Chapter 19 Flashcards

1
Q

Administrative investigations

A
  • examine operational issues or violation of org policies
  • may be operational investigation - less stringent evidence; root cause analysis -> remediation
  • if not operational, then may require stronger standard evidence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Criminal investigations

A
  • violation of criminal law
  • evidence must prove beyond reasonable doubt
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Civil investigations

A
  • preponderance of evidence
  • evidence demonstrates outcome as more likely than not
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Regulatory investigations

A
  • conducted by gov’t against administrative law
  • can sometimes be against industry standards by orgs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Electronic Discovery Reference Model (EDRM)

a.k.a. eDiscovery

A
  1. Info governance - well organized for future eDiscrovery
  2. Identification - locate
  3. Preservation - prevent alteration or deletion
  4. Collection - gather centrally
  5. Processing - rough cut
  6. Review - remove irrelevant info or attorney-client privilege info
  7. Analysis - deeper screening
  8. Production - put in sharable format
  9. Presentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Admissible Evidence

A
  • evidence must be relevant
  • evidenced fact must be material (related to case)
  • must be competent (legally obtained)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of evidence

A
  1. Real evidence (objects)
  2. Documentary evidence
    - Best evidence rule - original
    - Parol evidence rule - must be written agreement, no verbal change
  3. Testimonial evidence
    - Direct evidence
    - Expert opinion - 3rd party SME
  4. Demonstrative evidence - items used to support testimonial evidence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Artifacts and evidence collection guidleines

A
  • Must not change evidence
  • Must be forensically competent
  • Activities must be documented
  • Responsible for everything
  • Agents must also adhere to these guidelines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of analysis

A

Media analysis
In-memory analysis
Network analysis
Software analysis
Hardware/Embedded device analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Media analysis

A
  • use write blocker to prevent accidental write
  • take hash
  • take back up
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In-memory analsys

A
  • take mem dump
  • take hash
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Locard’s Exchange Principle

A

Every contact leaves a trace
- applies to digital world as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Investigation Process

A
  1. Gathering evidence
  2. Calling in law enforcement
  3. Conducting Investigation
  4. Interview individuals
  5. Data integrity and retention
  6. Document the investigation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Gathering evidence

A
  • voluntary surrender
  • subpoena
  • plain view doctrine - can seize if in plain sight
  • search warrant
  • exigent circumstance - seize if believe will be destroyed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fourth amendment (as applied to warrants)

A
  • must have warrant to search
  • only probably cause needed to issue warrant
  • warrant must have specific scope
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Interview - gather info

Interrogation - question suspect of crime and use in court

17
Q

Types of Computer Crime

A
  1. Military and intelligence attacks
  2. Business attacks
  3. Financial attacks
  4. Terrorist attacks
  5. Grudge attacks
  6. Thrill attacks
  7. Hacktivist attacks - political motivation
18
Q

ISC2 Code of Ethics

A
  1. Protect society, the common good, necessary public trust and
    confidence, and the infrastructure.
  2. Act honorably, honestly, justly, responsibly, and legally.
  3. Provide diligent and competent service to principals.
  4. Advance and protect the profession.

Complains:
Canon 1 & 2 - Member of public
Canon 3 - principal
Canon 4 - Any certified professional

  • Must be in writing and in form of sworn affidavit
19
Q

RFC 1807 - acceptable Internet use

A

Should not:
- unauthorized access to resources
- disrupt intended use
- wasteful use of resources
- destroy integrity of info
- compromise user privacy