Finals - L4 - Retrieving Data from Memory And Hard disk Flashcards
Project – Real World Scenario
What is the term used to describe this?
This is the process of investigating and analyzing digital devices to detect, preserve. This field involves the use of specialized tools and techniques to identify how a system was compromised, what data was accessed or altered.
Digital Forensics
What is the term used to describe this?
This is a form of electronic computer memory that can be read and changed in any order, typically used to store working data and machine code.
RAM - Random-access memory
What is the term used to describe this?
This is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnetic material.
Hard disk, hard drive, or fixed disk
What is the term used to describe this?
It concerns the process of obtaining, processing,
analyzing, and storing digital information.
Digital Forensics
True or False?
Data can be retrieved from existing files (even those that have
been deleted, encrypted, or damaged)
True
What scenario is this?
An offense may be committed or a policy may be violated as follows:
Example: theft of intellectual property, industrial espionage, or destruction of data
A company may be the victim of the crime
What scenario is this?
An offense may be committed or a policy may be violated as follows:
Example: A computer owned by a company may be used to store contraband (e.g., pirated software or images) Information that is obtained from workplace computers can be used as evidence in harassment, discrimination, wrongful termination, embezzlement, and other criminal cases.
A company may be the victim of the crime
What scenario is this?
An offense may be committed or a policy may be violated as follows:
Example: Employees may violate company policy by improperly using computer resources such as surfing the web for personal reasons during company time.
A company may be the victim of the crime
What scenario is this?
An offense may be committed or a policy may be violated as follows:
Example: Employees may violate company policy by improperly using computer resources such as surfing the web for personal reasons during company time.
A company may be the victim of the crime
During a computer forensics investigation, blank must be protected. If an incident occurs, company and client data must be secured.
Spcial considerations in corporate investigations
Confidential data
Spcial considerations in corporate investigations
True or False?
Computer and information systems must remain available to the company for use in daily operations while the investigation is ongoing.
Spcial considerations in corporate investigations
True
Spcial considerations in corporate investigations
True or False?
The integrity of the data should be maintained, and no data should be altered or lost during an investigation.
Spcial considerations in corporate investigations
True
Spcial considerations in corporate investigations
What are the 4 steps in computer forensics investigations?
4 Steps of Computer Forensics Investigations
- Acquisition
- Identification
- Evaluation
- Presentation
4 Steps of Computer Forensics Investigations
What is the step that involves the process of evidence retrieval - from the search for the evidence to its collection and documentation? It must also document all aspects of the computer search, including the following:
- Which evidence was obtained
- Which individual/s retrieved the evidence
- Where the evidence was gathered
- When was the evidence collected
- How was the evidence acquired
4 Steps of Computer Forensics Investigations
- Acquisition
4 Steps of Computer Forensics Investigations
True or False?
A computer is seized during a cybercrime investigation and taken off site - typically to a forensic lab - for a search of its contents for evidence.
In fact, numerous court rulings have upheld the validity of the seizure of computer systems and subsequent search of them off site as the only reasonable means to conduct a search.
4 Steps of Computer Forensics Investigations
True
4 Steps of Computer Forensics Investigations