Key Concepts 7.1 Understand and comply with investigations Flashcards

Domain 7 (38 cards)

1
Q

A crime involving a computer that violates the law regulation. It could be an act against the computer itself or the computer could have been used in the actual commission of the crime against another target.

A

Computer crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Military and intelligence attacks: These involve unauthorized access to government or
    military systems to steal classified information or disrupt critical infrastructure.
  • Business attacks: These attacks target companies to steal trade secrets, intellectual
    property, or customer data for financial gain or competitive advantage.
  • Financial attacks: These crimes focus on illegally accessing financial institutions or
    individual accounts to steal money or manipulate financial markets.
  • Terrorist attacks: Cybercriminals use digital means to spread propaganda, recruit
    members, or launch attacks on critical systems to cause widespread fear and disruption.
  • Grudge attacks: Disgruntled individuals, often insiders, target specific organizations or
    persons to exact revenge or cause damage due to personal grievances.
  • Thrill attacks: Motivated by the challenge or excitement, these attacks are conducted by
    individuals seeking to prove their skills or gain notoriety in hacking communities.
A

Types of Computer Crimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The process of identifying, preserving, collecting, processing, reviewing, and producing electronically stored information (ESI) in litigation. It about gathering data and assessing its relevance to request for production

A

eDiscovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

involves the use of a
forensic expert to protect data integrity and to copy/capture/recover the data stored
on a device.

A

Digital Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Proper evidence collection and handling are essential for ensuring the admissibility and
integrity of evidence in legal proceedings

A

Chain of Custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A detailed record of where the evidence was, who handled
it, and when, at every step from collection to final disposition.

A

Chronological documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ensuring that evidence is properly stored and protected from
tampering or contamination.

A

Preservation of evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Recording every time the evidence changes hands, including the
reason for the transfer.

A

Transfer accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Limiting and documenting who has access to the evidence.

A

Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Proving that the evidence presented in court is the same evidence that was initially collected, without alteration.

A

Maintaining integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When an individual willingly hands over evidence or property to
law enforcement without being compelled to do so. This method often occurs when a
person wants to cooperate with an investigation, and is generally the most desirable
circumstance.

A

Voluntary surrender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The act of legally taking possession of items or property, typically by law enforcement officials, when those items are believed to be connected to criminal activity
or are illegal to possess.

A

Confiscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A legal document that orders a person or organization to provide specific documents, records, or physical evidence relevant to a legal proceeding or investigation.
Failure to comply can result in legal consequences

A

Subpoena

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A court-issued document that authorizes law enforcement to search a specific location for evidence related to a crime. Must be based on probable cause and typically describe the place to be searched and the items to be
seized.

A

Search warrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The collection of evidence that is in plain view of law enforcement
officers during a lawful presence in an area. This method doesn’t require a warrant
if the evidence is clearly visible, and its criminal nature is immediately apparent.

A

Seizure of visible evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The gathering of evidence without a warrant when there’s an urgent need to prevent the destruction of evidence, protect public safety,
or pursue a fleeing suspect. This method is used in emergency situations where obtaining
a warrant would be impractical or potentially dangerous.

A

Collection under exigent circumstances

17
Q

consists of actual objects that can be brought into the courtroom.

A

Real evidence

18
Q

consists of written documents that provide insight into the facts.

A

Documentary evidence

19
Q

consists of verbal or written statements made by witnesses.

A

Testimonial evidence

20
Q

The most reliable and original form of evidence available, typically
referring to original documents or items rather than copies or descriptions. In legal
contexts, it’s the highest quality evidence that can be presented to prove a fact

A

Best evidence

21
Q

Evidence that is not original or primary, such as copies of documents or testimony about the contents of a document when the original is not available.
It’s generally considered less reliable than best evidence but may be admissible when
best evidence cannot be obtained.

A

Secondary evidence

22
Q

Evidence that directly proves a fact (based on the five senses) without
requiring any inference or presumption. This often includes eyewitness testimony or
video recordings of an event.

A

Direct evidence

23
Q

Evidence that is so strong and convincing that it cannot be contradicted or overcome by other evidence. It establishes a fact with certainty and leaves no
room for doubt.

