Front | Back |
What is Computer Forensics?
|
The preservation, identifications, extraction, interpretation, and documentation of computer evidence.
|
What is Digital Forensics?
|
The scientific acquisition, analysis, and preservation of data contained in electronic media and info can be used as evidence in a court of law.
|
What are the three main functions of the TRIAD?
|
Vulnerability assessment and risk management, network intrusion detection, and incident response computer investigations.
|
What two tests for evidence for both computer forensics and physical forensics have to survive in a court of law?
|
Authenticity - Where does the evidence fomr from?
Reliability - Is the evidence reliable and free from flaws?
|
What are the five main cyber crimes?
|
Theft of Intellectual Property, Damage of company service networks, $ fraud, Hacker penetrations, Distribution and execution of viruses and worms
|
What is theft of intellectual property?
|
And act that allows access to patent, trade secrets, customer data, sales trends, and any confidential information.
|
What are four examples of damage of company service networks?
|
Planting a trojan horse, conduct denial of service attack, install unauthorized modem or back door to allow unauthorized access to network or systems.
|
What is financial fraud?
|
Using fraudulent solicitation to prospective victims to conduct fraudulent transactions.
|
What are hacker system penetrations?
|
These occur via the use of sniffers, rootkits, and other tools that take advantage of vulnerabilities of systems or software.
|
What is the most common form of cyber crime?
|
The distribution and execution of viruses and worms.
|
What constitutes a computer crime?
|
An intentional illegal act involving a computer, its system, or applications.
|
What is the first of the five stages of forensic investigation involving tracking computer crimes?
|
Identify the crime to include the computer and other tools to commit the crime.
|
What is the second of the five stages of forensic investigation involving tracking computer crimes?
|
Gathers evidence to build a suitable chain of custody,
|
What is the third of the five stages of forensic investigation involving tracking computer crimes?
|
Recovers data, must image, duplicate and replicate it.
|
What is the fourth of the five stages of forensic investigation involving tracking computer crimes?
|
Analyze the duplicated evidence
|