Save
Reporting
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Pamela
Visit profile
Cards (58)
What is 'voluntary surrender' in digital forensics?
Owner gives permission for
examination
View source
How should permission for examination be obtained?
Voluntarily
, via phone, email, or mail
View source
What is 'Forensic Readiness'?
Ability to collect and analyze
digital evidence
View source
What guidelines do most companies follow for digital evidence?
ACPO
guidelines
View source
Why should companies monitor computer use?
To detect
unusual
activity early
View source
What can Artificial Intelligence software do in digital forensics?
Spot unusual activity like
malware
View source
Why must records of computer use be treated as potential evidence?
To protect against
loss
or damage
View source
What is the 'chain of custody' in digital forensics?
Record of evidence
access and handling
View source
What does Forensic Readiness ensure in case of a crime?
Availability
of evidence for quick investigation
View source
What standard must companies demonstrate compliance with for evidence?
BSI 0008
View source
What happens if evidence is not collected according to BS 0008?
It will not be
accepted
in court
View source
What are the three basic phases of a Digital Forensics investigation?
Acquisition
Analysis
Reporting
View source
What is the purpose of the Acquisition stage in digital forensics?
To collect and preserve
original data
View source
What must be done before removing digital devices from a crime scene?
Identify
and
record
the devices
View source
Why is it crucial to preserve original data during acquisition?
To ensure evidence can be
challenged
in court
View source
What do Digital Forensic Technicians do during acquisition?
Capture and preserve
device memory
View source
How should battery-powered devices be handled during acquisition?
Unplugged and isolated from
power supply
View source
What is the importance of using evidence bags for devices?
To
prevent
changes to the devices
View source
What should be done if changes occur to a device during examination?
Record the changes for
court
explanation
View source
What types of information can a Digital Forensics examiner access?
Active programs
,
usernames
, and
logs
View source
What is FTK Imager used for?
To capture memory of
Windows
computers
View source
What does EnCase software do in digital forensics?
Analyzes data and produces
court-accepted
reports
View source
What is a 'pcap' file?
A
packet capture
file for network analysis
View source
What records do phone service providers maintain?
Call history
and
location data
View source
What challenges do manufacturers face with data encryption?
It makes
data recovery
harder but not impossible
View source
How do mobile devices store location data?
Records
location even when not in use
View source
What is the role of network analysis software?
To monitor and analyze
network traffic
View source
What is the purpose of using a Write Blocker?
To prevent changes to the
original data
View source
What can be retrieved from smartphones during forensic examination?
Deleted files
and
location history
View source
What is the significance of the 'First Principle' in digital forensics?
Ensures
proper procedures
are followed
View source
How does the use of digital forensics evolve with cyberattacks?
New challenges arise for
data inspection
View source
What information does a detailed call history contain?
Location
, number called,
date
, time,
duration
View source
Why do mobile devices contain deleted files?
They can be
retrieved
and examined later
View source
What additional records do smartphones contain?
Records of
location
and time when
switched
on
View source
What is the impact of encryption on data recovery?
It makes recovery
harder
but not impossible
View source
How do cyberattacks affect data inspection for forensic examination?
They
introduce
new
challenges
for
data inspection
View source
What do criminals want users to overlook?
The security aspects of the
World Wide Web
View source
What does a VPN do for communications?
It
encrypts
all communications for security
View source
What is steganalysis?
A process to detect
hidden
files
View source
What is a steganogram?
A package
concealed
within a cover file
View source
See all 58 cards
See similar decks
7.5.2.3 Reporting Psychological Investigations
AQA A-Level Psychology > 7. Research Methods > 7.5 Data Analysis > 7.5.2 Inferential Statistics
53 cards
7.1.4 Reporting Findings
OCR GCSE Biology > B7: Practical Skills > 7.1 Practical Activity Skills
83 cards
11.5.4 Reporting Findings
Edexcel GCSE Psychology > Topic 11: Research Methods – How do you carry out psychological research? > 11.5 Research Procedures
45 cards
11.5.4 Reporting Findings
Edexcel GCSE Psychology > Topic 11: Research Methods – How do you carry out psychological research? > 11.5 Research Procedures
74 cards
7.4 Reporting Findings
AQA A-Level Environmental Science > 7. Research Methods
93 cards
3.2 Recording transactions
AQA A-Level Accounting > 3. The double entry model
53 cards
3.4.3 Recording Submissions
AQA A-Level Music > 3. Composition > 3.4 Portfolio Compilation
50 cards
C7.2.3 Recording and Analyzing Data
OCR GCSE Chemistry > Topic C7: Practical Skills > C7.2 Developing Practical Skills
53 cards
7.4.2 Presentations
AQA A-Level Environmental Science > 7. Research Methods > 7.4 Reporting Findings
29 cards
7.4.1 Scientific Writing
AQA A-Level Environmental Science > 7. Research Methods > 7.4 Reporting Findings
64 cards
Financial Reporting
113 cards
Resources
Financial Reporting
13 cards
Financial Reporting MN2115
2nd Year
33 cards
financial reporting week 9
54 cards
financial reporting week 8
50 cards
financial reporting week 7
88 cards
Non currents assets
Financial Reporting
8 cards
Inventory build up
Financial Reporting
8 cards
Recording transactions
Financial Accounting
30 cards
formally reporting results
Research Skills A - QUANT
22 cards
Inventory valuation: Indistinguishable Goods
Financial Reporting
15 cards