Mid Term Flashcards

1
Q

An evidence capturing tool that is used by some Police forces is what?

A

Hunchly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who is the former editor and one of the founders of Breitbart news?

A

Steve Bannon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Proprietary Information …

A

Information a company wants to keep secret (eg: KFC’s blend of seasonings)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing is…

A

An unsolicited email or text impersonating a trusted entity, sent to a number of random recipients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Social Engineering and Example:

A

Techniques that take advantage of natural social interactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cyber Crime…

A

Criminal Activities carried out by means of a computer or the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Scams..

A
  1. Lottery
  2. Inheritance
  3. Romance
  4. CRA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PII …

A

Personal Identifiable Information
- Credit card data
- Banking credentials
- Passwords
- Email addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How PII is collected and put at risk?

A
  • Collected by forms
  • Put at risk by not being stored properly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What goes down the dark web?

A
  • Tor search engine need to use
  • Not everything on the dark web is illegal
  • Need VPN to access dark web
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does SCADA stand for? What would you target?

A

Supervisory Control and Date Acquisition

Systems use computers to communicate and network the controls that drive critical processes and machinery, for energy, transportation, water and power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Challenges of law enforcement

A
  • Phone Rights
  • Different jurisdiction
  • Not many cops trained in online investigations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Section 8 of the Canadian Charter of Rights and Freedoms:

A

Unreasonable search and seizure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Exigency Circumstances means?

A
  • Do not need warrant
  • Reasons: Risk of harm to suspect or others, missing person, evidence may be destroyed.
  • A Canadian common law as a basis to search without a warrant.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

LTE:
WIFI:
Bluetooth:
5G:

A
  • LTE: Long-term evolution -increased capacity through high-speed internet.
  • WIFI: Reduces demand on LTE and allows for better signal management
  • BlueTooth: Short-range data exchange.
  • 5G: Improves service with faster data exchange speeds. ( Sales promotion term)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Case Studies – R v Fearon:

A

-Two guys rob a jewelry store at gunpoint
-Cops pull over males in black car who did the robbery.
-The searches of the phone before the warrant violated section 8.
-The cop should have not have searched the phone before warrant. But the cop was seen to have made an honest mistake reasonably made.
-The term “cell phones and similar devices” was adapted

17
Q

Case studies — R v. Marakeh

A

The appellant, Nour Marakah, was convicted by Justice O’Marra of multiple firearm offenses. The convictions were ultimately dependent on the contents of private text messages between the appellant and Andrew Winchester, a former co-accused, which police obtained from Winchester’s cell phone. All of the other incriminating evidence, including the same text messages extracted from the appellant’s cell phone, was excluded due to Charter violations.

18
Q

R v. Cole:

A
  • Based on a teacher who handed a work laptop into IT to fix something. The IT found porn and nude of students within the school.
    -Laptop and disc was handed to police. Police looked through evidence, without warrant.
    -Judge said teachers section 8 was breached by police looking through the computer without warrant.
    -Conclusion, the evidence was excluded due to unreasonable search and seizure.
19
Q

What is the Cole Test;

A

-Step One: Requires the applicant to identify the subject matter of the search

-Step Two: Requires the applicant to demonstrate a direct interest in the impugned subject matter

-Step Three: Requires applicant to demonstrate the he or she subjective expected the subject matter to remain private.

20
Q

Understand Malware:

A

Spyware

21
Q

STOP/THINK/CONNECT:

A

International Online Safety Awareness Campaign

22
Q

Grey/Black/White Hat Hackers - Government Hacking:

A

-White hat: Good guy/ Ethical Hackers

-Grey hat: Good and bad

-Black hat: Bad guy

23
Q

TTPs:

A

Tactics, Techniques, Procedures

24
Q

Patches — How and why?

A

Are released at regular intervals to update operating systems. They are there to fix nasty software bugs.

25
Q

What is the MLAT (Mutual Legal Assistance Treaty?):

A

An agreement that assists one countries law enforcement help another

26
Q

Challenges of digital within law enforcement:

A

-Volume of cases can be overwhelming.
-Training: understand specialized forensics and handling of digital evidence.
-Details of cybercrime can be cross border, multi-jurisdictional.
-Difficulty in linking people, places and things; tracing assets, identifying at risk targets.
-No smoking gun; identity can be hidden anywhere in the world.

27
Q

Production order vs warrant:

A

-Warrant: Go to justice of the peace and ask for a warrant on searching a home, office, phone etc.

-PO: The police go to the service provider and ask for information. A request to an ISP to provide data.

28
Q

RROSH:

A

Real risk of significant harm

29
Q

Data Breaches:

A

38% of business affected in Canada

30
Q

Most common operating systems:

A

IOS
Android
Linux

31
Q

Portable operating systems:

A

IOS
Android

32
Q

Prevention

A

Report accounts or suspicious activity