QUIZ SUMMARIZE Flashcards
Best Description for Write Blocker
A tool designed to prevent any write access to hard disk, permitting read-only access to data storage without compromising the integrity of data
What access control models will allow the access to view Top Secret files?
Mandatory Access Control (MAC)
IAM systems provide what capability to users?
- Single sign-on
- Two-factor authentication
- Privileged access management
Bit Stream Copy
- A copy of the original storage medium
- Also known as Bit Stream Image
- Exact copy of the original disk
Discretionary Access Control (DAC)
- Owners can usually modify object ACLS
- Control accessed through Asset Control Lists(ACL)
- Owner can place subject on ACL or not
Mandatory Access Control (MAC)
- Allows end-user to decide who get access to info
- Doesn’t allow user to give other users privilege access
Two types of evidence extractions
- Logical Extraction
- Physical Extraction
What does Hash Value do
Used to determine the integrity of data to verify a forensic image was captured successfully
What is Chain of Custody?
The sequential documentation that accounts for the sequence of custody, control, transfer, analysis, and disposition of evidence
Logical Extraction
Examining file system information: file name, size, location, attributes, data and time stamps
What tool is needed for DATA RECOVERY
Recuva
Collection method that is most likely to be accepted in a court case
Provide a mirror image of a hard drive such as disk management tool
Example of an Intruder attack
Performing a remote root compromise of an email server, defacing a web server, guessing and cracking passwords, viewing private info without authorization.
What entity is responsible for potentially affecting an organisation’s security
- Threat Actors
- Malicious Actors
What is watering hole?
a form of cyberattack that targets groups of users by infecting websites that they commonly visit
Digital Evidence can be grouped as these categories:
User Created
Computer Created
User Protected
Types of Digital Evidence
Logs.
Video Footage and Images.
Archives.
Active Data.
Metadata.
Residual Data.
Volatile Data.
Replicant Data.
Most dangerous Threat Actors
Nation States
Phishing, baiting, smishing, , malware, pretexting, and water-holing are examples of?
Social Engineering
Message Digest
Create a message digest or “fingerprint”
Chain of custody definition
CoC indicates the collection, sequence of control, transfer, and analysis. It also documents each person who handled the evidence, the date/time it was collected or transferred, and the purpose for the transfer.
What would be the best email for Susan?
.Sus@n53
Symmetric encryption is known as?
“secret key” encryption: the key must be kept secret from third parties.
Asymmetric encryption is known as?
Public key encryption