Overview Flashcards
(52 cards)
What is Encapsulation
Encapsulation refers to the process of protocol information being added to data as it moves through each layer of the OSI Model.
This is done in the form of a header
What is a Firewall
A firewall is a security device that can be applied to a network.
Generally this is placed at the perimeter of the network and is used to filter inbound and outbound traffic by using a set of predefined rules.
What is Spoofing
When a device pretends to be another device on a network.
This can be done through actions such as an attacker spoofing an IP or MAC address
What is ACPO
Association of Chief of Police Officers
Created a set of guidelines for forensic investigators to ensure that they are being compliant and following a forensically sound process.
What is De-Capsulation
De-capsulation process removes this information once the data is received at the corresponding layer on the destination computer.
What is a Proxy
Device that can be added to the perimeter of a network which handles requests from clients, disguising the address/identity of the client on the internal network.
What is a DDOS Attack
Distributed Denial of Service attack is an attack where a large amount of packets are sent to a single device where the intention is to render the device inoperable.
What is the Digital Forensics Process
Incident Response
Managing Digital Evidence
Preparing Forensic Documentation
What is a Switch
A networking device that is used in a Local Area Network to direct internal traffic.
Traditionally works at layer 2.
Helps to break up collision domains
Utilises physical (MAC) addresses in order to direct and forward traffic
What is Authentication
Ensuring that an individual or device is in fact who they claim to be
What is the Ethical Hacking Methodology
Reconnaissance
Scanning
Gaining Access
Maintaining Access
Covering Tracks
What is the Incident Response
Including Securing the Crime Scene
Identifying Evidence
What is a Router
A layer 3 device that carries out path determination and packet forwarding of network packets.
Traffic can not move to an external network without passing through a router first.
Uses IP addressing in order to direct traffic
What is Biometrics
A method of identifying a user due to a physical characteristic that they have:
Fingerprint
Iris
Face
Voice
What is Social Engineering
A technique used by attackers to trick users into giving out information that can assist in an attack on a system.
What is Managing Digital Evidence
Acquiring Digital Evidence
Chain of Custody
Processing Evidence
Analysing Evidence
What is the OSI Model
Application
Presentation
Session
Transport
Network
Data-Link
Physical
What is Encryption
The process of changing data from plain text to cypher text so as unauthorised individuals cannot read the data.
What is Reconnaissance
Consists of gathering information relating to the target system.
Can be done passively or actively.
What is Preparing Forensic Documentation
A report documenting all actions, findings and justifications
Contemporaneous notes, as well as documentation regarding the chain of custody.
What is Simplex
Refers to one way communication
What is the CIA Triad
Confidentiality: Data is only accessible to those who have permission to access it
Integrity: Data should remain intact and not be manipulated
Availability: Data should be secure, but should also be available to those who have permission to access it whenever required
What is Scanning
Involves an attacker scanning a system for live hosts, open ports and vulnerabilities in order to assist in the exploitation of a target
What is Evidence Integrity
Important that the integrity of evidence remains intact, as well as proof of this being presented throughout an investigation.
This is to demonstrate that evidence is admissible in a court of law