CyberJustice Course 1

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/67

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:02 AM on 3/28/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

68 Terms

1
New cards

What are the three pillars of the U.S. criminal justice system?

Law Enforcement, Courts, Corrections

2
New cards

In the CIA Triad, what does “I” stand for?

Integrity

3
New cards

Which best defines 'Confidentiality' in cybersecurity?

Encrypting all emails

4
New cards

A phishing attack typically targets which human vulnerability?

User trust and behavior

5
New cards

Which of the following is NOT an example of cybercrime?

Trespassing on propert

6
New cards

The 2016 DNC breach was primarily caused by:

Social Engineering (Phishing)

7
New cards

Which part of the justice system would likely be responsible for prosecuting cybercrime cases?

Courts

8
New cards

What happens if the ‘Availability’ principle is violated?

Systems are down or inaccessible

9
New cards

Digital fraud is best defined as:

Using deception online to steal assets or identity

10
New cards

The CIA Triad applies primarily to:

 

Cybersecurity frameworks

11
New cards

What is law enforcement?

  • Deect and investigate crime through evidence collection, suspect identification, and case building (police)

12
New cards

What are courts?

Adjudicate case and interpreting law of federal, state, and local courts. Ensures due process, fair trials, and appropriate sentencing based on establisnhed legal frameworks

13
New cards

Corrections

Enforce sentences, rehabilitation, and reintegration through prisons, jails, probation, and aprole systems

14
New cards

What are evidence challenges?

Digitial evidence may be altered

15
New cards

What is jurissdictioinal complexity?

Cybercrimes can span many countries which creates enforcement challenges as each country varies in law, treaties, and political considerations

16
New cards

What is investigative adaptation?

Law enforcement must develop new technical skills and investigative methods. Requires specialized training, tools, and understanding of digital forensics principles that differ significantly from policing appraoches

17
New cards

What is legal admissibility?

Courts face complex questions regarding admissibility, authenticity, and reliability of digital evidence (Chain of custody)

18
New cards

Case Example 2016 DNC Hack

Attack Vector: Attackers used phishing email to gain access to sensitive email accounts and network resources

Impact: Thousands of emails and documents were exfiltrated and leaked publicly, affecting the US election and damaging organizational credibility

Justice challenges; Case raised complex issues of sovereignty, attribution, and foreign interference in domestic affairs

Security Lessosn: Email security, employee training, and multi-factor authebtication

19
New cards

Computer Fraud and Abuse Act (CFAA)

  • US law for addressing cyber based crimes

20
New cards

Electornic Communications Privacy Act (ECPA)

  • US law

21
New cards

Summarry of the HIPAA Security Rule

The Security Rule establishes a national set of security standards to protect certain health information that is maintained or transmitted in electronic form.

ogether, the Privacy, Security, and Breach Notification Rules help to protect the privacy and security of protected health information (PHI).10

22
New cards

European Commission - GDPR

Applies to european citizens and companies handling their data

23
New cards

The Equifax breach exposed

143 million credit records

24
New cards

Under GDPR, what is a ‘data cubject’?

A person whose data is being processed

25
New cards

Colonial Pipeline was shut down due to:

Ransomeware attack

26
New cards

Which law is most concerned with privacy in email and phone communication?

ECPA

27
New cards

Which of the following is a challenge when prosecuting international hackers?

Jurisdiction across borders

28
New cards

Case Study: Equifax Breach (2017)

Massive data preach of 147.9 million american, 15.2 million UK, and 19,000 Canadian consumers (social security numbers, birthdates, addresses, driver’s licenses)

  • Failed to patch a known critical Apache Struts vulenrability (CVE-2017-5638) despite a patch being avaialble for months

  • OVer $700 million in fines and settlements (FTC, CFPB, 50 US States) for consumer restitution, credit monitoring, and identity restoration

  • Influence GDPR, strengthened breach notfic

29
New cards

Case Study: Colonial Pipeline (2021)

  • DarkSide ransomeware disrupted 45% of US east coast fuel supply through a single compomised VPN password

  • Company paid 4.4 million to hackers

  • FBI later recovered some o the ransom

  • Exposed weaknesses in infrastructure protection

30
New cards

What is the primary purpose of digital forensics?

