Chapter 13 - Legal Issues Flashcards
1
Q
What are the different phases of the Security Incident Lifecycle?
A
- Preparation
- Detection, Analysis, Escalation
- Containment
- Eradication
- Recovery
- Reporting
- some organizations may have regulatory and legal requirements to report any significant data breaches - Lessons Learned
- Implement Countermeasures
2
Q
When handling evidence, what must be done in order to ensure evidence integrity and validity?
A
Chain of Custody
3
Q
What are the three phases of a Computer Forensic Investigation?
A
- Acquisition
- Authentication
- Analysis
4
Q
What are some examples of common Forensic Toolkits?
A
Forensic Toolkit (FTK)
- Disk imaging, scanning and disk examination
Computer Online Forensic Evidence Extractor (COFEE)
- MS data analysis, distributed by Interpol
The Coroners Toolkit (TCT) The Sleuth Kit (TST)
- UNIX based analysis
5
Q
What is the Daubert Method?
A
The Daubert Method confirms the validity of evidence presented at a court of law.
6
Q
What are the 5 different components of the Daubert Method?
A
- Testability
- Has the technique been empirically tested and is it reliable and replicable? - Acceptance
- Has the technique been subject to peer review and publication? - Error Rate
- What is the known error rate of the technique? - Credibility
- What are the expert’s qualifications and is the technique replicable? - Clarity
- Can the technique, methodology and result be explained with sufficient clarity in a court of law?