Podcast
Questions and Answers
What is the significance of the number 255 in an IP address?
What is the significance of the number 255 in an IP address?
What is the primary function of hyperlinks in the context of the World Wide Web?
What is the primary function of hyperlinks in the context of the World Wide Web?
Why is it important for every device on a network to have a unique IP address?
Why is it important for every device on a network to have a unique IP address?
What does IPv6 refer to in the context of internet communication?
What does IPv6 refer to in the context of internet communication?
Signup and view all the answers
In networking terms, what does the term 'subnet mask' typically refer to?
In networking terms, what does the term 'subnet mask' typically refer to?
Signup and view all the answers
What is the relationship between Internet Protocol (IP) and Internet Protocol version 4 (IPv4)?
What is the relationship between Internet Protocol (IP) and Internet Protocol version 4 (IPv4)?
Signup and view all the answers
What is the purpose of DHCP in a network?
What is the purpose of DHCP in a network?
Signup and view all the answers
Why is manually assigning IP addresses to devices considered tedious and error-prone?
Why is manually assigning IP addresses to devices considered tedious and error-prone?
Signup and view all the answers
What was a common issue with older routers regarding IP address assignment?
What was a common issue with older routers regarding IP address assignment?
Signup and view all the answers
Which technology uses radio waves to provide wireless high-speed Internet access?
Which technology uses radio waves to provide wireless high-speed Internet access?
Signup and view all the answers
What happens if two devices on a network are accidentally assigned the same IP address?
What happens if two devices on a network are accidentally assigned the same IP address?
Signup and view all the answers
In the context of IP addresses, what does DHCP stand for?
In the context of IP addresses, what does DHCP stand for?
Signup and view all the answers
What kind of information can be used as identifiers to distinguish your device from others?
What kind of information can be used as identifiers to distinguish your device from others?
Signup and view all the answers
Which security measures are mentioned in the text to protect a computer system?
Which security measures are mentioned in the text to protect a computer system?
Signup and view all the answers
What is the purpose of conducting an investigation in the context of cyber security awareness?
What is the purpose of conducting an investigation in the context of cyber security awareness?
Signup and view all the answers
Which practice is recommended to protect oneself from being traced back by suspects?
Which practice is recommended to protect oneself from being traced back by suspects?
Signup and view all the answers
What does the term 'Netizen Power!' refer to in the provided text?
What does the term 'Netizen Power!' refer to in the provided text?
Signup and view all the answers
Which type of account information is suggested to be known about a target during an investigation?
Which type of account information is suggested to be known about a target during an investigation?
Signup and view all the answers
Which type of evidence must be produced when the subject of inquiry is the contents of a document?
Which type of evidence must be produced when the subject of inquiry is the contents of a document?
Signup and view all the answers
Under what circumstances can a copy of a document be considered as an original document?
Under what circumstances can a copy of a document be considered as an original document?
Signup and view all the answers
In which case can evidence other than the original document be admissible under the Best Evidence Rule?
In which case can evidence other than the original document be admissible under the Best Evidence Rule?
Signup and view all the answers
What is required for evidence from a document to be admissible in court under the Best Evidence Rule?
What is required for evidence from a document to be admissible in court under the Best Evidence Rule?
Signup and view all the answers
When can a party offer a copy of a document instead of the original under the Best Evidence Rule?
When can a party offer a copy of a document instead of the original under the Best Evidence Rule?
Signup and view all the answers
What must be proven to allow for evidence other than an original document to be admissible under the Best Evidence Rule?
What must be proven to allow for evidence other than an original document to be admissible under the Best Evidence Rule?
Signup and view all the answers
What is the primary function of a cache?
What is the primary function of a cache?
Signup and view all the answers
Which search engine is known as a dedicated cache search engine?
Which search engine is known as a dedicated cache search engine?
Signup and view all the answers
What type of information can metadata provide?
What type of information can metadata provide?
Signup and view all the answers
What is the benefit of viewing a cached version of a webpage?
What is the benefit of viewing a cached version of a webpage?
Signup and view all the answers
Which tool can assist in geolocating images?
Which tool can assist in geolocating images?
Signup and view all the answers
What does the Wayback Machine primarily cache?
What does the Wayback Machine primarily cache?
Signup and view all the answers
Study Notes
Online Investigation Internet
- The Internet is a worldwide system of computer networks, also known as "the Net."
- It's a network of networks where users can get information from any other computer.
World Wide Web
- The World Wide Web (WWW or W3) refers to all public websites or pages accessible on the internet.
- These pages are interconnected by hyperlinks, providing information in different formats (text, images, audio, and video).
IP Address
- An IP address is a unique number assigned to a device on a network.
- It's usually represented as four sets of numbers separated by a dot (e.g., 10.0.0.1).
- Each number can range from 0 to 255, with 0 and 255 sometimes having special meanings.
- Every device on a network must have a unique IP address.
IPv4 and IPv6
- IPv4 is the current internet protocol used by most devices.
- The internet is transitioning to IPv6 over the next ten years.
Static vs Dynamic IP Address
- A static IP address is assigned manually to each device on a network.
- Dynamic IP addresses are assigned using DHCP (Dynamic Host Configuration Protocol), which reduces errors and maintenance.
DHCP
- DHCP is a protocol that assigns a unique IP address to each device on a network.
- When a device connects to the network, it sends a DHCP discovery packet, and the router assigns an IP address.
Wi-Fi
- Wi-Fi is a wireless networking technology that uses radio waves to provide wireless high-speed internet access.
Documents as Evidence
- Documents consist of writing or material containing letters, words, numbers, figures, symbols, or other modes of written expression.
- The best evidence rule states that the original document must be produced in court, except in certain cases.
Online Investigation
- Investigation involves gathering evidence to aid in solving a case.
- Cyber security awareness is crucial to protect oneself online.
Cyber Security Awareness
- Protect yourself first by using secured computer systems, passwords, anti-virus software, firewalls, and VPNs.
- Be aware of risks, such as malware, phishing links, and equipment compromise.
Social Media Investigation
- Minimize risks by using dedicated computers and internet connections.
- Use investigation tools and software, following protocols and avoiding laws violation.
- Document everything properly.
What Can be Investigated
- Online accounts, photos, videos, comments, likes, shares, emails, and other online activities can be investigated.
Maximizing and Utilizing Search Engines
- The Internet Archive (Wayback Machine) is a dedicated cache search engine that stores data for faster access.
- Use the cache to reduce your footprint and access older versions of web pages.
Tools for Reverse Image
- Google Images, TinEye, Yandex Images, and Bing Image Match are tools used for reverse image searching.
- Metadata helps summarize data and includes information such as creation means, time, purpose, author, location, and file size.
Geolocating Images
- Extract, research, and verify image metadata to geolocate images.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on fundamental concepts of the Internet including networks, World Wide Web, and hyperlinks. Learn about the structure and functionality of the online world.