Chapter 1: The Need for Computer Forensics Flashcards

Defining computer forensics, Understanding corporate forensic needs and law enforcement forensic, being a tryhard narc

1
Q

Name some examples of electronic discovery items.

A

Electronic documents for litigation. Examples of such are e-mail، word-processing documents، plaintext files، database files، spreadsheets، digital art، photos، and presentations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who works under more restrictive rules، law enforcement officials or corporate employees?

A

“Law enforcement officials work under more restrictive rules than corporate agents or employees.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is social engineering hard to prevent and detect?

A

“Because employers have very little influence over lack of common sense or ignorance on the part of employees. That said، employee education is the best counter against ignorance. Most business environments are fast-paced and service-oriented.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why aren’t incidents reported in many corporate environments?

A

Often due to the issue of legal liability. The “Let’s just quietly fix it” approach to security incidents is common in the corporate world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What law was passed to avoid future accounting scandals such as those involving Enron and WorldCom?

A

The Sarbanes-Oxley Act، named for the two Congressmen who sponsored it، was passed to restore the public’s confidence in corporate governance by requiring chief executives of publicly traded companies to personally validate financial statements and other information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name some factors that help to determine which criminal cases get priority.

A

The Amount of Harm Inflicted، Crime Jurisdiction، Success of Investigation، Availability and Training of Personnel، Frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name a good resource for computer forensic training for law enforcement.

A

The National Center for Missing and Exploited Children (NCMEC)،

To become a narc: Certified Computer Examiner (CCE)، The SANS Institute، International Association of Computer Investigative Specialists (IACIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In looking at the major concepts behind computer forensics، the main emphasis is on data recovery. To do that you must:

A
  1. Identify meaningful evidence
  2. Determine how to preserve the evidence
  3. Extract، process، and interpret the evidence
  4. Ensure that the evidence is acceptable in a court of law
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does computer forensic review entail?

A

Computer forensic review involves the application of investigative and analytical techniques to acquire and protect potential legal evidence; therefore، a professional within this field needs to have a detailed understanding of the local، regional، national، and sometimes even international laws affecting the process of evidence collection and retention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who is/was Alberto Gonzalez and what is he most famous for?

A

Alberto Gonzalez، 28، led a hacking and identity theft ring that compromised record-breaking numbers of credit cards. Gonzalez received the longest sentence imposed for criminal hacking to date. In March 2010، in separate cases، U.S. District Court judges sentenced Gonzalez to two 20-year prison terms for hacking into several retail networks and a major payment processor. The second prison sentence، 20 years and one day، was for two counts of conspiracy for assisting others in breaching the networks of card processor Heartland Payment Systems، supermarket chain، Hannaford Brothers Co. Inc.، and nationwide convenience store chain، 7-Eleven.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What would happen in a complex case if the jury، prosecutor، and judge did not understand computer-related evidence?

A

More likely than not، the defendant would end up getting away with the crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the hardest environment to control?

A

The hardest environment to control is the end user’s environment. Training and education are vital to any organization with computer users and Internet access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who is/was Mikalai Mardakhayeu and what is he most famous for?

A

In June 2010، Mikalai Mardakhayeu was arrested and charged for his alleged role in an online phishing scam. The international scam was designed to steal U.S. taxpayer income tax refunds. Mardakhayeu is a Belarusian national living in Massachusetts. He was charged with conspiracy and wire fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who is/was Robert Matthew Bentley and what is he most famous for?

A

In June 2008، a federal judge sentenced 21-year-old Robert Matthew Bentley to 41 months in prison and payment of $65،000 in restitution for conspiracy and computer fraud. Bentley and others (who are still being investigated) infected hundreds of computers in Europe with adware. The cost to detect and neutralize the adware was tens of thousands of dollars. Bentley and his co-conspirators were paid for installing the adware through a Western European-based operation called “Dollar Revenue.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between monitoring and checking logs?

A

The textbook doesn’t state this، but I thought it should be included in my own words. Monitoring is the process of observing in real time while checking logs is the process of looking at data retrospectivley.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What must you do in addition to monitoring?

A

You can monitor as much or as little as you want، but if you don’t read the logs، they cannot serve their intended purpose.