MIS 6333 QUIZ 1 (WEEK 1 & 2)

studied byStudied by 36 people
5.0(1)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 31

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

32 Terms

1

What are the goals of security?

Confidentiality
Integrity
Availability

New cards
2

What is forensics?

Application of science to legal problems

New cards
3

What is digital forensics?

Application of science to provide an explanation to what has and has not happened in a system, and to preserve integrity and maintain chain of custody

New cards
4

What is volatile data?

Data that will event not be available for collection over time.

New cards
5

Examples of volatile data (Physical and Digital)

Blood, hair

Dying Laptop/phone, computer RAM

New cards
6

How is the order of volatility determined?

The lifetime of the data

Highest: CPU, Cache, Register contents
Lowest: Archival media & Backups

New cards
7

What is Chain of custody

Tracks the movement of evidence, who touched it, etc.

New cards
8

What is a Legal Hold (Litigation Hold)

Prevents others from altering evidence in any way, such as in the situation where that evidence may be important

New cards
9

What is a Hold Notification

A notification to preserve evidence in its current state and previous any form of alteration

New cards
10

What is the purpose of capturing a system image?

It creates a replica of a system's physical memory

Allows people to work with and manipulate a copy of evidence for further investigation

Important since working with the original evidence may corrupt the original data

New cards
11

What is the purpose of obtaining network/traffic logs? Where can they be obtained?

Data acquisition and investigation. 

Firewalls, network flow data, event logs

New cards
12

What is an incident?

Essentially any threat-level event. Not all incidents have the same threat-level, and often some incidents are bigger than others.

New cards
13

What is Incident management?

Refers to the plans that an organization should take to correct hazards and prevent them in the future

New cards
14

What is an incident response plan?

The instructions that help an organization perform incident management: Helps to detect, respond to, and recover from security incidents

New cards
15

What are the phases of an incident response plan?

Preparation
Identification
Containment
Eradication/Recovery
Lessons Learned

New cards
16

What is a CSIRT?

Cyber Security Incident Response Team. 

The team in charge of creating and enforcing the Incident Response Plan

New cards
17

What is the primary goal of incident response?

To effectively remove a threat from the environment while minimizing damages and restoring operations asap

New cards
18

What are the six questions that a digital forensics team answers?

Who
What
Where
When
Why
and How

New cards
19

What is the Incident Response Process?

Preparation
Detection
Analysis
Containment
Eradication & Recovery
Post Incident Activity (Lessons Learned)

New cards
20

What does Chain of Custody protect?

The Integrity of the evidence

New cards
21

What are the types of digital evidence?

Persistent Data and Volatile Data

New cards
22

What are the 5 rules of Evidence

Admissible
Authentic
Complete
Reliable
Believable
Relevant

New cards
23

What is Locard's Exchange Principle?

Every contact, no matter how slight, will leave a trace

New cards
24

What is the best practice in terms of handling digital evidence?

Digital evidence can be contaminated, and therefore you always make a copy, and only ever analyze the copy

New cards
25

What are the categories of digital forensics?

Network forensics
Database forensics
Mobile device forensics
and more

New cards
26

What are some methods for data evidence collection?

Full-disk forensic imaging
Drag and Drop Collection
Targeted Forensic Collection
Volatile Data Collection
Live System Imaging

New cards
27

What are the three areas of preparation?

Prepare the organization
Prepare the Incident Response Team
Prepare the infrastructure

New cards
28

What is the policy for secure storage and handling of evidence?

Must be in a tamper-proof bag or tamper-proof state
Access is controlled
Chain of custody is included

New cards
29

What are the main two types of evidence collection?

Background evidence collection
Foreground evidence collection

New cards
30

What is the difference between Background and Foreground evidence collection?

Background evidence refers to passive data collection, collected as part of normal procedure

Foreground evidence refers to active data gathered to detect crime or identify criminals. Sometimes referred to monitoring

New cards
31

What is the different between reactive and proactive digital forensics?

RDF responds to a crime after the fact
PDF prepares for the eventuality of the crime occurring

New cards
32

What are some types of Intrusion detection?

Honeypots
Tampering detection
Outbound packet inspection
Network mapping

New cards

Explore top notes

note Note
studied byStudied by 18 people
841 days ago
5.0(1)
note Note
studied byStudied by 56 people
820 days ago
5.0(1)
note Note
studied byStudied by 7 people
784 days ago
5.0(1)
note Note
studied byStudied by 52 people
952 days ago
5.0(2)
note Note
studied byStudied by 1 person
77 days ago
5.0(1)
note Note
studied byStudied by 177 people
667 days ago
5.0(1)
note Note
studied byStudied by 68 people
788 days ago
5.0(1)
note Note
studied byStudied by 27 people
55 days ago
5.0(3)

Explore top flashcards

flashcards Flashcard (232)
studied byStudied by 66 people
19 days ago
5.0(2)
flashcards Flashcard (65)
studied byStudied by 7 people
573 days ago
5.0(1)
flashcards Flashcard (23)
studied byStudied by 12 people
762 days ago
4.0(1)
flashcards Flashcard (27)
studied byStudied by 5 people
647 days ago
5.0(2)
flashcards Flashcard (40)
studied byStudied by 153 people
152 days ago
5.0(1)
flashcards Flashcard (54)
studied byStudied by 72 people
496 days ago
5.0(2)
flashcards Flashcard (37)
studied byStudied by 5 people
671 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 5 people
680 days ago
4.0(1)
robot