Computer Forensics

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Disaster Recovery

involves preventing data loss by using backups, uninterruptible power supply (UPS) devices, and off-site monitoring.

Data recovery

involves recovering information from a computer that was deleted by mistake or lost during a power surge or server crash, for example.

check fraud.

The most common computer-related crime is

physical

Courts consider evidence data in a computer as x evidence

business

Generally, computer records are considered admissible if they qualify as a x record.

hearsay

Most federal courts have interpreted computer records as x evidence.

clusters

In Microsoft file structures, sectors are grouped to form x, which are storage allocation units of one or more sectors.

line of authority

Published company policies provide a(n) for a business to conduct internal investigations.

TIF

The image format XIF is derived from the more common x file format.

investigation plan.

You begin any computer forensics case by creating a(n) x

graphics editors

You use x to create, modify, and save bitmap, vector, and metafile graphics files.

F

Computer investigations and forensics fall into the same category: public investigations.

hazardous materials (HAZMAT)

Some computer cases involve dangerous settings. For these types of investigations, you must rely on the skills of x teams to recover evidence from the scene.

data acquisition

For computer forensics, is the task of collecting digital evidence from electronic media.

warrant

For most law-enforcement-related computing investigations, the investigator is limited to working with data defined in the search x.

T

For target drives, use only recently wiped media that have been reformatted and inspected for computer viruses.

F

ISPs can investigate computer abuse committed by their customers.

expectation of privacy

If a company does not publish a policy stating that it reserves the right to inspect computing assets at will or display a warning banner, employees have a(n) x

1960's

The FOIA (Freedom of Information Act) was originally enacted in the

literary works

Under copyright laws, computer programs may be registered as x

pictoral, graphic, and sculptural.

Under copyright laws, maps and architectural plans may be registered as x

creating a disk-to-image file.

____ 68. The most common and flexible data-acquisition method is c

bookmarks

FTK and other computer forensics programs use x to tag and document digital evidence.

live

FTK provides two options for searching for keywords: indexed search and x search.

file

Drive slack includes RAM slack (found primarily in older Microsoft OSs) and x slack.

Windows 9x

During an investigation involving a live computer, do not cut electrical power to the running system unless it's an older x or MS-DOS system.

preliminary

During the x design or approach to the case, you outline the general steps you need to follow to investigate the case.

reasonable suspicion

Every business or organization must have a well defined process that describes when an investigation can be initiated. At a minimum, most corporate policies require that employers have a x that a law or policy is being violated.

T

Bitmap images are collections of dots, or pixels, that form an image.

Master Boot Record (MBR)

On Windows and DOS computer systems, the x stores information about partitions on a disk and their locations, size, and other important items.

Partition Boot Sector,

On an NTFS disk, the first data set is the x which starts at sector [0] of the disk.

internet

The x is the best source for learning more about file formats and their associated extensions

initial-response field kit

With a(n) x you can arrive at a scene, acquire the data you need, and return to the lab as quickly as possible.

carving or salvaging.

Recovering pieces of a file is called x

Steganography

x has also been used to protect copyrighted material by inserting digital watermarks into a file.

Computer Forensics

x involves obtaining and analyzing digital information for use as evidence in civil, criminal, or administrative cases.

The Expert Witness format

x is the default format for acquisitions for Guidance Software EnCase.

Indexed

x search catalogs all words on the evidence disk so that FTK can find them quickly.

safety

Environmental and x issues are your primary concerns when you're working at the scene to gather information about an incident or a crime.

curiosity

Evidence is commonly lost or corrupted through professional x, which involves police officers and other professionals who aren't part of the crime scene processing team.

full-featured hexadecimal editor, computer forensics tool

Getting a hash value with a x is much faster and easier than with a(n) x

repeatable findings.

In any computing investigation, you should be able to repeat the steps you took and produce the same results. This capability is referred to as

supinas

In civil and criminal cases, the scope is often defined by search warrants or x, which specify what data you can recover.

prosecution.

In general, a criminal case follows three stages: the complaint, the investigation, and the

whole disk encryption

Microsoft has recently added (x) in its Vista Ultimate and Enterprise editions, which makes performing static acquisitions more difficult.

T

One way to examine a partition's physical level is to use a disk editor, such as Norton DiskEdit, WinHex, or Hex Workshop.

government agencies

Private-sector organizations include businesses and x that aren't involved in law enforcement.

sniffing

Real-time surveillance requires x data transmissions between a suspect's computer and a network server.

chain of custody

The basic plan for your investigation includes gathering the evidence, establishing the , and performing the forensic analysis.

bitshifting

The data-hiding technique x changes data from readable code to data that looks like binary executable code.

standard risk assessment.

