Chapter 11 & 12 Flashcards

1
Q

phishing

A

e-mails contain links to text on a Web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Spear phishing

A

Targets a specific individual or group in an organization. Goals steal login credentials, trade secrets, financial documents, event details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Whaling-Phishing

A

Targets executive level employees in an organization. Often accomplished through social engineering. Goals get target to authorize wire transfers, provide login credentials, divulge sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Smishing

A

Fraudulent text messages meant to trick a person into revealing sensitive data or clicking on a malicious link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vishing

A

Fraudulent phone calls that induce a person to provide personal information or give remote access to their computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Pharming

A

DNS poisoning takes user to a fake site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spoofing

A

A technique used in spam and phishing attacks to trick a user
into thinking the email came for an person or entity they know an trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BEC

A

Business email compromise. A legitimate email account is taken
over. Fraudulent messages sent from the legitimate email account to trick someone into sending money or divulging sensitive info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Enhanced/Extended Simple Mail Transfer Protocol (ESMTP)

A

number in the message’s header to check for legitimacy of email. Reasons for email being bounced – Error codes can be looked up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

applicable privacy laws

A

Electronic Communications Privacy Act (ECPA) and the Stored
Communications Act (SCA) apply to e-mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Forensic Linguistics

A

Where language and law intersect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Examining E-mail Messages

A

-Find and copy any potential evidence
* Access protected or encrypted material
* Print e-mails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Viewing E-mail headers

A

GUI clients
Web-based clients

After you open e-mail headers, copy and paste them into a text document
* So that you can read them with a text editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Information contained in headers?

A

-The main piece of information you’re looking for is the originating e-mail’s IP address
* Date and time the message was sent
* Filenames of any attachments
* Unique message number (if supplied)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tracing

A

Determining message origin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What consists of Router logs?

A
  • Record all incoming and outgoing traffic
  • Have rules to allow or disallow traffic
  • You can resolve the path a transmitted e-mail has taken
17
Q

Email logs identify:

A
  • E-mail messages an account received
  • Sending IP address
  • Receiving and reading date and time
  • E-mail content
  • System-specific information
18
Q

E-mail forensic tools

A
  • DataNumen for Outlook and Outlook Express
  • FINALeMAIL for Outlook Express and Eudora
  • Sawmill-Novell GroupWise for log analysis
  • MailXaminer for multiple e-mail formatas and large data sets
  • Fookes Aid4Mail and MailBag Assistant
  • Paraben E-Mail Examiner
  • AccessData FTK for Outlook and Outlook Express
  • Ontrack Easy Recovery EmailRepair
  • R-Tools R-Mail
  • OfficeRecovery’s MailRecovery
19
Q

Online social networks (OSNs)

A

are used to conduct business, brag
about criminal activities, raise money, and have class discussions

20
Q

what can you rely on for business investigations?

A

For many e-mail investigations you can rely on e-mail message files, headers, and server log files

21
Q

Code Division Multiple Access (CDMA)

A

is a digital cellular technology that allows multiple users to access a shared communication channel simultaneously.

22
Q

Global System for Mobile Communications (GSM)

A

uses the Time
Division Multiple Access (TDMA) technique

widely used mobile communication standards globally
Multiple phones take turns sharing a channel

23
Q

MSISDN

A

Mobile Station International Subscriber Directory Number – Number
which you call or send text messages from. Linked to SIM

24
Q

IMEI –

A

International Mobile Equipment Identifier – Unique 15 digit number
identifies GSM and other types of phones. Differs from a serial number because the IMEI is broadcast with every transmission

25
Q

IMSI

A

Individual Mobile Subscriber Identity – 15 digit number tied to SIM card. Identifies Subscriber, Carrier, and Mobile Network.

26
Q

Pros of GSM

A
  • Advantage – Users can transmit data and make phone calls at the same time.
    Not so with CDMA.
  • GSM powered devices are cheaper and easier to produce.
27
Q

OS is stored in ROM

A
  • Nonvolatile memory
  • Available even if the phone loses power
28
Q

Subscriber identity module (SIM) cards

A

Found most commonly in GSM devices
Consist of a microprocessor and internal memory

29
Q

Internet of Things (IoT)

A

The number of devices that connect to the Internet is higher than the
amount of people
- That number is expected to reach 50 billion in the next few decades

30
Q

Base transceiver station (BTS)

A

Commonly referred to as cell towers.
Fixed transceiver. Main communications point for multiple wireless mobile
client devices.

31
Q

Base station controller (BSC)

A

Controls and monitors number of Base Stations. Interface between cell sites and mobile switching centers

32
Q

Mobile switching center (MSC)

A

Multi-function. Call setup and routing,
conference calling & fax, SMS text routing. Base stations connect to it. It is
an interface to other networks and PSTN.

33
Q

PSTN –

A

Public Switched Telephone Network. In use in one form or another for
a century. POTS – Plain Old Telephone System. Carries landline and cell voice
calls. Copper wiring to homes, switching centers and cellular networks.
Costly to maintain.

34
Q

VOIP

A

Voice Over IP. Uses Internet connection rather than PSTN. For voice
and other communications.
Mobile Phone Basics (5 of 5)

35
Q

Four things in SIM cards

A
  1. the Network Authentication information where the SIM card contains information necessary to authenticate the subscriber to the mobile network.
  2. The contacts and phonebook data where the SIM cards can store contact information like names and phone numbers.
  3. SMS(short message service) Data where text messages are stored.
  4. Security features the SIM cards often include features such as PIN codes that protect the SIM card.