Term
| What does the word forensics mean? |
|
Definition
|
|
Term
| ________________ is the process of using scientific knowledge for collecting, analyzing and presenting evidence to courts. |
|
Definition
|
|
Term
| Forensic science deals primarily with the recovery and analysis of __________ evidence. |
|
Definition
|
|
Term
|
Definition
|
|
Term
| Computer forensics combine ________ and C______ S_______ to create ____________ evidence in court |
|
Definition
| *Law *computer science *admissible |
|
|
Term
What are 3 objectives of computer forensics?
1.
2
3. |
|
Definition
*recover
*analyze
*preserve |
|
|
Term
| Preservation of evidence, identification of evidence, interpretation of evidence, documentation of evidence are _________________ of computer forensics. |
|
Definition
|
|
Term
| Computer forensics must adhere to what 5 Principle in computer Forensics? |
|
Definition
* rules of evidence *Legal process *Integrity of evidence *factual reporting of info found *Provide expert opinion at court |
|
|
Term
| What are the 5 points in computer forensic methodology? |
|
Definition
*preservation
*identification
*extraction
*interpretation
* documentation |
|
|
Term
| What 4 things do computer forensic practioners have to be worried about? |
|
Definition
*Rules of evidence
*preserving evidence
*evidence chain of custody
*forensic methodology |
|
|
Term
| What is computer fraud or e-fraud? |
|
Definition
|
|
Term
| Offenses that involve computer include computers as a _________ of a crime and Computers as a ________of a crime? |
|
Definition
|
|
Term
| The most dangerous threat to computer system and its organization is the _________. This act can be ________ or ___________ |
|
Definition
*the users
*malicious or acidental |
|
|
Term
| Fraud, child pornography, extortion piracy, stalking, forgery, identity theft, terrorism, phising are all examples of __________ crimes. |
|
Definition
|
|
Term
| Rogue programs (viruses, worms, trojans), unauthorized access/tampering, Denial of service attacks/spamming, cyberterrorism are _______ crimes. |
|
Definition
|
|
Term
| Name 3 different types of computer criminals? |
|
Definition
*Young people(script kiddies),
*wannabes (cybergangs), Hactivists,
*people who crack under presure,
*sociopaths,
*criminals |
|
|
Term
| What is the profile of a hacker? |
|
Definition
| college age males, Loner or a social activity, |
|
|
Term
| Women hackers are often___________ motivated? |
|
Definition
|
|
Term
| What are 3 types of old crimes facilitated by the internet? |
|
Definition
| Child porn, piracy, stalking |
|
|
Term
| Name 3 types of new crimes facilitated by the Internet? |
|
Definition
| Rogue programs, Denial of Service, unauthorized access |
|
|
Term
|
Definition
| Berne Madoff, provide high prfs, just give each other their money |
|
|
Term
| What is a Pyramid Scheme? |
|
Definition
| get rick quick scheme. Email chain |
|
|
Term
| What is the difference between fraud and embezzlement? |
|
Definition
| embezzlement is someone from inside a company. |
|
|
Term
| What’s the difference in the profile of male v. female hackers? |
|
Definition
| Female hackers politically motivated. Men are young, its social activity. |
|
|
Term
| What is the difference between a private and public investigation? What issues may each be dealing with? |
|
Definition
Public: Fed/State/LPD Misalloction of funds/grants, child porn.
Priave: Employ Forensic Investigators leaked trade secrets, indust espionage, security breaches. |
|
|
Term
| What may private forensic firms do? (3 Things) |
|
Definition
*Investigate Security breach for companies *Assist w/ gov't investigations *Act as expert witness |
|
|
Term
|
Definition
| Offensive act against society. Violates a law punishable by government |
|
|
Term
| What is the definition of cybercrime? |
|
Definition
| Any violation of criminal law that involves a knowledge of computer technology for their perpetration, investigation, or prosecution. |
|
|
Term
| What are some objects that can be found in a computer lab? |
|
Definition
*workstations *UPS *Software *Internet Conx |
|
|