A

Conclusive evidence

24
Q

Evidence that relies on inference to connect it to a conclusion
of fact. It doesn’t directly prove a fact but allows a fact to be inferred. While often considered
weaker than direct evidence, strong circumstantial evidence can be very compelling in legal proceedings.

A

Circumstantial evidence

25
Evidence that supports or reinforces other evidence already presented. It doesn’t stand alone to prove a fact but strengthens the credibility of other evidence or testimony.
Corroborative evidence
26
Testimony that is based on a witness’s personal belief or judgment rather than on direct knowledge of facts. Witnesses may be expert or non-expert. Expert witnesses often provide opinion evidence based on their specialized knowledge or experience and carries greater weight than non-expert.
Opinion evidence
27
Testimony that is given by a witness who relates not what they know personally, but what others have said. It’s generally considered less reliable and is often inadmissible in court, though there are numerous exceptions to this rule.
Hearsay evidence
28
Requirements for evidence to be admissible in a court of law, evidence must be: * Relevant to a fact at issue in the case (the legal proceeding)). * Material (related) to the case. * Competent, which means collected through legal means. Evidence obtained through an illegal act is generally inadmissible in court.
Admissibility of Evidence
29
* Documenting all steps taken during the investigation process, including evidence collection and analysis * Report creation. Creating detailed incident reports that include timelines, affected systems, and actions taken * Secure storage. Securely storing and protecting investigation reports and documentation * Stakeholder updates. Regularly updating stakeholders on the progress and findings of the investigation.
Reporting and documentation
30
* Interviews. Interviewing witnesses and stakeholders to gather information about the incident * Data collection. Analyzing system logs, network traffic, and other data sources to identify indicators of compromise * Forensic investigation. Conducting forensic analysis of affected systems to determine the scope and impact of the incident * Collaboration with external parties. Collaborating with other teams and external parties as needed, such as law enforcement or external investigators assigned by a cyber insurer.
Investigative techniques
31
* Understanding the principles and best practices of digital forensics, including data acquisition, analysis, and reporting * Familiarity with common digital forensic tools and techniques, such as disk imaging, file carving, and memory analysis * Ensuring the admissibility and reliability of digital evidence through proper handling and documentation * Staying current with emerging trends and challenges in digital forensics, such as encryption and cloud computing
Digital forensics special skills and training
32
The focus here is on maintaining the integrity of original evidence by working with copies and properly sealing originals. use write-blockers to prevent accidental modification, create bit-for-bit copies, and calculate hash values to verify integrity. Store original evidence in anti-static bags in a secure, climate-controlled environment.
Evidence Preservation
33
A specialized technique for investigating various devices, combining skills from both media and software analysis. Document the physical state of the device, photograph all connections before disconnecting, and consider the potential for anti-forensic measures like booby traps or remote wiping capabilities.
Hardware/Embedded Device Analysis
34
This involves collecting and examining information from live system memory using trusted tools and working with verified copies of memory dumps. Perform as quickly as possible after the incident to capture volatile data. Use validated tools and document the system’s state (running processes, network connections) at the time of acquisition.
In-Memory Analysis
35
A method of extracting information from various storage media by creating forensic images and analyzing copies while preserving the original. Use forensically sound tools to create images, verify the images with hash values, and analyze them in a controlled environment. Be aware of potential encryption, hidden partitions, or steganography that may conceal evidence.
Media Analysis
36
A technique for reconstructing network activity during incidents by utilizing pre-existing logs, captures, and monitoring data. When performing it correlate data from multiple sources (e.g., firewall logs, IDS alerts, netflow data) to build a comprehensive picture. Be mindful of time synchronization across devices and potential log tampering.
Network Analysis
37
If malicious activity is suspected, forensic analysis of applications, including their activities, and potentially examination of source code for potential security issues or malicious elements may be necessary to identify the presence of backdoors or other security vulnerabilities. When source code is not available, it may require dynamic testing in a controlled environment or reverse engineering to identify
Software Analysis
38
are pieces of digital evidence that can provide valuable insights into a security incident. They are remnants of a security breach that may reveal the type of attack and identity of the attacker. Are commonly found on computer systems, applications and web browsers on computer systems, various types of fixed and removable storage, and mobile devices (e.g., smart phones and tablets).
Artifacts