and Network Intrusion
Exam Prep
,Denial-of-service technique kr
An attack that sends a large amount of data to overwhelm system resources.
kr kr kr kr kr kr kr kr kr kr kr kr
Mail bombing A type of denial-of-
kr kr kr kr
service attack that involves sending a large volume of emails to a target.
kr kr kr kr kr kr kr kr kr kr kr kr
Acquiring data kr
The step in computer crime forensics that requires an investigator to duplicate and image th
kr kr kr kr kr kr kr kr kr kr kr kr kr kr
e collected digital information.
kr kr kr
Testifying in court kr kr
The last step of a criminal investigation that requires the involvement of a computer forensi
kr kr kr kr kr kr kr kr kr kr kr kr kr kr
c investigator.
kr
Verifying an Android mobile device kr kr kr kr
Checking to see if it is plugged into a computer without potentially changing the original evi kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr
dence.
Aluminum foil An alternative to a Faraday bag for protecting a mobile device.
kr kr kr kr kr kr kr kr kr kr kr
Search warrant innovation criterion
kr kr kr
Availability to the general public determines whether a technology requires a search warra kr kr kr kr kr kr kr kr kr kr kr kr
nt.
Seizing a hard drive without a warrant
kr kr kr kr kr kr
A law enforcement officer can seize a hard drive if the evidence is in imminent danger.
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr
Investigation report kr
A legal document that contains a summary of findings and is used to prosecute.
kr kr kr kr kr kr kr kr kr kr kr kr kr
Faraday bag kr A protective bag used to prevent signals from reaching a mobile phone.
kr kr kr kr kr kr kr kr kr kr kr
Ethical behavior while testifying
kr kr kr
Providing and explaining facts found during the investigation. kr kr kr kr kr kr kr
Search and seizure compliance
kr kr kr
What a government agent should have complied with during search and seizure in a case in
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr
volving malware. kr
Flashing lights kr
A method for a forensic investigator to verify an Android mobile device is on without interac
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr
ting with the operating system.
kr kr kr kr
Sturdy container kr An alternative to a Faraday bag for protecting a mobile device.
kr kr kr kr kr kr kr kr kr kr
,Cardboard box An alternative to a Faraday bag for protecting a mobile device.
kr kr kr kr kr kr kr kr kr kr kr
Bubble wrap An alternative to a Faraday bag for protecting a mobile device.
kr kr kr kr kr kr kr kr kr kr kr
Dependency on third-party software kr kr kr
A criterion that may determine whether a technology used by government requires a searc
kr kr kr kr kr kr kr kr kr kr kr kr kr
h warrant.
kr
Implementation based on open source software kr kr kr kr kr
A criterion that may determine whether a technology used by government requires a searc
kr kr kr kr kr kr kr kr kr kr kr kr kr
h warrant.
kr
Use of cloud-based machine learning
kr kr kr kr
A criterion that may determine whether a technology used by government requires a searc
kr kr kr kr kr kr kr kr kr kr kr kr kr
h warrant.
kr
Suspicious occupant behavior kr kr
Not a valid reason for a law enforcement officer to seize a hard drive without a warrant.
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr
Unattended computer kr
Not a valid reason for a law enforcement officer to seize a hard drive without a warrant.
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr
Wide open front door
kr kr kr
Not a valid reason for a law enforcement officer to seize a hard drive without a warrant.
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr
Fourth Amendment kr
A part of the United States Constitution that protects citizens from unreasonable searches a
kr kr kr kr kr kr kr kr kr kr kr kr kr
nd seizures.
kr
Stored Communications Act kr kr
A law that governs the voluntary and involuntary disclosure of stored wire and electronic co
kr kr kr kr kr kr kr kr kr kr kr kr kr kr
mmunications and transactional records. kr kr kr
Net Neutrality Bill
kr kr
Legislation that aims to ensure that internet service providers treat all data on the internet t kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr
he same, without discriminating or charging differently.
kr kr kr kr kr kr
Federal Rules of Evidence kr kr kr
A set of rules that governs the introduction of evidence at civil and criminal trials in federal c
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr
ourts.
Stego-only
A method used in steganography where only the stego object is available to the investigator.
kr kr kr kr kr kr kr kr kr kr kr kr kr kr
, Known-stego
A method where the investigator has access to both the stego object and the method used t
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr
o hide the information.
kr kr kr
Known-message
A method where the investigator has access to the plaintext message and uses it to find the
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr
hidden information. kr
Chosen-message
A method where the investigator can choose a plaintext message and analyze it to find the h
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr
idden information.
kr
Linux An open-source operating system based on the Linux kernel.
kr kr kr kr kr kr kr kr
OS X kr An operating system developed by Apple Inc. for Macintosh computers.
kr kr kr kr kr kr kr kr kr
UNIX A powerful, multiuser operating system originally developed in the 1960s and 1970s.
kr kr kr kr kr kr kr kr kr kr kr
Windows A series of operating systems developed by Microsoft for personal computers.
kr kr kr kr kr kr kr kr kr kr
Cain and Abel
kr kr
A password recovery tool for Microsoft Windows that can recover passwords by sniffing the
kr kr kr kr kr kr kr kr kr kr kr kr kr kr
network, cracking encrypted passwords, and more.
kr kr kr kr kr
DaveGrohl
A password cracker specifically designed to recover passwords on OS X operating systems.
kr kr kr kr kr kr kr kr kr kr kr kr
L0phtCrack A password auditing and recovery application for Windows.
kr kr kr kr kr kr kr
Ophcrack An open-source Windows password cracker based on rainbow tables.
kr kr kr kr kr kr kr kr
Wireshark
A network protocol analyzer that allows for the capture and analysis of network traffic.
kr kr kr kr kr kr kr kr kr kr kr kr kr
Administrative
A type of cybercrime investigation approach focused on enforcing company policies and reg
kr kr kr kr kr kr kr kr kr kr kr kr
ulations.
Enterprise Theory of Investigation kr kr kr
A model that applies a holistic approach toward any criminal activity as a criminal operation
kr kr kr kr kr kr kr kr kr kr kr kr kr kr
.
Court warrant kr
A legal document issued by a judge authorizing law enforcement to conduct a search or seiz
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr
ure.