• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/33

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

33 Cards in this Set

  • Front
  • Back

Private IP address

three groups of IP addresses are specifically reserved for use by any private network and are not seen on the public internet

dynamic ip

temporarily assigned from a pool of available addresses registered to an ISP

static ip

are permanently assigned to devices configured to always have the same ip address (commonly used when a person, business, or org is maintaining a constant internet presence such as a website)

Domain name system (DNS) servers

"phonebooks of the internet"


directories that match ip addresses with registered domains and resolve the text that people understand into a format that devices understand

ip masking

a method of hiding or obscuring the true source ip address

ip spoofing

method of impersonating another system's ip address

ip redirecting

a method of forwarding or routing internet traffic to an obscured ip address

FTP (file transfer protocol)

client-server model


any computer can be the server, using software

peer-to-peer (p2p)

directly b/t computers and does not require a server to transfer files

network intrusion

unauthorized access or access in excess of user's privileges on a network

service set identifier (SSID)

is an identifier included in packets to allow the differentiation b/t multiple wireless networks

wired equivalent privacy (WEP)

a form of encryption that is used to protect wireless communication from eavesdropping and to prevent unauthorized access to a wireless network

dynamic host configuration protocol (DHCP)

a system can automatically configure and is allowed to connect to the network

search warrant

a court order issued by magistrate, judge or supreme court official that authorize law enforcement officers to conduct a search of a person, location, or vehicle for evidence of a crime and to confiscate evidence if it is found. (cannot be issued in aid of a civil process)

court order

an official proclamation by a judge that defines the legal relationship b/t the parties to a hearing, trial, appeal or other court proceedings. (signed by a judge)

subpoena

a writ by a government agency most often a court that has authority to compel testimony by a witness or production of evidence under penalty or failure

black's law dictionary

the bible for legal definitions

traditional seizure methodology

1. secure physical scene


2. secure digital scene


3. seize all hardware and media


4. document label and package for delivery to lab


5. at the lab, all seized data is analyzed

seizure methodology featuring minimization

1. secure physical scene


2. secure digital scene


3.(digital media identification)(minimize crime scene by prioritizing the physical media)(seizure of storage devices and media)


4. document, label and package for delivery to lab


5. at the lab, all seized data is analyzed

removable media

flash drive, cds, dvds

flash media

key chains, watches, cameras

imaging

creats a bit-stream copy- an exact cops pf 1s and 0s


perserves the exact order of bits

ram dump

use of a program to view the computers logs

simple hex and command line scripts

assist the examiner in performing keyword searches, sorting data objects, and sourcing the source disk for file remnants in file slack and drive free space

latent evidence

finger prints, blood, physical evidence

corporation vision statement

design, produce and sell a high quality widget and thus expand market shares while continuing to improve processes to manage cost and meet customers' expectations

security department vision statement

in partnership with our customers, provide a competitive advantage for the corporation by continuous protection of all the corporations assets without hindering productivity and support increased production or corporate widgets in a cost effective manner

cyber crime prevention vision statement

provide the most efficient and effective cyber crime prevention program for the corporation, which adds value to teh corporate products and services as a recognized leader in the industry

risk management

to be cost-effective you must apply risk management concepts

atactical plan

a short-range (3 year) plan that supports the corporate cyber crime prevention strategic plan goals and objectives

law enforcement

detecting criminal activity, identifying and apprehending suspects, and gathering evidence necessary to comvict a suspect in court

court system

examining presented by both the prosecution and defense, rendering a verdict and deciding punishment

correction system

the corrections system carries out the punishment