Lemma Final Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/371

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

372 Terms

1
New cards

What is Computer Forensics?

The use of analytical and investigative techniques to identify, collect, examine, and preserve evidence/information which is magnetically stored or encoded.

2
New cards

What is the role of first responders in computer forensics?

First responders play a critical role; improper handling of evidence can render it unusable for prosecution.

3
New cards

What are the five principles outlined in the Council of Europe’s Electronic Evidence Guide?

Data integrity, Audit trail, Specialist support, Appropriate training, and Legality.

4
New cards

What are the four steps of examination according to the Scientific Working Group on Digital Evidence (SWGDE)?

Visual inspection, Forensic duplication, Media examination, and Evidence return.

5
New cards

What are the initial steps in the U.S. Secret Service Forensics Guidelines?

Secure the scene and make it safe, take immediate steps to preserve evidence, and determine whether you have a legal basis to seize the computer.

6
New cards

According to U.S Secret Service Forensics Guidelines, what action should be taken if a computer is believed to be destroying evidence?

Shut down the computer by pulling the power cord.

7
New cards

List three evidence gathering principles.

Touch as little as possible, leave a document trail, and secure the evidence.

8
New cards

What elements should be included in the chain of custody?

Discovery of the evidence, collection location, date and time of collection, names of everyone who had access, and names of everyone who “owned” the evidence.

9
New cards

What does the FBI recommend regarding the preservation of a computer's state by the first responder?

Making a backup copy of any logs, damaged or altered files, and files left by the intruder.

10
New cards

Name four locations where evidence can be found on a PC.

Browser history, index.dat file, system logs, and Windows Registry.

11
New cards

Name some examples of computer evidence beyond PCs and laptops.

Logs, portable storage devices, e-mails, and devices capable of storing data like iPods, iPads, and cell phones.

12
New cards

What information can be found in the Windows Registry regarding USB devices?

HKEYLOCALMACHINE\SYSTEM\ControlSet\Enum\USBSTOR lists USB devices that have been connected to the machine; MountPoints2 will indicate what user was logged onto the system when the USB device was connected.

13
New cards

What type of information can be gathered from a cell phone for forensics?

Photos, videos, text messages, call times and durations, and contact names and phone numbers.

14
New cards

What are some general rules for gathering evidence from a cell phone?

Document the cell phone make, model, and condition and photograph the initial screen of the phone. The SIM card will be the location of most of what you need to find.

15
New cards

What is Logical Acquisition of a cell phone?

Copying the active file system from the device into another file.

16
New cards

What is Physical Acquisition of a cell phone?

Creating a physical bit-by-bit copy of the phone's memory.

17
New cards

What is Chip-off Forensics?

The practice of removing a memory chip, or any chip, from a circuit board and reading it.

18
New cards

How is JTAG used for cell phone forensics?

Joint Test Action Group is a less extreme method where JTAG ports can be used to retrieve a physical image of the data without removing the chip.

19
New cards

Name four common cellular network technologies.

GSM (2G), EDGE (Pre-3G), UMTS (3G), and LTE (4G).

20
New cards

What does SIM stand for in cell phone terminology?

Subscriber Identity Module.

21
New cards

What is an IMEI?

International Mobile Equipment Identity; unique ID for GSM, UMTS, LTE, and satellite phones; can be “blacklisted” even if the user changes the SIM card.

22
New cards

List four forensic tools.

AccessData Forensic Toolkit, EnCase, The Sleuth Kit, OSForensics.

23
New cards

What is the Daubert Standard?

Any scientific evidence presented in a trial must have been reviewed and tested by the relevant scientific community.

24
New cards

What is the initial step in the scientific method?

Formulating a hypothesis which is a question that can be tested.

25
New cards

Give three examples of Computer Forensics Certifications.

Computer Hacking Forensic Investigator (CHFI), Certified Forensic Computer Examiner (CFCE), SANS certifications.

26
New cards

What is a growing concern as networks connect through the Internet?

Cyber terrorism

27
New cards

List three reasons why people engage in espionage.

Economic gain, grudge, and ideology

28
New cards

What approach should be used for information access to defend against espionage?

A need-to-know approach

29
New cards

What should be done with old disks/tape backups/CDs to defend against espionage?

They should be melted.

30
New cards

What should be done with terminated employees' PCs to defend against espionage?

They should be scanned carefully.

31
New cards

What should employees with access to sensitive data sign?

A nondisclosure statement

32
New cards

Give four examples of potential harm from terrorist attacks.

