Mr. Jacksons' most recent alma mater
What is UDC
Someone who looks into cybercrimes and helps businesses and/or law enforcement
What is digital forensics investigator?
Data acquisition from a source that is still connected to power
What is Live Acquisition?
Passwords sent and stored in plaintext
What is cleartext password?
Browser used to access the dark web
What is Tor
Mr. Jackson previous job working with Digital Forensics Investigations
What is the Secret Service?
Keeping a business operating after an unexpected emergency
What is business continuity?
The order in which volatile data should be collected
What is the order of volatility?
Password attack that tries every possible combination
What is brute force?
An attack where you click on a webpage and malicious software starts downloading
What is drive-by download?
The manga/anime that Mr. Jackson based the third scenario on
What is Blue Lock
The phase of an investigation where you set up everything, such as a lab and a team before doing the actual investigation
What is pre investigative phase?
Format of data acquisition that creates a bit by bit copy
What is raw format?
Technique that hides data in plain sight
What is steganography?
The relay that sends the data to its final destination
What is exit relay?
The color of Mr. Jackson's Lanyard
What is Blue?
Cyber attacks from people with access
What is Internal/insider attack?
Making a copy of acquired data and hashing it to confirm authenticity
What is the rule of thumb?
Anti-Forensics technique used to confuse and mislead investigators
What is trail obfuscation?
The reason Tor is so hard to investigate
What is encryption/anonymity?
Mr. Jacksons undergraduate university. Bonus* Undergraduate degree
What is George Washington Unversity?
What is Criminal Justice?
The ability to perform an investigation in different locations, such as different countries
What is Jurisdiction?
Data acquisition format that is open source and available on many platforms
What is Advance Forensic Format (AFF4)?
Password cracking technique that tries different combinations based on specific criteria
What is Rule-Based attack?
The 100% percent sure fire way to track someones activity while using Tor
What is nothing?