Domain 7: Forensics and Incident Response Flashcards
Ensures that multiple people are required to complete critical or sensitive transactions
Separation of duties
Provides a type of knowledge redundancy, and moving personnel around reduces the risk of fraud, data modification, theft, sabotage, and misuse of information
Rotation of duties/Job rotation
Requires employees to be away from work used to detect and deter fraud, or negligence
Mandatory leave/forced vacation
Contractual agreement requiring an individual or organization not to discuss sensitive information pertaining to the company
Nondisclosure agreement (NDA)
Portions of disk partition that are marked as actively containing data
Allocated space
- Portions of disk partition that does not contain active data
- i.e. file is deleted the portion of the disk that held the deleted file
Unallocated space
The leftover space inside a cluster
Slack space
- Disk space that cannot be used generally due to some physical defect
- When marked OS ignores these sections
- Attackers will mark these sections in order to hide data within the portion of disk
“Bad” blocks/clusters/sectors
- Logs can contain info about visited websites
- Server can be configured to block access to certain websites
Proxy logs
Logs that track source and destination IP addresses and ports of network traffic
Firewall Logs
Logs that monitor when a user accesses, modifies, or deletes a file or folder
Security logs
- Logs that monitor computer, and OS events.
- i.e. computer or service stops and starts
System logs
An individual or group who are responsible for a threat that exploits a give vulnerability
Threat agent
Another name for a hypervisor
Virtual Machine Monitor (VMM)
- Pre-trial routine of attorney’s on both sides exchanging evidence
- With this term we focus on electronic stored info (ESI) - i.e. emails, text messages, word processing documents, social media posts etc.
Electronic Discovery (eDiscovery)