Cybercrime Final

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

Review the Basic Process of Storage Forensics.

  • Examiner's main job is to keep evidence consistent from the original source to the final analysis

  • A forensic analyst must show a clear connection between the seized device (evidence device) and the final analysis

  • Evidence remains unchanged on the original device

  • Analysis helps create leads and summaries, but it is not the actual evidence

2
New cards

Review the Preparation for Forensic Analysis. 

  • An analyst must ensure that analysis results come from real evidence, not contamination or mistakes

  • The gold standard is that an analyst must be able to repeat results using procedure notes and the original seized data 

  • Analysis steps must be recorded consistently and reproducibly in the analyst's Activity Log 

  • Best practice is to follow standard procedures for evidence types and record any changes, explaining why they are needed

  • These procedures help ensure analysis is reliable and can withstand legal scrutiny in court

3
New cards

Why do we wipe a drive that is used for Analysis?  

So the analysis can prove that the drive was not contaminated

4
New cards

Review the Acquisition of Data

  • the source device should be imaged without using its built-in operating system

  • Field acquisition is not ideal since losing control of the evidence device can make it harder to prove authenticity and maintain the chain of custody in court 

  • Use a true read-only mount for the file system, though this is often difficult with Windows

  • Analysis should be done with the evidence device mounted in read-only mode

5
New cards

Review the Authentication of Data.

  • The prosecutor must prove that the court evidence is unchanged and directly from the defendant

  • Digital forensic analyst has an easier job

  • Forensic analysis results must be proven as genuine and directly from the seized evidence

  • Digital evidence is easier to authenticate than physical evidence due to its unique properties

6
New cards

Review the Imaging of the evidence drive section.

  • With any seized device, it is important to create a working copy for forensic analysis 

    • Best method is to create bit stream copy

7
New cards

Know the rule of best evidence in Court 

  • Original evidence

8
New cards

Know what a FAT or File Allocation Table is and what useful artifacts can be obtained from it.

  • Support older versions of Windows and are often less secure

    • the deleted files are not wiped from drive

9
New cards

Know what the NTFS file system is and the difference between FAT and NTFS

  • Supports newer Windows versions and is more difficult to examine in latest incarnation

    • In FAT files data can sit intact for years 

    • NTFS DOS tools do not work

10
New cards

Know the seven steps of the analysis protocol or process.

  • Understanding the problem

  • Data collection

  • Data cleaning

  • Data analysis

  • Data interpretation

  • Visualization

  • Deployment

11
New cards


Know what a hash is.

  • Unique numerical value calculated from data in a digital data set 

12
New cards

Review the Computer Storage Systems section

  • Two parts:

    • volatile 

    • nonvolatile storage 

  • Experts cannot identify where information is physically found on the evidence device

  • Volatile storage is lost when a device loses power 

13
New cards

Know what a processor is 

  • The fastest part of the computer

14
New cards

Know what cache is

  • Type of memory that supports processor

15
New cards

Know what RAM is and what it holds

  • Large reserve of information storage that supplies data from processor through cache systems

16
New cards

What happens when you defragment a Disk?

  • F A T de-allocates clusters and makes them available for new files

17
New cards

What is the difference between volatile and nonvolatile storage.

  • Volatile

    • Loses data when device is powered off 

  • Nonvolatile 

    • retains data even when off

18
New cards

What is Risk Analysis? 

Predict the most likely outcome and assign resources to handle it effectively

19
New cards

Know the steps of the principles of risk analysis

  • Anticipating the most probable threats

  • Calculating the likely impact of those threats

  • Identifying appropriate controls and resources to reduce the likelihood and/or impact of those threats

20
New cards

What are the threats that risk analysis identifies

  • External threats

  • Internal threats 

  • Natural disasters 

  • Human made vents

21
New cards

Know security technologies, and Backups

  • protecting individual components, such as software, hardware, and connected devices

  • Backups = If data are lost, destroyed, or altered, a backup may provide the only way to recover the data

22
New cards

Know what firewalls are and do

  • Device or software that acts as checkpoint between network or standalone computer and Internet

  • Check all data coming in and going out

23
New cards

Know what encryption is and does

  • Technique of securing data by scrambling data into apparent nonsense but doing so in such a way that message can be recovered by person possessing secret code called a key

24
New cards

Review password Discipline

password policy requirements for strength and expiration

25
New cards

Review the threats section

  • Second important aspect is to identify the threats facing an organization

  • The single-largest threat to an organization and its information security is from within

  • Many times, organizations suffer from key individuals intentionally stealing information or corrupting files

26
New cards

Review the Home users section

  • Cyberattacks have also focused on the home computer user or the remote worker

  • Many computers and individuals can be victimized despite the presence and use of antivirus and other protective programs

27
New cards

What is packet filtering

assigns numbers to computers called Internet protocol addresses 

28
New cards

The number of police agencies with high tech or computer crime units has increased significantly over the last few years.

TRUE

29
New cards

Law enforcement is currently well trained in issues of cybercrime and investigation

FALSE