{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

extended_Module_K_Notes

extended_Module_K_Notes - Extended Learning Module K Theory...

Info icon This preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Extended Learning Module K Theory Notes – Computer Crime and Forensics What I consider important in this chapter This module has two major themes. The first is the type of computer crime that organizations are vulnerable to and the second is computer forensics - the process of investigating electronic information for presentation in court. The first section covers computer crime perpetrated outside and inside the organization and covers various types computer viruses different kinds of hackers, and their motivations and activities the types of crimes that are perpetrated by “insiders” The second addresses the definition of computer forensics and the two phases of a computer forensics investigation. 1. The collection phase, which is the collection, protection, and preservation of evidence on computers and networks. Here we discuss the steps and important considerations in conducting a computer forensics investigation so that information on storage media is not changed, deleted, or damaged in any way (key terms – forensic image copy and MD5 hash value ). 2. The analysis phase, which is the part of the investigation where the clues are interpreted and the story of the crime revealed. The third and last section discusses how and where information on storage devices can be recovered. The discussion includes where to look for hidden information, and the ways in which people try to hide information on computer storage devices. The last part of this section is a short essay on the types of cases that real-life computer forensics experts have dealt with and how they solved them. KEY TERMS AND CONCEPTS Black-hat hacker 471 Computer crime 463 Computer forensics 474 Computer virus (virus) 463 Cracker 471 Cyberterrorist 472 Denial-of-service (DoS) attack 467 Distributed denial-of-service (DDoS) attack 467 Encryption 484 Forensic image copy 476 Hacker 471 Hacktivist 471 Key logger (key trapper) software 467 Macro virus 463 MD5 hash value 476 Script kiddie (script bunny) 472 Slack space 482 Social engineering 471 Spoofing 467 1
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon