ITN276 - Computer Forensics - Midterm Exam - Review Flashcards
Study Guide Definitions
Computer Forensics
The American Heritage Dictionary defines __________as “the use of science and technology to investigate and establish facts in criminal or civil courts of law.”
Roles of the first responder to a crime scene
Prepare evidence
Preserve Evidence
Chain of Custody
The continuity of control of evidence that makes it possible to account for all that has happened to evidence between its original collection and its appearance in court, preferably unaltered.
One must be able to show the whereabouts and custody of the evidence, how it was handled and stored and by whom, from the time the evidence is first seized by a law enforcement officer or civilian investigator until the moment it is shown in court.
Daubert standard
TheDaubert Standard dictates that only methods and tools widely accepted in the scientific community can be used in court.
Anti-forensics
The actions that perpetrators take to conceal their locations, activities, or identities.
Rainbow table
Rainbow table means type of password crackers that work with pre-calculated hashes of all passwords available within a certain character space.
Physical analysis
offline analysis conducted on an evidence disk or forensic duplicate after booting from a CD or another system
Bit-level information
information at the level of actual 1s and 0s stored in memory or on the storage device, as opposed to going through the file system’s interpretation.
Volatile Data
Data that changes rapidly and may be lost when the machine that holds it is powered down?
Temporary Data
Data that an operating system creates and overwrites without the computer user taking a direct action to save this data
Types of cyber crime
Identity theft
Hacking Systems for data .
Cyberstalking / Harassment
Internet Fraud -
Non Access Computer Crimes
Cyber Terrorism
Techniques that cybercriminals use
Phishing - attempt to trick a victim into giving up personal information
Spyware - any software that can monitor your activity on a computer
Hacking - breaking into a system
SQL Injection - May be the most common Web application attacj and is based on inserting Structured Language Query (SQL) commands into text boxes such as the username and password fields on a login screen.
XSS (Cross Site Scripting) - perp seeks out somewhere that allows end users to post and posts javascript that will execute.
Sarbanes-Oxley Act of 2002
contains many provisions about recordkeeping and destruction of electronic records relating to the management and operation of publicly held companies.
SQL attack
May be the most common Web application attack and is based on inserting Structured Language Query (SQL) commands into text boxes such as the username and password fields on a login screen.
Ophcrack
One of the most basic tools or physically accessing a Windows machine.
Tool to crack Windows passwords
A ________ is malware that is designed to do harm to the system when some logical condition is reached.
logic bomb
Virus
any software that self-replicates