cyber investigations

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/163

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

164 Terms

1
New cards

What are the three ways computers relate to crime?

Mere evidence, instrumentality, and contraband.

2
New cards

 Why is cybercrime harder to investigate?

Anonymity, automation, global reach, and legal challenges (encryption, jurisdiction).

3
New cards

What four questions do investigators ask in cases involving digital evidence?

Was a crime committed? What happened? Who did it? Why did they do it?

4
New cards

Do most cases today involve digital evidence?

Yes—nearly all investigations involve digital elements.

5
New cards

What does the processor do?

Executes instructions and calculations.

6
New cards

What is RAM?

Volatile memory used for running programs.

7
New cards

What is long-term storage?

Devices like HDDs, SSDs, USB drives.

8
New cards

What is the difference between programs and data?

Programs instruct; data is information processed.

9
New cards

What is an OS?

A program that controls hardware and manages other programs.

10
New cards

What is a bit?

 The smallest unit of digital data (0 or 1).

11
New cards

What is a file system?

Method of organizing data on a disk.

12
New cards

Do deleted files disappear immediately?

No—they move to unallocated space until overwritten.

13
New cards

What is a virtual machine?

A software-simulated computer.

14
New cards

In networking, what is the server?

Device providing resources.

15
New cards

What is a MAC address?

A unique hardware identifier for a network interface.

16
New cards

What is an IP address?

Numerical address identifying a device on a network.

17
New cards

What is a packet?

A chunk of data sent across a network.

18
New cards

What does a router do?

Connects networks and routes traffic.

19
New cards

What are ports?

Numbers that identify which program handles incoming data.

20
New cards

What does “whois” do?

Displays domain and IP ownership information.

21
New cards

What do logs show?

Connections, authentication, processes, errors, and activity history.

22
New cards

Why is cloud computing challenging for investigators?

Data may be stored in other countries, raising jurisdiction issues.

23
New cards

What is a VPN?

Encrypted tunnel that hides a user’s IP.

24
New cards

What does a proxy server do?

Forwards traffic on behalf of a user; may log activity.

25
New cards

What is Tor?

Network using onion routing for anonymity.

26
New cards

What are hidden services?

Tor-hosted sites ending in .onion.

27
New cards

What is the dark web?

Internet content accessible only through special software.

28
New cards

What is the blockchain?

Public ledger of all Bitcoin transactions.

29
New cards

What is a public key?

Address to receive cryptocurrency.

30
New cards

What is a private key?

Secret needed to authorize transactions.

31
New cards

Are Bitcoin transactions anonymous?

Pseudonymous—identities can be uncovered with analysis.

32
New cards

What is CCIPS?

DOJ Cybercrime & Intellectual Property Section.

33
New cards

What determines 4th Amendment protection?

Reasonable expectation of privacy (Katz test).

34
New cards

What is the foregone conclusion doctrine?

Government can compel acts if it already knows the evidence exists.

35
New cards

Are passwords protected under the 5th Amendment?

Often yes—password entry is considered testimonial.

36
New cards

What can a subpoena obtain?

Subscriber information.

37
New cards

What can a court order obtain?

Transactional records.

38
New cards

What requires a warrant?

Content of communications.

39
New cards

What is a Title III order used for?

Live interception (wiretaps).

40
New cards

Are border searches usually warrantless?

Yes, but courts are increasing scrutiny for digital devices.

41
New cards

What is the number one rule in digital forensics?

Change nothing.

42
New cards

What is chain of custody?

Documentation of who handled evidence and when.

43
New cards

What is a write-blocker?

Device that prevents data from being modified during forensic imaging.

44
New cards

What is hashing used for?

Verifying evidence integrity.

45
New cards

What is the difference between physical and logical imaging?

Physical = full disk copy; logical = accessible files only.

46
New cards

 What do MAC times represent?

Modified, accessed, created timestamps.

47
New cards

What does metadata reveal?

Info about a file (author, creation, location).

48
New cards

What is EXIF data?

Metadata embedded in photos (GPS, camera model, timestamps).

49
New cards

What are Windows Prefetch files?

Artifacts showing program execution history.