Direct economic damage, economic disruption, compromising sensitive/military data, and disrupting mass communications

33
New cards

What can result from an out-of-service e-commerce site?

Lost revenue from sales

34
New cards

What is the focus of general attacks in cyber terrorism?

Economic chaos

35
New cards

What is one defense strategy at the state and national level to prevent cyberterrorism?

Greater law enforcement attention to computer crimes

36
New cards

What is involved in propaganda, in the context of cyber terrorism?

Putting an undisclosed political spin on what claims to be objective news

37
New cards

How is public perception affected in information control?

By the amount and type of information available and the language used

38
New cards

What is the function of a packet sniffer?

It intercepts packets on a network or the Internet and copies their contents for analysis

39
New cards

Name one reason for using a packet sniffer.

To ensure packets are encrypted.

40
New cards

What is CommView?

Basic packet sniffing software that provides statistics regarding captured packets

41
New cards

What is EtherDetect?

A tool to study specific packets, simpler than CommView but without statistics or graphs

42
New cards

What is WireShark?

A free, easy-to-use packet analyzer with a GUI and filters to drill down on data

43
New cards

List four pieces of information provided by packet sniffers.

Source IP address, destination IP address, protocol of the packet, contents of the packet

44
New cards

What is a white hat hacker?

A white hat hacker, also known as a pen-tester, hacks with the permission of the target system owners.

45
New cards

What is a black hat hacker?

A black hat hacker gains unauthorized access to a system with malicious intent, often referred to as a cracker.

46
New cards

What is a gray hat hacker?

A gray hat hacker typically abides by the law but may occasionally engage in illegal activities.

47
New cards

What does passively searching for information involve?

Gathering information without directly connecting to the target system, such as using tools like www.netcraft.com or http://archive.org.

48
New cards

What is active scanning?

Actively probing a target network to discover open ports, services, and vulnerabilities.

49
New cards

What activities are included in active scanning?

Port scanning (Ping, Connect, SYN, FIN scans) and Enumerating (finding computers, shared folders, and users).

50
New cards

What are some useful tools for identifying vulnerabilities?

Shodan.io, NSAuditor, FreeNetEnumerator, and Nmap.

51
New cards

VERY DUMB FLASHCARD

VERY DUMB FLASHCARD

52
New cards

What is involved in physical access attacks?

Bypassing the password using tools like OphCrack or tricking tech support.

53
New cards

ANOTHER DUMB ONE

ANOTHER DUMB ONE

54
New cards

What is SQL injection?

An attack that exploits vulnerabilities in a database by injecting malicious SQL code.

55
New cards

What is Cross-Site Scripting (XSS)?

An attack that injects client-side scripts into web pages viewed by other users.

56
New cards

How does bypassing the password work?

Boot to a Linux disc, access the Windows volume, backup the magnify application, replace Magnify.exe with cmd.exe, and reboot in Windows.

57
New cards

What is OphCrack?

A tool used to crack Windows passwords by booting the system in Linux and using rainbow tables to crack the SAM file.

58
New cards

How does SQL injection work?

By adding 'OR X=X' to the end of a password to bypass authentication if code is not well written.

59
New cards

What are some Wi-Fi hacking techniques?

Jamming, de-authentication, Wi-Fi Protected Setup (WPS) attacks, and cracking the password.

60
New cards

What is de-authentication in Wi-Fi hacking?

Sending a logoff packet to the WAP, spoofing the user’s IP address to trick them into logging back in through a rogue access point.

61
New cards

What are some typical actions Trojan Horses take?

Delete files, spread other malware, launch DDoS attacks, search for personal information, install back doors.

62
New cards

Name some notorious Trojan Horses.

Back Orifice, Anti-Spyware 2011, Sheldun, Brain Test, FinFisher, NetBus, FlashBack, GameOver Zeus, Linux Trojan Horses, Portal of Doom.

63
New cards

How does Back Orifice work?

Allows control over TCP/IP, is self-installing, can be attached to legitimate applications, doesn't appear in the task list, and is best removed through the registry.

64
New cards

How does NetBus work?

Similar to Back Orifice, only works on port 20034, simple to check for infection, removal through the registry, and has an easy-to-use GUI.

65
New cards

What are some capabilities of the Portal of Doom Trojan Horse?

Open/close CD tray, shut down system, open files/programs, access drives, change passwords, log keystrokes, take screenshots.

66
New cards

What are some symptoms of a Trojan Horse infection?