To collect, preserve, and analyze digital evidence

31
New cards

Which concept ensures digital evidence is trustworthy in court?

Chain of custody

32
New cards

Which of the following is an example of metadata?

File creation and modification dates

33
New cards

If the chain of custody is broken, what is a likely consequence?

The evidence may be ruled inadmissible in court

34
New cards

Which of the following tools is commonly used for capturing network traffic?

Wireshark

35
New cards

What does FTK stand for?

Forensic Toolkit

36
New cards

In a forensic investigation, why is taking a disk image important?

To preserve the original data in a tamper-free state

37
New cards

Which of the following is the LEAST likely source of digital evidence?

Physical fingerprints on a laptop

38
New cards

What type of case would most likely rely on memory forensics?

Rootkit detection during a live breach

39
New cards

What is the FIRST step when beginning a digital investigation?

Acquire and preserve the evidence

40
New cards

What is digital forensics?

  • Collecting, preserving, and analyzing digital evidence for use in investigations

    • Criminal investigations

    • Civil litigation and disputes

    • Internal corporate investigations

  • Goal: Create legally admissible evidence that can withstand court proceedings and lead to just outcomes

41
New cards

Chain of Custody

Documentation process that maintains the integrity of digital evidence throughout an investigation

42
New cards

Collection

Evidence is discovered and documented at the scene

43
New cards

Preservation

Evidence is secured using forensic methods

44
New cards

Documentation

Every transfer and access is recorded

45
New cards

Presentation

Evidence is presented in court

46
New cards

Cyberjustice invovles sensitive digital evidence across various forms like:

  • Emails and Chat Messages

  • Hard Drives & Mobile Devices

  • Malware Samples

  • Screenshots

  • Login records

  • Cloud logs

  • Forensic imags

  • System access history

47
New cards

Whos on the Law team and what they need

  • Prosecutors

    • Authentic

  • Defense attorneys

    • Legally obtained

  • Corporate legal counsel

    • Properly documented

  • Compliance officers

    • Securly preserved

  • Risk management teams

    • Traceable from beginning to end

  • HR investigators

  • Forensic Analysts (Expert witnesses)

48
New cards

Understanding the chain of custyd

What - What evidence was collected?

Where - Where it was stored

Who - Who collected it

Handled by - Who handled or transferred it

When - When it was collected

Why - Why it was accessed or moved

Protected - Whether it remained protected from alteration

49
New cards

Types of Digital evidence

Storage Media

  • Hard drive images

  • USB drives

  • Cloud storage

Communication Date

  • Email metadata

  • Chat logs

  • Call records

User activity

  • Broswer history

  • Download records

  • Search queries

System data

  • Server logs

  • timestamps

  • Mobile phone content

50
New cards

Common forensic tools

  • FTK Forensic Toolkit

    • Comprehensive evidence processing and analysis

  • Autopsy

    • Open source GUI tool for disk analysis

  • EnCase

    • Enterprise grade forensic analysis platform

  • Wireshark

    • Captures and analyzes network packts

  • Volatility

    • Memory forensic framework

  • Cellebrite

    • Mobile device forensic extraction

51
New cards

Real-World Case Scenarion

  1. Initial Alert

  2. First Response

  3. Investigation

  4. Documentation

52
New cards

What is predictive policing?

  • Predictive policing tries to harness the power of information, geospatial technologies and evidence-based intervention models to reduce crime and improve public safety.

53
New cards

Which ethical dilemma is often linked to predictive policing systems?

Algorithmic bias

54
New cards

Which of the following is a GDPR principle?

 

Right to be forgotten

55
New cards

Which of these is NOT a typical ethical concern in cyber law enforcement?

Increased IT funding

56
New cards

True or False: The CFAA is enforced only by state governments.

 

False

57
New cards

Which case highlighted ransomware risks to U.S. critical infrastructure?

Colonial Pipeline

58
New cards

Ethical Dilemmas in Cybersecurity

  • Surveillace vs. Privacy

  • Algorithmic justice

  • Facial recognition boundries

  • Encryption backdoors

59
New cards

Which responsibility is most closely associated with the role of a SOC Analyst?

Monitoring security alerts, analyzing suspicious activity, and escalating potential incidents

60
New cards

What is the primary value of resources such as CyberSeek or the NICE Framework?

They map cybersecurity roles, skills, and career pathways to help learners understand workforce opportunities

61
New cards

Which scenario best represents an ethical issue in cybersecurity?


Deciding whether to deploy a monitoring tool that improves security but may intrude on user privacy

62
New cards

Which concern is most often raised about advanced surveillance technologies?

They may expand public safety capabilities while also increasing risks to privacy, fairness, and civil liberties

63
New cards

Why is digital evidence handled carefully during forensic investigations?


Because improperly handled evidence may lose integrity, credibility, or evidentiary value

64
New cards

Which example best illustrates metadata?

Information such as file creation date, author, location tags, or transmission time associated with data

65
New cards

In digital investigations, chain of custody is best understood as:


A documented record showing who collected, handled, transferred, and stored evidence over time

66
New cards

During a suspected cybersecurity incident, why is evidence preservation so important in the early stages of response?


Because preserved evidence can support investigation, containment decisions, and possible legal action

67
New cards

Which of the following scenarios is the clearest example of cybercrime rather than a general technology misuse issue?

The judicial system, because it oversees adjudication and application of law in court proceedings

68
New cards

Explore top notes

note
Deltoid Syndrome
Updated 1141d ago
0.0(0)
note
Metals
Updated 1179d ago
0.0(0)
note
Chapter 11: Forensic Identity
Updated 1084d ago
0.0(0)
note
H105IUSBF24.REV4 - Tagged
Updated 466d ago
0.0(0)
note
AP Calculus BC Ultimate Guide
Updated 1076d ago
0.0(0)
note
Leading to the Civil War
Updated 1208d ago
0.0(0)
note
Micronutrients and Phytochemicals
Updated 1237d ago
0.0(0)
note
Deltoid Syndrome
Updated 1141d ago
0.0(0)
note
Metals
Updated 1179d ago
0.0(0)
note
Chapter 11: Forensic Identity
Updated 1084d ago
0.0(0)
note
H105IUSBF24.REV4 - Tagged
Updated 466d ago
0.0(0)
note
AP Calculus BC Ultimate Guide
Updated 1076d ago
0.0(0)
note
Leading to the Civil War
Updated 1208d ago
0.0(0)
note
Micronutrients and Phytochemicals
Updated 1237d ago
0.0(0)

Explore top flashcards

flashcards
CMS 2 - ALL antibodies
38
Updated 301d ago
0.0(0)
flashcards
Chap 1: History and Approaches
27
Updated 1190d ago
0.0(0)
flashcards
INVESTIGATION
44
Updated 742d ago
0.0(0)
flashcards
Unit One - Quiz
64
Updated 100d ago
0.0(0)
flashcards
1.3.2 Databases
92
Updated 3d ago
0.0(0)
flashcards
GGPg - Fragenkatalog (1.Test)
42
Updated 479d ago
0.0(0)
flashcards
CMS 2 - ALL antibodies
38
Updated 301d ago
0.0(0)
flashcards
Chap 1: History and Approaches
27
Updated 1190d ago
0.0(0)
flashcards
INVESTIGATION
44
Updated 742d ago
0.0(0)
flashcards
Unit One - Quiz
64
Updated 100d ago
0.0(0)
flashcards
1.3.2 Databases
92
Updated 3d ago
0.0(0)
flashcards
GGPg - Fragenkatalog (1.Test)
42
Updated 479d ago
0.0(0)