The list of problems you normally expect in the type of case you are handling is known as the

Exchangable Image File (EXIF)

The majority of digital cameras use the x format to store digital pictures.

T

The reason for the standard practice of securing an incident or crime scene is to expand the area of control beyond the scene's immediate location.

hexadecimal

The simplest way to access a file header is to use a(n) x editor

FBI Computer Analysis and Response Team (CART)

The was formed in 1984 to handle the increasing number of cases involving digital evidence.

live

There are two types of acquisitions: static acquisitions and x acquisitions.

T

To be a successful computer forensics investigator, you must be familiar with more than one computing platform.

bit stream image

To create an exact image of an evidence disk, copying the to a target work disk that's identical to the evidence disk is preferable.

bookmark

To generate reports with the FTK ReportWizard, first you need to x files during an examination.

Email abuse

investigations typically include spam, inappropriate and offensive message content, and harassment or threats.

Bitmap

x images store graphics information as grids of individual pixels.

Insertion

x steganography places data from the secret file into the host file without displaying the secret data when you view the host file in its associated program.

Substitution

x steganography replaces bits of the host file with other bits of data.

forensics copy.

A bit-stream image is also known as a(n)

T

Chain of custody is also known as chain of evidence.

metafile

A graphics program creates and saves one of three types of image files: bitmap, vector, or x.

bit-stream copy

A is a bit-by-bit copy of the original storage medium.

F

A nonsteganographic graphics file has a different size than an identical steganographic graphics file.

virtual machine

A x allows you to create a representation of another computer on an existing physical computer.

cylinder

A x is a column of tracks on two or more disk platters.

metadata

Records in the MFT are referred to as x.

police blotter

The x provides a record of clues to crimes that have been committed previously.

Fourth Amendment

The x to the U.S. Constitution (and each state's constitution) protects everyone's rights to be secure in their person, residence, and property from search and seizure.

Data compression

x is the process of coding of data from a larger form to a smaller form.

Geometry

x refers to a disk's structure of platters, tracks, and sectors.

sparse

If your time is limited, consider using a logical acquisition or (x) acquisition data copy method.

T

After a judge approves and signs a search warrant, it's ready to be executed, meaning you can collect evidence as defined by the warrant.

critique the case.

After you close the case and make your final report, you need to meet with your department or a group of fellow investigators and

much easier than

Investigating and controlling computer incident scenes in the corporate environment is x in the criminal environment.

end user

A(n) is a person using a computer to perform routine tasks other than systems administration.

extensive-response field kit

A(n) x kid should include all the tools you can afford to take to the field.

exhibits

It's the investigator's responsibility to write the affidavit, which must include (evidence) that support the allegation to justify the warrant.

allegation

Based on the incident or crime, the complainant makes a(n), an accusation or supposition of fact that a crime has been committed.

T

By the 1970s, electronic crimes were increasing, especially in the financial sector.

T

If a corporate investigator follows police instructions to gather additional evidence without a search warrant after you have reported the crime, you run the risk of becoming an agent of law enforcement.

live

If the computer has an encrypted drive, a (x) acquisition is done if the password or passphrase is available.

criminal

In a case, a suspect is tried for a criminal offense, such as burglary, murder, or molestation.

affidavit.

In a criminal or public case, if you have enough information to support a search warrant, the prosecuting attorney might direct you to submit a(n)

notarized

The affidavit must be under sworn oath to verify that the information in the affidavit is true.

data runs

The file or folder's MFT record provides cluster addresses where the file is stored on the drive's partition. These cluster addresses are referred to as x

computer investigations

The group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime.

F

The law of search and seizure protects the rights of all people, excluding people suspected of crimes.

limiting phrase

When an investigator finds a mix of information, judges often issue a(n) x to the warrant, which allows the police to separate innocent information from evidence.

U.S. Department of Justice (DOJ) Homeland Security Patriot Act Department of Defense

When seizing computer evidence in criminal investigations, follow the x standards for seizing digital data.

copyright

When working with image files, computer investigators also need to be aware of x laws to guard against copyright violations.

password -cracking software

When you are dealing with password protected files, you might need to acquire x or find an expert who can help you crack the passwords.

assessment and risk management

When you work in the vulnerability x group, you test and verify the integrity of standalone workstations and network servers.

Vector graphics

x are based on mathematical instructions that define lines, curves, text, ovals, and other geometric shapes.

Digital evidence

x can be any information stored or transmitted in digital form.


Ensembles d'études connexes

Match the terms that pertain to urinalysis with their correct meanings

View Set

A+ 220-801 Objective 2.9: Compare and contrast network devices and their functions and features

View Set

Unit 4- Nervous, senses, endocrine

View Set

Unit Circle sine, cosine, tangent

View Set