cyber crime midterm

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/54

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

55 Terms

1
New cards

When were the first laws relating to digital evidence established?

1970s

2
New cards

Digital forensics

applies froensics procedures to digital evidence

3
New cards

Insider threat

a person who may be an employee, a contractor, or another person with access to the corporate network or computer system who commits malicious acts or who commits industrial espionage

4
New cards

Internet of Things

contains any physical device that can be connected to the internet

5
New cards

Public-sector investigation

abide by fourth amendment; you search for evidence to support criminal allegations

6
New cards

Private-sector investigation

you search for evidence to support allegations of policy violations, abuse of assets, and criminal complaints

7
New cards

Warning banners

should be used to remind employees and visitors of organization policy on computer, email, and Internet use

8
New cards

Companies should

define and limit the number of authorized requesters who can start an investigation

9
New cards

When planning a case

take into account the nature of the case, instructions from the requester, what additional tools and expertise you might need, and how you will acquire the evidence

10
New cards

Crimiinal cases and company policy violations

should be handled in much the same manner to ensure that quality evidence is presented; both can go to court

11
New cards

Internet abuse investigations

require examining server log data

12
New cards

For attorney-client privilege cases

all written communication should have a header label stating that it’s privileged communication and a confidential work product

13
New cards

Bit-stream copy

a bit-by-bit duplicate of the disk

14
New cards

Rule 26 of the Federal Rules of Civil Procedure

requires expert witnesses who anticipate that they will have to testify to submit written reports; must include their opinion and their basis for their opinion

15
New cards

Deposition banks

used by attorneys to research expert witnesses’ previous testimony and to learn more about expert witnesses hired by opposing counsel

16
New cards

A well-defined report structure

contributes to a reader’s ability to understand the information you’re communicating; clearly labeled secions and follows a numbering scheme

17
New cards

The report-writing process

  1. analyzing the data and reviewing the examiner notes

  2. writing the first draft

  3. revising the draft and creating the final report

18
New cards

Fact witness

you’re providing only the facts you discovered in your investigation

19
New cards

Bona fides

a statement listing proof of your qualifications, credentials, and legitimacy as an expert in the form of a summary, resume, or curriculum vitae

20
New cards

Lay witness

a person whose testimony is based on personal observation or perception; not considered to be an expert in a particular field

21
New cards

Depostion

formal examination where the witness is questioned under oath, and a judge is not present, the purpose of this is to give the opposing counsel a chance to preview testimony before the trial

22
New cards

Examination plan

a document that lets a witness know what questions to expect when they are testifying

23
New cards

Discovery

process by which attorneys seek information from the other side before a trial

24
New cards

Voir dire

the qualification phase of testimony, in which an attorney asks questions to establish an expert witness’s credentials

25
New cards

Conflicting out

the practice of opposing attorneys trying to prevent a digital forensics examiner from testifying by claiming the examiner has discussed the case with them and, therefore, has a conflict of interest

26
New cards

Discovery deposition

a type of deposition during which the opposing attorney conducts the equivalent of both direct and cross-examination of the witness; it’s considered part of the discovery process

27
New cards

Testimony-preservation deposition

a deposition held to preserve testimony in case of schedule conflicts or health problems; usually videotaped as well as recorded

28
New cards

Digital forensics lab

a lab dedicated to digital investigations; typically, it has a variety of computers, OSs, and forensics software

29
New cards

Uniform Crime Report

information collected at the federal, state, and local levels to determine the types and frequencies of crimes committed

30
New cards

TEMPEST

a term describing facilities that have been hardened so that electrical signals from digital devices, computer networks, and telephone systems can’t be monitored or accessed easily by someone outside the facility

31
New cards

Change management

the process of reviewing and validating new methods or resources being used in a digital forensics lab

32
New cards

Configuration management

the process of keeping track of all upgrades and patches applied to a computer’s OS and applications

33
New cards

Business case

a document that provides justification to upper management or a lender for purchasing new equipment, software, or other tools when upgrading a facility

34
New cards

Acquisition

the process of creating a duplicate image of data; one of the required functions of digital forensics tools

35
New cards

Validation

the process of confirming that a tool is functioning as intended; one of the functions of digital forensics tools

36
New cards

Verification

the process of proving that two sets of data are identical by calculating hash values or using another similar method; one of the functions of digital forensics tools

37
New cards

Extraction

the process of pulling relevant data from an image and recovering or reconstructing data fragments; one of the required functions of digital forensics tools

38
New cards

Reconstruction

the process of rebuilding data files; one of the required functions of digital forensics tools

39
New cards

Command-line interface

can find file slack and free space, recover data, and search by keyword; they are designed to run in minimal configurations and can fit on a bootable disk

40
New cards

Static aquisition

a data acquisition method used when a suspect drive is write-protected and cannot be altered; if disk evidence is preserved correctly, static acquisitions are repeatable

41
New cards

Live aquisition

a data acquisition method used when a suspect computer cannot be shut down to perform a static acquisition; captured data might be altered during a live acquisition because it is not write-protected, not repeatable

42
New cards

Raw format

a data acquisition format that creates simple, sequential flat files of a suspect drive or data set

43
New cards

Cyclic redundancy check

a mathematical algorithm that translates a file into a unique hexadecimal value

44
New cards

MD5

an algorithm that produces a hexadecimal value of a file or storage media; used to determine whether data has been changed

45
New cards

AFF

an open-source data acquisition format that stores image data and metadata; file extensions include .afd for segmented image files and .afm for AFF metadata

46
New cards

Logical aquisition

a data acquisition method that captures only specific files of interest to the case, or specific types of files

47
New cards

Sparse aquisition

like logical acquisition but also captures fragments of allocated (deleted) data

48
New cards

Host protected area

an area of a disk drive reserved for booting utilities and diagnostic programs; not visible to the computer’s OS

49
New cards

Whole disk encryption

an encryption technique that performs sector-by-sector encryption of an entire drive; unreadable when copied with a static acquisition method

50
New cards

Wear leveling

in SSDs and flash drives, the utility that ensures that all memory cells get used and have the same number of reads, writes, and erases to maintain endurance of the SSD

51
New cards

TRIM utility

recoverable deleted data from an SSD’s free space will be automatically erased as part of routine maintenance of the memory cells; will alter the hash value

52
New cards

Mean time to failure

the average time that a part, component, or device will work before it might fail

53
New cards

Redundant array of independent disks (RAID)

a computer configuration in which two or more disks are combined into one large drive in several configurations for special needs

54
New cards

Four methods for acquiring data

disk-to-image, physical disk-to-disk, parition-to-partition, and partion-to-data

55
New cards

dc3dd

a computer configuration in which two or more disks are combined into one large drive in several configurations for special needs