Cengage Chapter 1 - Understanding the Digital Forensics Profession and Operations Flashcards

1
Q

A notarized document, given under penalty of perjury, that investigators create to detail their findings. This document is often used to justify issuing a warrant or to deal with abuse in a corporation. Also called a “declaration” when the document isn’t notarized.

A

affidavit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A charge made against someone or something before proof has been found.

A

allegation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A fireproof container locked by a key or combination.

A

approved secure container

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Communication between an attorney and client about legal matters is protected as confidential communications. The purpose of having confidential communications is to promote honest and open dialogue between an attorney and client. This confidential information must not be shared with unauthorized people.

A

attorney-client privilege (ACP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In a private-sector environment, the person who has the right to request an investigation, such as the chief security officer or chief intelligence officer.

A

authorized requester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A bit-by-bit duplicate of data on the original storage medium. This process is usually called “acquiring an image,” “making an image,” or “forensic copy.”

A

bit-stream copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The file where the bitstream copy is stored; usually referred to as an “image,” “image save,” or “image file.”

A

bit-stream image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The route evidence takes from the time the investigator obtains it until the case is closed or goes to court.

A

chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A nonprofit group based in Seattle-Tacoma, WA, composed of law enforcement members, private corporation security professionals, and other security professionals whose aim is to improve the quality of high-technology investigations in the Pacific Northwest.

A

Computer Technology Investigators Network (CTIN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Retrieving files that were deleted accidentally or purposefully.

A

data recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A professional who secures digital evidence at the scene and ensures its viability while transporting it to the lab.

A

Digital Evidence First Responder (DEFR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An expert who analyzes digital evidence and determines whether additional specialists are needed.

A

Digital Evidence Specialist (DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Applying investigative procedures for a legal purpose; involves the analysis of digital evidence as well as obtaining search warrants, maintaining a chain of custody, validating with mathematical hash functions, using validated tools, ensuring repeatability, reporting, and presenting evidence as an expert witness.

A

digital forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The process of conducting forensic analysis of systems suspected of containing evidence related to an incident or a crime.

A

digital investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Nonstatic bags used to transport computer components and other digital devices.

A

evidence bags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A printed form indicating who has signed out and been in physical possession of evidence.

A

evidence custody form

17
Q

Evidence that indicates the suspect is innocent of the crime.

A

exculpatory evidence

18
Q

Evidence used in court to prove a case.

A

exhibits

19
Q

A workstation set up to allow copying forensic evidence, whether it’s on a hard drive, flash drive, or the cloud. It usually has software preloaded and ready to use.

A

forensic workstation

20
Q

The ______________________ to the U.S. Constitution in the Bill of Rights dictates that the government and its agents must have probable cause for search and seizure.

A

Fourth Amendment

21
Q

An environment in which employees can’t perform their assigned duties because of the actions of others. In the workplace, these actions include sending threatening or demeaning e-mail or a co-worker viewing pornographic or hate sites.

A

hostile work environment

22
Q

Evidence that indicates a suspect is guilty of the crime he or she is charged with.

A

inculpatory evidence

23
Q

Theft of company sensitive or proprietary company information often to sell to a competitor.

A

industrial espionage

24
Q

An organization created to provide training and software for law enforcement in the digital forensics field.

A

International Association of Computer Investigative Specialists (IACIS)

25
Q

The process of trying to get a suspect to confess to a specific incident or crime.

A

interrogation

26
Q

A conversation conducted to collect information from a witness or suspect about specific facts related to an investigation.

A

interview

27
Q

The order in which people or positions are notified of a problem; these people or positions have the legal right to initiate an investigation, take possession of evidence, and have access to evidence.

A

line of authority

28
Q

An evidence custody form used to list all items associated with a case.

A

multi-evidence form

29
Q

Detecting attacks from intruders by using automated tools; also includes the manual process of monitoring network firewall logs.

A

network intrusion detection and incident response

30
Q

Behavior expected of an employee in the workplace or other professional setting.

A

professional conduct

31
Q

Being able to obtain the same results every time from a digital forensics examination.

A

repeatable findings

32
Q

The legal act of acquiring evidence for an investigation.

A

search and seizure

33
Q

Legal documents that allow law enforcement to search an office, a home, or other locale for evidence related to an alleged crime.

A

search warrants

34
Q

A form that dedicates a page for each item retrieved for a case. It allows investigators to add more detail about exactly what was done to the evidence each time it was taken from the storage locker.

A

single-evidence form

35
Q

The decision returned by a jury.

A

verdict

36
Q

The group that determines the weakest points in a system. It covers physical security and the security of OSs and applications.

A

vulnerability/threat assessment and risk management

37
Q

Text displayed on computer screens when people log on to a company computer; this text states ownership of the computer and specifies appropriate use of the machine or Internet access.

A

warning banner

38
Q

Financial crimes, including falsification of financial information, fraud, identify theft, intellectual property theft and piracy, embezzlement, and money laundering.

A

white-collar crimes