Cybersecurity

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/37

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:53 AM on 2/26/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

38 Terms

1
New cards
Cyber Forensics
The process of collecting, analyzing, and preserving digital evidence to investigate cybercrimes and incidents.
2
New cards
Key goals of Cyber Forensics
Identify and recover digital evidence, analyze its authenticity and integrity, determine the scope of a cyber incident, and provide evidence for legal proceedings.
3
New cards
Volatile data
Data that can be lost when a system is powered off.
4
New cards
Live Analysis
Analyzing a system while it's running to gather evidence from volatile memory and active processes.
5
New cards
Post-mortem Analysis
Analyzing data after a system has been shut down to examine the state of files, artifacts, and configurations.
6
New cards
RAM analysis
Extracting and analyzing the contents of a system's volatile memory to gather information about running processes, open files, and potential malware.
7
New cards
Incident documentation
Recording detailed information about a situation, actions taken, evidence collected, and analysis results.
8
New cards
Event reconstruction
Piecing together a sequence of events based on collected evidence to create a cohesive narrative of the incident.
9
New cards
Recover deleted files
Recovering files from the storage media using specialized tools that identify and restore data marked as deleted but not yet overwritten.
10
New cards
Metadata
Additional information about a file or document, such as creation and modification dates, author information, and file properties.
11
New cards
Preservation of digital evidence
Creating forensic images of storage media using write-blocking tools to prevent alteration, maintaining a strict chain of custody.
12
New cards
Hashing
The process of converting data into a fixed-size string of characters, used to verify the integrity of evidence.
13
New cards
Hash analysis
Calculating and comparing hash values of files to verify integrity and ensure authenticity of evidence.
14
New cards
Write-blocker
A tool used to prevent write access to storage media during evidence collection to ensure data integrity.
15
New cards
Blockchain forensics
Analyzing transactions on blockchain networks to uncover potential fraudulent activities or unauthorized transactions.
16
New cards
Chain of custody
A documented record of the possession, control, transfer, and disposition of evidence to maintain integrity for legal proceedings.
17
New cards
Disk imaging
Creating a bit-for-bit copy of an entire storage device for analysis without altering the original evidence.
18
New cards
File system analysis
Examining the structure and contents of a storage device's file system to retrieve information about files and access permissions.
19
New cards
Recover data from encrypted storage
Requires decryption using the appropriate encryption keys for evidence analysis.
20
New cards
Data carving
Recovering files and fragments from storage media without relying on file system metadata.
21
New cards
Admissibility of digital evidence
Collecting, preserving, and analyzing evidence following standardized procedures to maintain chain of custody and authenticity.
22
New cards
Analyze USB devices
Examining metadata, identifying connected systems, retrieving files, and understanding usage history for evidence.
23
New cards
Image forensics
Analyzing digital images to detect tampering, alterations, or signs of manipulation.
24
New cards
Network forensics
Analyzing network traffic and logs to identify unauthorized activities and potential security breaches.
25
New cards
Determine the origin of an email
Email headers contain information for tracing the sender and route taken for delivery.
26
New cards
Email forensics
Analyzing email messages, attachments, headers, and metadata for evidence related to communication and potential security breaches.
27
New cards
Analyze email attachments for potential malware
Scanning attachments using antivirus tools and examining file headers for malware detection.
28
New cards
Analyze email headers
Examining headers to trace the route an email took through various mail servers.
29
New cards
Network packet analysis
Examining the contents of network packets to understand communication patterns and detect unauthorized activities.
30
New cards
Analyze network traffic
Monitoring patterns and anomalies in communication to identify potential security breaches.
31
New cards
Data retention policies
Policies dictating how long data is stored and its management impacting the availability of historical data for analysis.
32
New cards
Analyze network logs
Monitoring authentication logs and correlating events to uncover unauthorized access attempts.
33
New cards
Forensic artifact analysis
Examining artifacts left by systems, applications, and user activities for insights into actions and behaviors.
34
New cards
Signs of malware infection
Unusual network traffic, unexpected behavior, altered timestamps, and suspicious files or processes.
35
New cards
Timeline analysis
Creating a chronological sequence of events to reconstruct the actions on a system.
36
New cards
Log analysis
Reviewing system and application logs to identify events, anomalies, and potential security breaches.
37
New cards
File signature analysis
Identifying files based on unique signatures or patterns for classification.
38
New cards
Automated analysis tools
Using scripts or software to process and analyze large volumes of data quickly to identify patterns and anomalies.