PRELIM Flashcards

1
Q

tools and techniques that frustrate forensic tools, investigations,
and investigators

A

ANTI FORENSICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a model that enables customers to be in control of their
computing resource needs and add computing resources as they
wish through a highly automated and responsive set of processes.

A

CLOUD COMPUTING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

any device capable of performing logical, arithmetic, routing, or
storage facility, or equipment or communications facility or
equipment directly to or operating in conjunction with such
device

A

COMPUTER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

-
any representation of facts, information, or concepts in
a local computer system or online

A

COMPUTER DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

refers to any device or group of interconnected or related devices, one or more of which, pursuant to a
program, performs automated processing data

A

COMPUTER SYSTEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

application of scientific principles to the process of discovering information from a digital device

A

DIGITAL FORENSICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

stores and provides relatively quick access to large amounts of data on an electromagnetically charged surface

A

HARD DISK/ DISK DRIVE/HARD DRIVE/HARD DISK DRIVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

physical components of a computer

A

HARDWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

involves the application of scientific principles to the process of discovering information from mobile devices which include cell phones, smartphones, and table devices.

A

MOBILE FORENSICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

involves capturing, recording, and analysis of network events to discover source of security attack

A

NETWORK FORENSICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a set of instructions compiled into a program that performs a particular task

A

SOFTWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

criminal act committed via computer

A

Computer Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

criminal activities in which a
computer was peripherally/incidentally involved

A

Computer Related Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a criminal activity which has been committed through, or facilitated by the Internet.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

any criminal activity which involves the
unauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data

A

Digital Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

application of investigation and analysis techniques to gather
and preserve evidence from a particular computing device in a
way that is suitable for presentation in a court of law

A

COMPUTER FORENSICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Computer Forensic is concerns in the process of

A

a. obtaining
b. processing and analyzing
c. storing digital information

for criminal, civil and administrative cases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

USES OF COMPUTER FORENSICS IN LAW ENFORCEMENT

A
  1. recovering deleted files
  2. searching unallocated space
  3. tracing artifacts
  4. processing hidden files
  5. running a string
    search
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

COMPUTER FORENSICS ASSISTANCE TO HUMAN RESOURCES /
EMPLOYMENT PROCEEDINGS

A

employer safeguard program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

COMPUTER FORENSICS SERVICES

A
  1. data seizure
  2. data duplication/preservation
  3. data recovery
  4. document searches
  5. media conversion
  6. expert witness services
  7. Computer evidence service options
  8. Other miscellaneous services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

data duplication/preservation

  • When one party must seize data from another, two concerns must be
    addressed:
A

a. the data must not be altered in any way
b. the seizure must not put an undue burden on the
responding party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Computer evidence service options

  • various levels of service, each designed to suit your individual
    investigative needs
A

a. Standard service
b. On site service
c. Emergency service
d. Priority service
e. Weekend service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Other miscellaneous services

A
  1. On-site seizure of computer data in criminal investigations
  2. Analysis of computers and data in civil litigations
  3. On-site seizure of computer data in civil litigations
  4. Analysis of company computers to determine employee activity
  5. Assistance in preparing electronic discovery requests
  6. Reporting in a comprehensive and readily understandable manner
  7. Court-recognized computer expert witness testimony
  8. Computer forensics on both PC and Mac platforms
  9. Fast turnaround time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BENEFITS OF PROFESSIONAL
FORENSIC METHODOLOGY

A
  1. No possible evidence is damaged, destroyed, or otherwise compromised by the procedures used to investigate the computer.
  2. No possible computer virus is introduced to a subject computer during the analysis process.
  3. Extracted and possibly relevant evidence is properly handled and protected from later mechanical or electromagnetic damage.
  4. A continuing chain of custody is established and maintained.
  5. Business operations are affected for a limited amount of time, if at all.
  6. Any client attorney information that is inadvertently acquired
    during a forensic exploration is ethically and legally respected
    and not divulged
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

STEPS TAKEN BY COMPUTER FORENSICS SPECIALISTS

A
  1. protect
  2. discover
  3. recover
  4. reveal
  5. access
  6. analyze
  7. print out
  8. provide
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

CHALLENGES FACED BY INVESTIGATORS OF ELECTRONIC EVIDENCE

A
  1. evidence may be difficult to detect
  2. degree of anonymity
  3. electronic evidence are quite fragile
  4. global nature of evidence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

CYBERCRIME CLASSIFICATIONS
(Inside or OUtside)

A
  1. Against Individuals
  2. Against Property
  3. Against Organizations
  4. Against Society
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Against Individuals

A
  1. e-mail spoofing,
  2. spamming,
  3. cyber defamation,
  4. cyber harassment and cyberstalking.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

which the e-mail header is forged so that the mail appears to originate from one source but actually has been sent from another source.

A

e-mail spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

sending multiple copies of unsolicited mails or mass e-mails such as chain letters.

