Chapter 18&19 Flashcards

1
Q

What is the biggest difference between traditional evidence and computer evidence?

A

Computer evidence is often intangible, requiring specialized tools to access and interpret, while traditional evidence is typically physical and directly observable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is cyber-crime defined?

A

Any illegal activity involving computers, networks, or digital devices, either as a target or a tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why are most computer crimes not reported?

A

Fear of reputational damage.
Lack of awareness of the crime.
Concerns over security vulnerabilities being exposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where is digital evidence often found?

A

Computers and mobile devices.
Servers and cloud storage.
Email accounts and social media platforms.
External storage devices (e.g., USB drives, hard drives).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does spoofing refer to?

A

The act of disguising communication (e.g., email, IP address) to appear as if it originates from a trusted source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does phishing refer to?

A

A technique used to deceive individuals into providing sensitive information, such as passwords or credit card numbers, often via fake websites or emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the important considerations for maintaining the integrity of evidence on a cell phone?

A

Preventing remote wiping by placing the phone in airplane mode or using a Faraday bag.
Avoiding tampering with the device.
Proper documentation and chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of material should be used when packaging electronic evidence, and why?

A

Anti-static packaging, such as Faraday bags, to prevent electrostatic discharge and shield devices from remote access or wiping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Outline the common protocol for processing a crime scene involving electronic evidence.

A

Secure and isolate the scene.
Document all devices in their original locations.
Power down devices appropriately to avoid data corruption.
Use Faraday bags for mobile devices.
Collect all associated peripherals (e.g., chargers, cables).
Maintain a chain of custody.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What questions should investigators ask as part of the initial investigation?

A

What types of devices are present?
Who owns or has access to the devices?
What is the function of each device?
Are there passwords or encryption that need to be bypassed?
Are there network connections that need to be severed?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly