Computer Forensics Lecture Notes

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/36

flashcard set

Earn XP

Description and Tags

Flashcards generated from lecture notes on Computer Forensics

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

37 Terms

1
New cards

Computer Forensics

A set of methodological procedures and techniques that help identify, gather, preserve, extract, interpret, document, and present evidence from computing equipment, such that any discovered evidence is acceptable during a legal and/or administrative proceeding

2
New cards

Objectives of Computer Forensics

Identify, gather, and preserve evidence of cybercrime; Gather evidence of cyber crimes in a forensically sound manner; Estimate the potential impact of malicious activity; Minimize losses to the organization; Protect the organization from similar incidents; Support the prosecution of the perpetrator

3
New cards

Need for Computer Forensics

To ensure the integrity of IT systems; To track down perpetrators; To process factual evidence for court; To protect financial resources and time

4
New cards

Cybercrime Definition

Cybercrime is defined as any illegal act involving a computing device, network, its systems, or its applications

5
New cards

Internal/Insider Attack

An attack performed on a corporate network by an entrusted person (insider) who has authorized access to the network

6
New cards

External Attack

An attack that occurs when an attacker from outside the organization tries to gain unauthorized access to computing systems

7
New cards

Examples of Cybercrimes

Examples include Espionage, Intellectual Property Theft, Data Manipulation, Trojan Horse Attack, SQL Attack, Brute-force Attack, Phishing/Spoofing, Privilege Escalation Attacks, Denial of Service Attack, Cyber Defamation, Cyberterrorism, Cyberwarfare

8
New cards

Impact of Cybercrimes at the Organizational Level

Loss of confidentiality, integrity and availability of information; Theft of sensitive data; Disruption of business activities; Loss of customer trust; Reputational damage; Financial losses; Penalties for non-compliance

9
New cards

Digital evidence

Any information of probative value that is either stored or transmitted in a digital form

10
New cards

Volatile Data

Data that are lost as soon as the device is powered off

11
New cards

Non-volatile Data

Permanent data stored on secondary storage devices such as hard disks and memory cards

12
New cards

User-Created Files

Address books, database files, media files, documents, Internet bookmarks

13
New cards

User-Protected Files

Compressed files, encrypted files, password-protected files, hidden files

14
New cards

Computer-Created Files

Backup files, log files, configuration files, printer spool files, cookies, swap files, system files, history files, temporary files

15
New cards

Understandable Evidence

Evidence must be clear and understandable

16
New cards

Admissible Evidence

Evidence must be related to the fact being proved

17
New cards

Authentic Evidence

Evidence must be real and appropriately related to the incident

18
New cards

Reliable Evidence

There must be no doubt about the authenticity or veracity of the evidence

19
New cards

Complete Evidence

The evidence must prove the attacker's actions or innocence

20
New cards

Best Evidence Rule

The court only allows the original evidence of a document, photograph, or recording at the trial rather than a copy

21
New cards

SWGDE Principle 1

Law enforcement and forensic organizations must establish and maintain an effective quality system

22
New cards

ACPO Principles of Digital Evidence

No action should change data which may subsequently be relied upon in court; Persons accessing original data must be competent; An audit trail of processes should be created and preserved; The case officer has overall responsibility

23
New cards

Forensic Readiness

An organization's ability to optimally use digital evidence in a limited period of time and with minimal investigation costs

24
New cards

Forensics Readiness Planning

Identify potential evidence; Determine sources of evidence; Define a policy to legally extract electronic evidence; Establish a policy to handle and store evidence; Identify if the incident requires full investigation; Create a process for documenting the procedure; Establish a legal advisory board; Keep an incident response team

25
New cards

Need for a Forensic Investigator

Helps organizations and law enforcement investigate and prosecute cybercrimes; Sound Evidence Handling; Incident Handling and Response

26
New cards

Roles and Responsibilities of a Forensics Investigator

Determines the extent of damage; Recovers data of investigative value; Creates an image of the original evidence; Guides officials; Prepares analysis reports; Updates the organization about attack methods; Addresses the issue in court

27
New cards

What Makes a Good Computer Forensics Investigator?

Interviewing skills; Excellent writing skills; Strong analytical skills; Excellent communication skills; Updated knowledge; Knowledge of computer platforms; Knowledge of various technologies; Contact with professionals; Knowledge of relevant laws

28
New cards

Legal compliance in computer forensics

Ensures that any evidence collected and analyzed is admissible in a court of law

29
New cards

Examples of legal acts relevant to Computer Forensics

Gramm-Leach-Bliley Act (GLBA), Federal Information Security Modernization Act of 2014 (FISMA), Health Insurance Portability and Accountability Act of 1996 (HIPAA), Payment Card Industry Data Security Standard (PCI DSS), Electronic Communications Privacy Act, General Data Protection Regulation (GDPR), Data Protection Act 2018, Sarbanes-Oxley of 2002

30
New cards

NIST Framework for Digital Forensic

Framework for conducting digital forensic investigations, focusing on evidence integrity, repeatability, and accuracy.

31
New cards

Phishing Attack Investigation Reporting

Summarize collection, Examination, Analysis, and Reporting key findings.

32
New cards

Cyber Crime

Type of crime that involves a computer, networked device, or a network, often used to commit fraud, steal information, or disrupt services.

33
New cards

First recorded cyber crime Internationally Morris Worm in 1988

Caused significant disruption and highlighting the vulnerabilities of networked systems.

34
New cards

Robert Tappan Morris was prosecuted for his role in creating the Morris Worm.

Convicted under the U.S. Computer Fraud and Abuse Act

35
New cards

Yahoo Inc. v. Akash Arora case in 1999

Highlighted the need for legal measures to address domain name disputes in India.

36
New cards

State of Tamil Nadu vs. Suhas Katti (2004)

First cases in India where a conviction was secured under the Information Technology Act for cyberstalking and harassment.

37
New cards

Key Points of Evidence and Proceedings

Police tracked the IP addresses used by the accused to send the messages.