Diaz_Assignment7
pdf
keyboard_arrow_up
School
Valencia College *
*We aren’t endorsed by this school
Course
2414C
Subject
Information Systems
Date
Dec 6, 2023
Type
Pages
3
Uploaded by KidGrasshopper3117
Assignment 7: Cybercrime Investigations
Instructions:
Read each question and fill in the blanks with words from the
word bank below.
The answers can be found in
Chapters 11 & 12
of
Cybercrime, Second Edition: Investigating High-Technology Computer Crime by
Robert Moore.
Question 1:
__________ is a term used to describe the application of scientific
techniques to the investigation of criminal activities and the presentation of
evidence at trial.
Question 2:
Any activity on a computer or computer network can potentially be
tracked, and evidence that is deleted may still be recoverable.
This new trail of
electronic or digital evidence has been termed the __________.
Question 3:
In a file system like, NTFS,
after you’ve deleted a file,
the difference
between the space needed to store the original file and the new file replacing it is
known as the __________.
Question 4:
__________ are small bits of data that websites use to recognize
returning visitors.
Question 5:
The first step in the computer forensics process will normally involve
the __________ of the suspect’s hard drive or other digital storage media.
Question 6:
The copying of data is sometimes referred to a __________ because
analyst make a bit-by-bit image of the original storage media.
Question 7:
A __________ is a 32-
character value that is representative of a disk’s
content.
Question 8:
Sophisticated criminals who are familiar with computer technology
and operating system mechanisms may attempt to use this technique, __________,
as a simple means of hiding images and making them appear to be only documents.
Question 9:
Many consider the __________ to be the most tedious and unexciting
part of the high-technology crime investigation.
Question 10:
The final step of a digital investigation is completing a well-written
__________ concerning the evidence that was uncovered during the investigation.
Question 11:
__________ manufactured by Guidance Software, is considered one
of the best computer forensics packag
es available because of the software’s various
component packages.
Question 12:
In __________, a woman brought forth charges against a drug
company in which she claimed that the birth defects of her child were caused by
medication produced by the company, the case introduced the admission of
scientific evidence into the federal trial system.
Question 13:
The issue in __________, was whether scientific evidence relating to
blood pressure and its effects during the course of telling a lie could be introduced
during a criminal trial.
Question 14:
Even if digital evidence in general is deemed to be admissible under
the criteria necessary for scientific evidence, there is still the need to __________
the digital evidence and establish the __________ for such evidence.
Question 15
:
Denning defined __________ as “unlawful attacks and threats of
attack against computers, networks, and the information stored therein when done
to intimidate or coerce a government or its people in furtherance of political and
social objectives.”
Question 16:
__________ was a mock attack, orchestrated by the NSA, where 35
hackers where asked to launch a simulated attack on government agency computer
systems to see if they had adequate security measures in place.
Question 17:
The __________ refers to the belief that punishment is used to
ensure that a person does not want to engage in future criminal behavior.
Question 18:
Control of high-technology crime is believed by some to be
associated with __________ of victims.
Question 19
: __________ refers to the sharing of cultural, capital or technological
ideas.
Questions 20
: One of the issues with passing international legislation is that what
is deemed __________ in one country may not be deemed so in another.
Word Bank
Encase
Duplication
Report
Frye v. United States
Digital Trail
Hash Value
Changing File Signatures
Daubert v. Merrell Dow Pharmaceuticals
Deterrence Theory
Globalization
Criminal Behavior
Slack Space
Forensic Analysis
Target Hardening
Imaging
Cookies
Operation Eligible Receiver
Forensic Science
Cyberterrorism
Authenticate, Chain of Custody
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help