QUIZ SUMMARIZE Flashcards
Best Description for Write Blocker
A tool designed to prevent any write access to hard disk, permitting read-only access to data storage without compromising the integrity of data
What access control models will allow the access to view Top Secret files?
Mandatory Access Control (MAC)
IAM systems provide what capability to users?
- Single sign-on
- Two-factor authentication
- Privileged access management
Bit Stream Copy
- A copy of the original storage medium
- Also known as Bit Stream Image
- Exact copy of the original disk
Discretionary Access Control (DAC)
- Owners can usually modify object ACLS
- Control accessed through Asset Control Lists(ACL)
- Owner can place subject on ACL or not
Mandatory Access Control (MAC)
- Allows end-user to decide who get access to info
- Doesn’t allow user to give other users privilege access
Two types of evidence extractions
- Logical Extraction
- Physical Extraction
What does Hash Value do
Used to determine the integrity of data to verify a forensic image was captured successfully
What is Chain of Custody?
The sequential documentation that accounts for the sequence of custody, control, transfer, analysis, and disposition of evidence
Logical Extraction
Examining file system information: file name, size, location, attributes, data and time stamps
What tool is needed for DATA RECOVERY
Recuva
Collection method that is most likely to be accepted in a court case
Provide a mirror image of a hard drive such as disk management tool
Example of an Intruder attack
Performing a remote root compromise of an email server, defacing a web server, guessing and cracking passwords, viewing private info without authorization.
What entity is responsible for potentially affecting an organisation’s security
- Threat Actors
- Malicious Actors
What is watering hole?
a form of cyberattack that targets groups of users by infecting websites that they commonly visit