PRELIM Flashcards
tools and techniques that frustrate forensic tools, investigations,
and investigators
ANTI FORENSICS
a model that enables customers to be in control of their
computing resource needs and add computing resources as they
wish through a highly automated and responsive set of processes.
CLOUD COMPUTING
any device capable of performing logical, arithmetic, routing, or
storage facility, or equipment or communications facility or
equipment directly to or operating in conjunction with such
device
COMPUTER
-
any representation of facts, information, or concepts in
a local computer system or online
COMPUTER DATA
refers to any device or group of interconnected or related devices, one or more of which, pursuant to a
program, performs automated processing data
COMPUTER SYSTEM
application of scientific principles to the process of discovering information from a digital device
DIGITAL FORENSICS
stores and provides relatively quick access to large amounts of data on an electromagnetically charged surface
HARD DISK/ DISK DRIVE/HARD DRIVE/HARD DISK DRIVE
physical components of a computer
HARDWARE
involves the application of scientific principles to the process of discovering information from mobile devices which include cell phones, smartphones, and table devices.
MOBILE FORENSICS
involves capturing, recording, and analysis of network events to discover source of security attack
NETWORK FORENSICS
a set of instructions compiled into a program that performs a particular task
SOFTWARE
criminal act committed via computer
Computer Crime
criminal activities in which a
computer was peripherally/incidentally involved
Computer Related Crime
a criminal activity which has been committed through, or facilitated by the Internet.
Cybercrime
any criminal activity which involves the
unauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data
Digital Crime
application of investigation and analysis techniques to gather
and preserve evidence from a particular computing device in a
way that is suitable for presentation in a court of law
COMPUTER FORENSICS
Computer Forensic is concerns in the process of
a. obtaining
b. processing and analyzing
c. storing digital information
for criminal, civil and administrative cases
USES OF COMPUTER FORENSICS IN LAW ENFORCEMENT
- recovering deleted files
- searching unallocated space
- tracing artifacts
- processing hidden files
- running a string
search
COMPUTER FORENSICS ASSISTANCE TO HUMAN RESOURCES /
EMPLOYMENT PROCEEDINGS
employer safeguard program
COMPUTER FORENSICS SERVICES
- data seizure
- data duplication/preservation
- data recovery
- document searches
- media conversion
- expert witness services
- Computer evidence service options
- Other miscellaneous services
data duplication/preservation
- When one party must seize data from another, two concerns must be
addressed:
a. the data must not be altered in any way
b. the seizure must not put an undue burden on the
responding party
Computer evidence service options
- various levels of service, each designed to suit your individual
investigative needs
a. Standard service
b. On site service
c. Emergency service
d. Priority service
e. Weekend service
Other miscellaneous services
- On-site seizure of computer data in criminal investigations
- Analysis of computers and data in civil litigations
- On-site seizure of computer data in civil litigations
- Analysis of company computers to determine employee activity
- Assistance in preparing electronic discovery requests
- Reporting in a comprehensive and readily understandable manner
- Court-recognized computer expert witness testimony
- Computer forensics on both PC and Mac platforms
- Fast turnaround time.
BENEFITS OF PROFESSIONAL
FORENSIC METHODOLOGY
- No possible evidence is damaged, destroyed, or otherwise compromised by the procedures used to investigate the computer.
- No possible computer virus is introduced to a subject computer during the analysis process.
- Extracted and possibly relevant evidence is properly handled and protected from later mechanical or electromagnetic damage.
- A continuing chain of custody is established and maintained.
- Business operations are affected for a limited amount of time, if at all.
- Any client attorney information that is inadvertently acquired
during a forensic exploration is ethically and legally respected
and not divulged
STEPS TAKEN BY COMPUTER FORENSICS SPECIALISTS
- protect
- discover
- recover
- reveal
- access
- analyze
- print out
- provide
CHALLENGES FACED BY INVESTIGATORS OF ELECTRONIC EVIDENCE
- evidence may be difficult to detect
- degree of anonymity
- electronic evidence are quite fragile
- global nature of evidence
CYBERCRIME CLASSIFICATIONS
(Inside or OUtside)
- Against Individuals
- Against Property
- Against Organizations
- Against Society
Against Individuals
- e-mail spoofing,
- spamming,
- cyber defamation,
- cyber harassment and cyberstalking.
which the e-mail header is forged so that the mail appears to originate from one source but actually has been sent from another source.
e-mail spoofing
sending multiple copies of unsolicited mails or mass e-mails such as chain letters.
Spamming
This occurs when defamation takes place with the help of computers and/or the Internet
Cyber Defamation
following an individual’s activity over internet
Cyber Harassments and Cyber Stalking
Against Property
- credit card frauds
- internet time theft
- intellectual property crimes.
the usage of the Internet hours by an unauthorized person which is actually paid by another person
internet time theft
intellectual property crimes - includes the following:
- Software piracy
- Copyright infringement
- Trademark violations
- Theft of computer source code
Illegal copying of programs, distribution of copies of software.
Software piracy
Using copyrighted material without proper permission
Copyright infringement
Using trademarks and associated rights without permission of the actual holder.
Trademarks violations
Stealing, destroying, or misusing the source code of a computer.
Theft of computer source code