exploring forensic analysis Flashcards

1
Q

Forensic analysis:

A

Forensic analysis is the process of detecting, investigating, and documenting the reason, course, and consequences of a security incident or violation against state and organisation laws.

Part of digital forensics, forensic data analysis examines structured data and often uses statistical modelling to uncover fraudulent activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Steps for conducting a forensic analysis:

A

Developing Policy and Procedures
Assess the evidence
Acquire evidence
Examine the evidence
Documenting and reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Tools for forensic analysis:

A

Autopsy
Wireshark
Encrypted disk detector
Magnet RAM Capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Forensic analysis in accounting:

A

The field of accounting operates with many specialisations, and auditing and forensic accounting are two of the most common.

Forensic accountants search specifically for fraudulent activity within organizations; auditors verify that companies are compliant with federal regulations and organizational policies.

Forensic accounting utilizes accounting, auditing, and investigative skills to conduct an examination into the finances of an individual or business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Uses of forensic accounting:

A

Forensic Accounting for Litigation Support
Forensic Accounting for Criminal Investigation
Forensic Accounting in the Insurance Industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Computer Forensics:

A

Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation and maintain a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Autopsy

A

It is an open-source GUI-based tool that analyses smart
phones and hard drives. It is used worldwide for investigating what happened
in a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wireshark

A

It is a network capture and analyser software tool that sees
what happens in the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encrypted Disk Detector

A

It helps in checking encrypted physical drives
and supports Bitlocker, TrueCrypt, and Safeboot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Magnet RAM Capture

A

t is used to capture physical memory of a
computer to analyse memory artifacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Miner

A

It is a network forensic analyser for Linux, Windows,
and Mac OS X for detecting operating systems, hostname, open ports and
sessions by PCAP file or through packet sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Importance of forensic analysis for the security of your infrastructure

A
  1. Prevents hacking
  2. Prevents malware
  3. retrieving deleted information
  4. Identifying vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Performing digital forensics:

A

Collection: identifying, labelling, recording, and acquiring data from the
possible sources of relevant data, while following procedures that preserve
the integrity of the data.
* Examination: forensically processing collected data using a combination of
automated and manual methods, and assessing and extracting data of particular interest, while preserving the integrity of the data.
* Analysis: analysing the results of the examination, using legally justifiable methods and techniques, to derive useful information that addresses the questions that were the impetus for performing the collection and examination.
* Reporting: reporting the results of the analysis, which may include describing the actions used, explaining how tools and procedures were selected, determining what other actions need to be performed (e.g., forensic examination of additional data sources, securing identified vulnerabilities,
improving existing security controls), and providing recommendations for improvement to policies, procedures, tools, and other aspects of the forensic
process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Forensic Tools and Techniques:

A

Operational Troubleshooting
log monitoring
data recovery
data acquisition
due diligence/regulatory compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

forensic accounting for litigation support

A

Forensic accounting is utilized in litigation when quantification of damages is
needed. Parties involved in legal disputes use the quantifications to assist in
resolving disputes via settlements or court decisions. For example, this may arise
due to compensation and benefit disputes. The forensic accountant may be utilized
as an expert witness if the dispute escalates to a court decision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Forensic accounting for criminal investigation

A

Forensic accounting is also used to discover whether a crime occurred and assess
the likelihood of criminal intent. Such crimes may include employee theft, securities
fraud, falsification of financial statement information, identity theft, or insurance
fraud

17
Q

Forensic accounting in the insurance industry:

A

Forensic accounting is also used to discover whether a crime occurred and assess
the likelihood of criminal intent. Such crimes may include employee theft, securities
fraud, falsification of financial statement information, identity theft, or insurance
fraud

18
Q

Computer forensics is also known as

A

Cyber forensics