"What you need to know for the C840" Flashcards
is the process of acquiring and analyzing information stored on physical storage
media, such as computer hard drives, smartphones, GPS systems, and removable media. Disk
forensics includes both the recovery of hidden and deleted information and the process of
identifying who created a file or message.
Disk Forensics
is the study of the source and content of email as evidence. Email forensics
includes the process of identifying the sender, recipient, date, time, and origination location of
an email message. You can use email forensics to identify harassment, discrimination, or
unauthorized activities. There is also a body of laws that deal with retention and storage of
emails that are specific to certain fields, such as financial and medical.
Email Forensics
is the process of examining network traffic, including transaction logs and
real-time monitoring using sniffers and tracing.
Network Forensics
is the process of piecing together where and when a user has been on the
internet. For example, you can use internet forensics to determine whether inappropriate
internet content access and downloading were accidental.
Internet Forensics
also known as malware forensics, is the process of examining malicious
computer code.
Software Forensics
is the process of searching memory in real time, typically for working
with compromised hosts or to identify system abuse. Each of these types of forensic analysis
requires specialized skills and training.
Live System Forensics
is the process of searching the contents of cell phones. A few years ago,
this was just not a big issue, but with the ubiquitous nature of cell phones today, cell-phone
forensics is a very important topic. A cell phone can be a treasure trove of evidence. Modern
cell phones are essentially computers with processors, memory, even hard drives and operating
systems, and they operate on networks. Phone forensics also includes VoIP and traditional
phones and may overlap the Foreign Intelligence Surveillance Act of 1978 (FISA), the USA
PATRIOT Act, and the Communications Assistance for Law Enforcement Act (CALEA) in the
United States.
Cell-Phone Forensics
___________ establishes a code of information-handling practices that governs the
collection, maintenance, use, and dissemination of information about individuals that is
maintained in systems of records by U.S. federal agencies. A system of records is a group of
records under the control of an agency from which information is retrieved by the name of the
individual or by some identifier assigned to the individual.
The Federal Privacy Act of 1974
________ protects journalists from being required to turn over to
law enforcement any work product and documentary materials, including sources, before it is
disseminated to the public. Journalists who most need the protection of the PPA are those who
are working on stories that are highly controversial or that describe criminal acts, because the
information gathered may also be useful to law enforcement.
The Privacy Protection Act of 1980
A federal wiretap law for
traditional wired telephony. It was expanded in 2004 to include wireless, voice over packets, and
other forms of electronic communications, including signaling traffic and metadata.
The Communications Assistance to Law Enforcement Act of 1994 (CALEA)
governs the privacy and disclosure,
access, and interception of content and traffic data related to electronic communications.
The Electronic Communications Privacy Act of 1986
passed to improve the security and privacy of sensitive
information in federal computer systems. The law requires the establishment of minimum
acceptable security practices, creation of computer security plans, and training of system users
or owners of facilities that house sensitive information.
The Computer Security Act of 1987 (CSA)
is a law that allows for collection of
“foreign intelligence information” between foreign powers and agents of foreign powers using
physical and electronic surveillance. A warrant is issued by the FISA court for actions under
FISA.
The Foreign Intelligence Surveillance Act of 1978
requires service providers
that become aware of the storage or transmission of child pornography to report it to law
enforcement.
The Child Protection and Sexual Predator Punishment Act of 1998
protects children 13 years of age and under from the collection and use of their personal information by websites. It is noteworthy
that COPPA replaces the Child Online Protection Act of 1988 (COPA), which was determined to
be unconstitutional.
The Communications
The Children’s Online Privacy Protection Act of 1998 (COPPA)