Diaz_Assignment7

pdf

School

Valencia College *

*We aren’t endorsed by this school

Course

2414C

Subject

Information Systems

Date

Dec 6, 2023

Type

pdf

Pages

3

Uploaded by KidGrasshopper3117

Report
Assignment 7: Cybercrime Investigations Instructions: Read each question and fill in the blanks with words from the word bank below. The answers can be found in Chapters 11 & 12 of Cybercrime, Second Edition: Investigating High-Technology Computer Crime by Robert Moore. Question 1: __________ is a term used to describe the application of scientific techniques to the investigation of criminal activities and the presentation of evidence at trial. Question 2: Any activity on a computer or computer network can potentially be tracked, and evidence that is deleted may still be recoverable. This new trail of electronic or digital evidence has been termed the __________. Question 3: In a file system like, NTFS, after you’ve deleted a file, the difference between the space needed to store the original file and the new file replacing it is known as the __________. Question 4: __________ are small bits of data that websites use to recognize returning visitors. Question 5: The first step in the computer forensics process will normally involve the __________ of the suspect’s hard drive or other digital storage media. Question 6: The copying of data is sometimes referred to a __________ because analyst make a bit-by-bit image of the original storage media. Question 7: A __________ is a 32- character value that is representative of a disk’s content. Question 8: Sophisticated criminals who are familiar with computer technology and operating system mechanisms may attempt to use this technique, __________, as a simple means of hiding images and making them appear to be only documents. Question 9: Many consider the __________ to be the most tedious and unexciting part of the high-technology crime investigation. Question 10: The final step of a digital investigation is completing a well-written __________ concerning the evidence that was uncovered during the investigation.
Question 11: __________ manufactured by Guidance Software, is considered one of the best computer forensics packag es available because of the software’s various component packages. Question 12: In __________, a woman brought forth charges against a drug company in which she claimed that the birth defects of her child were caused by medication produced by the company, the case introduced the admission of scientific evidence into the federal trial system. Question 13: The issue in __________, was whether scientific evidence relating to blood pressure and its effects during the course of telling a lie could be introduced during a criminal trial. Question 14: Even if digital evidence in general is deemed to be admissible under the criteria necessary for scientific evidence, there is still the need to __________ the digital evidence and establish the __________ for such evidence. Question 15 : Denning defined __________ as “unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political and social objectives.” Question 16: __________ was a mock attack, orchestrated by the NSA, where 35 hackers where asked to launch a simulated attack on government agency computer systems to see if they had adequate security measures in place. Question 17: The __________ refers to the belief that punishment is used to ensure that a person does not want to engage in future criminal behavior. Question 18: Control of high-technology crime is believed by some to be associated with __________ of victims. Question 19 : __________ refers to the sharing of cultural, capital or technological ideas. Questions 20 : One of the issues with passing international legislation is that what is deemed __________ in one country may not be deemed so in another.
Word Bank Encase Duplication Report Frye v. United States Digital Trail Hash Value Changing File Signatures Daubert v. Merrell Dow Pharmaceuticals Deterrence Theory Globalization Criminal Behavior Slack Space Forensic Analysis Target Hardening Imaging Cookies Operation Eligible Receiver Forensic Science Cyberterrorism Authenticate, Chain of Custody
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help