Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
33 Cards in this Set
- Front
- Back
Private IP address |
three groups of IP addresses are specifically reserved for use by any private network and are not seen on the public internet |
|
dynamic ip |
temporarily assigned from a pool of available addresses registered to an ISP |
|
static ip |
are permanently assigned to devices configured to always have the same ip address (commonly used when a person, business, or org is maintaining a constant internet presence such as a website) |
|
Domain name system (DNS) servers |
"phonebooks of the internet" directories that match ip addresses with registered domains and resolve the text that people understand into a format that devices understand |
|
ip masking |
a method of hiding or obscuring the true source ip address |
|
ip spoofing |
method of impersonating another system's ip address |
|
ip redirecting |
a method of forwarding or routing internet traffic to an obscured ip address |
|
FTP (file transfer protocol) |
client-server model any computer can be the server, using software |
|
peer-to-peer (p2p) |
directly b/t computers and does not require a server to transfer files |
|
network intrusion |
unauthorized access or access in excess of user's privileges on a network |
|
service set identifier (SSID) |
is an identifier included in packets to allow the differentiation b/t multiple wireless networks |
|
wired equivalent privacy (WEP) |
a form of encryption that is used to protect wireless communication from eavesdropping and to prevent unauthorized access to a wireless network |
|
dynamic host configuration protocol (DHCP) |
a system can automatically configure and is allowed to connect to the network |
|
search warrant |
a court order issued by magistrate, judge or supreme court official that authorize law enforcement officers to conduct a search of a person, location, or vehicle for evidence of a crime and to confiscate evidence if it is found. (cannot be issued in aid of a civil process) |
|
court order |
an official proclamation by a judge that defines the legal relationship b/t the parties to a hearing, trial, appeal or other court proceedings. (signed by a judge) |
|
subpoena |
a writ by a government agency most often a court that has authority to compel testimony by a witness or production of evidence under penalty or failure |
|
black's law dictionary |
the bible for legal definitions |
|
traditional seizure methodology |
1. secure physical scene 2. secure digital scene 3. seize all hardware and media 4. document label and package for delivery to lab 5. at the lab, all seized data is analyzed |
|
seizure methodology featuring minimization |
1. secure physical scene 2. secure digital scene 3.(digital media identification)(minimize crime scene by prioritizing the physical media)(seizure of storage devices and media) 4. document, label and package for delivery to lab 5. at the lab, all seized data is analyzed |
|
removable media |
flash drive, cds, dvds |
|
flash media |
key chains, watches, cameras |
|
imaging |
creats a bit-stream copy- an exact cops pf 1s and 0s perserves the exact order of bits |
|
ram dump |
use of a program to view the computers logs |
|
simple hex and command line scripts |
assist the examiner in performing keyword searches, sorting data objects, and sourcing the source disk for file remnants in file slack and drive free space |
|
latent evidence |
finger prints, blood, physical evidence |
|
corporation vision statement |
design, produce and sell a high quality widget and thus expand market shares while continuing to improve processes to manage cost and meet customers' expectations |
|
security department vision statement |
in partnership with our customers, provide a competitive advantage for the corporation by continuous protection of all the corporations assets without hindering productivity and support increased production or corporate widgets in a cost effective manner |
|
cyber crime prevention vision statement |
provide the most efficient and effective cyber crime prevention program for the corporation, which adds value to teh corporate products and services as a recognized leader in the industry |
|
risk management |
to be cost-effective you must apply risk management concepts |
|
atactical plan |
a short-range (3 year) plan that supports the corporate cyber crime prevention strategic plan goals and objectives |
|
law enforcement |
detecting criminal activity, identifying and apprehending suspects, and gathering evidence necessary to comvict a suspect in court |
|
court system |
examining presented by both the prosecution and defense, rendering a verdict and deciding punishment |
|
correction system |
the corrections system carries out the punishment |