Chapter 18: Incidents and Ethics Flashcards

1
Q

What are the requirements for evidence to be admissible?

A

It must be relevant to determining a fact
The fact must be material to the case
The evidence must be competent (legally obtained)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the types of evidence?

A

Real, documentary, testimonial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is real evidence

A

Things that can actually be brought into a courtroom, such as a murder weapon or a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is documentary evidence?

A

Any written items brought into court to prove a fact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the best evidence rule?

A

The original document must be used unless certain exceptions apply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the parol evidence rule?

A

When an agreement between parties is put into writing, it is assumed to be the complete agreement and no verbal agreements may modify it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is testimonial evidence?

A

Evidence consisting of the testimony of a witness either verbal or written.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the IOCE

A

International Organization on Computer Evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the six principles to guide digital evidence collection?

A

1) All of the general forensic and procedural principles must be applied
2) Actions taken should not change the evidence
3) When it’s necessary to access the original, the person should be trained for the purpose
4) All activity relating to the seizure, access, storage, or transfer of digital evidence must be fully documented, preserved, and available for review.
5) An individual is responsible for all actions taken with respect to digital evidence while it is in their possession
6) Any gency responsible for seizure, access, storage, or transfer of digital evidence must adhere to these principles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is media analysis?

A

The branch of computer forensic analysis concerned with identification and extraction of information from storage media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What sources does network analysis draw from?

A

IDS/IPS logs, network flow captured by a flow monitoring system, packet captures collected during an incident, logs from firewalls and other network security devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is software analysis?

A

Examination of a running application or review of software code to look for logic bombs, back doors, or other vulnerabilities. Can also include log review.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is hardware/embedded device analysis?

A

Examination of the contents of PCs, smart phones, tablets, and embedded computers in cars, security systems, and other devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the principles of conducting an investigation?

A

Never conduct the investigation ont he actual compromised system. Take it offline and make a backup.
Never hack back.
If in doubt, call in expert assistance.
Begin using formal interviewing and interrogation techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the major categores of computer crime?

A
military and intelligence attacks
business attacks
financial attacks
terrorist attacks
grudge attacks
thrill attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an event?

A

Any occurrence that takes place during a certain period of time.

17
Q

What is an incident?

A

An event that has a negative outcome affecting the confidentiality, integrity, or availabiity of an organization’s data.

18
Q

What are the common types of incidents?

A

scanning
compromises
malicious code
denial of service

19
Q

What are the responsibilities of a CIRT?

A
  1. Determine the amount and scope of damage caused by the incident
  2. Determine whether any confidential information was compromised
  3. Implement any necessary recovery prodecures to restore security and recvoer from damages
  4. Supervise the implementation of any additional security measures needed to improve security and prevent recurrence.
20
Q

Who are the potential members of a CIRT?

A

Representative(s) of senior management
Information security professionals
Legal representatives
Public affairs/communications representatives
Engineering representatives (system and network)