100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CIS 410 Chapter 14: Introduction to Forensics Complete Graded A+

Rating
-
Sold
-
Pages
4
Grade
A+
Uploaded on
27-10-2022
Written in
2022/2023

Forensics the process of using scientific knowledge for collecting, analyzing, and presenting evidence to the courts (forensics means to bring to the court) goal of cyber forensics to examine computer devices using scientific methods to extract evidence in such a way that it can be presented in a court Don't touch the suspect drive touch the system as little as possible, you don't want to make changes to the system in the process of examining it make a forensically valid copy of the drive use bootable linux copy, use syntax to copy the information from a specific port to the forensics server Forensic ToolKit made by AccessData, an expensive commercial product used to make images of drives to mount images that have been made, allows you to recover deleted files, examine registry settings, and perform forensic examination tasks Document Trail document everything, when you begin the investigation, you must document every step Secure the evidence the computer must be taken offline to prevent further tampering, limit access to the machine, hard drive should be locked in a safe/ secure cabinet, analysis should be done in a room with limited access, must be able to document who had access to the evidence (chain of custody) chain of custody detailed documentation showing the status of evidence at every point in time from the moment of seizure to the moment the evidence is present in court FBI Forensic Guidelines preserve the state of the computer by making back up logs, and copies of any files left by the intruder, document specific losses suffered due to the attack computer evidence logs, portable storage devices, emails, devices capable of storing data, cell phones U.S. Secret Service forensics guide secure the scene and make it safe, preserve evidence, avoid accessing computer files, etc. EU Evidence Gathering (5 Principles) Data Integrity, Audit Trail, Specialist Support, Appropriate Training, Legality SWGDE Scientific Working Group on Digital Evidence, 4 steps of examination, 1. visual inspection, 2. forensic duplication, 3. media examination, 4. evidence return Locard's principles of transference you cannot interact in any environment without leaving something behind EnCase tool made by guidance software. allows you to image drives, recover deleted files, examine the registry, etc. competitor with FTK, used by law enforcement OS Forensics tool used to recover deleted files, examine the registry, and search the drive, low cost and easy to use Sleuth Kit suite of open source tools, each tool can require you to learn a set of command line commands to execute Oxygen specifically for phone forensics, analyzes iPhones and androids, doesn't work well with older androids Cellebrite one of the most popular phone forensic tools, very effective , only downside that it one of the most expensive phone forensics tools available Finding Evidence in the browser can contain evidence of the specific crime, could find evidence in the case of cyber stalking, if a person erases their history, it is still possible to retrieve it security log contains successful and unsuccessful log in attempts application log contains events logged by applications or programs system log contains events logged by windows systems components forwarded events log used to store events collected from remote computers applications and services log used to store events from a single application or component DiskDigger free tool used to recover Windows files Net Sessions command that lists any active sessions connected to the computer you run on it open files command for finding live attacks ongoing, will list any shared files that are currently open Fc command you can use with a forensic copy of a machine, it compares two files and shows the difference Netstat command used to detect ongoing attacks, lists all current network connections- both inbound and outbound the windows registry central database used in microsoft windows family of operating systems to store information necessary to configure the system for one of more users, applications and hardware devices hive five sections that the windows registry is organized into SIM subscriber identity module, heart of the phone, how you identify the phone, a removable chip, IMIS international mobile security subscriber identity, 15-digit number used to uniquely identify a phone, if you can the phone, you change the phone's identity ICCID Integrated circuit card identification, used to identify the phone, the SIM chip itself is identified by the ICCID GSM Global System for Mobile Communications, older technology (2G) , was originally developed for digital voice but was expanded to include data EDGE Enhanced Data Rates for GSM Revolution, level between 2G and 3G, designed to deliver media, such as television over the cellular network UMTS Universal Mobile Telecommunications Systems, 3G upgrade to 2G, provides text, voice, video, and multimedia at data rates higher than 2 megabits per second LTE Long term evolution, (4G), provides broadband internet, multimedia, and voice, supports speeds of 300 megabits per second, based in IP just like a computer network iDEN integrated digitally enhanced network, GSM-based architecture that combines cell phone, two-way radio, pager, and modem into the same network, devised by motorola iOS released for the iPhone in 2007, for macintosh, based on a touch interface, divided into 4 layers Android operating system based on linux, open source, first released in 2003 Federal Rule 702 a witness who is qualified as an expert by knowledge, skill, training, or education may testify in the form of an opinion if: the knowledge will help to understand the evidence, testimony is based on facts, testimony is the product of reliable principles, and the expert has reliably applied the principles and methods to the facts of the case Daubert standard used in the U.S. federal courts to determine whether or not an expert's scientific testimony is based on reasoning or methodology that is scientifically valid and can properly be applied to the facts at issue

Show more Read less
Institution
CIS 410
Course
CIS 410








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CIS 410
Course
CIS 410

Document information

Uploaded on
October 27, 2022
Number of pages
4
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EvaTee Phoenix University
View profile
Follow You need to be logged in order to follow users or courses
Sold
4977
Member since
4 year
Number of followers
3554
Documents
50910
Last sold
6 hours ago
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.9

907 reviews

5
434
4
160
3
164
2
45
1
104

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions