IS3350 CHAPTER 15 Flashcards
Documentation that shows how evidence is collected, used, and handled throughout the lifetime of a case is called ___?
This document shows who obtained evidence, where and when it was obtained, who secured it, and who had control or possession of it.
CHAIN OF CUSTODY
A category of computer forensics that focuses on examining programming code for malicious code or signatures is called ___?
It is also know as malware forensics.
CODE OF ANALYSIS
The scientific process of collecting and examining data that is stored on or received or transmitted by an electronic device is called ___?
It is also called system forensics, digital forensics, computer forensic analysis, computer examination, data recovery, or inforensics.
COMPUTER FORENSICS
Evidence collected from an electronic device is called ___?
DIGITAL EVIDENCE
An exact copy of an electronic media storage device is called ___?
A bit-by-bit copy includes deleted files, slack space, and areas of the storage device that a normal file copy would not include.
FORENSIC DUPLICATE IMAGE
A legal doctrine that states that evidence that isn’t gathered evidence can’t be used in court is called ___?
Any subsequent evidence gathered as a result of the illegally obtained evidence can’t be used in court either.
FRUIT OF THE POISONOUS TREE DOCTRINE
Any out-of-court statement made by a person that is offered to prove some issue in a case is called ___?
Gossip is a common example.
HEARSAY
A basic assumption in forensics science that states that people always leave traces of their activities when they interact with other people or with other objects is called ___?
LOCARD’S EXCHANGE PRINCIPLE
A category of computer forensics that focuses on collecting and examining data stored on physical media is called ___?
MEDIA ANALYSIS
A category of computer forensics that focuses on capturing and examining network traffic is called ___?
It includes reviewing transaction logs and using real time monitoring to identify and locate evidence.
NETWORK ANALYSIS
A warning banner that provides notice of legal rights to users of computer networks is called ___?
The are generally displayed as a computer user logs into a network or on an entity’s home page.
NETWORK BANNER
A formal protest made by an attorney to a trial court judge is called ___?
An attorney usually makes this if the opposing party is asking questions or submitting evidence that is inappropriate or violates a trial court rule.
OBJECTION
Devices that monitor outgoing transmission data is called ___?
They record dialing, routing, signaling, or address information.
PEN REGISTER DEVICES
Data that is sorted on a hard drive or other storage media is called ___?
It is preserved when an electronic device is turned off.
PERSISTENT DATA
Evidence that proves or disproves a legal element in a case is called ___?
If evidence isn’t this, then it can be excluded from a trial.
Also known as relevant evidence.
PROBATIVE EVIDENCE