Email investigations Flashcards

(15 cards)

1
Q

Describe emails in client/server architecture

A

Server OS and email software differs from those on client side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List examples of crimes involving emails

A

Narcotics trafficking
Extortion
Sexual harassment
Child abductions and pornography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the methods of examining email messages

A

Access victim’s computer
Use victim’s email client or pst file
Guide victim on the phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the method for when you find an email involved in a crime

A

Copy before investigation
Print copy
(Forward as attachment to another email address)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the role of headers in email investigations

A

Contain useful information
-Unique identifying numbers, sending time and IP address of sending server

Open, copy and paste them into text document to read in text editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What information is gathered in an email investigation

A

Return path
Recipient’s email address
Type of sending email service
IP address of sending server
Name of email server
Unique message number
Date and time email was sent
Attachment files information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do you trace an email message

A

Contact the administrator responsible for the sending server
Find domain name’s point of contact
Find suspect’s contact information
Verify your findings by checking network email logs against email addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe router logs

A

Record all incoming and outgoing traffic
Have rules to allow/disallow traffic
Can be used to resolve the path a transmitted email has taken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the role of firewall logs

A

Filter email traffic
Can be used to verify whether an email has passed through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the types of logs

A

Default or manual
Continuous or circular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What information can be found in a log

A

Email content
Sending IP address
Receiving and reading date and time
System specific information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can deleted files be recovered

A

Using servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do forensic tools find

A

Email database files
Personal email files
Offline storage files
Log files

Do not need to know how email servers/clients work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly