OPS Flashcards
Microphones, vibrations sensors
Acoustical Detection
Relevant, sufficient, reliable, does not have to be tangible
Admissible Evidence
The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks
Alarm filtering
A signal suggesting a system has been or is being attacked.
Alert/Alarm
Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.
Analysis
When resolving a single failure (though system administrators are needed to resolve additional failures
Automatic Recovery
Higher level of recovery defining prevention against the undue loss of protected objects
Automatic Recovery Without Undo Loss
Alarm to local fire or police
Auxiliary Station Systems
Tape: sequential, slow read, fast write 200GB an hour, historically
cheaper than disk (now changing), robotic libraries
Disk: fast read/write, less robust than tape
Optical drive: CD/DVD. Inexpensive
Solid state: USB drive, security issues, protected by AES
Backup Storage Media
Primary: used at the trial because it is the most reliable.
Original documents are used to document things such as contracts
Best Evidence
Placeholders for literal values in SQL query being sent to the database on a server; Used to enhance performance of a database
Bind Variables
Focus on illegally obtaining an organization’s confidential information. The use of the information gathered usually causes more damage than the initial event itself.
Business Attacks
Less than 10mins travel time for e.g. an private security firm
Central Stations
Collection, analysis and preservation of data
Forensics uses bit-level copy of the disk
Chain of Custody
Maintaining full control over requests, implementation, traceability, and proper documentation of changes.
Change Control
Electrical
Cipher Lock
Used to help assume another fact
Cannot stand on its own to directly prove a fact
Circumstantial Evidence
Europe, South America
Civil Law
The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Classification
organization way of classifying data by factors such as criticality, sensitivity and ownership.
Classification Scheme
Overwriting media to be reused
Clearing
3 digits with wheels
Combination Lock
USA, UK Australia Canada (judges)
Common Law
3 types of harm:
unauthorized intrusion
unauthorized alteration or destruction
malicious code
Computer Crime Laws