Chapter 13 - Legal Issues Flashcards

1
Q

What are the different phases of the Security Incident Lifecycle?

A
  1. Preparation
  2. Detection, Analysis, Escalation
  3. Containment
  4. Eradication
  5. Recovery
  6. Reporting
    - some organizations may have regulatory and legal requirements to report any significant data breaches
  7. Lessons Learned
  8. Implement Countermeasures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When handling evidence, what must be done in order to ensure evidence integrity and validity?

A

Chain of Custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three phases of a Computer Forensic Investigation?

A
  1. Acquisition
  2. Authentication
  3. Analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some examples of common Forensic Toolkits?

A

Forensic Toolkit (FTK)
- Disk imaging, scanning and disk examination

Computer Online Forensic Evidence Extractor (COFEE)
- MS data analysis, distributed by Interpol

The Coroners Toolkit (TCT) The Sleuth Kit (TST)
- UNIX based analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Daubert Method?

A

The Daubert Method confirms the validity of evidence presented at a court of law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 5 different components of the Daubert Method?

A
  1. Testability
    - Has the technique been empirically tested and is it reliable and replicable?
  2. Acceptance
    - Has the technique been subject to peer review and publication?
  3. Error Rate
    - What is the known error rate of the technique?
  4. Credibility
    - What are the expert’s qualifications and is the technique replicable?
  5. Clarity
    - Can the technique, methodology and result be explained with sufficient clarity in a court of law?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly