• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/46

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

46 Cards in this Set

  • Front
  • Back
SODDI
Some other dude did it- trojan defense
Robert Morris Sr.
Worked at NSA father of Rober Tappan Morris who wrote Morriss Worm
Robert T. Morris
Created Morris Worm the first computer worm on internet. 1st person convicted under computer fraud and abuse act
Percentage of cyber crime cases reported in 2006
25%
Why are businesses reluctant to report cyber crimes?
Negative Publicity
-Attracting other cyber attackers
-Undermining confidence of cust, supp
Inviting ridicule of competitors
How do you define digital Forensics
Can be defined as the art of
discovering, retrieval of
information about a crime in
such a way to make it
admissible to the court.
What other things is Digital Forensics known as
-Cyberspace Forensics (or Cyber
Forensics)
-Computer and Network
Forensics
NDCI
National Data Conversion Institute
NW3C
National White Collar Crime Center
IACIS
International Association of Computer Investigative Specialist
Dr Edmond Locard
Transference or exchange principal
aka something is taken something is left
Hans Gross
birth of the field of criminalistics, applying science to the practices of crime investigation and law
Sir Alec Jefferys
Serology or DNA profiling
What is serology
DNA profiling
File Extensions: .pwl
Windows Password List
File Extension: .rft
Rich Text Document
File Extension: .mpnt
mac Paint Image Format
What is the study of
handwriting, especially when
employed as a means of
analyzing character ?
Graphology / Forensic
Document Examiners
What is the study of disease
through examination of body
tissues and organs ?
Pathology
What is the scientific study of
crime, criminal behavior, and
law enforcement?
Criminology
What is the study of harmful
interactions between chemicals
and biological systems?
Toxicology
What device has a read write head
Hard drive, etc
What is AGP
advanced graphics port
What Unix command can be
used to create a bit-for-bit, raw
image copy of a file or
partition?
dd
What is the wireless equivalent
of "ifconfig“?
Use "iwconfig" to control the
wireless card
In Unix what is fsck used for?
To check and repair file
systems
What Unix command is used to
find printable text strings in an
object or binary file?
strings
What does LBA stand for?
Logical Block Addressing
What is SIMM/DIMM?
Single Inline Memory
Modules/Dual Inline Memory
Module
What does “RAID” stand for?
“Redundant Array of
Inexpensive / Independent
Disks”
What is a MFT?
Master File Table
Chief NSA Scientist and his Son
who gave annelids their
traveling orders…?
Robert Morris Sr. and his son,
Robert T. Morris
A set of formal rules describing
how to transmit data…?
Protocol
Name the missing Layer in the
OSI Model…?
Network Layer
Starting in 802.11i WEP is being
replaced by…?
AES
or
Advanced Encryption Standard
A method designed to detect
active service on a network
connected host?
Port Scan
Set of tools loaded on a victim
host by a privileged attacker for
later use…?
Root Kit
Attack on availability, from
various remote sources…?
Distributed Denial of Service
Attacks (DDOS)
A troublesome program that
propagates itself over a
network,
reproducing itself as it goes..?
worm
Unwitting computer system
controlled/directed remotely…?
Zombie
Admissible proof of who
handled evidence and where it
has been since seizure?
Chain of Custody
Making a bit-by-bit copy of any
given piece of media…?
Imaging
ROM, EPROM, EEPROM are
examples of what type of
media…?
Nonvolatile memory or media
The full meaning of the file
attributes called MAC times…?
Modified, Accessed, Created
times
Values computed from data
content used to ensure data
integrity, e.g. MD5 & SHA1…?
Hashes or Hash value
An unchanging internal pattern
used to uniquely ID a type or
group of file…?
File Signature or file
header/trailer