Digital Forensics/Cyber Security Flashcards Preview

cyber security > Digital Forensics/Cyber Security > Flashcards

Flashcards in Digital Forensics/Cyber Security Deck (18)
Loading flashcards...
1
Q

Computer Forensics has been gaining in popularity as

A

society increasingly is dependent on technology. While is has been around for awhile, it is still seen as an emerging science.

2
Q

Computer Forensics uses specialized tools and techniques for

A

(like FTK toolkits) preserving, analyzing, recovering and authenticating electronic data such as files.

3
Q

MD5 while a valuable tool for digital forensics, is

A

is no longer uses today because of its vulnerabilities that hackers can exploit.

4
Q

MD5 stand for

A

Message Digest 5 and is a digital hash, that uses 128 bits displayed in Hex. and does a cyclical redundancy check.

5
Q

Digital evidence can be used for

A

hacking, narcotics trafficking, murder, data theft, and conspiracy.

6
Q

Digital evidence can take the form of

A

hard drives, floppy, zip, jazz drives, CDs, DVDs, Blu Ray, tapes, memory cards, USB sticks, printers and fax machines.

7
Q

Two key responsibilities of a DFE

A

is to protect and authenticate.

8
Q

Digital scientist can usually find

A

hidden files, deleted files, encrypted files and steganographic files

9
Q

Malware is a catch all term to describe

A

malicious software threats and social engineering tools designed to vandalize or compromised computer systems.

10
Q

Spyware is used to

A

monitor a user’s activity without their knowledge and sends that information to someone else.

11
Q

Trojans are

A

hidden malware that is downloaded by a user unintentionally when they are trying to install a normal program.

12
Q

If you use encryption on a file, you can

A

generally prevent someone from trying to circumvent file and folder security.

13
Q

When someone eavesdrops on a network, they

A

have the ability to capture and reading data packets as they move across a network

14
Q

A program virus is a

A

sequence of code that insert themselves into another executable program.

15
Q

A network firewall filters packets to prevent unauthorized access by

A

direction, IP address and TCP or UDP port number.

16
Q

three properties secure information should have.

A

Confidentiality, Integrity and availability

17
Q

Footprinting is the

A

process of information gathering in which the attacker attempts to learn about the configuration and the networking and security systems.

18
Q

Authorization creates

A

one or more barriers around the resource such that only authenticated users can gain access.