IAS LESSON 3 Flashcards
this is related to scientific methods of identifying the authors of a crime by examining objects or substances involved in the crime
forensic analysis
this aims to explain the state of a computing system by extracting information and using it to reconstruct the series of actions undertaken by the attacker
forensic analysis
refers to the explanation of a cybercrime, based on the analysis of information or traces led by the attacker in the computing systems attacked
forensic analysis in the context of cybersecurity
explain forensic analysis in your own words
Forensic analysis is like being a digital detective, searching for clues on computers and phones to solve crimes. It involves recovering deleted files and hidden data, analyzing the information to understand what happened, and preserving the evidence for use in court.
practices where governments or governmental organizations perform surveillance and data collection at a national state
mass dataveillance
performs surveillance and data collection on an individual of interest
personal dataveillance
observation attacks, perturbation attacks, and hardware-targeted software attacks are classified as
physical attacks
the attacks can target the hardware, the network, the system, the applications, or the user themselves.
intrusion attacks
these are physical attacks based on the observation of the circuit behavior during a computation
side-channel analysis (sca) or observation attacks
attacks where a device undergoes modification of physical parameters in order to obtain an incorrect behavior
fault/perturbation attacks (i.e. power glitches, clock glitches, laser pulses, and electromagnetic pulses)
an example of this is the rowhammer attack, flipping memory bits while reading and writing another cell; effective on SSD disks
hardware-targeted software attacks
this refers to finding a path for each packet sent on the internet, no matter its source and its destination; this can isolate a whole country or redirect all traffic through a surveillance point
routing
a hierarchical decentralized naming system for the internet, with scalability and flexibility as key design goals; used for address resolution
Domain name system (DNS)
the server cannot handle the load and thus does not respond to legitimate queries
Denial of Service (DOS)
IP datagram are also known as
packets