Computer Forensics s4

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/13

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts and terms related to computer forensics, including crime scene analysis, data storage, evidence handling, internet activity, and mobile forensics.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

Types of computers involved in crime casework

Desktops, laptops, servers, mobile devices, tablets, embedded systems, and cloud-based platforms.

2
New cards

First step in analyzing a computer crime scene

Securing the scene and preserving digital evidence to prevent tampering or data loss.

3
New cards

Types of computer crime

Hacking, identity theft, cyberstalking, phishing, malware distribution, data breaches, and intellectual property theft.

4
New cards

Hardware components of a computer

CPU, RAM, hard drive, motherboard, input/output devices.

5
New cards

Software components of a computer

Operating system, applications, drivers, and utilities.

6
New cards

Data storage in a hard disk drive

Data is stored magnetically in sectors and tracks; file systems like NTFS or FAT32 are used to locate and retrieve files.

7
New cards

Proper procedure for preserving computer evidence

Document the scene, photograph devices, disconnect power (if volatile data isn’t needed), use write-blockers for imaging, and maintain chain of custody.

8
New cards

Visible data

Files accessible through normal means.

9
New cards

Latent data

Deleted files, metadata, hidden partitions, and slack space recovered through forensic tools.

10
New cards

User's Internet activities investigation areas

Browser history, cache, cookies, bookmarks, downloads folder, email clients, chat logs, and system logs.

11
New cards

Role of IP in forensic investigations

IP addresses help trace the origin and destination of online activity, identify devices, and correlate logs across systems.

12
New cards

Techniques for investigating unauthorized computer intrusion

Log analysis, malware scanning, network traffic monitoring, file integrity checks, and timeline reconstruction.

13
New cards

Services offered by modern mobile services

Messaging, GPS, cloud sync, social media, banking, and health tracking.

14
New cards

Investigative value of mobile services

Location history, communications, app usage, and synced data across devices.