A

Spamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

This occurs when defamation takes place with the help of computers and/or the Internet

A

Cyber Defamation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

following an individual’s activity over internet

A

Cyber Harassments and Cyber Stalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Against Property

A
  1. credit card frauds
  2. internet time theft
  3. intellectual property crimes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

the usage of the Internet hours by an unauthorized person which is actually paid by another person

A

internet time theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

intellectual property crimes - includes the following:

A
  1. Software piracy
  2. Copyright infringement
  3. Trademark violations
  4. Theft of computer source code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Illegal copying of programs, distribution of copies of software.

A

Software piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Using copyrighted material without proper permission

A

Copyright infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Using trademarks and associated rights without permission of the actual holder.

A

Trademarks violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Stealing, destroying, or misusing the source code of a computer.

A

Theft of computer source code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Against Organizations

A
  1. unauthorized accessing of computer 2. denial of service
  2. computer contamination/virus attack
  3. e-mail bombing
  4. salami attack
  5. logic bomb
  6. trojan horse
  7. data diddling.
41
Q

Accessing the computer/network without permission from the owner

A

Unauthorized accessing of computer

42
Q

The criminal reads or copies confidential or proprietary information, but the data is neither deleted nor changed

A

Computer voyeur

43
Q

When Internet server is flooded with continuous bogus requests so as to denying legitimate users to use the server or to crash the server.

A

Denial of service

44
Q

a computer program that can infect other programs with virus

A

Computer contamination / Virus attack

45
Q

sending large number of mails to the individual or company or mail servers ultimately resulting into crashing

A

e-mail bombing

46
Q

financial crimes committed when negligible amounts are removed and accumulated into something larger

A

Salami attack

47
Q

an event dependent program designated to crash the computer

A

Logic bomb

48
Q

a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious

A

Trojan horse

49
Q

altering of raw data before it is processed by a computer and then changing it back after the process was completed

A

Data diddling

50
Q

Against Society

A
  1. Forgery
  2. Cyber Terrorism
  3. Web Jacking
51
Q

hackers gain access and control over a website of another even changing the content of website

A

Web Jacking

52
Q

no physical or geographic boundaries

A

cybercrime

53
Q

committed in a certain place to a certain
target / victim at a time

A

traditional crime

54
Q

Reasons why cybercrimes continue to exist despite creation of anti
cybercrime laws:

A
  1. Inherent vulnerability of computer networks/ internet.
  2. The enormous number of computers connected to the internet
    gives cybercriminals a wide array of target.
    3.The internet is an effective medium for running automated systems, thus leading to automation of illegal internet activity.
  3. The unregulated nature of the internet.
  4. Overwhelming impact of advancements in technology.
  5. Anonymity in the virtual world
  6. Different cybercrime laws of different countries
  7. Existence of different social engineering techniques
55
Q

TYPES OF HACKING

A

A. Ethical Hacking
B. Unethical Hacking

56
Q
  • used to identify vulnerabilities and secure systems
  • simulation of real-world attacks to fix security flaws
  • conducted within legal and ethical boundaries
A

Ethical Hacking

57
Q
  • violation of ethical standards and regulations
  • unauthorized access to sensitive information, disrupt operations,
    or cause harm
A

Unethical Hacking

58
Q

Phases of Unethical Hacking

A
  1. Performing Reconnaissance Reconnaissance (pre-attack phase)
  2. Scanning and Enumeration
  3. Gaining Access
  4. Escalation of Privilege
  5. Maintaining Access
  6. Covering Tracks and Planting Backdoors
59
Q

Some Techniques for Reconnaissance:

A

a. Dumpster Diving
b. War Driving
c. Sniffing
d. Social Engineering

60
Q

systematic attempt to locate, gather, identify, and record
information about the target

A

Performing Reconnaissance (pre-attack phase)

61
Q

probing a target network/system to
identify potential vulnerabilities

A

Scanning

62
Q

gathering information about the target system or network

A

Enumeration

63
Q

aim is to become system administrator & have full access and control

A

Escalation of Privilege

64
Q

pull down the password file or steal other passwords so that they can
access other user’s accounts

A

Maintaining Access

65
Q

set of tools used to help the attacker maintain his access to the system and use it for malicious purposes

A

rootkits

66
Q

a. Using rootkits or other tools to cover their tracks
b. Hunt down log files and attempt to alter or erase them
c. Utilize file hiding techniques, such as hidden directories, hidden attributes, and alternate data streams (ADS)
d.Creation of backdoors to reenter the computer at will
e. Insertion of programs or malicious codes for future activation in hidden
files/directories botnet & zombie

A

Covering Tracks and Planting Backdoors

67
Q

Identity Theft and Identity Fraud
Criminal Acts Facilitated by Identity Theft / Fraud:

A

1.Money Laundering
2.Drug trafficking
3.Alien Smuggling
4.Weapon Smuggling
5.Extortion
6.Misappropriation of Funds
7.Embezzlement and other financial crime

