COMP607 - Week 7 Digital Forensics and Cybersecurity: Incident Response & Investigation

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

60 Terms

1
New cards

What is e-Crime?

E-crime refers to all offenses where information and communications technology is used as a tool, target, or storage device in the commission of an offense.

2
New cards

What are the main categories of the information security workforce?

The information security workforce is divided into managerial personnel and technical personnel.

3
New cards

What is the role of a Chief Information Security Officer (CISO)?

The CISO is responsible for assessing, managing, and implementing security, reporting directly to the Chief Information Officer (CIO).

4
New cards

What does a Security Manager do?

A Security Manager supervises technicians and security staff, resolves issues identified by technicians, and works on tasks identified by the CISO.

5
New cards

What are the responsibilities of a Security Administrator?

A Security Administrator manages daily operations, analyzes and designs security solutions, and identifies users' needs.

6
New cards

What is the primary function of a Security Technician?

A Security Technician provides technical support, configures security hardware, implements security software, and troubleshoots problems.

7
New cards

What is digital forensics?

Digital forensics is the application of science to the identification, collection, examination, and analysis of data, preserving the integrity of the information.

8
New cards

What was the first practical application of digital forensics?

The first practical application was in 1986, used to capture hacker Markus Hess.

9
New cards

What types of crimes can digital forensics investigate?

Digital forensics can investigate cyberbullying, copyright infringement, cybercrimes involving illegal items, cyberwarfare, and cyberterrorism.

10
New cards

What are the branches of digital forensics?

The branches include computer forensics, mobile device forensics, network forensics, and forensic data analysis.

11
New cards

What does computer forensics focus on?

Computer forensics focuses on explaining the current state of digital artifacts, such as computers, hard drives, and electronic documents.

12
New cards

What does mobile device forensics involve?

Mobile device forensics involves the investigation and recovery of digital evidence from mobile devices, including phone records and GPS location.

<p>Mobile device forensics involves the investigation and recovery of digital evidence from mobile devices, including phone records and GPS location.</p>
13
New cards

What is the purpose of network forensics?

Network forensics is used to monitor computer network traffic, usually intercepted at the packet level.

14
New cards

What is the goal of forensic data analysis?

Forensic data analysis aims to discover and analyze patterns of fraudulent crimes, typically financial crimes.

15
New cards

What is the significance of maintaining a strict chain of custody in digital forensics?

Maintaining a strict chain of custody is crucial to ensure the integrity of the evidence collected during a digital forensic investigation.

16
New cards

What types of offenses does e-crime include?

E-crime includes traditional offenses like drug trading and fraud, as well as new activities like computer attacks and software piracy.

17
New cards

What is the role of information security?

Information security focuses on protecting electronic information from cyberattacks and unauthorized access.

18
New cards

What are some common data-hiding techniques?

Common data-hiding techniques may include encryption, steganography, and the use of hidden files.

19
New cards

What is the purpose of tools used in digital forensics?

Tools in digital forensics are used to validate data and ensure accurate analysis during investigations.

20
New cards

What is the impact of information technology on traditional crimes?

Information technology has influenced traditional crimes by enabling new forms of offenses, such as identity theft and organized crime.

21
New cards

What is the importance of analyzing data in a digital forensic investigation?

Analyzing data is essential to uncover evidence, understand the nature of the crime, and reconstruct events related to the incident.

22
New cards

What is the primary focus of network forensics?

To monitor computer network traffic, usually intercepted at the packet level.

23
New cards

What is the aim of forensic data analysis?

To discover and analyze patterns of fraudulent crimes, usually financial crimes.

24
New cards

What is the first step in digital forensics procedures when responding to an incident?

Secure the crime scene.

25
New cards

Why is it important to secure the crime scene immediately?

To prevent digital evidence from being overwritten, contaminated, or destroyed.

26
New cards

What actions should be taken by individuals in the vicinity of a digital incident?

Perform damage control, contact the incident response team, and secure the electronic equipment.

