Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
46 Cards in this Set
- Front
- Back
SODDI
|
Some other dude did it- trojan defense
|
|
Robert Morris Sr.
|
Worked at NSA father of Rober Tappan Morris who wrote Morriss Worm
|
|
Robert T. Morris
|
Created Morris Worm the first computer worm on internet. 1st person convicted under computer fraud and abuse act
|
|
Percentage of cyber crime cases reported in 2006
|
25%
|
|
Why are businesses reluctant to report cyber crimes?
|
Negative Publicity
-Attracting other cyber attackers -Undermining confidence of cust, supp Inviting ridicule of competitors |
|
How do you define digital Forensics
|
Can be defined as the art of
discovering, retrieval of information about a crime in such a way to make it admissible to the court. |
|
What other things is Digital Forensics known as
|
-Cyberspace Forensics (or Cyber
Forensics) -Computer and Network Forensics |
|
NDCI
|
National Data Conversion Institute
|
|
NW3C
|
National White Collar Crime Center
|
|
IACIS
|
International Association of Computer Investigative Specialist
|
|
Dr Edmond Locard
|
Transference or exchange principal
aka something is taken something is left |
|
Hans Gross
|
birth of the field of criminalistics, applying science to the practices of crime investigation and law
|
|
Sir Alec Jefferys
|
Serology or DNA profiling
|
|
What is serology
|
DNA profiling
|
|
File Extensions: .pwl
|
Windows Password List
|
|
File Extension: .rft
|
Rich Text Document
|
|
File Extension: .mpnt
|
mac Paint Image Format
|
|
What is the study of
handwriting, especially when employed as a means of analyzing character ? |
Graphology / Forensic
Document Examiners |
|
What is the study of disease
through examination of body tissues and organs ? |
Pathology
|
|
What is the scientific study of
crime, criminal behavior, and law enforcement? |
Criminology
|
|
What is the study of harmful
interactions between chemicals and biological systems? |
Toxicology
|
|
What device has a read write head
|
Hard drive, etc
|
|
What is AGP
|
advanced graphics port
|
|
What Unix command can be
used to create a bit-for-bit, raw image copy of a file or partition? |
dd
|
|
What is the wireless equivalent
of "ifconfig“? |
Use "iwconfig" to control the
wireless card |
|
In Unix what is fsck used for?
|
To check and repair file
systems |
|
What Unix command is used to
find printable text strings in an object or binary file? |
strings
|
|
What does LBA stand for?
|
Logical Block Addressing
|
|
What is SIMM/DIMM?
|
Single Inline Memory
Modules/Dual Inline Memory Module |
|
What does “RAID” stand for?
|
“Redundant Array of
Inexpensive / Independent Disks” |
|
What is a MFT?
|
Master File Table
|
|
Chief NSA Scientist and his Son
who gave annelids their traveling orders…? |
Robert Morris Sr. and his son,
Robert T. Morris |
|
A set of formal rules describing
how to transmit data…? |
Protocol
|
|
Name the missing Layer in the
OSI Model…? |
Network Layer
|
|
Starting in 802.11i WEP is being
replaced by…? |
AES
or Advanced Encryption Standard |
|
A method designed to detect
active service on a network connected host? |
Port Scan
|
|
Set of tools loaded on a victim
host by a privileged attacker for later use…? |
Root Kit
|
|
Attack on availability, from
various remote sources…? |
Distributed Denial of Service
Attacks (DDOS) |
|
A troublesome program that
propagates itself over a network, reproducing itself as it goes..? |
worm
|
|
Unwitting computer system
controlled/directed remotely…? |
Zombie
|
|
Admissible proof of who
handled evidence and where it has been since seizure? |
Chain of Custody
|
|
Making a bit-by-bit copy of any
given piece of media…? |
Imaging
|
|
ROM, EPROM, EEPROM are
examples of what type of media…? |
Nonvolatile memory or media
|
|
The full meaning of the file
attributes called MAC times…? |
Modified, Accessed, Created
times |
|
Values computed from data
content used to ensure data integrity, e.g. MD5 & SHA1…? |
Hashes or Hash value
|
|
An unchanging internal pattern
used to uniquely ID a type or group of file…? |
File Signature or file
header/trailer |