Podcast
Questions and Answers
Which of the following best describes Non-Cyber Crime
as defined in the context of digital forensics?
Which of the following best describes Non-Cyber Crime
as defined in the context of digital forensics?
- Crimes that occur in an environment where digital technologies are present but not central to the crime. (correct)
- Crimes investigated by digital forensic experts, regardless of the method used.
- Crimes that do not involve computers or digital devices.
- Crimes committed using digital technology as the primary tool.
Hacking
exclusively refers to the act of illegally breaking into computer systems.
Hacking
exclusively refers to the act of illegally breaking into computer systems.
False (B)
Briefly describe what Software Piracy
entails.
Briefly describe what Software Piracy
entails.
Software piracy involves the unauthorized copying, distribution, or use of software, often violating the terms of the End User License Agreement (EULA).
A ______ is a type of malicious software that disguises itself as a legitimate program to trick users into installing it.
A ______ is a type of malicious software that disguises itself as a legitimate program to trick users into installing it.
Match the following types of malware with their primary function:
Match the following types of malware with their primary function:
Which of the following is a key characteristic of an Advanced Persistent Threat (APT)
?
Which of the following is a key characteristic of an Advanced Persistent Threat (APT)
?
Static analysis
of malware involves executing the malware to observe its behavior.
Static analysis
of malware involves executing the malware to observe its behavior.
Name three types of information that can be revealed through dynamic analysis
of malware.
Name three types of information that can be revealed through dynamic analysis
of malware.
Telecommunications Fraud
involves the theft of ________ service for unauthorized purposes.
Telecommunications Fraud
involves the theft of ________ service for unauthorized purposes.
Match the following concepts with their descriptions regarding digital forensics:
Match the following concepts with their descriptions regarding digital forensics:
What is the significance of establishing a chain of custody
in digital forensics?
What is the significance of establishing a chain of custody
in digital forensics?
According to the general principles of forensics, the scene of a crime can be altered before evidence collection if it is necessary for safety reasons.
According to the general principles of forensics, the scene of a crime can be altered before evidence collection if it is necessary for safety reasons.
Explain the meaning of auditable in the context of forensic procedures.
Explain the meaning of auditable in the context of forensic procedures.
The ACPO principles state that any action taken by law enforcement should not __________ data, which may subsequently relied upon in court.
The ACPO principles state that any action taken by law enforcement should not __________ data, which may subsequently relied upon in court.
Match the following ACPO principles of digital forensics with their descriptions:
Match the following ACPO principles of digital forensics with their descriptions:
Why is digital forensics increasingly important?
Why is digital forensics increasingly important?
White-collar computer crimes generally result in higher rates of incarceration compared to armed bank robbery.
White-collar computer crimes generally result in higher rates of incarceration compared to armed bank robbery.
List three parties that might want access to evidence at a crime scene.
List three parties that might want access to evidence at a crime scene.
_____ refers to world's first crime lab was built by Edmond Locard in Lyon, France in 1910.
_____ refers to world's first crime lab was built by Edmond Locard in Lyon, France in 1910.
Match the following admissibility of evidence standards with their descriptions:
Match the following admissibility of evidence standards with their descriptions:
Which of the following is a guideline that judges use to determine the admissibility of evidence under the Daubert Test?
Which of the following is a guideline that judges use to determine the admissibility of evidence under the Daubert Test?
Under Daubert Test, evidence is admissible if it guaranteed to be 100% error-free.
Under Daubert Test, evidence is admissible if it guaranteed to be 100% error-free.
Name the 7 stages of Digital Forensics Process, as mentioned in the context.
Name the 7 stages of Digital Forensics Process, as mentioned in the context.
The Digital Forensics Process is as follows: Identification, Preservation, Collection, [Blank], Analysis, Presentation.
The Digital Forensics Process is as follows: Identification, Preservation, Collection, [Blank], Analysis, Presentation.
Match the following stages of the digital forensics process with their descriptions:
Match the following stages of the digital forensics process with their descriptions:
Which of the following is an important consideration in digital forensics examinations?
Which of the following is an important consideration in digital forensics examinations?
