extended_Module_K_Notes

extended_Module_K_Notes - Extended Learning Module K Theory...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Extended Learning Module K Theory Notes – Computer Crime and Forensics What I consider important in this chapter This module has two major themes. The first is the type of computer crime that organizations are vulnerable to and the second is computer forensics - the process of investigating electronic information for presentation in court. The first section covers computer crime perpetrated outside and inside the organization and covers various types computer viruses different kinds of hackers, and their motivations and activities the types of crimes that are perpetrated by “insiders” The second addresses the definition of computer forensics and the two phases of a computer forensics investigation. 1. The collection phase, which is the collection, protection, and preservation of evidence on computers and networks. Here we discuss the steps and important considerations in conducting a computer forensics investigation so that information on storage media is not changed, deleted, or damaged in any way (key terms – forensic image copy and MD5 hash value ). 2. The analysis phase, which is the part of the investigation where the clues are interpreted and the story of the crime revealed. The third and last section discusses how and where information on storage devices can be recovered. The discussion includes where to look for hidden information, and the ways in which people try to hide information on computer storage devices. The last part of this section is a short essay on the types of cases that real-life computer forensics experts have dealt with and how they solved them. KEY TERMS AND CONCEPTS Black-hat hacker 471 Computer crime 463 Computer forensics 474 Computer virus (virus) 463 Cracker 471 Cyberterrorist 472 Denial-of-service (DoS) attack 467 Distributed denial-of-service (DDoS) attack 467 Encryption 484 Forensic image copy 476 Hacker 471 Hacktivist 471 Key logger (key trapper) software 467 Macro virus 463 MD5 hash value 476 Script kiddie (script bunny) 472 Slack space 482 Social engineering 471 Spoofing 467
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Extended Learning Module K Theory Notes – Computer Crime and Forensics Steganography 485 Thrill-seeker hacker 471 Trojan-horse virus 467 Unallocated space 483 White-hat (ethical) hacker 471 Worm 463 INTRODUCTION This module covers crime outside and inside the organization and also the process of detection of evidence on computers, a field called computer forensics. Key Points and Terms: Computers are used as weapons and targets of crime (see Figure K.1 on page 462). Computers are used as weapons when they are used to commit the offence, as in stealing money by transferring it electronically. Computers are the targets of crime when the objective is to abuse the computer or network in some way. COMPUTER CRIME
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 6

extended_Module_K_Notes - Extended Learning Module K Theory...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online