IS4670 SLIDES STUDY GUIDE Flashcards
- ____Mechanisms for Sensitive Data Exposure
➢ Hacking ➢ Man-in-the-Middle attack ➢ Keylogging software ➢ Social engineering ➢ Insider attack, physical computer, and media theft
- In Controls and Responses Network and computer security includes _____:
➢ Use defense in depth
➢ Use firewalls and intrusion detection or
prevention systems
➢ Monitor logs
➢ Harden the servers
➢ Install anti-malware software and keep it
up-to-date
- The Role of Computers in Crimes is ____:
➢ Target ➢ Instrument ➢ Evidence ➢ Instrument > Evidence Repository ➢ Evidence Repository > Instrument
- The Three A’s of Digital Forensics is ____:
➢ Acquire
➢ Authenticate
➢ Analyze
- Law Firms need experienced forensics professionals to ___:
➢ Conduct investigations
➢ Testify as expert witnesses
- Criminal Prosecutors use digital evidence when working with ___:
➢ Incriminating documents
- Evidence Transport must include ____:
➢ Photograph or videotape the scene from premises to transport vehicle
➢ Photograph or videotape the scene from vehicle to lab
➢ Transport computer to a secure location
- Photograph or videotape the scene from premises to transport vehicle, photograph or videotape the scene from vehicle to lab and Transport computer to a secure location are all a part of ____?
➢ Evidence Transport
- The Evidence Life Cycle include ____:
➢ Collect or seize evidence
➢ Transport evidence
➢ Protect or store evidence
➢ Analyze evidence
- Collect or seize evidence, Transport evidence, Protect or store evidence, and Analyze evidence are all steps of the _____:
➢ Evidence Life Cycle
- Secure erasure or ____ completely overwrites sensitive data.
➢ Drive wiping or wiping
- Secure erasures or wiping applies to:
➢ Slack space
➢ Unused sectors,
➢ Entire disk space
- Why analyze data packets?
➢ Detect network problems, i.e.
bottlenecks
➢ Detect network intrusions
➢ Gather network statistics
- What does a protocol analyzer do?
➢ Captures and decodes data packets
traveling on a network
➢ Allow you to read and analyze data
packets
- Binary Data often means picking apart binary formats such as ____?
➢ Windows 32-bit files ➢ DOS.com and .exe formats ➢ Linux Executable and Linking Format (ELF) formats ➢ Uniplexed Information and Computing System (UNIX) a.out format