Forensics Fundamentals
Computer Crime
Challenges
Methods and Labs
Technologies
100
The system forensics specialty that involves acquiring and analyzing data stored on physical storage media, such as computer hard drives and removable media.
What is Disk Forensics
100
A suspect's ability to commit a crime.
What is Means
100
Data that has been processed and assembled so that it is relevan to an investigation.
What is Information
100
Data that is complete and materially unaltered.
What is Forensically Sound
100
Hacking process by which the iPhone firmware is overwritten to install third-party applcations or unlock the device.
What is Jailbreaking
200
This is an area of system forensics that is most often used to examine malicious code.
What is Software Forensics
200
Occurs when an attacker deprives people of the services they are entitled to access or provide.
What is Dos/DDoS attack
200
A court order that requires a person or an organization that owns subject equipment to release it for analysis?
What is a Subpoeona
200
Helps a lab restore its workstations and file servers to their original condition after a catastropic failure occurs.
What is a Disaster Recovery Plan
200
Trap set for cybercriminals that involves a sysem or data that is attracive the hackers.
What is a Honeypot
300
This is an area of system forensics that is used to search memory in real time, typically for working with compromised hosts or to identify system abuse.
What is Live System Forensics
300
This is an unauthorized intrusion into a computer system. The first offense can be punished by a year in jail.
What is Hacking
300
The continuity of evidence that makes it possible to account for all that has happened to evidence between its original collection and its appearance in court, preferable unaltered.
What is the Chain of Custody
300
Help justify the acquisition of newer and better resources to investigate acomputer fresics cases.
What is a Business Case
300
Process of encoding information using fewer bits than the unencoded information would use.
What is Compression
400
This is the withholding, hiding, alteration, or destruction of evidence relevant to a legal proceding.
What is spoliation
400
A collection of software robots that create and send out spam extremely quickly
What is Botnets
400
Identifies the types of data to be collected and descibe the expected source for the data. It should also list any anticipated problems as well as recommended strategies to deal with those problems.
What is a Data Analysis Plan
400
Governs the whether, when, how, and why proof of a legal case can be placed befoe a judge or jury.
What are Rules of Evidence
400
Used to identify unknown strings of text by searching for values between "completely true" and "completely false".
What is a Fuzzy Logic Tool
500
This refers to anything that changes or destroys digital evidence between the time the evidence is created and when the case goes to court.
What is Evidence Dynamics
500
Theft of copyrighted material through illegal copying of genuine programs or counterfeiting of products that are intended to pass as originals.
What is Piracy
500
States that when two objects come into contact, ther is always transfernd of materials from each object onto the other.
What is Locard's Exchange Principle
500
Provides guidelines for managing a forensics lab and axquiring crime and forensics lab certification.
What is the ASCLD - American Society of Crime Laboratory Directors
500
U.S. federal government agency tgaht sets standards for digital evidence proecessing, analysis, and diagnosticis.
What is the DoD Cyver Crime Center (DC3)
M
e
n
u