Home page changes without user action, password/username/account changes, screen saver changes, mouse setting changes, and devices working on their own.

67
New cards

What technological measures can be taken to prevent Trojan Horses?

Use antivirus software, firewalls, and intrusion detection systems.

68
New cards

What policy measures can be taken to prevent Trojan Horses?

Never download unsafe/unexpected attachments, close unused ports, avoid downloading browser skins/toolbars/screen savers/animations, scan downloads before use, be cautious of hidden file extensions.

69
New cards

What are the two methods to remove Gator (Adware)?

Add/remove programs and the registry.

70
New cards

What are some concerns regarding RedSheriff (Spyware)?

Uncertainty about what data is collected and negative reactions to website monitoring.

71
New cards

What are two popular antispyware applications?

Spy Sweeper and Zero Spyware.

72
New cards

What are some antispyware policies that can be implemented?

Avoid downloading unsafe attachments, configure browser to block cookies (especially third-party), block scripts without user awareness, utilize pop-up blockers.

73
New cards

What types of downloads should be avoided if their safety is uncertain?

Applications, browser skins, screen savers, and utilities.

74
New cards

What ports are used by Back Orifice?

31337 and 31338

75
New cards

What is the best way to protect against Trojan Horses and Spyware?

Virus scanners and appropiate policies

76
New cards

Why is adware more of a nuisance than a real security threat?

There is a threshold of adware that can make a system unusable

77
New cards

What is the role of policies in technology usage?

Policies designate how technology can be used, by whom, and for what purpose.

78
New cards

What areas should effective user policies cover?

Passwords, Internet use, e-mail attachments, software installation/removal, IM, and desktop configuration.

79
New cards

What are the key aspects of password policies?

Never write down or share passwords; contact admin if compromised; trace login attempts on old passwords.

80
New cards

Give examples of legitimate Internet use for businesses.

Checking competitor websites, checking business ratings, and checking weather conditions for business travel.

81
New cards

Give examples of inappropriate Internet use on a company network.

Searching for a job, pornographic use, violating laws, conducting personal business.

82
New cards

Give examples of 'gray' areas in Internet use policies.

Online shopping or reading news during breaks.

83
New cards

Under what conditions is it acceptable to open an e-mail attachment?

If expected, or if from a known source and appears legitimate.

84
New cards

List scenarios when you should never open an e-mail attachment.

From unknown source, active code/executable, animation/movie, or illegitimate-looking e-mail.

85
New cards

What are some software installation and removal policies businesses can enforce?

Limit user privileges, scan and approve installations, and optionally remove optical drives.

86
New cards

What are the key aspects of instant messaging policies?

Prohibit if not necessary; if necessary, restrict to business issues; no confidential information.

87
New cards

Why should desktop personalization be controlled through policies?

Potential virus risks and the ability to configure harmful system settings.

88
New cards

What are best practices for implementing user policies?

Require sign-off, clearly define policies, and clearly define consequences.

89
New cards

What events may require different system administration policies?

New employees, leaving employees, change requests, and security breaches.

90
New cards

What policies should be in place for new employees regarding system access?

Document access granting, require a signed RTA from an authorized manager, and file the request.

91
New cards

What steps should be taken when an employee leaves the company?

Disable accounts, return keys, shut off access, cancel mainframe accounts, and search workstation hard drive.

92
New cards

What steps should be included in a change control process?

Manager approval, IT verification, security issue identification, implementation plan, and scheduled notification.

93
New cards

List some examples of security breaches.

Virus infection, denial of service attacks, and intrusion by a hacker.

94
New cards

What steps should be taken in response to a virus infection?

Quarantine files, scan and clean machines, log incident, bring online in stages, notify leaders, and meet with IT.

95
New cards

What steps should be taken in response to a denial of service attack?

Utilize firewall/IDS, deny access from originating IP, find the owner of the IP and inform them, log activities, and inform leaders.

96
New cards

What steps should be taken in response to an intrusion by a hacker?

Copy logs, scan for Trojans and changes, document everything, change passwords, and inform leaders.

97
New cards

What access control concepts should be followed?

Following the concept of 'least privileges'.

98
New cards

What is true about defining access control?

The need for trade-offs.

99
New cards

What are important aspects of developmental policies?

Check code for malware, implement error handling, follow secure communication guidelines, document port usage, and require vendors to disclose security flaws.

100
New cards

What areas should security policies cover?

New employees, outgoing employees, access control, emergency response, and application/website security.