tor; hosts illegal markets

ex. dark web marketplace selling stolen gift cards/credit cards

24
New cards

what is tor?

: anonymity network using onion routing

benefits: privacy, protection from tracking

risks: criminal activity, malware

real case: FBI deanonymizing child exploitation sites on Tor

25
New cards

dark web investigations

steps:

  • use VM (virtual machine)

    • software-based, emulated computer that runs on top of a physical machine, or ‘host’

  • use VPN (virtual private network) 

    • creates a secure, encrypted connection between your device and a remote server, masking your IP address and protecting your online data

  • use isolated environment

risks: malware, illegal content exposure

ex. investigators tracing bitcoin transactions

26
New cards

protecting investigators

backstopping methods:

  • fake identity

  • secure browsers

  • strong OPSEC

ex. cyber investigator masking identity when entering forum

27
New cards

investigative documentation

notes must include:

  • date/time

  • actions taken

  • tools used

  • screenshots

reason: court admissibility

28
New cards

case study — phishing attack

scenario: employee receives fake bank alert.

investigation:

  • header analysis

  • link sandboxing

  • IP tracing

outcome: email linked to foreign crime ring

29
New cards

case study — social media harassment

evidence:

  • screenshots

  • metadata

  • account creation timeline

outcome: suspect identified through OSINT and IP logs

30
New cards
31
New cards
32
New cards
33
New cards
34
New cards

Explore top flashcards