27
New cards

What should the incident response team document at the crime scene?

The physical surroundings of the device, using video and photographs to capture the state before any evidence is touched.

28
New cards

What is the purpose of labeling cables connected to a device during an investigation?

To document the hardware components and their connections.

29
New cards

What is the second step in digital forensics procedures?

Preserve the evidence.

30
New cards

How can evidence preservation help in legal contexts?

It ensures that important proof is not corrupted or destroyed, aiding in nonrepudiation.

31
New cards

What is e-discovery in digital forensics?

The process of identifying, collecting, and producing electronically stored information (ESI) for investigations or lawsuits.

<p>The process of identifying, collecting, and producing electronically stored information (ESI) for investigations or lawsuits.</p>
32
New cards

What is the importance of documenting the chain of custody?

To ensure that evidence is always under strict control and not corrupted by unauthorized persons.

33
New cards

What does the chain of custody documentation include?

Serial numbers of systems, who handled the systems, and how the evidence was transported.

34
New cards

What is the fourth step in digital forensics procedures?

Examine the evidence.

35
New cards

What is meant by 'order of volatility' in digital forensics?

The principle of preserving the most fragile data first during an examination.

36
New cards

What are the first two levels of data considered most volatile?

Cache memory and CPU data.

37
New cards

What is a mirror image backup in digital forensics?

A backup that captures the swap file or pagefile containing data moved from RAM to the hard drive.

38
New cards

What is firmware in the context of digital forensics?

Software that is embedded in hardware, which can be targeted by threat actors.

39
New cards

What is 'slack' in digital forensics?

Hidden data that can be found in unused portions of storage blocks.

40
New cards

What types of slack are commonly used in Windows computers?

RAM slack and file slack.

41
New cards

What is RAM slack?

Data that is padded in the remaining cluster space of a file being saved, containing information from RAM.

42
New cards

What role do IP monitors play in digital forensics?

They provide insight into incidents by collecting and analyzing IP network traffic.

43
New cards

What is metadata?

Data that describes other data, useful for analyzing file, web, mobile, and email information.

44
New cards

Why are security logs important in incident investigations?

They reveal the type of attack directed at the network and how it bypassed security defenses.

45
New cards

What is the purpose of a vulnerability scan?

To identify potential security weaknesses in a system.

46
New cards

What is the function of a SIEM dashboard?

To provide real-time security monitoring and management of security information.

47
New cards

What does digital forensics aim to recover?

Data from security events and the lessons learned from them.

48
New cards

What is CAINE in digital forensics?

A Linux distribution that offers user-friendly tools for investigative purposes.

49
New cards

What does NetworkMiner do?

Detects operating systems, hostnames, and open ports through packet sniffing.

50
New cards

What is the purpose of ProDiscover?

To image and analyze evidence found on a drive.

51
New cards

What is the function of CryptHunter?

To notify users if active encryption is running on a system.

52
New cards

What are some features of digital forensic workstations?

Configured with multiple gigabit network ports, hot swap bays, and RAID 5 for redundancy.

53
New cards

What information can call detail records provide?

Details about telephone calls, including time, duration, and involved cell towers.

54
New cards

What does GPS data reveal in mobile forensics?

The precise location of a user and their activities at that location.

55
New cards

What is the significance of SMS texts in mobile forensics?

They leave electronic records of communication that can serve as evidence.

56
New cards

What are the primary concerns in cloud forensics?

Ensuring digital evidence is not tampered with and understanding the legal implications.

57
New cards

What is steganalysis?

The art of detecting and decoding hidden data within files.

<p>The art of detecting and decoding hidden data within files.</p>
58
New cards

What methods can be used for steganalysis?

Software analysis, disk analysis utilities, and statistical analysis of images or audio.

59
New cards

What challenges exist in recovering watermarked data?

It is very difficult to recover data hidden in pictures, videos, or audio.

60
New cards

How can deleted data be reconstructed?

Even if a disk has been wiped, deleted data can often be recovered.