Term
What does the word forensics mean? |
|
Definition
|
|
Term
________________ is the process of using scientific knowledge for collecting, analyzing and presenting evidence to courts. |
|
Definition
|
|
Term
Forensic science deals primarily with the recovery and analysis of __________ evidence. |
|
Definition
|
|
Term
|
Definition
|
|
Term
Computer forensics combine ________ and C______ S_______ to create ____________ evidence in court |
|
Definition
*Law *computer science *admissible |
|
|
Term
What are 3 objectives of computer forensics?
1.
2
3. |
|
Definition
*recover
*analyze
*preserve |
|
|
Term
Preservation of evidence, identification of evidence, interpretation of evidence, documentation of evidence are _________________ of computer forensics. |
|
Definition
|
|
Term
Computer forensics must adhere to what 5 Principle in computer Forensics? |
|
Definition
* rules of evidence *Legal process *Integrity of evidence *factual reporting of info found *Provide expert opinion at court |
|
|
Term
What are the 5 points in computer forensic methodology? |
|
Definition
*preservation
*identification
*extraction
*interpretation
* documentation |
|
|
Term
What 4 things do computer forensic practioners have to be worried about? |
|
Definition
*Rules of evidence
*preserving evidence
*evidence chain of custody
*forensic methodology |
|
|
Term
What is computer fraud or e-fraud? |
|
Definition
|
|
Term
Offenses that involve computer include computers as a _________ of a crime and Computers as a ________of a crime? |
|
Definition
|
|
Term
The most dangerous threat to computer system and its organization is the _________. This act can be ________ or ___________ |
|
Definition
*the users
*malicious or acidental |
|
|
Term
Fraud, child pornography, extortion piracy, stalking, forgery, identity theft, terrorism, phising are all examples of __________ crimes. |
|
Definition
|
|
Term
Rogue programs (viruses, worms, trojans), unauthorized access/tampering, Denial of service attacks/spamming, cyberterrorism are _______ crimes. |
|
Definition
|
|
Term
Name 3 different types of computer criminals? |
|
Definition
*Young people(script kiddies),
*wannabes (cybergangs), Hactivists,
*people who crack under presure,
*sociopaths,
*criminals |
|
|
Term
What is the profile of a hacker? |
|
Definition
college age males, Loner or a social activity, |
|
|
Term
Women hackers are often___________ motivated? |
|
Definition
|
|
Term
What are 3 types of old crimes facilitated by the internet? |
|
Definition
Child porn, piracy, stalking |
|
|
Term
Name 3 types of new crimes facilitated by the Internet? |
|
Definition
Rogue programs, Denial of Service, unauthorized access |
|
|
Term
|
Definition
Berne Madoff, provide high prfs, just give each other their money |
|
|
Term
What is a Pyramid Scheme? |
|
Definition
get rick quick scheme. Email chain |
|
|
Term
What is the difference between fraud and embezzlement? |
|
Definition
embezzlement is someone from inside a company. |
|
|
Term
What’s the difference in the profile of male v. female hackers? |
|
Definition
Female hackers politically motivated. Men are young, its social activity. |
|
|
Term
What is the difference between a private and public investigation? What issues may each be dealing with? |
|
Definition
Public: Fed/State/LPD Misalloction of funds/grants, child porn.
Priave: Employ Forensic Investigators leaked trade secrets, indust espionage, security breaches. |
|
|
Term
What may private forensic firms do? (3 Things) |
|
Definition
*Investigate Security breach for companies *Assist w/ gov't investigations *Act as expert witness |
|
|
Term
|
Definition
Offensive act against society. Violates a law punishable by government |
|
|
Term
What is the definition of cybercrime? |
|
Definition
Any violation of criminal law that involves a knowledge of computer technology for their perpetration, investigation, or prosecution. |
|
|
Term
What are some objects that can be found in a computer lab? |
|
Definition
*workstations *UPS *Software *Internet Conx |
|
|