Technology Flashcards
List at least 6 of the protocols found in the application layer of the Internet protocol suite
HTTP, HTTPS, SMTP, POP, DNS, IMAP
Who is Tim Berners-Lee? What does HTTP stand for? Name a web server technology? Name a web client? What does URL stand for?
a. Berners-Lee invented the world wide web
b. HTTP (hyper text transfer protocol)
c. Web server technology –
d. Web client –
e. URL
What is HTTP protocol
(hyper text transfer protocol): operates between web server and client for internet
What is FTP protocol
(file transfer protocol): used to transfer large files
What is SMTP protocol
(simple mail transfer protocol): email
What is POP protocol
What is IRC protocol
internet relay chat - used to transfer files directly, most oftenly used by offenders
What is NNTP protocol
Network News Transfer Protocol, is a protocol used primarily for reading and posting articles on Usenet discussion groups
What is TCP protocol
What is NTP protocol
List the regional registries that control IP allocation around the world
www.arin.net
www.ripe.net
www.afrinic.net
www.apnic.net
www.lacnic.net
What is the difference between a ccTLD and a gTLD
ccTLD (country code top level domain) - .ie, .uk, .fi
gTLD (global top level domain) - .com, .org
What is the difference between a Registrant, Registry and a Registrar
a. Registrant –
b. Registry – .net (verisign), .info (Afilias),
c. Registrar – Godaddy, blacknight”
Outline the purposes and functionality of the DNS system
Domain Name system. Converts IP addresses (numbers) of web addresses to plain text URLs, which are much easier to remember. Domain names are unique
What is WHOIS information and where can you get it for the gTLD space
Find owner/registrant of domain/website
What does the expression Root Server mean in relation to DNS and what role does it play in the DNS system
Root servers are the address books of the internet and store the conversion between IP addresses and plain text URLs
What makes Peer to Peer file sharing popular with open traders of child exploitation material
Direct connection, encrypted
List the difference between Image Chans and Forums
“Image chans have minimalistic structures, often without user accounts or profiles. Users usually post anonymously
Forums often require user registration and have more complex structures with user profiles, signatures, and sometimes a ranking or reputation system.
Discussions are typically text-based, organized into categories and sub-forums”
Outline two of reasons that email is used by online sex offenders with examples
Mailboxes are not public, data is indexable / searchable easily accessible data
Use email to be contacted / contact others
Continue conversation from forums on email”
What is an anonymous remailer and how does it work?
Strip away email headers, encrypt data with public key, no identifiers on where email originated from
As a collector of CAM why should I use online mail
“a. Does not store data locally like a mail client out. Using a web interface doesn’t display / download data
b. Does not store data locally to machine, stored in cloud
c. Online storage that in indexable”
Compare and contrast the use of a mail client and mail download with local storage and online webmail
“a. Store data online not stored locally on machine, accessible all over with internet connection
b. Local storage – easily accessible offline / indexable, no internet connection required
c. Storage and ease of access”
List 5 of the “Big 7” top level UseNet hierarchies
“comp: This hierarchy contains groups related to computers and technology. Topics can range from software to hardware, programming languages, and networking.
sci: This hierarchy includes groups that discuss science-related topics. This could involve physics, biology, chemistry, and other scientific disciplines.
soc: The soc hierarchy focuses on social issues and cultural discussions. It includes groups for discussing different societies, social norms, and cultural practices.
rec: Recreational activities are the focus of this hierarchy. It includes groups for hobbies, sports, music, games, and a variety of other leisure activities.
news: This hierarchy is meta-discussive, focusing on issues related to the Usenet system itself, including discussions about the Usenet, its administration, and its support.
talk, which is known for more contentious or controversial topics,
misc, which includes discussions that do not necessarily fit into the other more defined categories”You find 100 Nzb files on a suspects computer, what can you conclude
You find 100 Nzb files on a suspects computer, what can you conclude
NZB file is a file format used primarily within the Usenet community. It was created to simplify the process of downloading files from Usenet newsgroups
Briefly describe the dark net and describe how they are used to propagate Child Sexual Abuse Material:
The dark net is a small portion of the deep web that has been intentionally hidden and is inaccessible through standard web browsers. Accessing the dark net requires specific software, configurations, or authorization, most commonly using tools like Tor or I2P.
Briefly describe the deep web and describe how they are used to propagate Child Sexual Abuse Material:
“The deep web refers to all the parts of the internet that are not indexed by standard search engines like Google, Bing, or Yahoo. This includes any pages that are behind paywalls, require sign-in credentials, or are dynamically generated and thus not searchable or visible to the public.
Content Examples: Private databases, membership websites, confidential corporate web pages, and personal email accounts.”
Briefly describe the usenet and describe how they are used to propagate Child Sexual Abuse Material:
Usenet is an older distributed discussion system separate from the World Wide Web, established in 1980. It allows users to read and post messages to various newsgroups. While originally designed for textual messages and discussions, it is now also used for sharing binaries (files) across its system.
Why is IRC a perfect combination of functionality for online child sex offenders
Direct client to client connection
What does the @ sign signify within an IRC room
“a. @ - Username of person in charge of room
b. + - higher status”
What other parameters would you need with the /j command executed in the status window
the /j command is a shorthand or abbreviation for the /join command, which is used to join a specific channel
What does DCC mean?
Direct client to client communication, Don’t need to connect to IRC server to share files
Is mIRC a client or a server?
client
Describe the “cuckoo carousel” as described in the lecture on web based CAM sharing
taking resources of someone else to achieve your goals
What do you understand by the term EXIF data? List five elements of EXIF data that have investigative value
EXIF (Exchangeable Image File Format) data is metadata embedded within image files captured by digital cameras and smartphones.
Date and Time of Capture
GPS Coordinates
Camera Model and Settings
Software and Editing History
Thumbnail images and Comments
Which image file formats would you expect to support animation and transparency
GIF
What would you expect to find if you saw the following headers: ÿØÿà
JPEG
Describe the following file types: TIFF
Describe the following file types: RAW
Describe the following file types: GIF
Describe the following file types: BMP
Describe the following file types: PNG