What is the definition of digital forensics?
The process of uncovering digital evidence from electronic devices.
What is the name of the internet browser that allows users to mask their browsing activity?
Tor
What will happen to the field of digital forensics as technology continues to evolve?
Digital forensics will also evolve with new tools and techniques
What is metadata?
Information about the information itself.
List two types of files that forensic analysts can retrieve.
Emails, text messages, photos, documents, and other files that may have been intentionally or accidentally deleted.
How can investigators and detectives access encrypted files?
They must be unencrypted/cracked.
List two advantages to the use of digital forensics.
Allows law enforcement to track and use evidence against criminals, can help individuals retrieve their personal information, can help prevent crimes such as cyberbullying, terrorism, and fraud, and can protect companies and entities from data breaches.
List two disadvantages to the use of digital forensics.
The equipment required is expensive and requires expertise, it can be time-consuming, it can be unreliable and inaccurate, it can invade someone's privacy, etc.
In which kinds of court cases can digital forensics be used?
Criminal and civil
List three examples of evidence that may be used against a suspect in court.
Internet browsing history, encrypted files, deleted files, etc.
What is a common argument against the use of digital forensics?
The right to privacy, the possibility of punishing an innocent person due to error, etc.
List two examples of criminal cases in which digital forensics is commonly used.
Terrorism, fraud, cyberbullying, identity theft, intellectual property theft.
Provide an example of a situation in which error by detectives leads an innocent person to go to prison?
Answers may vary.
List two examples of software which may be used in data security or digital forensics?
Answers may vary.
What part of an enterprise system may be vulnerable to criminal activity?
Any parts: network, applications, operating systems, storage media, etc.