Chapter Five & Six Flashcards
Incident Response is…
Responding to a matter of organizational security following existing policy.
Disaster Recovery is…
Policies that define how to recover stole data, mitigate damage, reclaim compromised systems, etc.
Business Continuity is…
Continuing day-to-day business operations before, during, and after security breaches.
Remediation is
recovery from a compromise
Why do we not use
its native OS to analyze its content
This changes information on the hard drive
To handle magnetic data…
Reading data: We generate a current if a coil of wire moves past a magnet
Writing data: We magnetize a surface if it moves past a coil of wire containing a current
Data on a hard drive: What are sectors?
Each sector is an independent data block on the hard drive
– Typical drives have fixed-size sectors
* 512 bytes each, larger on some new drives
– Each sector has a unique address
* Drive may read or write each sector independently
– doesn’t affect other sectors
Moore’s Law:
-– Named for Gordon Moore of Intel
– Noted that, by the mid-1960s, integrated
circuits double size and performance yearly
– Later refined the estimate:
* Doubles every 18 months
True or false: The number of bits determines the maximum
size of any number
True
Signed integers…
– Can be both positive and negative
– Range from [-2147483648 to 2147483647]
– Use a “sign bit” (first bit of a string) as a flag to indicate positive or negative (magnitude)
Unsigned Integers…
– Can ONLY be positive
– Range from [0 to 4294967295]
– Do not have the capacity for negative sign flags to change internal binary interpretation
Clusters are..
Each cluster is a series of sectors treated as a single block of data by the file system
Parity bit…
binary flag which enforces
communication protocol between two computers
Cyclic Redundancy Checks (CRCs)
– Can detect a “burst” of errors
* A series of all 0s replacing the real data
– More sensitive to a change of order
* Simple checksum won’t detect swaps
Error Correcting Codes (ECC)
– Can detect larger-scale errors
– Can correct smaller errors
– Used on RAMs and DVDs
The binary address size
number of bits in the
binary number that holds the address
– We use k bits to store addresses up to size n
k = log2(n)
FAT… (file allocation table)
- A relatively simple and widely used file system
– Introduced in Microsoft’s MSDOS
– Supported in Windows, OS-X, Linux, etc.
– Used in digital products like cameras, medical
equipment, etc. - Supports many modern features
– Longer, mixed-case file names
– Hierarchical directories
– Individual files sized up to 4GB
Boot blocks…
– Contain bootstrap program on bootable drive
– Contains details of the volume format