68
Q

Types of Identity Theft and Identity Fraud

A
  1. Assumption of Identity
  2. Theft for Employment
  3. Reverse Criminal Record Identity Theft
  4. Virtual Identity Theft / Fraud
  5. Credit Identity Theft / Fraud
69
Q
  • rarest form of identity theft/fraud
  • occurs when an individual simply assumes the identity of his/her
    victim, including all aspects of the victim’s life
A

Types of Identity Theft and Identity Fraud

70
Q
  • fraudulent use of stolen or fictitious personal information to obtain employment
  • common to illegal immigrants
A

Theft for Employment

71
Q

occurs when a criminal uses a victim’s identity, not to engage in criminal activity, but to seek employment

A

Reverse Criminal Record Identity Theft

72
Q
  • use of personal, professional, or other dimensions of identity toward the development of a fraudulent virtual personality
  • often used for online dating, role playing, and accessing deviant
    sites or locations containing questionable content and are used by
    individuals to explore forbidden areas or to satisfy their curiosity behind a veil of anonymity
A

Virtual Identity Theft / Fraud

73
Q
  • most common and most feared type

-use of stolen personal and financial information to facilitate the
creation of fraudulent accounts

A

Credit Identity Theft / Fraud

74
Q

illegal use of a stolen credit card

A

credit card fraud

75
Q

Other Classifications of Identity Fraud

A
  1. Financial Identity Theft
  2. Criminal Identity Theft
  3. Identity Cloning
  4. Business / Commercial Identity Theft
76
Q

identity = gain financial transactions

A

Financial Identity Theft

77
Q

identity = committing crimes usually cybercrimes

A

Criminal Identity Theft

78
Q

-offender assumes the identity of the victim in his or her daily life

A

Identity Cloning

79
Q

use of another business’ or organization’s name to obtain credit,
funds, goods, or services

A

Business / Commercial Identity Theft

80
Q

Victimology
Susceptible victims of Identity Theft/Fraud include but are not
limited to the following:

A

1.Smartphone owners who fail to safeguard their devices with passwords

2.People who publicly share personal information in social networking sites

3.People who are usually using services of online banking, online
communication, and online shopping

4.People / companies who experienced data breaches

81
Q

CATEGORIES OF TECHNIQUES EMPLOYED BY IDENTITY

A

A. physical
B. virtual

82
Q

Physical Methods of Identity Theft

A
  1. Mail Theft
  2. Dumpster Diving
  3. Theft of Computers
  4. Bag Operations
  5. Child Identity Theft
  6. Insiders
  7. Fraudulent / Fictitious Companies
  8. Card Skimming, ATM Manipulation, and Fraudulent Machines
83
Q

retrieving info from unsecured mail boxes

A

Mail Theft

84
Q
  • surreptitious entry into hotel rooms to steal, photograph, or photocopy
    documents, or copy magnetic media, or download information for a laptop
    computer and is made easier with the availability of mass storage
    removable media
A

Bag Operations

85
Q
  • stealing their children’s identities for employment, evasion of
    authorities, financial gain and credit
A
  1. Child Identity Theft
86
Q
  • reading and recording of personal information encoded on the
    magnetic strip of an automated teller machine or credit card
A

Card Skimming, ATM Manipulation, and Fraudulent Machines

87
Q

VIRTUAL OR INTERNET FACILITATED METHODS

A
  1. Phishing
    2.Spyware and Crimeware
    3.Keyloggers and Password Stealers
  2. Trojans horse or Trojan
88
Q
  • malware that is often disguised as legitimate software
A

Trojans horse or Trojan

89
Q

devices or software programs which record the input activity of a
computer or system

A

Keyloggers

90
Q

type of computer virus that infects your machine, records all of your user
passwords and then emails them to a remote user

A

Password Stealers

91
Q

a browser based software designed to capture and transmit
privacy sensitive information to third parties without the knowledge and
consent of the user

A

Spyware

92
Q

is a spyware created or employed specifically to facilitate identity theft or other economically motivated crime.

A

Crimeware

93
Q

provide mechanism for cybercriminals to change website IP addresses repeatedly without affecting the domain name

A

Botnets

94
Q

e-mail = recipient for his/ her assistance in claiming “found” money

A

Advance fee Fraud / 419 Fraud

95
Q

malicious programs which redirect user’s network traffic to undesired sites

A

Redirectors

96
Q

redirects the connection between IP address and its target service
and is accomplished when the link is altered so that consumers are unwittingly redirected to a mirror site

A

B. Pharming

97
Q

company trademarks and logos

A

A. Spoofing

98
Q

solicitation of information via e mail or directing individuals to
fake websites

A

Phishing

99
Q

CATEGORIES OF PHISHING ATTACKS

A

A. Spoofing
B. Pharming
C. Redirectors
D. Advance fee Fraud / 419 Fraud
E. Botnets