Digital forensics examiners should focus solely on using tools.
Digital forensics examiners should focus solely on using tools.
What should digital forensics examiners know what to look for in a device?
What should digital forensics examiners know what to look for in a device?
Forensic analysis can also help counter __________.
Forensic analysis can also help counter __________.
Match the descriptions to the type of malware:
Match the descriptions to the type of malware:
Flashcards
Non-Cyber Crime
Non-Cyber Crime
Crimes that occur in an environment surrounded with digital technologies.
Cyber Crime
Cyber Crime
Crimes that use digital technology to commit the crime.
Malware
Malware
Malicious code including viruses, logic bombs, and worms.
Virus
Virus
Signup and view all the flashcards
Trojan
Trojan
Signup and view all the flashcards
Worm
Worm
Signup and view all the flashcards
Rootkit
Rootkit
Signup and view all the flashcards
Backdoor
Backdoor
Signup and view all the flashcards
Spyware
Spyware
Signup and view all the flashcards
Adware
Adware
Signup and view all the flashcards
Scareware
Scareware
Signup and view all the flashcards
Ransomware
Ransomware
Signup and view all the flashcards
Rogue security software
Rogue security software
Signup and view all the flashcards
Advanced Persistent Threat (APT)
Advanced Persistent Threat (APT)
Signup and view all the flashcards
Botnets
Botnets
Signup and view all the flashcards
Denial of Service
Denial of Service
Signup and view all the flashcards
zero day attack
zero day attack
Signup and view all the flashcards
Software Piracy
Software Piracy
Signup and view all the flashcards
Hacking
Hacking
Signup and view all the flashcards
Forensic Science
Forensic Science
Signup and view all the flashcards
Forensic Evidence
Forensic Evidence
Signup and view all the flashcards
Digital Forensics
Digital Forensics
Signup and view all the flashcards
Frozen crime scene
Frozen crime scene
Signup and view all the flashcards
Chain of Custody
Chain of Custody
Signup and view all the flashcards
Auditable
Auditable
Signup and view all the flashcards
Study Notes
Digital Forensics
- Digital forensics is the application of forensic science to legal matters, focusing on computer operations, software, files (digital and electronic), and technology-based appliances/storage devices.
- Forensic evidence adheres to stringent standards of reliability and scientific integrity to be admissible in court.
Crime Context
- Crimes can be categorized into non-cyber and cyber crimes.
- Non-cyber crimes occur in environments with digital technologies.
- Cyber crimes use digital technology to commit the crime.
- Several examples of non-cybercrimes: sexual abuse of children, fraud, murder, stalking, ID theft, and extortion.
Cyber Crimes
- Cyber crimes arise from computer use
- Malware is malicious code that includes viruses, logic bombs, and worms.
- Hacking/Cracking, two forms of internet and computer privacy/copyright breaches, are usually malicious.
- Software Piracy - the illegal copying, distribution, or use of software.
- Telecommunications Fraud involves theft of telecommunication services or using them to commit other kinds of fraud.
- Victims include consumers, businesses, and communication service providers.
- Online Stalking is cyberstalking through the internet or electronic means to stalk or harass.
- Online Auction Fraud schemes misrepresent products advertised for sale via internet auction sites or non-delivery after purchase.
Indicators as Evidence Sources
- Evidence of a crime varies based on the type.
- Common evidence sources: address book, chat logs, cheques, credit card data, databases, diaries and calendars, digital camera/image editing software, disk and traffic encryption software, email, encrypted, file sequences, financial records, hacking tools, internet history, or multiple accounts.
Malware Types
- A virus replicates by inserting itself into other computer programs and may carry a malicious payload.
- A trojan masquerades as legitimate software to trick users into installing it.
- A worm propagates itself across a network with or without a payload, potentially causing significant harm.
Additional Malware Types
- A rootkit hides that an operating system has been comprised, sometimes replacing executes.
- Backdoors bypass authentication for remote access to a system, which is normally undetected.
- It can take the form of installed programs like Back Orifice.
- Spyware is installed without the owner's knowledge to collect private data.
- Adware displays unwanted ads, redirects search requests, and collects marketing data.
- Scareware tricks users into buying useless or dangerous software.
- Ransomware threatens to publish or block access to a victim's data until a ransom is paid.
- Rogue security software deceives users into paying for fake malware removal.
- Advanced Persistent Threat (APT) is a prolonged, undetected network attack to gain unauthorized access.
- Botnets, networks of infected devices running bots, are used for DDoS attacks, data theft, spam, and unauthorized device access.
Malware Analysis Techniques
- Malware analysis involves static and dynamic techniques.
- Static analysis examines inactive malware and is basic and quick.
- It is mostly ineffective against sophisticated malware and may miss behaviors.
- Dynamic analysis executes the malware to analyze real-time activities.
- It understands functionality and can detect technical indicators to reveal signatures, domain names, IP addresses, file paths, registry keys etc.
Hacking Definitions
- The word "hacking" can refer to hobbyist work with how computer systems work at a basic level.
- It can refer to breaking into computer systems, a definition commonly used over the first definition.
Denial of Service (DoS)
- A DoS attack deprives users or organizations of expected resource services via distributed systems.
- DoS attack methods include bandwidth or processor exhaustion, resource unavailability, and network exclusion.
Software Piracy
- Virtually all software programs now use an end-user license agreement, which needs to be agreed to by the user.
- Software piracy is violating the EULA agreement.
- Copyright infringement, occurs in unauthorized copies of music/movies.
- P2P file-sharing, while legal, is mostly used to distribute copyrighted material.
- High-quality versions of media become available shortly after release.
General Forensics Principles
- Crime scene must be "frozen" to prevent contamination when collected.
- There must be a chain of custody.
- All examination procedures must be auditable for expert review.
ACPO Principles of Digital Forensics
- Principle 1: Do not alter data that may be relied upon in court.
- Principle 2: Accessing original data must be performed by a competent person giving evidence explaining relevance.
- Principle 3: An audit trail of all processes of digital evidence needs to be created and maintained.
- An independent third party should be able to reexamine and achieve the same results.
- Principle 4: The investigator is responsible for law adherence.
Why Digital Forensics is needed
- Technology increases, so crimes involving technology with evidence will continue to do the same.
- The average bank robbery nets $7,500, and 80% of offenders get jailed.
- White-collar crimes annually earn about $10 billion with less than 5% of offenders in jail.
- Digital access is ubiquitous as non-violent crimes are considered by juries.
Securing the Crime Scene
- A scene, in the event of digital evidence, may lead to crimes such as: murder, gambling, kidnapping, bond scams, rape, confidence games, web defacement, auto theft, child exploitation etc.
- Forensic investigators can operate in a hostile environment with access to the evidence.
- It is clear to protect the physical evidence in electronic environments.
Admissibility of Evidence
- Edmond Locard built the first crime lab in 1910.
- LOCARD's Exchange Principle is that every contact leaves a trace.
- The Frye v. U.S. (1923) case set the first acceptance of scientific evidence meaning expert testimony is is admissible if underlying, scientific principles have general acceptance.
- The Daubert v. Merrell Dow (1993) case set a new standard for evidentiary reliability on accepting scientific evidence
Daubert Test
- A judge determines evidence admissibility based on testing, error rate, publication, and acceptance.
Digital Forensics Process
- The digital forensic process uses multiple techniques to analyze and report information.
- Identification focuses on what incident has occurred.
- Preservation maintains the evidentiary chain.
- Collection has the forensically correct copy of a media, creating a mirror image
- Examination is a gathering or pertinent data from files, deleted files, etc.
- Analysis interprets the findings and reconstructs a picture of relevant information.
- Presentation involves reporting the results.
Digital Forensics Examinations
- Computer and network evidence alone doesn't convict a suspect, but it can solidify a behavior pattern.
- Computer and forensic analysis can counter false defenses.
- Digital forensic analysis must be tied to the investigation.
- You can’t ignore both incriminating and exculpatory evidence.
- As part of the investigating team, examiners need to know what the investigator needs like pictures/browser history.
- Digital forensic examiners must bring knowledge to the investigation but are note private investigators.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.