50
New cards

What is the goal of attribution?

Prove who operated the device.

51
New cards

What evidence helps attribute activity?

Accounts, logs, timestamps, unique user data, location data.

52
New cards

Why are phone extractions challenging?

Encryption, rapid connectivity, ability to wipe remotely.

53
New cards

How can phones be isolated?

Airplane mode, removing SIM, Faraday bags.

54
New cards

What is a physical extraction?

Copy of all data including deleted contents.

55
New cards

What is JTAG/chip-off?

Hardware-level extraction methods.

56
New cards

Why is IoT forensics challenging?

Data is often stored in the cloud, not on the device.

57
New cards

Examples of IoT devices?

Smart speakers, wearables, home cameras, connected vehicles.

58
New cards

Why is child exploitation common online?

Easy anonymous distribution and global connectivity.

59
New cards

What is CSAM?

Child s*xual abuse material.

60
New cards

What does NCMEC do?

Central hub for reporting/extending child exploitation cases.

61
New cards

What federal act allows civil commitment of predators?

Adam Walsh Act.

62
New cards

Digital Evidence

Any data stored or transmitted using a computer or electronic device.

63
New cards

Forensic Image

A bit-for-bit copy of a digital device.

64
New cards

Write-Blocker

A device that prevents modification of evidence during collection.

65
New cards

Hash Value

A unique digital fingerprint used to verify file integrity.

66
New cards

Chain of Custody

Documentation of every person who handled evidence.

67
New cards

Unallocated Space

Disk space not currently used by files, often containing deleted data.

68
New cards

Metadata

Information describing a file (timestamps, creator, device info).

69
New cards

 MAC Times

File timestamps—Modified, Accessed, Created.

70
New cards

RAM (Random Access Memory)

Temporary, volatile memory for active processes.

71
New cards

HDD/SSD

Long-term storage devices (SSDs use flash memory).

72
New cards

File System

Method an operating system uses to organize data (e.g., NTFS, FAT).

73
New cards

Virtual Machine (VM)

A software-based computer environment.

74
New cards

IP Address

Numerical label identifying a device on a network.

75
New cards

MAC Address

Hardware identifier unique to a network card.

76
New cards

Packet

Small chunk of data sent across a network.

77
New cards

Router

Device that connects networks and routes traffic.

78
New cards

Port Number

Numeric identifier specifying a program/network service.

79
New cards

Client/Server Model

A system where clients request resources and servers provide them.

80
New cards

VPN (Virtual Private Network)

Encrypted tunnel hiding a user’s IP address.

81
New cards

Proxy Server

Intermediary server forwarding client requests.

82
New cards

Tor (The Onion Router)

Network that anonymizes traffic through layered relays.

83
New cards

Onion Routing

Technique of encrypting traffic multiple times through different nodes

84
New cards

Hidden Service (.onion)

Tor-accessible site keeping server location anonymous.

85
New cards

Dark Web

Internet content accessible only with specialized software like Tor.

86
New cards

Blockchain

Public, immutable ledger of cryptocurrency transactions.

87
New cards

Public Key

Cryptocurrency address used to receive funds.

88
New cards
89
New cards

Private Key

Secret key required to spend cryptocurrency.

90
New cards

Pseudonymity

Being identified by a digital alias rather than a real identity.

91
New cards

Contraband (Digital)

Illegal data stored on a device (e.g., CSAM).

92
New cards

Instrumentality

When a computer is used to commit a crime.

93
New cards

 ECPA (Electronic Communications Privacy Act)

Governs access to electronic communications by law enforcement.

94
New cards

SCA (Stored Communications Act)

Regulates access to stored electronic data.

95
New cards

Title III Order

Court order permitting real-time interception (wiretap).

96
New cards

Foregone Conclusion Doctrine

Government can compel evidence if it already knows it exists.

97
New cards

Attribution

Linking a digital action to a specific individual.

98
New cards

Log File

Recorded data showing system and user activity.

99
New cards

Keyword Search

Searching large data sets for specified terms.

100
New cards

JTAG / Chip-Off

Hardware extraction methods for mobile device data.

Explore top flashcards