343 Flashcards
(97 cards)
What is forensic computing
Application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation
Building a clear and evidence based report with regards to a computer system
Describe IT in computer forensics
IT facilitates commission of and investigation into the act in question
Describe the internet in reference to computer forensics
Internet provides major arena for new types of crime and means of potentially tracking criminal behaviour
What are the 2 main themes of forensics
Computer forensics
Intrusion forensics
Computer/intrusion forensics involves data…
Preservation
Identification
Extraction
Documentation
Interpretation
Describe the methodologies/procedures of computer forensic specialists
Clear and well defined
Flexible when faced with the unusual/unexpected
Describe the role of law in computer forensics
Legal terms often used
-Seizure, evidence and investigation
Not all computer misdeeds are criminal
What applications of computer forensics are not for criminal prosecution
Determine root of event to ensure no repeat
Identify responsibility
Internal investigation within an organisation
Intelligence operations
Law enforcement
Describe the global impact of the internet
Enhanced interconnected system allows for rapid data discovery and sharing
Opens area of investigation to a global investigation
Still growing
List cyber concerns
Paedophilia/other abuse
Fraud, e.g. phishing, scam, identity theft
Cyber warfare
Hate crimes, harassment, bullying, stalking
Use of digital equipment for crime, e.g. encrypted email/messaging, crime related documents
Monitoring and capture of network traffic to steal sensitive information e.g. user IDs, passwords
Hacking- unauthorised access to resources e.g. disclosure, modification and destruction of resources
What are the different computer crime classifications
The computer is the target of the crime, with the intention of damaging its integrity, confidentiality or availability
Computer is a repository for information used or generated in the commission of a crime
The computer is used as a tool for committing the crime
Not mutually exclusive
What are the legal considerations of computer forensics
Search and seizure
Paradox of protecting privacy and solving computer crimes
-User perspective vs. law enforcement perspective
Global access for activities, e.g. banking, travel, email and phone
What are the legal challenges of computer forensics
Jurisdiction/applicable laws
Crime classification- differences in laws/jurisprudence
Differences in legal systems
-accessing digital evidence, authority, human rights, ethics
What are the operational challenges of computer forensics
Technical and legal cooperation across countries
Harmonisation of laws
Cooperative investigation
Define computer security
Preserve a system as its meant to be (as per security policies)
What is the aim of forensic computing
Set out to explain how a policy became violated
(especially intrusion forensics)
How does discrepancy occur
Historic
Security policies
Technology changes
What are the goals of computer security
Confidentiality
Integrity
Availability
How is computer security enforced
Preventative countermeasures
Mitigating countermeasures
Transferring countermeasures
Recovery countermeasures
Compare computer security and computer forensics
Degree of overlap between raw materials used by both fields
Different and sometimes opposing aims
Security functions implement minimal logging
Security countermeasures may work against forensic computing
How were forensic examinations used in early computer crimes
To recover evidence
What are the 2 scenarios for the role of a computer in a crime
Computers as facilitators/ repositories of evidence relating to more traditional crimes
Computers being targets for crime e.g. hacking
What does CFSAP stand for
Computer Forensics
-Secure, Analyse, Present
What are the 4 key elements of the CFSAP model
Identification
Preservation
Analysis
Presentation