Prelims Flashcards

1
Q

are tools and techniques that frustrate forensic tools, investigations, and investigators / the attempt to limit the identification, collection, collation, and validation of electronic data / techniques to avoid detection or hiding of system intrusion

A

Anti - forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a model for enabling ubiquitous, convenient, on-demand network access to shared pool of configurable computing resources (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction; this model enables customers to be in control of their computing resource needs and add computing resources as they wish througha highly automated and responsive set of processes.

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

referstoanelectronic,magnetic,optical,electrochemical,orotherdataprocessing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage facility, or equipment or communications facility or equipment directly to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks, and other devices connected to the Internet.

A

Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system, including a program suitable to cause a computer system to perform a function, and includes electronic documents / or electronic data messages whether stored in local computer systems or online.

A

Computer Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

refers to any device or group of interconnected or related devices,one or more of which, pursuant to a program, performs automated processing data. It covers anytype of device with data processing capabilities, including, but not limited to, computers andmobile phones. The device consisting of a hardware and software may include input, output,
and storage components, which may stand alone or be connected to a network or othersimilar devices. It also includes computer data storage devices or media.

A

Computer System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is the application of scientific principles to the process of discovering information from a digital device which includes computers, printers, cell phones, mobile devices, global positioning systems (GPSs), storage media, automobile systems and other programmable devices.

A

Digital Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is part of a unit, often called a “disk drive”, “hard drive”, or “hard disk drive” that stores and provides relatively quick access to large amounts of data on an electromagnetically charged surface or set of surfaces. Data can be retrieved from existing files (even those that have been deleted, encrypted, or damaged) or by monitoring user activity in real time.

A

Hard Disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

refers to the physical components of a computer: case, keyboard, monitor, motherboard, RAM (random access memory), HDD (hard disk drive), etc.

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

involvestheapplicationofscientificprinciplestotheprocessofdiscovering information from mobile devices which include cell phones, smartphones, and table devices.

A

Mobile Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

involves capturing, recording, and analysis of network events to discover source of security attack.

A

Network Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

focus of investigation, as compared to traditional digital forensics, is broader since one or more persons of interest may post information in any number of social media sites, using any number of social media technologies; also involves a degree of social network analysis in which organizational structures and key players are examined and identified.

A

Social Media Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a set of instructions compiled into a program that performs a particular task; consists of programs and applications that carry out a set of instructions on the hardware (e.g. operating systems like Windows, Linux, Mac OS, word-processing programs like Microsoft Word, web-browsing applications like Internet Explorer, Google Chrome.

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

traditionally defined as any criminal act committed via computer; general term which included both Internet and non-Internet facilitated criminal activities

A

Computer Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a broad term used to encompass those criminal activities in which a computer was peripherally/incidentally involved

A

Computer-Related Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

aspecifictermusedtorefertoanycriminalactivitywhichhasbeencommitted through, or facilitated by the Internet.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

arelativelynewtermforanycriminalactivitywhichinvolvestheunauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data

A

Digital Crime